query_id
stringlengths
32
32
query
stringlengths
6
2.48k
positive_passages
listlengths
1
17
negative_passages
listlengths
10
100
subset
stringclasses
7 values
49314da7c3f67befa38bc30956b93cbd
The evolution of foresight: What is mental time travel, and is it unique to humans?
[ { "docid": "566a2b2ff835d10e0660fb89fd6ae618", "text": "We argue that an understanding of the faculty of language requires substantial interdisciplinary cooperation. We suggest how current developments in linguistics can be profitably wedded to work in evolutionary biology, anthropology, psychology, and neuroscience. We submit that a distinction should be made between the faculty of language in the broad sense (FLB) and in the narrow sense (FLN). FLB includes a sensory-motor system, a conceptual-intentional system, and the computational mechanisms for recursion, providing the capacity to generate an infinite range of expressions from a finite set of elements. We hypothesize that FLN only includes recursion and is the only uniquely human component of the faculty of language. We further argue that FLN may have evolved for reasons other than language, hence comparative studies might look for evidence of such computations outside of the domain of communication (for example, number, navigation, and social relations).", "title": "" } ]
[ { "docid": "8a34a79e1c0d8996ffbd97285749542d", "text": "Currency duplication also is known as counterfeit currency is a vulnerable threat to Economy.it is now a common phenomenon due to advanced printing and scanning technology. Bangladesh has been facing the serious problem by increasing rate of fake note in the market.to get rid of this problem various fake not detection methods are available around the world and most of these are hardware based and costly.in the present paper an automated image-based technique is described for the detection of fake banknotes in Bangladesh. Security features of banknote such as watermark, micro-printing, and hologram etc., are extracted from the banknote images and then detection is performed using “Mathlab tools”", "title": "" }, { "docid": "ed6a69d040a53bec208cf3f0fc5076e9", "text": "The Buddhist construct of mindfulness is a central element of mindfulness-based interventions and derives from a systematic phenomenological programme developed over several millennia to investigate subjective experience. Enthusiasm for ‘mindfulness’ in Western psychological and other science has resulted in proliferation of definitions, operationalizations and self-report inventories that purport tomeasure mindful awareness as a trait. This paper addresses a number of seemingly intractable issues regarding current attempts to characterize mindfulness and also highlights a number of vulnerabilities in this domain that may lead to denaturing, distortion, dilution or reification of Buddhist constructs related to mindfulness. Enriching positivist Western psychological paradigms with a detailed and complex Buddhist phenomenology of the mind may require greater study and long-term direct practice of insight meditation than is currently common among psychologists and other scientists. Pursuit of such an approach would seem a necessary precondition for attempts to characterize and quantify mindfulness.", "title": "" }, { "docid": "74378f7c4cb0217fad37bc9cd9e6f91a", "text": "Multiple sclerosis (MS) is a multi-focal progressive disorder of the central nervous system often resulting in diverse clinical manifestations. Imbalance appears in most people with multiple sclerosis (PwMS). A popular balance training tool is virtual reality (VR) with several advantages including increased compliance and user satisfaction. Therefore, the aim of this pilot RCT (Trial registration number, date: ISRCTN14425615, 21/01/2016) was to examine the efficacy of a 6-week VR balance training program using the computer assisted rehabilitation environment (CAREN) system (Motek Medical BV, Amsterdam, Netherlands) on balance measures in PwMS. Results were compared with those of a conventional balance exercise group. Secondary aims included the impact of this program on the fear of falling. Thirty-two PwMS were equally randomized into the VR intervention group or the control group. Each group received balance training sessions for 6 consecutive weeks, two sessions per week, 30 min sessions. Clinical balance tests and instrumented posturography outcome measures were collected upon initiation of the intervention programs and at termination. Final analysis included 30 patients (19 females, 11 males; mean age, (S.D.) = 45.2 (11.6) years; mean EDSS (S.D.) = 4.1 (1.3), mean disease duration (S.D.) = 11.0 (8.9) years). Both groups showed a main effect of time on the center of pressure (CoP) path length with eyes open (F = 5.278, P = .024), sway rate with eyes open (F = 5.852, P = .035), Functional Reach Test (F = 20.841, P = .001), Four Square Step Test (F = 9.011, P = .031) and the Fear of Falls self-reported questionnaire (F = 17.815, P = .023). In addition, significant differences in favor of the VR program were observed for the group x time interactions of the Functional Reach Test (F = 10.173, P = .009) and fear of falling (F = 6.710, P = .021). We demonstrated that balance training based on the CAREN device is an effective method of balance training for PwMS.", "title": "" }, { "docid": "17734cba2928aee20a869c7a79208627", "text": "We describe a method called Predestination that uses a history of a driver’s destinations, along with data about driving behaviors, to predict where a driver is going as a trip progresses. Driving behaviors include types of destinations, driving efficiency, and trip times. Beyond considering previously visited destinations, Predestination leverages an open-world modeling methodology that considers the likelihood of users visiting previously unobserved locations based on trends in the data and on the background properties of locations. This allows our algorithm to smoothly transition between “out of the box” with no training data to more fully trained with increasing numbers of observations. Multiple components of the analysis are fused via Bayesian inference to produce a probabilistic map of destinations. Our algorithm was trained and tested on hold-out data drawn from a database of GPS driving data gathered from 169 different subjects who drove 7,335 different trips.", "title": "" }, { "docid": "319861af7abf646628c9d6873cb18c23", "text": "In this paper, the transceiver which incorporates a PLL using a ring voltage-controlled oscillator (VCO), a phase interpolator (PI), the quarter-rate linear phase detector (PD) and an output driver with pre-emphasis is presented. The phase detector which uses a clock whose frequency is a quarter of the data rate and reduces the phase offset is proposed. The transceiver, implemented in a 0.18-mum CMOS technology, operates at 3.2-Gb/s over a 10-cm PCB line with the bit error rate (BER) of less than 10-12. The chip area is 3.7 times 2.5 mm2 and the core without I/O consumes 45-mA and I/O buffers consume 80-mA from a 1.8-V supply.", "title": "" }, { "docid": "304393092575799920363fdcea0daca4", "text": "We present ClearView, a system for automatically patching errors in deployed software. ClearView works on stripped Windows x86 binaries without any need for source code, debugging information, or other external information, and without human intervention.\n ClearView (1) observes normal executions to learn invariants thatcharacterize the application's normal behavior, (2) uses error detectors to distinguish normal executions from erroneous executions, (3) identifies violations of learned invariants that occur during erroneous executions, (4) generates candidate repair patches that enforce selected invariants by changing the state or flow of control to make the invariant true, and (5) observes the continued execution of patched applications to select the most successful patch.\n ClearView is designed to correct errors in software with high availability requirements. Aspects of ClearView that make it particularly appropriate for this context include its ability to generate patches without human intervention, apply and remove patchesto and from running applications without requiring restarts or otherwise perturbing the execution, and identify and discard ineffective or damaging patches by evaluating the continued behavior of patched applications.\n ClearView was evaluated in a Red Team exercise designed to test its ability to successfully survive attacks that exploit security vulnerabilities. A hostile external Red Team developed ten code injection exploits and used these exploits to repeatedly attack an application protected by ClearView. ClearView detected and blocked all of the attacks. For seven of the ten exploits, ClearView automatically generated patches that corrected the error, enabling the application to survive the attacks and continue on to successfully process subsequent inputs. Finally, the Red Team attempted to make Clear-View apply an undesirable patch, but ClearView's patch evaluation mechanism enabled ClearView to identify and discard both ineffective patches and damaging patches.", "title": "" }, { "docid": "f3d03c33d011d4bdd350f558cae922e1", "text": "In a laboratory environment, the practicality and scope of experiments is often constrained by time and financial resources. In the digital hardware design arena, the development of programmable logic devices, such as field--programmable gate arrays (FPGAs), has greatly enhanced the student’s ability to design and synthesize complete systems within a short period of time and at a reasonable cost. Unfortunately, analog circuit design and signal processing have not enjoyed similar advances. However, new advances in field--programmable analog arrays (FPAAs) have created many new opportunities in analog circuit design and signal processing education. This paper will investigate the usefulness of these FPAAs as viable pedagogical tools. It will also explore the new methodologies in analog signal processing education that are available when FPAAs are brought into the classroom.", "title": "" }, { "docid": "2d8769414f82a209cdf38e46f64ab02b", "text": "Software Defined Network (SDN) is a revolutionary networking paradigm system in which network control plane is separated from data plane and assigned to a devoted software program called controller running at a control layer. SDN makes networks wholly controlled through software applications and gives a hope to change the limitations of current networks infrastructures. Since the emergence of SDN, it has introduced a radical change in network architecture which simplified the control of networks, but on the other hand many challenges have arisen. One of the fundamental issues which exposed due to the new architecture of SDN is the security risks. Network firewall is an essential component for securing traffic by enforcing security policies. This study aims to implement some firewall functionalities on SDN through writing some firewall applications that run on the top of the SDN POX controller. The firewall application which is working at layer2, layer3 and layer4 capable of detecting the traffic and enforcing specified rules. Our firewall filters packets based on their headers and matches them against the predefined policies. If there is matching found, the packet is blocked otherwise it is forwarded. We have selected POX a python-based SDN controller and Open vSwitch for the experiment. To create the SDN network topology, we have used VirtualBox and Mininet. Wireshark and Iperf have been used to analyze the performance of firewall module. In this study, we cover the implementation details of firewall application, experimentation result as well as providing a performance analysis of the firewall module.", "title": "" }, { "docid": "2897897e683e94b921799e72ebf99b4a", "text": "Recurrent neural networks have achieved excellent performance in many applications. However, on portable devices with limited resources, the models are often too large to deploy. For applications on the server with large scale concurrent requests, the latency during inference can also be very critical for costly computing resources. In this work, we address these problems by quantizing the network, both weights and activations, into multiple binary codes {−1,+1}. We formulate the quantization as an optimization problem. Under the key observation that once the quantization coefficients are fixed the binary codes can be derived efficiently by binary search tree, alternating minimization is then applied. We test the quantization for two well-known RNNs, i.e., long short term memory (LSTM) and gated recurrent unit (GRU), on the language models. Compared with the full-precision counter part, by 2-bit quantization we can achieve ∼16× memory saving and ∼6× real inference acceleration on CPUs, with only a reasonable loss in the accuracy. By 3-bit quantization, we can achieve almost no loss in the accuracy or even surpass the original model, with ∼10.5× memory saving and ∼3× real inference acceleration. Both results beat the exiting quantization works with large margins. We extend our alternating quantization to image classification tasks. In both RNNs and feedforward neural networks, the method also achieves excellent performance.", "title": "" }, { "docid": "908847bed52b13c380d84cf3eef9c51a", "text": "This paper discusses the future of power transmission in U.S. The revolution in distribution must be accompanied by the continued evolution of the transmission system. It is to find the political alignment that is needed to accept the vision and move forward aggressively. For transmission, that means recognizing that new lines, not just better lines, will be needed. United States has allowed fragmented responsibility for transmission additions to slow the process to an unacceptable extent.", "title": "" }, { "docid": "eb00b73abb24e2592bce9c53d5417333", "text": "OBJECTIVE\nTo assess the performance of magnetic resonance venography (MRV) for pelvis and deep vein thrombosis in the lower extremities before surgical interventions for varicose veins.\n\n\nMATERIALS AND METHODS\nWe enrolled 72 patients who underwent MRV and ultrasonography before stripping for varicose veins of lower extremities. All images of the deep venous systems were evaluated by time-of-flight MRV.\n\n\nRESULTS\nForty-six patients (63.9%) of all were female. Mean age was 65.2 ± 10.2 years (37-81 years). There were forty patients (55.6%) with varicose veins in both legs. Two deep vein thrombosis (2.8%) and three iliac vein thrombosis (4.2%) were diagnosed. All patients without deep vein thrombosis underwent the stripping of saphenous veins, and post-thrombotic change was avoided in all cases.\n\n\nCONCLUSION\nMRV, without contrast medium, is considered clinically useful for the lower extremity venous system.", "title": "" }, { "docid": "971227f276624394bf87678186d99e2d", "text": "Some of the most challenging issues in data outsourcing scenario are the enforcement of authorization policies and the support of policy updates. Ciphertext-policy attribute-based encryption is a promising cryptographic solution to these issues for enforcing access control policies defined by a data owner on outsourced data. However, the problem of applying the attribute-based encryption in an outsourced architecture introduces several challenges with regard to the attribute and user revocation. In this paper, we propose an access control mechanism using ciphertext-policy attribute-based encryption to enforce access control policies with efficient attribute and user revocation capability. The fine-grained access control can be achieved by dual encryption mechanism which takes advantage of the attribute-based encryption and selective group key distribution in each attribute group. We demonstrate how to apply the proposed mechanism to securely manage the outsourced data. The analysis results indicate that the proposed scheme is efficient and secure in the data outsourcing systems.", "title": "" }, { "docid": "eccae386c0b8c053abda46537efbd792", "text": "Software Defined Networking (SDN) has recently emerged as a new network management platform. The centralized control architecture presents many new opportunities. Among the network management tasks, measurement is one of the most important and challenging one. Researchers have proposed many solutions to better utilize SDN for network measurement. Among them, how to detect Distributed Denial-of-Services (DDoS) quickly and precisely is a very challenging problem. In this paper, we propose methods to detect DDoS attacks leveraging on SDN's flow monitoring capability. Our methods utilize measurement resources available in the whole SDN network to adaptively balance the coverage and granularity of attack detection. Through simulations we demonstrate that our methods can quickly locate potential DDoS victims and attackers by using a constrained number of flow monitoring rules.", "title": "" }, { "docid": "1d62ce41268eff90478f338131ca8dc3", "text": "T sale of digital items, such as avatars and decorative objects, is becoming an important source of revenue for virtual community (VC) websites. However, some websites are unable to leverage this source of revenue, and there is a corresponding lack of understanding about what motivates people to purchase digital items in VCs. To explain the phenomenon, we develop a model based on the theory of self-presentation. The model proposes that the desire for online self-presentation is a key driver for such purchases. We also hypothesize that the social influence factors of online self-presentation norms and VC involvement as well as personal control in the form of online presentation self-efficacy are antecedents of the desire for online self-presentation. The model was validated by using survey data collected from Cyworld (N = 217) and Habbo (N = 197), two online social network communities that have been pioneers in the sale of digital items. This work contributes to our understanding of the purchase of digital items by extending the theory of self-presentation and adds to the broader line of research on online identity. It also lends insights into how VC providers can tap this source of revenue.", "title": "" }, { "docid": "64cbd9f9644cc71f5108c3f2ee7851e7", "text": "The use of neurofeedback as an operant conditioning paradigm has disclosed that participants are able to gain some control over particular aspects of their electroencephalogram (EEG). Based on the association between theta activity (4-7 Hz) and working memory performance, and sensorimotor rhythm (SMR) activity (12-15 Hz) and attentional processing, we investigated the possibility that training healthy individuals to enhance either of these frequencies would specifically influence a particular aspect of cognitive performance, relative to a non-neurofeedback control-group. The results revealed that after eight sessions of neurofeedback the SMR-group were able to selectively enhance their SMR activity, as indexed by increased SMR/theta and SMR/beta ratios. In contrast, those trained to selectively enhance theta activity failed to exhibit any changes in their EEG. Furthermore, the SMR-group exhibited a significant and clear improvement in cued recall performance, using a semantic working memory task, and to a lesser extent showed improved accuracy of focused attentional processing using a 2-sequence continuous performance task. This suggests that normal healthy individuals can learn to increase a specific component of their EEG activity, and that such enhanced activity may facilitate semantic processing in a working memory task and to a lesser extent focused attention. We discuss possible mechanisms that could mediate such effects and indicate a number of directions for future research.", "title": "" }, { "docid": "495e2bcbd91580d1c58ca658fada40b6", "text": "Numerous activities in our daily life, including purchases, travels and access to services, require us to verify who we are by showing ID documents containing face images, such as passports and driver licenses. An automatic system for matching ID document photos to live face images in real time with high accuracy would speed up the verification process and reduce the burden on human operators. In this paper, we propose a new method, DocFace, for ID document photo matching using the transfer learning technique. We propose to use a pair of sibling networks to learn domain specific parameters from heterogeneous face pairs. Cross validation testing on an ID-Selfie dataset shows that while the best CNN-based general face matcher only achieves a TAR=61.14% at FAR=0.1% on the problem, the DocFace improves the TAR to 92.77%. Experimental results also indicate that given sufficiently large training data, a viable system for automatic ID document photo matching can be developed and deployed.", "title": "" }, { "docid": "1203f22bfdfc9ecd211dbd79a2043a6a", "text": "After a short introduction to classic cryptography we explain thoroughly how quantum cryptography works. We present then an elegant experimental realization based on a self-balanced interferometer with Faraday mirrors. This phase-coding setup needs no alignment of the interferometer nor polarization control, and therefore considerably facilitates the experiment. Moreover it features excellent fringe visibility. Next, we estimate the practical limits of quantum cryptography. The importance of the detector noise is illustrated and means of reducing it are presented. With present-day technologies maximum distances of about 70 kmwith bit rates of 100 Hzare achievable. PACS: 03.67.Dd; 85.60; 42.25; 33.55.A Cryptography is the art of hiding information in a string of bits meaningless to any unauthorized party. To achieve this goal, one uses encryption: a message is combined according to an algorithm with some additional secret information – the key – to produce a cryptogram. In the traditional terminology, Alice is the party encrypting and transmitting the message, Bob the one receiving it, and Eve the malevolent eavesdropper. For a crypto-system to be considered secure, it should be impossible to unlock the cryptogram without Bob’s key. In practice, this demand is often softened, and one requires only that the system is sufficiently difficult to crack. The idea is that the message should remain protected as long as the information it contains is valuable. There are two main classes of crypto-systems, the publickey and the secret-key crypto-systems: Public key systems are based on so-called one-way functions: given a certainx, it is easy to computef(x), but difficult to do the inverse, i.e. compute x from f(x). “Difficult” means that the task shall take a time that grows exponentially with the number of bits of the input. The RSA (Rivest, Shamir, Adleman) crypto-system for example is based on the factorizing of large integers. Anyone can compute 137 ×53 in a few seconds, but it may take a while to find the prime factors of 28 907. To transmit a message Bob chooses a private key (based on two large prime numbers) and computes from it a public key (based on the product of these numbers) which he discloses publicly. Now Alice can encrypt her message using this public key and transmit it to Bob, who decrypts it with the private key. Public key systems are very convenient and became very popular over the last 20 years, however, they suffer from two potential major flaws. To date, nobody knows for sure whether or not factorizing is indeed difficult. For known algorithms, the time for calculation increases exponentially with the number of input bits, and one can easily improve the safety of RSA by choosing a longer key. However, a fast algorithm for factorization would immediately annihilate the security of the RSA system. Although it has not been published yet, there is no guarantee that such an algorithm does not exist. Second, problems that are difficult for a classical computer could become easy for a quantum computer. With the recent developments in the theory of quantum computation, there are reasons to fear that building these machines will eventually become possible. If one of these two possibilities came true, RSA would become obsolete. One would then have no choice, but to turn to secret-key cryptosystems. Very convenient and broadly used are crypto-systems based on a public algorithm and a relatively short secret key. The DES (Data Encryption Standard, 1977) for example uses a 56-bit key and the same algorithm for coding and decoding. The secrecy of the cryptogram, however, depends again on the calculating power and the time of the eavesdropper. The only crypto-system providing proven, perfect secrecy is the “one-time pad” proposed by Vernam in 1935. With this scheme, a message is encrypted using a random key of equal length, by simply “adding” each bit of the message to the orresponding bit of the key. The scrambled text can then be sent to Bob, who decrypts the message by “subtracting” the same key. The bits of the ciphertext are as random as those of the key and consequently do not contain any information. Although perfectly secure, the problem with this system is that it is essential for Alice and Bob to share a common secret key, at least as long as the message they want to exchange, and use it only for a single encryption. This key must be transmitted by some trusted means or personal meeting, which turns out to be complex and expensive.", "title": "" }, { "docid": "a498773a517995670790536db1877e69", "text": "There has been a recent interest in counterforensics as an adversarial approach to forensic detectors. Most of the existing counterforensics strategies, although successful, are based on heuristic criteria, and their optimality is not proven. In this paper the optimal modification strategy of a content in order to fool a histogram-based forensics detector is derived. The proposed attack relies on the assumption of a convex cost function; special attention is paid to the Euclidean norm, obtaining the optimal attack in the MSE sense. In order to prove the usefulness of the proposed strategy, we employ it to successfully attack a well-known algorithm for detecting double JPEG compression.", "title": "" }, { "docid": "200e7a3baa9a3d35e332ee3906bd5694", "text": "With the fast growing information technologies, AC-DC front-end power supply design is facing extremely tough challenges due to the continuously increasing power density and efficiency requirement. For the PFC stage, how to reduce the boost inductor and the EMI filter size without compromising the efficiency is the key to meet the challenges. Lots of techniques has been studied and proposed during the last several years. Among these techniques, multi-channel interleaving is a quite promising one. By staggering the channels at uniform intervals, multichannel interleaved PFC can reduce the EMI filter size significantly due to the ripple cancellation effect. In addition, the interleaving multi-channel configuration makes it possible to implement the phase-shedding to improve the PFC light load efficiency. Today, the power supply industry is spending tremendous effort on improving the PFC light efficiency due to the economic reasons and environmental concerns. By decreasing the number of active channels according to the load, the PFC light load efficiency can be optimized. In this paper, the phase-shedding control is proposed to improve the PFC light load efficiency and the issues on the EMI filter design are investigated. To improve the light load efficiency without compromising the EMI filter size, the asymmetrical phase angle control strategy is proposed, and is verified and demonstrated by the experimental results.", "title": "" }, { "docid": "840c12478e48043b998484e884560c02", "text": "Users have adopted a wide range of digital technologies into their communication repertoire. It remains unclear why they adopt multiple forms of communication instead of substituting one medium for another. It also raises the question: What type of need does each of these media fulfill? In the present article, the authors conduct comparative work that examines the gratifications obtained from Facebook with those from instant messaging. This comparison between media allows one to draw conclusions about how different social media fulfill user needs. Data were collected from undergraduate students through a multimethod study based on 77 surveys and 21 interviews. A factor analysis of gratifications obtained from Facebook revealed six key dimensions: pastime, affection, fashion, share problems, sociability, and social information. Comparative analysis showed that Facebook is about having fun and knowing about the social activities occurring in one’s social network, whereas instant messaging is geared more toward relationship maintenance and development. The authors discuss differences in the two technologies and outline a framework based on uses and gratifications theory as to why young people integrate numerous media into their communication habits.", "title": "" } ]
scidocsrr
36a3ed9566c1bfdb9f07039480a892dc
Creation of a 3D printed temporal bone model from clinical CT data.
[ { "docid": "45974f33d79bf4d3af349877ef119508", "text": "Generation of graspable three-dimensional objects applied for surgical planning, prosthetics and related applications using 3D printing or rapid prototyping is summarized and evaluated. Graspable 3D objects overcome the limitations of 3D visualizations which can only be displayed on flat screens. 3D objects can be produced based on CT or MRI volumetric medical images. Using dedicated post-processing algorithms, a spatial model can be extracted from image data sets and exported to machine-readable data. That spatial model data is utilized by special printers for generating the final rapid prototype model. Patient–clinician interaction, surgical training, medical research and education may require graspable 3D objects. The limitations of rapid prototyping include cost and complexity, as well as the need for specialized equipment and consumables such as photoresist resins. Medical application of rapid prototyping is feasible for specialized surgical planning and prosthetics applications and has significant potential for development of new medical applications.", "title": "" } ]
[ { "docid": "e48903be16ccab7bf1263e0a407e5d66", "text": "This research applies Lotka’s Law to metadata on open source software development. Lotka’s Law predicts the proportion of authors at different levels of productivity. Open source software development harnesses the creativity of thousands of programmers worldwide, is important to the progress of the Internet and many other computing environments, and yet has not been widely researched. We examine metadata from the Linux Software Map (LSM), which documents many open source projects, and Sourceforge, one of the largest resources for open source developers. Authoring patterns found are comparable to prior studies of Lotka’s Law for scientific and scholarly publishing. Lotka’s Law was found to be effective in understanding software development productivity patterns, and offer promise in predicting aggregate behavior of open source developers.", "title": "" }, { "docid": "d6fe99533c66075ffb85faf7c70475f0", "text": "Outlier detection has received significant attention in many applications, such as detecting credit card fraud or network intrusions. Most existing research focuses on numerical datasets, and cannot directly apply to categorical sets where there is little sense in calculating distances among data points. Furthermore, a number of outlier detection methods require quadratic time with respect to the dataset size and usually multiple dataset scans. These characteristics are undesirable for large datasets, potentially scattered over multiple distributed sites. In this paper, we introduce Attribute Value Frequency (A VF), a fast and scalable outlier detection strategy for categorical data. A VF scales linearly with the number of data points and attributes, and relies on a single data scan. AVF is compared with a list of representative outlier detection approaches that have not been contrasted against each other. Our proposed solution is experimentally shown to be significantly faster, and as effective in discovering outliers.", "title": "" }, { "docid": "3d8a102c53c6e594e01afc7ad685c7ab", "text": "As register allocation is one of the most important phases in optimizing compilers, much work has been done to improve its quality and speed. We present a novel register allocation architecture for programs in SSA-form which simplifies register allocation significantly. We investigate certain properties of SSA-programs and their interference graphs, showing that they belong to the class of chordal graphs. This leads to a quadratic-time optimal coloring algorithm and allows for decoupling the tasks of coloring, spilling and coalescing completely. After presenting heuristic methods for spilling and coalescing, we compare our coalescing heuristic to an optimal method based on integer linear programming.", "title": "" }, { "docid": "774bdacd260740d5345a08f21e0fd8f0", "text": "This paper presents a new way of categorizing behavior change in a framework called the Behavior Grid. This preliminary work shows 35 types of behavior along two categorical dimensions. To demonstrate the analytical potential for the Behavior Grid, this paper maps behavior goals from Facebook onto the framework, revealing potential patterns of intent. To show the potential for designers of persuasive technology, this paper uses the Behavior Grid to show what types of behavior change might most easily be achieved through mobile technology. The Behavior Grid needs further development, but this early version can still be useful for designers and researchers in thinking more clearly about behavior change and persuasive technology.", "title": "" }, { "docid": "cf768855de6b9c33a1b8284b4e24383f", "text": "The Value Sensitive Design (VSD) methodology provides a comprehensive framework for advancing a value-centered research and design agenda. Although VSD provides helpful ways of thinking about and designing value-centered computational systems, we argue that the specific mechanics of VSD create thorny tensions with respect to value sensitivity. In particular, we examine limitations due to value classifications, inadequate guidance on empirical tools for design, and the ways in which the design process is ordered. In this paper, we propose ways of maturing the VSD methodology to overcome these limitations and present three empirical case studies that illustrate a family of methods to effectively engage local expressions of values. The findings from our case studies provide evidence of how we can mature the VSD methodology to mitigate the pitfalls of classification and engender a commitment to reflect on and respond to local contexts of design.", "title": "" }, { "docid": "3976419e9f78dbff8ae235dd7aee2d8d", "text": "A generally intelligent agent must be able to teach itself how to solve problems in complex domains with minimal human supervision. Recently, deep reinforcement learning algorithms combined with self-play have achieved superhuman proficiency in Go, Chess, and Shogi without human data or domain knowledge. In these environments, a reward is always received at the end of the game; however, for many combinatorial optimization environments, rewards are sparse and episodes are not guaranteed to terminate. We introduce Autodidactic Iteration: a novel reinforcement learning algorithm that is able to teach itself how to solve the Rubik’s Cube with no human assistance. Our algorithm is able to solve 100% of randomly scrambled cubes while achieving a median solve length of 30 moves — less than or equal to solvers that employ human domain knowledge.", "title": "" }, { "docid": "16d3a7217182ad331d85eb619fa459ee", "text": "Pupil diameter was monitored during picture viewing to assess effects of hedonic valence and emotional arousal on pupillary responses. Autonomic activity (heart rate and skin conductance) was concurrently measured to determine whether pupillary changes are mediated by parasympathetic or sympathetic activation. Following an initial light reflex, pupillary changes were larger when viewing emotionally arousing pictures, regardless of whether these were pleasant or unpleasant. Pupillary changes during picture viewing covaried with skin conductance change, supporting the interpretation that sympathetic nervous system activity modulates these changes in the context of affective picture viewing. Taken together, the data provide strong support for the hypothesis that the pupil's response during affective picture viewing reflects emotional arousal associated with increased sympathetic activity.", "title": "" }, { "docid": "b05d36b98d68c9407e6cb213bcf03709", "text": "With the continuous increase in data velocity and volume nowadays, preserving system and data security is particularly affected. In order to handle the huge amount of data and to discover security incidents in real-time, analyses of log data streams are required. However, most of the log anomaly detection techniques fall short in considering continuous data processing. Thus, this paper aligns an anomaly detection technique for data stream processing. It thereby provides a conceptual basis for future adaption of other techniques and further delivers proof of concept by prototype implementation.", "title": "" }, { "docid": "b07e438c8bd71765373341c3bf1f9088", "text": "Procrastination is a common behavior, mainly in school settings. Only a few studies have analyzed the associations of academic procrastination with students' personal and family variables. In the present work, we analyzed the impact of socio-personal variables (e.g., parents' education, number of siblings, school grade level, and underachievement) on students' academic procrastination profiles. Two independent samples of 580 and 809 seventh to ninth graders, students attending the last three years of Portuguese Compulsory Education, have been taken. The findings, similar in both studies, reveal that procrastination decreases when the parents' education is higher, but it increases along with the number of siblings, the grade level, and the underachievement. The results are discussed in view of the findings of previous research. The implications for educational practice are also analyzed.", "title": "" }, { "docid": "c53e0a1762e4b69a2b9e5520e3e0bbfe", "text": "Conventional public key infrastructure (PKI) designs are not optimal and contain security flaws; there is much work underway in improving PKI. The properties given by the Bitcoin blockchain and its derivatives are a natural solution to some of the problems with PKI in particular, certificate transparency and elimination of single points of failure. Recently-proposed blockchain PKI designs are built as public ledgers linking identity with public key, giving no provision of privacy. We consider the suitability of a blockchain-based PKI for contexts in which PKI is required, but in which linking of identity with public key is undesirable; specifically, we show that blockchain can be used to construct a privacy-aware PKI while simultaneously eliminating some of the problems encountered in conventional PKI.", "title": "" }, { "docid": "ef92244350e267d3b5b9251d496e0ee2", "text": "A review of recent advances in power wafer level electronic packaging is presented based on the development of power device integration. The paper covers in more detail how advances in both semiconductor content and power advanced wafer level package design and materials have co-enabled significant advances in power device capability during recent years. Extrapolating the same trends in representative areas for the remainder of the decade serves to highlight where further improvement in materials and techniques can drive continued enhancements in usability, efficiency, reliability and overall cost of power semiconductor solutions. Along with next generation wafer level power packaging development, the role of modeling is a key to assure successful package design. An overview of the power package modeling is presented. Challenges of wafer level power semiconductor packaging and modeling in both next generation design and assembly processes are presented and discussed. 2009 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "df4923225affcd0ad02db3719409d5f2", "text": "Emotions have a high impact in productivity, task quality, creativity, group rapport and job satisfaction. In this work we use lexical sentiment analysis to study emotions expressed in commit comments of different open source projects and analyze their relationship with different factors such as used programming language, time and day of the week in which the commit was made, team distribution and project approval. Our results show that projects developed in Java tend to have more negative commit comments, and that projects that have more distributed teams tend to have a higher positive polarity in their emotional content. Additionally, we found that commit comments written on Mondays tend to a more negative emotion. While our results need to be confirmed by a more representative sample they are an initial step into the study of emotions and related factors in open source projects.", "title": "" }, { "docid": "e829a46ab8dd560f137b4c11c3626410", "text": "Modeling dressed characters is known as a very tedious process. It u sually requires specifying 2D fabric patterns, positioning and assembling them in 3D, and then performing a physically-bas ed simulation. The latter accounts for gravity and collisions to compute the rest shape of the garment, with the ad equ te folds and wrinkles. This paper presents a more intuitive way to design virtual clothing. We start w ith a 2D sketching system in which the user draws the contours and seam-lines of the garment directly on a v irtu l mannequin. Our system then converts the sketch into an initial 3D surface using an existing method based on a p recomputed distance field around the mannequin. The system then splits the created surface into different pan els delimited by the seam-lines. The generated panels are typically not developable. However, the panels of a realistic garment must be developable, since each panel must unfold into a 2D sewing pattern. Therefore our sys tem automatically approximates each panel with a developable surface, while keeping them assembled along the s eams. This process allows us to output the corresponding sewing patterns. The last step of our method computes a natural rest shape for the 3D gar ment, including the folds due to the collisions with the body and gravity. The folds are generated using procedu ral modeling of the buckling phenomena observed in real fabric. The result of our algorithm consists of a realistic looking 3D mannequin dressed in the designed garment and the 2D patterns which can be used for distortion free texture mapping. The patterns we create also allow us to sew real replicas of the virtual garments.", "title": "" }, { "docid": "9be80d8f93dd5edd72ecd759993935d6", "text": "The excretory system regulates the chemical composition of body fluids by removing metabolic wastes and retaining the proper amount of water, salts and nutrients. The invertebrate excretory structures are classified in according to their marked variations in the morphological structures into three types included contractile vacuoles in protozoa, nephridia (flame cell system) in most invertebrate animals and Malpighian tubules (arthropod kidney) in insects [2]. There are three distinct excretory organs formed in succession during the development of the vertebrate kidney, they are called pronephros, mesonephros and metanephros. The pronephros is the most primitive one and exists as a functional kidney only in some of the lowest fishes and is called the archinephros. The mesonephros represents the functional excretory organs in anamniotes and called as opisthonephros. The metanephros is the most caudally located of the excretory organs and the last to appear, it represents the functional kidney in amniotes [2-4].", "title": "" }, { "docid": "79c9f10c5e6fb163b09e9b773af14a3e", "text": "Small RTTs (~tens of microseconds), bursty flow arrivals, and a large number of concurrent flows (thousands) in datacenters bring fundamental challenges to congestion control as they either force a flow to send at most one packet per RTT or induce a large queue build-up. The widespread use of shallow buffered switches also makes the problem more challenging with hosts generating many flows in bursts. In addition, as link speeds increase, algorithms that gradually probe for bandwidth take a long time to reach the fair-share. An ideal datacenter congestion control must provide 1) zero data loss, 2) fast convergence, 3) low buffer occupancy, and 4) high utilization. However, these requirements present conflicting goals.\n This paper presents a new radical approach, called ExpressPass, an end-to-end credit-scheduled, delay-bounded congestion control for datacenters. ExpressPass uses credit packets to control congestion even before sending data packets, which enables us to achieve bounded delay and fast convergence. It gracefully handles bursty flow arrivals. We implement ExpressPass using commodity switches and provide evaluations using testbed experiments and simulations. ExpressPass converges up to 80 times faster than DCTCP in 10 Gbps links, and the gap increases as link speeds become faster. It greatly improves performance under heavy incast workloads and significantly reduces the flow completion times, especially, for small and medium size flows compared to RCP, DCTCP, HULL, and DX under realistic workloads.", "title": "" }, { "docid": "ad5c10745cd12c0fa47e52eac05907e0", "text": "Many currently deployed Reinforcement Learning agents work in an environment shared with humans, be them co-workers, users or clients. It is desirable that these agents adjust to people’s preferences, learn faster thanks to their help, and act safely around them. We argue that most current approaches that learn from human feedback are unsafe: rewarding or punishing the agent a-posteriori cannot immediately prevent it from wrong-doing. In this paper, we extend Policy Gradient to make it robust to external directives, that would otherwise break the fundamentally on-policy nature of Policy Gradient. Our technique, Directed Policy Gradient (DPG), allows a teacher or backup policy to override the agent before it acts undesirably, while allowing the agent to leverage human advice or directives to learn faster. Our experiments demonstrate that DPG makes the agent learn much faster than reward-based approaches, while requiring an order of magnitude less advice. .", "title": "" }, { "docid": "23b18b2795b0e5ff619fd9e88821cfad", "text": "Goal-oriented dialogue has been paid attention for its numerous applications in artificial intelligence. To solve this task, deep learning and reinforcement learning have recently been applied. However, these approaches struggle to find a competent recurrent neural questioner, owing to the complexity of learning a series of sentences. Motivated by theory of mind, we propose “Answerer in Questioner’s Mind” (AQM), a novel algorithm for goal-oriented dialogue. With AQM, a questioner asks and infers based on an approximated probabilistic model of the answerer. The questioner figures out the answerer’s intent via selecting a plausible question by explicitly calculating the information gain of the candidate intentions and possible answers to each question. We test our framework on two goal-oriented visual dialogue tasks: “MNIST Counting Dialog” and “GuessWhat?!.” In our experiments, AQM outperforms comparative algorithms and makes human-like dialogue. We further use AQM as a tool for analyzing the mechanism of deep reinforcement learning approach and discuss the future direction of practical goal-oriented neural dialogue systems.", "title": "" }, { "docid": "1926166029995392a9ccb3c64bc10ee7", "text": "OBJECTIVES\nFew low income countries have emergency medical services to provide prehospital medical care and transport to road traffic crash casualties. In Ghana most roadway casualties receive care and transport to the hospital from taxi, bus, or truck drivers. This study reports the methods used to devise a model for prehospital trauma training for commercial drivers in Ghana.\n\n\nMETHODS\nOver 300 commercial drivers attended a first aid and rescue course designed specifically for roadway trauma and geared to a low education level. The training programme has been evaluated twice at one and two year intervals by interviewing both trained and untrained drivers with regard to their experiences with injured persons. In conjunction with a review of prehospital care literature, lessons learnt from the evaluations were used in the revision of the training model.\n\n\nRESULTS\nControl of external haemorrhage was quickly learnt and used appropriately by the drivers. Areas identified needing emphasis in future trainings included consistent use of universal precautions and protection of airways in unconscious persons using the recovery position.\n\n\nCONCLUSION\nIn low income countries, prehospital trauma care for roadway casualties can be improved by training laypersons already involved in prehospital transport and care. Training should be locally devised, evidence based, educationally appropriate, and focus on practical demonstrations.", "title": "" } ]
scidocsrr
8b348748c9ee826a7a3cee3402d3a67f
A Survey of Algorithms for Dense Subgraph Discovery
[ { "docid": "2663e9e25bd27aefd8ca22b1acc6441f", "text": "Over the years, frequent itemset discovery algorithms have been used to solve various interesting problems. As data mining techniques are being increasingly applied to non-traditional domains, existing approaches for finding frequent itemsets cannot be used as they cannot model the requirement of these domains. An alternate way of modeling the objects in these data sets, is to use a graph to model the database objects. Within that model, the problem of finding frequent patterns becomes that of discovering subgraphs that occur frequently over the entire set of graphs. In this paper we present a computationally efficient algorithm for finding all frequent subgraphs in large graph databases. We evaluated the performance of the algorithm by experiments with synthetic datasets as well as a chemical compound dataset. The empirical results show that our algorithm scales linearly with the number of input transactions and it is able to discover frequent subgraphs from a set of graph transactions reasonably fast, even though we have to deal with computationally hard problems such as canonical labeling of graphs and subgraph isomorphism which are not necessary for traditional frequent itemset discovery.", "title": "" } ]
[ { "docid": "28d8ef2f63b0b4f55c60ae06484365d1", "text": "Social network systems, like last.fm, play a significant role in Web 2.0, containing large amounts of multimedia-enriched data that are enhanced both by explicit user-provided annotations and implicit aggregated feedback describing the personal preferences of each user. It is also a common tendency for these systems to encourage the creation of virtual networks among their users by allowing them to establish bonds of friendship and thus provide a novel and direct medium for the exchange of data.\n We investigate the role of these additional relationships in developing a track recommendation system. Taking into account both the social annotation and friendships inherent in the social graph established among users, items and tags, we created a collaborative recommendation system that effectively adapts to the personal information needs of each user. We adopt the generic framework of Random Walk with Restarts in order to provide with a more natural and efficient way to represent social networks.\n In this work we collected a representative enough portion of the music social network last.fm, capturing explicitly expressed bonds of friendship of the user as well as social tags. We performed a series of comparison experiments between the Random Walk with Restarts model and a user-based collaborative filtering method using the Pearson Correlation similarity. The results show that the graph model system benefits from the additional information embedded in social knowledge. In addition, the graph model outperforms the standard collaborative filtering method.", "title": "" }, { "docid": "b8d840944817351bb2969a745b55f5c6", "text": ".............................................................................................................................................................. 7 Tiivistelmä .......................................................................................................................................................... 9 List of original papers .................................................................................................................................. 11 Acknowledgements ..................................................................................................................................... 13", "title": "" }, { "docid": "66e7979aff5860f713dffd10e98eed3d", "text": "The encoder-decoder dialog model is one of the most prominent methods used to build dialog systems in complex domains. Yet it is limited because it cannot output interpretable actions as in traditional systems, which hinders humans from understanding its generation process. We present an unsupervised discrete sentence representation learning method that can integrate with any existing encoderdecoder dialog models for interpretable response generation. Building upon variational autoencoders (VAEs), we present two novel models, DI-VAE and DI-VST that improve VAEs and can discover interpretable semantics via either auto encoding or context predicting. Our methods have been validated on real-world dialog datasets to discover semantic representations and enhance encoder-decoder models with interpretable generation.1", "title": "" }, { "docid": "1152f211403964121ee688b0f7ec3443", "text": "Wi-Fi (IEEE 802.11), is emerging as the primary medium for wireless Internet access. Cellular carriers are increasingly offloading their traffic to Wi-Fi Access Points to overcome capacity challenges, limited RF spectrum availability, cost of deployment, and keep up with the traffic demands driven by user generated content. The ubiquity of Wi-Fi and its emergence as a universal wireless interface makes it the perfect tracking device. The Wi-Fi offloading trend provides ample opportunities for adversaries to collect samples (e.g., Wi-Fi probes) and track the mobility patterns and location of users. In this work, we show that RF fingerprinting of Wi-Fi devices is feasible using commodity software defined radio platforms. We developed a framework for reproducible RF fingerprinting analysis of Wi-Fi cards. We developed a set of techniques for distinguishing Wi-Fi cards, most are unique to the IEEE802.11a/g/p standard, including scrambling seed pattern, carrier frequency offset, sampling frequency offset, transient ramp-up/down periods, and a symmetric Kullback-Liebler divergence-based separation technique. We evaluated the performance of our techniques over a set of 93 Wi-Fi devices spanning 13 models of cards. In order to assess the potential of the proposed techniques on similar devices, we used 3 sets of 26 Wi-Fi devices of identical model. Our results, indicate that it is easy to distinguish between models with a success rate of 95%. It is also possible to uniquely identify a device with 47% success rate if the samples are collected within a 10s interval of time.", "title": "" }, { "docid": "01cf7cb5dd78d5f7754e1c31da9a9eb9", "text": "Today ́s Electronic Industry is changing at a high pace. The root causes are manifold. So world population is growing up to eight billions and gives new challenges in terms of urbanization, mobility and connectivity. Consequently, there will raise up a lot of new business models for the electronic industry. Connectivity will take a large influence on our lives. Concepts like Industry 4.0, internet of things, M2M communication, smart homes or communication in or to cars are growing up. All these applications are based on the same demanding requirement – a high amount of data and increased data transfer rate. These arguments bring up large challenges to the Printed Circuit Board (PCB) design and manufacturing. This paper investigates the impact of different PCB manufacturing technologies and their relation to their high frequency behavior. In the course of the paper a brief overview of PCB manufacturing capabilities is be presented. Moreover, signal losses in terms of frequency, design, manufacturing processes, and substrate materials are investigated. The aim of this paper is, to develop a concept to use materials in combination with optimized PCB manufacturing processes, which allows a significant reduction of losses and increased signal quality. First analysis demonstrate, that for increased signal frequency, demanded by growing data transfer rate, the capabilities to manufacture high frequency PCBs become a key factor in terms of losses. Base materials with particularly high speed properties like very low dielectric constants are used for efficient design of high speed data link lines. Furthermore, copper foils with very low treatment are to be used to minimize loss caused by the skin effect. In addition to the materials composition, the design of high speed circuits is optimized with the help of comprehensive simulations studies. The work on this paper focuses on requirements and main questions arising during the PCB manufacturing process in order to improve the system in terms of losses. For that matter, there are several approaches that can be used. For example, the optimization of the structuring process, the use of efficient interconnection capabilities, and dedicated surface finishing can be used to reduce losses and preserve signal integrity. In this study, a comparison of different PCB manufacturing processes by using measurement results of demonstrators that imitate real PCB applications will be discussed. Special attention has be drawn to the manufacturing capabilities which are optimized for high frequency requirements and focused to avoid signal loss. Different line structures like microstrip lines, coplanar waveguides, and surface integrated waveguides are used for this assessment. This research was carried out by Austria Technologie & Systemtechnik AG (AT&S AG), in cooperation with Vienna University of Technology, Institute of Electrodynamics, Microwave and Circuit Engineering. Introduction Several commercially available PCB fabrication processes exist for manufacturing PCBs. In this paper two methods, pattern plating and panel plating, were utilized for manufacturing the test samples. The first step in both described manufacturing processes is drilling, which allows connections in between different copper layers. The second step for pattern plating (see figure 1) is the flash copper plating process, wherein only a thin copper skin (flash copper) is plated into the drilled holes and over the entire surface. On top of the plated copper a layer of photosensitive etch resist is laminated which is imaged subsequently by ultraviolet (UV) light with a negative film. Negative film imaging is exposing the gaps in between the traces to the UV light. In developing process the non-exposed dry film is removed with a sodium solution. After that, the whole surrounding space is plated with copper and is eventually covered by tin. The tin layer protects the actual circuit pattern during etching. The pattern plating process shows typically a smaller line width tolerance, compared to panel plating, because of a lower copper thickness before etching. The overall process tolerance for narrow dimensions in the order of several tenths of μm is approximately ± 10%. As originally published in the IPC APEX EXPO Conference Proceedings.", "title": "" }, { "docid": "903d00a02846450ebd18a8ce865889b5", "text": "The ability to solve probability word problems such as those found in introductory discrete mathematics textbooks, is an important cognitive and intellectual skill. In this paper, we develop a two-step endto-end fully automated approach for solving such questions that is able to automatically provide answers to exercises about probability formulated in natural language. In the first step, a question formulated in natural language is analysed and transformed into a highlevel model specified in a declarative language. In the second step, a solution to the high-level model is computed using a probabilistic programming system. On a dataset of 2160 probability problems, our solver is able to correctly answer 97.5% of the questions given a correct model. On the end-toend evaluation, we are able to answer 12.5% of the questions (or 31.1% if we exclude examples not supported by design).", "title": "" }, { "docid": "832916685b22b536d1e8e85f0eeb0e14", "text": "People have always sought an attractive smile in harmony with an esthetic appearance. This trend is steadily growing as it influences one’s self esteem and psychological well-being.1,2 Faced with highly esthetic demanding patients, the practitioner should guarantee esthetic outcomes involving conservative procedures. This is undoubtedly challenging and often requiring a perfect multidisciplinary approach.3", "title": "" }, { "docid": "a63bfd773444b0ac70700a840a844743", "text": "The utility of thermal inkjet (TIJ) technology for preparing solid dosage forms of drugs was examined. Solutions of prednisolone in a solvent mixture of ethanol, water, and glycerol (80/17/3 by volume) were dispensed onto poly(tetrafluoroethylene)-coated fiberglass films using TIJ cartridges and a personal printer and using a micropipette for comparison. The post-dried, TIJ-dispensed samples were shown to contain a mixture of prednisolone Forms I and III based on PXRD analyses that were confirmed by Raman analyses. The starting commercial material was determined to be Form I. Samples prepared by dispensing the solution from a micropipette initially showed only Form I; subsequent Raman mapping of these samples revealed the presence of two polymorphs. Raman mapping of the TIJ-dispensed samples also showed both polymorphs. The results indicate that the solvent mixture used in the dispensing solution combined with the thermal treatment of the samples after dispensing were likely the primary reason for the generation of the two polymorphs. The advantages of using a multidisciplinary approach to characterize drug delivery systems are demonstrated using solid state mapping techniques. Both PXRD and Raman spectroscopy were needed to fully characterize the samples. Finally, this report clarifies prednisolone's polymorphic nomenclature existent in the scientific literature.", "title": "" }, { "docid": "9e7fc71def2afc58025ff5e0198148d0", "text": "BACKGROUD\nWith the advent of modern computing methods, modeling trial-to-trial variability in biophysical recordings including electroencephalography (EEG) has become of increasingly interest. Yet no widely used method exists for comparing variability in ordered collections of single-trial data epochs across conditions and subjects.\n\n\nNEW METHOD\nWe have developed a method based on an ERP-image visualization tool in which potential, spectral power, or some other measure at each time point in a set of event-related single-trial data epochs are represented as color coded horizontal lines that are then stacked to form a 2-D colored image. Moving-window smoothing across trial epochs can make otherwise hidden event-related features in the data more perceptible. Stacking trials in different orders, for example ordered by subject reaction time, by context-related information such as inter-stimulus interval, or some other characteristic of the data (e.g., latency-window mean power or phase of some EEG source) can reveal aspects of the multifold complexities of trial-to-trial EEG data variability.\n\n\nRESULTS\nThis study demonstrates new methods for computing and visualizing 'grand' ERP-image plots across subjects and for performing robust statistical testing on the resulting images. These methods have been implemented and made freely available in the EEGLAB signal-processing environment that we maintain and distribute.", "title": "" }, { "docid": "c87112a95e41fccd9fc33bedf45e2bb5", "text": "Smart grid introduces a wealth of promising applications for upcoming fifth-generation mobile networks (5G), enabling households and utility companies to establish a two-way digital communications dialogue, which can benefit both of them. The utility can monitor real-time consumption of end users and take proper measures (e.g., real-time pricing) to shape their consumption profile or to plan enough supply to meet the foreseen demand. On the other hand, a smart home can receive real-time electricity prices and adjust its consumption to minimize its daily electricity expenditure, while meeting the energy need and the satisfaction level of the dwellers. Smart Home applications for smart phones are also a promising use case, where users can remotely control their appliances, while they are away at work or on their ways home. Although these emerging services can evidently boost the efficiency of the market and the satisfaction of the consumers, they may also introduce new attack surfaces making the grid vulnerable to financial losses or even physical damages. In this paper, we propose an architecture to secure smart grid communications incorporating an intrusion detection system, composed of distributed components collaborating with each other to detect price integrity or load alteration attacks in different segments of an advanced metering infrastructure.", "title": "" }, { "docid": "586ba74140fb7f68cc7c5b0990fb7352", "text": "Hotel companies are struggling to keep up with the rapid consumer adoption of social media. Although many companies have begun to develop social media programs, the industry has yet to fully explore the potential of this emerging data and communication resource. The revenue management department, as it evolves from tactical inventory management to a more expansive role across the organization, is poised to be an early adopter of the opportunities afforded by social media. We propose a framework for evaluating social media-related revenue management opportunities, discuss the issues associated with leveraging these opportunities and propose a roadmap for future research in this area. Journal of Revenue and Pricing Management (2011) 10, 293–305. doi:10.1057/rpm.2011.12; published online 6 May 2011", "title": "" }, { "docid": "7bc2c428a43437afbbdb880ea9431288", "text": "Multi-label image classification aims to predict multiple labels for a single image which contains diverse content. By utilizing label correlations, various techniques have been developed to improve classification performance. However, current existing methods either neglect image features when exploiting label correlations or lack the ability to learn image-dependent conditional label structures. In this paper, we develop conditional graphical Lasso (CGL) to handle these challenges. CGL provides a unified Bayesian framework for structure and parameter learning conditioned on image features. We formulate the multi-label prediction as CGL inference problem, which is solved by a mean field variational approach. Meanwhile, CGL learning is efficient due to a tailored proximal gradient procedure by applying the maximum a posterior (MAP) methodology. CGL performs competitively for multi-label image classification on benchmark datasets MULAN scene, PASCAL VOC 2007 and PASCAL VOC 2012, compared with the state-of-the-art multi-label classification algorithms.", "title": "" }, { "docid": "139cff6c4b5deebe1138e3bb6bec182b", "text": "Persuasive technologies aim to influence user's behaviors. In order to be effective, many of the persuasive technologies developed so far relies on user's motivation and ability, which is highly variable and often the reason behind the failure of such technology. In this paper, we present the concept of Mindless Computing, which is a new approach to persuasive technology design. Mindless Computing leverages theories and concepts from psychology and behavioral economics into the design of technologies for behavior change. We show through a systematic review that most of the current persuasive technologies do not utilize the fast and automatic mental processes for behavioral change and there is an opportunity for persuasive technology designers to develop systems that are less reliant on user's motivation and ability. We describe two examples of mindless technologies and present pilot studies with encouraging results. Finally, we discuss design guidelines and considerations for developing this type of persuasive technology.", "title": "" }, { "docid": "f7c46115abe7cc204dd7dbd56f9e13c6", "text": "Forecasting of future electricity demand is very important for decision making in power system operation and planning. In recent years, due to privatization and deregulation of the power industry, accurate electricity forecasting has become an important research area for efficient electricity production. This paper presents a time series approach for mid-term load forecasting (MTLF) in order to predict the daily peak load for the next month. The proposed method employs a computational intelligence scheme based on the self-organizing map (SOM) and support vector machine (SVM). According to the similarity degree of the time series load data, SOM is used as a clustering tool to cluster the training data into two subsets, using the Kohonen rule. As a novel machine learning technique, the support vector regression (SVR) is used to fit the testing data based on the clustered subsets, for predicting the daily peak load. Our proposed SOM-SVR load forecasting model is evaluated in MATLAB on the electricity load dataset provided by the Eastern Slovakian Electricity Corporation, which was used in the 2001 European Network on Intelligent Technologies (EUNITE) load forecasting competition. Power load data obtained from (i) Tenaga Nasional Berhad (TNB) for peninsular Malaysia and (ii) PJM for the eastern interconnection grid of the United States of America is used to benchmark the performance of our proposed model. Experimental results obtained indicate that our proposed SOM-SVR technique gives significantly good prediction accuracy for MTLF compared to previously researched findings using the EUNITE, Malaysian and PJM electricity load", "title": "" }, { "docid": "0c5c83cfb63b335b327f044973514d23", "text": "With the explosion of healthcare information, there has been a tremendous amount of heterogeneous textual medical knowledge (TMK), which plays an essential role in healthcare information systems. Existing works for integrating and utilizing the TMK mainly focus on straightforward connections establishment and pay less attention to make computers interpret and retrieve knowledge correctly and quickly. In this paper, we explore a novel model to organize and integrate the TMK into conceptual graphs. We then employ a framework to automatically retrieve knowledge in knowledge graphs with a high precision. In order to perform reasonable inference on knowledge graphs, we propose a contextual inference pruning algorithm to achieve efficient chain inference. Our algorithm achieves a better inference result with precision and recall of 92% and 96%, respectively, which can avoid most of the meaningless inferences. In addition, we implement two prototypes and provide services, and the results show our approach is practical and effective.", "title": "" }, { "docid": "8b3dffbb60d75f042c29a22340383453", "text": "Welcome to the course: Gazing at Games: Using Eye Tracking to Control Virtual Characters. I will start with a short introduction of the course which will give you an idea of its aims and structure. I will also talk a bit about my background and research interests and motivate why I think this work is important.", "title": "" }, { "docid": "12d0d14ce1bc94a7346fd00c26631e9b", "text": "In visual saliency estimation, one of the most challenging tasks is to distinguish targets and distractors that share certain visual attributes. With the observation that such targets and distractors can sometimes be easily separated when projected to specific subspaces, we propose to estimate image saliency by learning a set of discriminative subspaces that perform the best in popping out targets and suppressing distractors. Toward this end, we first conduct principal component analysis on massive randomly selected image patches. The principal components, which correspond to the largest eigenvalues, are selected to construct candidate subspaces since they often demonstrate impressive abilities to separate targets and distractors. By projecting images onto various subspaces, we further characterize each image patch by its contrasts against randomly selected neighboring and peripheral regions. In this manner, the probable targets often have the highest responses, while the responses at background regions become very low. Based on such random contrasts, an optimization framework with pairwise binary terms is adopted to learn the saliency model that best separates salient targets and distractors by optimally integrating the cues from various subspaces. Experimental results on two public benchmarks show that the proposed approach outperforms 16 state-of-the-art methods in human fixation prediction.", "title": "" }, { "docid": "01d93a621bb6d52ca37650d4a79c43f3", "text": "Recommender systems are a classical example for machine learning applications, however, they have not yet been used extensively in health informatics and medical scenarios. We argue that this is due to the specifics of benchmarking criteria in medical scenarios and the multitude of drastically differing end-user groups and the enormous contextcomplexity of the medical domain. Here both risk perceptions towards data security and privacy as well as trust in safe technical systems play a central and specific role, particularly in the clinical context. These aspects dominate acceptance of such systems. By using a Doctor-in-theLoop approach some of these difficulties could be mitigated by combining both human expertise with computer efficiency. We provide a three-part research framework to access health recommender systems, suggesting to incorporate domain understanding, evaluation and specific methodology into the development process.", "title": "" } ]
scidocsrr
547b536299a2f9d3f339138e48534ed1
Sophisticated Honeypot mechanism - the autonomous hybrid solution for enhancing computer system security
[ { "docid": "82c9c8a7a9dccfa59b09df595de6235c", "text": "Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Nowadays, they are also being extensively used by the research community to study issues in network security, such as Internet worms, spam control, DoS attacks, etc. In this paper, we advocate the use of honeypots as an effective educational tool to study issues in network security. We support this claim by demonstrating a set of projects that we have carried out in a network, which we have deployed specifically for running distributed computer security projects. The design of our projects tackles the challenges in installing a honeypot in academic institution, by not intruding on the campus network while providing secure access to the Internet. In addition to a classification of honeypots, we present a framework for designing assignments/projects for network security courses. The three sample honeypot projects discussed in this paper are presented as examples of the framework.", "title": "" } ]
[ { "docid": "29aa068763580b02d50c23e08bba2352", "text": "In this paper, a self-learning approach is proposed towards solving scene-specific pedestrian detection problem without any human annotation involved. The self-learning approach is deployed as progressive steps of object discovery, object enforcement, and label propagation. In the learning procedure, object locations in each frame are treated as latent variables that are solved with a progressive latent model (PLM). Compared with conventional latent models, the proposed PLM incorporates a spatial regularization term to reduce ambiguities in object proposals and to enforce object localization, and also a graph-based label propagation to discover harder instances in adjacent frames. With the difference of convex (DC) objective functions, PLM can be efficiently optimized with a concave-convex programming and thus guaranteeing the stability of self-learning. Extensive experiments demonstrate that even without annotation the proposed self-learning approach outperforms weakly supervised learning approaches, while achieving comparable performance with transfer learning and fully supervised approaches.", "title": "" }, { "docid": "4910c462dd735ef16378c014a7d63c69", "text": "Malware detection increasingly relies on machine learning techniques, which utilize multiple features to separate the malware from the benign apps. The effectiveness of these techniques primarily depends on the manual feature engineering process, based on human knowledge and intuition. However, given the adversaries' efforts to evade detection and the growing volume of publications on malware behaviors, the feature engineering process likely draws from a fraction of the relevant knowledge. We propose an end-to-end approach for automatic feature engineering. We describe techniques for mining documents written in natural language (e.g. scientific papers) and for representing and querying the knowledge about malware in a way that mirrors the human feature engineering process. Specifically, we first identify abstract behaviors that are associated with malware, and then we map these behaviors to concrete features that can be tested experimentally. We implement these ideas in a system called FeatureSmith, which generates a feature set for detecting Android malware. We train a classifier using these features on a large data set of benign and malicious apps. This classifier achieves a 92.5% true positive rate with only 1% false positives, which is comparable to the performance of a state-of-the-art Android malware detector that relies on manually engineered features. In addition, FeatureSmith is able to suggest informative features that are absent from the manually engineered set and to link the features generated to abstract concepts that describe malware behaviors.", "title": "" }, { "docid": "e9ce26c20369103f1f3549e921702cbf", "text": "Vehicle navigation is one of the most important applications in the era of navigation which is mostly used by drivers. Therefore the efficiency of the maps given to the drivers has a great importance in the navigation system. In this paper we proposed a very efficient system which uses the GPS and earth maps to help the driver in navigation by robust display of the current position of the vehicle on a displayed map. The main aim of this project is designing a system which is capable of continuous monitoring of path of the vehicle on PC with Google Earth Application. Here the important issue is displaying the map on several various scales which are adopted by the users. The heart elements in the implementation of this project are GPS, GSM and MCU. The GPS-GSM integrated structure is designed to track the vehicles by using Google earth application. The micro controller is used to receive data from GPS and to transfer the latitude and longitude to the PC to map by using the VB.Net language and this map is generated using Google Earth information.", "title": "" }, { "docid": "c6fae566f6193c75679c2ed9dc433b1c", "text": "Concept prerequisite learning focuses on machine learning methods for measuring the prerequisite relation among concepts. With the importance of prerequisites for education, it has recently become a promising research direction. A major obstacle to extracting prerequisites at scale is the lack of large scale labels which will enable effective data driven solutions. We investigate the applicability of active learning to concept prerequisite learning. We propose a novel set of features tailored for prerequisite classification and compare the effectiveness of four widely used query strategies. Experimental results for domains including data mining, geometry, physics, and precalculus show that active learning can be used to reduce the amount of training data required. Given the proposed features, the query-by-committee strategy outperforms other compared query strategies.", "title": "" }, { "docid": "4d52c27f623fdf083d2a5bddb4dfaade", "text": "The Iron Man media franchise glorifies futuristic interfaces and devices like holographic screens, powerful mobile devices, and heads-up displays. Consequently, a mainstream audience has come to know about and discursively relate to Augmented Reality (AR) technology through fan participation. This paper identifies how Iron Man fans reveal the belief that technology sensationalized in the films and comics may actually become real. Using humanities theories and methods, it argues for a new way to explore potential users' expectations for augmented reality. HCI as a field needs to broaden its focus and attend to fans in terms of their future as consumers and users.", "title": "" }, { "docid": "0022623017e81ee0a102da0524c83932", "text": "Calcite is a new Eclipse plugin that helps address the difficulty of understanding and correctly using an API. Calcite finds the most popular ways to instantiate a given class or interface by using code examples. To allow the users to easily add these object instantiations to their code, Calcite adds items to the popup completion menu that will insert the appropriate code into the user’s program. Calcite also uses crowd sourcing to add to the menu instructions in the form of comments that help the user perform functions that people have identified as missing from the API. In a user study, Calcite improved users’ success rate by 40%.", "title": "" }, { "docid": "4f4baf40e174510ee484f7962d74fb58", "text": "In neuroscience, the ability to correlate and classify certain activity patterns of the brain to different physical and mental states of the subject is of high importance. Analysis of fMRI data is one of the venues in which this objective is being pursued. However data produced using fMRI technology is highly complex. To this end, machine learning becomes relevant. Prominent hurdles facing fMRI data analysis are their high-dimensionality (thousands of features per instance), low signal-to-noise ratio and interdependency. This motivates the use of feature selection methods in order to consolidate relevant information and discard noise. Many feature selection methods exist but only a few have been applied in the fMRI domain. In this paper we identify positive characteristics of feature selection algorithms that are beneficial when dealing with fMRI datasets. To do this, we evaluate representatives from each of the three main feature selection classes: Filters, wrappers and embedded methods. We have found probabilistic embedded methods to be the most suitable for fMRI data. We would therefore recommend using these (or similar) methods to process data with fMRI-like characteristics.", "title": "" }, { "docid": "e97247d7b42875782164719ddf202a3c", "text": "This work, set in the context of the apparel industry, proposes an action-oriented disclosure tool to help solve the sustainability challenges of complex fast-fashion supply chains (SCs). In a search for effective disclosure, it focusses on actions towards sustainability instead of the measurements and indicators of its impacts. We applied qualitative and quantitative content analysis to the sustainability reporting of the world’s two largest fast-fashion companies in three phases. First, we searched for the challenges that the organisations report they are currently facing. Second, we introduced the United Nations’ Sustainable Development Goals (SDGs) framework to overcome the voluntary reporting drawback of ‘choosing what to disclose’, and revealed orphan issues. This broadened the scope from internal corporate challenges to issues impacting the ecosystems in which companies operate. Third, we analysed the reported sustainability actions and decomposed them into topics, instruments, and actors. The results showed that fast-fashion reporting has a broadly developed analysis base, but lacks action orientation. This has led us to propose the ‘Fast-Fashion Sustainability Scorecard’ as a universal disclosure framework that shifts the focus from (i) reporting towards action; (ii) financial performance towards sustainable value creation; and (iii) corporate boundaries towards value creation for the broader SC ecosystem.", "title": "" }, { "docid": "72f17106ad48b144ccab55b564fece7d", "text": "We present an efficient and robust model matching method which uses a joint shape and texture appearance model to generate a set of region template detectors. The model is fitted to an unseen image in an iterative manner by generating templates using the joint model and the current parameter estimates, correlating the templates with the target image to generate response images and optimising the shape parameters so as to maximise the sum of responses. The appearance model is similar to that used in the AAM [1]. However in our approach the appearance model is used to generate likely feature templates, instead of trying to approximate the image pixels directly. We show that when applied to human faces, our Constrained Local Model (CLM) algorithm is more robust and more accurate than the original AAM search method, which relies on the image reconstruction error to update the model parameters. We demonstrate improved localisation accuracy on two publicly available face data sets and improved tracking on a challenging set of in-car face sequences.", "title": "" }, { "docid": "80305580204e9a3399c4e7cd28f4adcb", "text": "A series of three studies were conducted to generate, develop, and validate the Attitudes toward Transgender Men and Women (ATTMW) scale. In Study 1, 120 American adults responded to an open-ended questionnaire probing various dimensions of their perceptions of transgender individuals and identity. Qualitative thematic analysis generated 200 items based on their responses. In Study 2, 238 American adults completed a questionnaire consisting of the generated items. Exploratory factor analysis (EFA) revealed two non-identical 12-item subscales (ATTM and ATTW) of the full 24-item scale. In Study 3, 150 undergraduate students completed a survey containing the ATTMW and a number of validity-testing variables. Confirmatory factor analysis (CFA) verified the single-factor structures of the ATTM and ATTW subscales, and the convergent, discriminant, predictive, and concurrent validities of the ATTMW were also established. Together, our results demonstrate that the ATTMW is a reliable and valid measure of attitudes toward transgender individuals.", "title": "" }, { "docid": "e5a8d2679c34537f57b6da192b831711", "text": "Social networking sites have seen tremendous growth and are widely used around the world. Nevertheless, the use of social networking sites in educational contexts is an under explored area. This paper uses a qualitative methodology, autoethnography, to investigate how social networking sites, specifically Facebook, can help first semester doctoral students adapt to a Ph.D. program and a new national culture. Each week during the semester, a Ph.D. Student Tip and a Cultural Tip was posted. Students would then post related discussions, observations, and/or questions. At the conclusion of the semester the doctoral students shared their thoughts about participating in the FacebookTM group through autobiographical narratives. A technique called open coding was used to analyze the narratives. Our findings suggest three emergent themes. Social networking sites can aid adaptation through: 1) facilitating knowledge exchange, 2) alleviating apprehension, and 3) enabling socialization and building community. The data showed that the FacebookTM discussions aided in various types of knowledge exchange, providing a conceptual map that facilitated greater adaptation. Next, the interactions appeared to help minimize trepidation related to embarking on a new program of study and adjusting to a new national culture. Third, the FacebookTM group was useful fostering socialization and community among the students. We make the following recommendations for professors when implementing SNS (Social Network Site) groups: 1) establish a FacebookTM group with a course-related identity, 2) be sensitive to security and privacy issues, 3) provide tips to “seed” various types of knowledge exchange, 4) encourage participation, and 5) assess and adjust. While our research is exploratory in nature, we believe it provides a foundation for future research in this important and rapidly expanding area of SNS usage.", "title": "" }, { "docid": "5d3f5e6c52b3ccb97fb8a891074d4fb4", "text": "OBJECTIVE\nThis study investigated the effects of school-based occupational therapy services on students' handwriting.\n\n\nMETHOD\nStudents 7 to 10 years of age with poor handwriting legibility who received direct occupational therapy services (n = 29) were compared with students who did not receive services (n = 9) on handwriting legibility and speed and associated performance components. Visual-motor, visual-perception, in-hand manipulation, and handwriting legibility and speed were measured at the beginning and end of the academic year. The intervention group received a mean of 16.4 sessions and 528 min of direct occupational therapy services during the school year. According to the therapists, visual-motor skills and handwriting practice were emphasized most in intervention.\n\n\nRESULTS\nStudents in the intervention group showed significant increases in in-hand manipulation and position in space scores. They also improved more in handwriting legibility scores than the students in the comparison group. Fifteen students in the intervention group demonstrated greater than 90% legibility at the end of the school year. On average, legibility increased by 14.2% in the students who received services and by 5.8% in the students who did not receive services. Speed increased slightly more in the students who did not receive services.\n\n\nCONCLUSION\nStudents who received occupational therapy services demonstrated improved letter legibility, but speed and numeral legibility did not demonstrate positive intervention effects.", "title": "" }, { "docid": "22981a1731d35f35241271d14b85df31", "text": "New generations of distributed systems are opening novel perspectives for logic programming (LP): on the one hand, service-oriented architectures represent nowadays the standard approach for distributed systems engineering; on the other hand, pervasive systems mandate for situated intelligence. In this paper we introduce the notion of Logic Programming as a Service (LPaaS) as a means to address the needs of pervasive intelligent systems through logic engines exploited as a distributed service. First we define the abstract architectural model by re-interpreting classical LP notions in the new context; then we elaborate on the nature of LP interpreted as a service by describing the basic LPaaS interface. Finally, we show how LPaaS works in practice by discussing its implementation in terms of distributed tuProlog engines, accounting for basic issues such as interoperability and configurability.", "title": "" }, { "docid": "aa5d6e57350c2c1082091c62b6a941e8", "text": "MEC is an emerging paradigm that provides computing, storage, and networking resources within the edge of the mobile RAN. MEC servers are deployed on a generic computing platform within the RAN, and allow for delay-sensitive and context-aware applications to be executed in close proximity to end users. This paradigm alleviates the backhaul and core network and is crucial for enabling low-latency, high-bandwidth, and agile mobile services. This article envisions a real-time, context-aware collaboration framework that lies at the edge of the RAN, comprising MEC servers and mobile devices, and amalgamates the heterogeneous resources at the edge. Specifically, we introduce and study three representative use cases ranging from mobile edge orchestration, collaborative caching and processing, and multi-layer interference cancellation. We demonstrate the promising benefits of the proposed approaches in facilitating the evolution to 5G networks. Finally, we discuss the key technical challenges and open research issues that need to be addressed in order to efficiently integrate MEC into the 5G ecosystem.", "title": "" }, { "docid": "b7e5028bc6936e75692fbcebaacebb2c", "text": "dent processes and domain-specific knowledge. Until recently, information extraction has leaned heavily on domain knowledge, which requires either manual engineering or manual tagging of examples (Miller et al. 1998; Soderland 1999; Culotta, McCallum, and Betz 2006). Semisupervised approaches (Riloff and Jones 1999, Agichtein and Gravano 2000, Rosenfeld and Feldman 2007) require only a small amount of hand-annotated training, but require this for every relation of interest. This still presents a knowledge engineering bottleneck, when one considers the unbounded number of relations in a diverse corpus such as the web. Shinyama and Sekine (2006) explored unsupervised relation discovery using a clustering algorithm with good precision, but limited scalability. The KnowItAll research group is a pioneer of a new paradigm, Open IE (Banko et al. 2007, Banko and Etzioni 2008), that operates in a totally domain-independent manner and at web scale. An Open IE system makes a single pass over its corpus and extracts a diverse set of relational tuples without requiring any relation-specific human input. Open IE is ideally suited to corpora such as the web, where the target relations are not known in advance and their number is massive. Articles", "title": "" }, { "docid": "dd0cc729ce33906c31fa48fbc31b23c1", "text": "Firstborn children's reactions to mother-infant and father-infant interaction after a sibling's birth were examined in an investigation of 224 families. Triadic observations of parent-infant-sibling interaction were conducted at 1 month after the birth. Parents reported on children's problem behaviors at 1 and 4 months after the birth and completed the Attachment Q-sort before the birth. Latent profile analysis (LPA) identified 4 latent classes (behavioral profiles) for mother-infant and father-infant interactions: regulated-exploration, disruptive-dysregulated, approach-avoidant, and anxious-clingy. A fifth class, attention-seeking, was found with fathers. The regulated-exploration class was the normative pattern (60%), with few children in the disruptive class (2.7%). Approach-avoidant children had more behavior problems at 4 months than any other class, with the exception of the disruptive children, who were higher on aggression and attention problems. Before the birth, anxious-clingy children had less secure attachments to their fathers than approach avoidant children but more secure attachments to their mothers. Results underscore individual differences in firstborns' behavioral responses to parent-infant interaction and the importance of a person-centered approach for understanding children's jealousy.", "title": "" }, { "docid": "c576c08aa746ea30a528e104932047a6", "text": "Despite tremendous progress achieved in temporal action localization, state-of-the-art methods still struggle to train accurate models when annotated data is scarce. In this paper, we introduce a novel active learning framework for temporal localization that aims to mitigate this data dependency issue. We equip our framework with active selection functions that can reuse knowledge from previously annotated datasets. We study the performance of two state-of-the-art active selection functions as well as two widely used active learning baselines. To validate the effectiveness of each one of these selection functions, we conduct simulated experiments on ActivityNet. We find that using previously acquired knowledge as a bootstrapping source is crucial for active learners aiming to localize actions. When equipped with the right selection function, our proposed framework exhibits significantly better performance than standard active learning strategies, such as uncertainty sampling. Finally, we employ our framework to augment the newly compiled Kinetics action dataset with ground-truth temporal annotations. As a result, we collect Kinetics-Localization, a novel large-scale dataset for temporal action localization, which contains more than 15K YouTube videos.", "title": "" }, { "docid": "854b473b0ee6d3cf4d1a34cd79a658e3", "text": "Blockchain provides a new approach for participants to maintain reliable databases in untrusted networks without centralized authorities. However, there are still many serious problems in real blockchain systems in IP network such as the lack of support for multicast and the hierarchies of status. In this paper, we design a bitcoin-like blockchain system named BlockNDN over Named Data Networking and we implement and deploy it on our cluster as well. The resulting design solves those problems in IP network. It provides completely decentralized systems and simplifies system architecture. It also improves the weak-connectivity phenomenon and decreases the broadcast overhead.", "title": "" }, { "docid": "0cdf1f89faeebbbb50dbe5d8e79f1fff", "text": "This paper introduces a new method, called the robust Bayesian estimator (RBE), to learn conditional probability distributions from incomplete data sets. The intuition behind the RBE is that, when no information about the pattern of missing data is available, an incomplete database constrains the set of all possible estimates and this paper provides a characterization of these constraints. An experimental comparison with two popular methods to estimate conditional probability distributions from incomplete data—Gibbs sampling and the EM algorithm—shows a gain in robustness. An application of the RBE to quantify a naive Bayesian classifier from an incomplete data set illustrates its practical relevance.", "title": "" }, { "docid": "b6818031020a04a5b9385603f38da147", "text": "LINGUISTIC HEDGING IN FINANCIAL DOCUMENTS by CAITLIN CASSIDY (Under the Direction of Frederick W. Maier) ABSTRACT Each year, publicly incorporated companies are required to file a Form 10-K with the United States Securities and Exchange Commission. These documents contain an enormous amount of natural language data and may offer insight into financial performance prediction. This thesis attempts to analyze two dimensions of language held within this data: sentiment and linguistic hedging. An experiment was conducted with 325 human annotators to manually score a subset of the sentiment words contained in a corpus of 106 10-K filings, and an inference engine identified instances of hedges having governance over these words in a dependency tree. Finally, this work proposes an algorithm for the automatic classification of sentences in the financial domain as speculative or non-speculative using the previously defined hedge cues.", "title": "" } ]
scidocsrr
47bc10208873706fd75e142b84e15dd7
Policy development and implementation in health promotion--from theory to practice: the ADEPT model.
[ { "docid": "1137cdf90ff6229865ae20980739afc5", "text": "This paper addresses the role of policy and evidence in health promotion. The concept of von Wright’s “logic of events” is introduced and applied to health policy impact analysis. According to von Wright (1976), human action can be explained by a restricted number of determinants: wants, abilities, duties, and opportunities. The dynamics of action result from changes in opportunities (logic of events). Applied to the policymaking process, the present model explains personal wants as subordinated to political goals. Abilities of individual policy makers are part of organisational resources. Also, personal duties are subordinated to institutional obligations. Opportunities are mainly related to political context and public support. The present analysis suggests that policy determinants such as concrete goals, sufficient resources and public support may be crucial for achieving an intended behaviour change on the population level, while other policy determinants, e.g., personal commitment and organisational capacities, may especially relate to the policy implementation process. The paper concludes by indicating ways in which future research using this theoretical framework might contribute to health promotion practice for improved health outcomes across populations.", "title": "" } ]
[ { "docid": "c47525f2456de0b9b87a5ebbb5a972fb", "text": "This article reviews the potential use of visual feedback, focusing on mirror visual feedback, introduced over 15 years ago, for the treatment of many chronic neurological disorders that have long been regarded as intractable such as phantom pain, hemiparesis from stroke and complex regional pain syndrome. Apart from its clinical importance, mirror visual feedback paves the way for a paradigm shift in the way we approach neurological disorders. Instead of resulting entirely from irreversible damage to specialized brain modules, some of them may arise from short-term functional shifts that are potentially reversible. If so, relatively simple therapies can be devised--of which mirror visual feedback is an example--to restore function.", "title": "" }, { "docid": "0869fee5888a97f424856570f2b9dc2c", "text": "This paper evaluates the four leading techniques proposed in the literature for construction of prediction intervals (PIs) for neural network point forecasts. The delta, Bayesian, bootstrap, and mean-variance estimation (MVE) methods are reviewed and their performance for generating high-quality PIs is compared. PI-based measures are proposed and applied for the objective and quantitative assessment of each method's performance. A selection of 12 synthetic and real-world case studies is used to examine each method's performance for PI construction. The comparison is performed on the basis of the quality of generated PIs, the repeatability of the results, the computational requirements and the PIs variability with regard to the data uncertainty. The obtained results in this paper indicate that: 1) the delta and Bayesian methods are the best in terms of quality and repeatability, and 2) the MVE and bootstrap methods are the best in terms of low computational load and the width variability of PIs. This paper also introduces the concept of combinations of PIs, and proposes a new method for generating combined PIs using the traditional PIs. Genetic algorithm is applied for adjusting the combiner parameters through minimization of a PI-based cost function subject to two sets of restrictions. It is shown that the quality of PIs produced by the combiners is dramatically better than the quality of PIs obtained from each individual method.", "title": "" }, { "docid": "208b4cb4dc4cee74b9357a5ebb2f739c", "text": "We report improved AMR parsing results by adding a new action to a transitionbased AMR parser to infer abstract concepts and by incorporating richer features produced by auxiliary analyzers such as a semantic role labeler and a coreference resolver. We report final AMR parsing results that show an improvement of 7% absolute in F1 score over the best previously reported result. Our parser is available at: https://github.com/ Juicechuan/AMRParsing", "title": "" }, { "docid": "bc272e837f1071fabcc7056134bae784", "text": "Parental vaccine hesitancy is a growing problem affecting the health of children and the larger population. This article describes the evolution of the vaccine hesitancy movement and the individual, vaccine-specific and societal factors contributing to this phenomenon. In addition, potential strategies to mitigate the rising tide of parent vaccine reluctance and refusal are discussed.", "title": "" }, { "docid": "5c2b73276c9f845d7eef5c9dc4cea2a1", "text": "The detection of QR codes, a type of 2D barcode, as described in the literature consists merely in the determination of the boundaries of the symbol region in images obtained with the specific intent of highlighting the symbol. However, many important applications such as those related with accessibility technologies or robotics, depends on first detecting the presence of a barcode in an environment. We employ Viola-Jones rapid object detection framework to address the problem of finding QR codes in arbitrarily acquired images. This framework provides an efficient way to focus the detection process in promising regions of the image and a very fast feature calculation approach for pattern classification. An extensive study of variations in the parameters of the framework for detecting finder patterns, present in three corners of every QR code, was carried out. Detection accuracy superior to 90%, with controlled number of false positives, is achieved. We also propose a post-processing algorithm that aggregates the results of the first step and decides if the detected finder patterns are part of QR code symbols. This two-step processing is done in real time.", "title": "" }, { "docid": "43654115b3c64eef7b3a26d90c092e9b", "text": "We investigate the problem of domain adaptation for parallel data in Statistical Machine Translation (SMT). While techniques for domain adaptation of monolingual data can be borrowed for parallel data, we explore conceptual differences between translation model and language model domain adaptation and their effect on performance, such as the fact that translation models typically consist of several features that have different characteristics and can be optimized separately. We also explore adapting multiple (4–10) data sets with no a priori distinction between in-domain and out-of-domain data except for an in-domain development set.", "title": "" }, { "docid": "3266a3d561ee91e8f08d81e1aac6ac1b", "text": "The seminal work of Dwork et al. [ITCS 2012] introduced a metric-based notion of individual fairness. Given a task-specific similarity metric, their notion required that every pair of similar individuals should be treated similarly. In the context of machine learning, however, individual fairness does not generalize from a training set to the underlying population. We show that this can lead to computational intractability even for simple fair-learning tasks. With this motivation in mind, we introduce and study a relaxed notion of approximate metric-fairness: for a random pair of individuals sampled from the population, with all but a small probability of error, if they are similar then they should be treated similarly. We formalize the goal of achieving approximate metric-fairness simultaneously with best-possible accuracy as Probably Approximately Correct and Fair (PACF) Learning. We show that approximate metricfairness does generalize, and leverage these generalization guarantees to construct polynomialtime PACF learning algorithms for the classes of linear and logistic predictors. rothblum@alum.mit.edu. Research supported by the ISRAEL SCIENCE FOUNDATION (grant No. 5219/17). gal.yona@gmail.com. Research supported by the ISRAEL SCIENCE FOUNDATION (grant No. 5219/17).", "title": "" }, { "docid": "b640ed2bd02ba74ee0eb925ef6504372", "text": "In the discussion about Future Internet, Software-Defined Networking (SDN), enabled by OpenFlow, is currently seen as one of the most promising paradigm. While the availability and scalability concerns rises as a single controller could be alleviated by using replicate or distributed controllers, there lacks a flexible mechanism to allow controller load balancing. This paper proposes BalanceFlow, a controller load balancing architecture for OpenFlow networks. By utilizing CONTROLLER X action extension for OpenFlow switches and cross-controller communication, one of the controllers, called “super controller”, can flexibly tune the flow-requests handled by each controller, without introducing unacceptable propagation latencies. Experiments based on real topology show that BalanceFlow can adjust the load of each controller dynamically.", "title": "" }, { "docid": "30750e5ee653ee623f6ec38e957f4843", "text": "Chroma is a widespread feature for cover song recognition, as it is robust against non-tonal components and independent of timbre and specific instruments. However, Chroma is derived from spectrogram, thus it provides a coarse approximation representation of musical score. In this paper, we proposed a similar but more effective feature Note Class Profile (NCP) derived with music transcription techniques. NCP is a multi-dimensional time serie, each column of which denotes the energy distribution of 12 note classes. Experimental results on benchmark datasets demonstrated its superior performance over existing music features. In addition, NCP feature can be enhanced further with the development of music transcription techniques. The source code can be found in github1.", "title": "" }, { "docid": "ace30c4ad4a74f1ba526b4868e47b5c5", "text": "China and India are home to two of the world's largest populations, and both populations are aging rapidly. Our data compare health status, risk factors, and chronic diseases among people age forty-five and older in China and India. By 2030, 65.6 percent of the Chinese and 45.4 percent of the Indian health burden are projected to be borne by older adults, a population with high levels of noncommunicable diseases. Smoking (26 percent in both China and India) and inadequate physical activity (10 percent and 17.7 percent, respectively) are highly prevalent. Health policy and interventions informed by appropriate data will be needed to avert this burden.", "title": "" }, { "docid": "c4ccb674a07ba15417f09b81c1255ba8", "text": "Real world environments are characterized by high levels of linguistic and numerical uncertainties. A Fuzzy Logic System (FLS) is recognized as an adequate methodology to handle the uncertainties and imprecision available in real world environments and applications. Since the invention of fuzzy logic, it has been applied with great success to numerous real world applications such as washing machines, food processors, battery chargers, electrical vehicles, and several other domestic and industrial appliances. The first generation of FLSs were type-1 FLSs in which type-1 fuzzy sets were employed. Later, it was found that using type-2 FLSs can enable the handling of higher levels of uncertainties. Recent works have shown that interval type-2 FLSs can outperform type-1 FLSs in the applications which encompass high uncertainty levels. However, the majority of interval type-2 FLSs handle the linguistic and input numerical uncertainties using singleton interval type-2 FLSs that mix the numerical and linguistic uncertainties to be handled only by the linguistic labels type-2 fuzzy sets. This ignores the fact that if input numerical uncertainties were present, they should affect the incoming inputs to the FLS. Even in the papers that employed non-singleton type-2 FLSs, the input signals were assumed to have a predefined shape (mostly Gaussian or triangular) which might not reflect the real uncertainty distribution which can vary with the associated measurement. In this paper, we will present a new approach which is based on an adaptive non-singleton interval type-2 FLS where the numerical uncertainties will be modeled and handled by non-singleton type-2 fuzzy inputs and the linguistic uncertainties will be handled by interval type-2 fuzzy sets to represent the antecedents’ linguistic labels. The non-singleton type-2 fuzzy inputs are dynamic and they are automatically generated from data and they do not assume a specific shape about the distribution associated with the given sensor. We will present several real world experiments using a real world robot which will show how the proposed type-2 non-singleton type-2 FLS will produce a superior performance to its singleton type-1 and type-2 counterparts when encountering high levels of uncertainties.", "title": "" }, { "docid": "9a8901f5787bf6db6900ad2b4b6291c5", "text": "MOTIVATION\nAs biological inquiry produces ever more network data, such as protein-protein interaction networks, gene regulatory networks and metabolic networks, many algorithms have been proposed for the purpose of pairwise network alignment-finding a mapping from the nodes of one network to the nodes of another in such a way that the mapped nodes can be considered to correspond with respect to both their place in the network topology and their biological attributes. This technique is helpful in identifying previously undiscovered homologies between proteins of different species and revealing functionally similar subnetworks. In the past few years, a wealth of different aligners has been published, but few of them have been compared with one another, and no comprehensive review of these algorithms has yet appeared.\n\n\nRESULTS\nWe present the problem of biological network alignment, provide a guide to existing alignment algorithms and comprehensively benchmark existing algorithms on both synthetic and real-world biological data, finding dramatic differences between existing algorithms in the quality of the alignments they produce. Additionally, we find that many of these tools are inconvenient to use in practice, and there remains a need for easy-to-use cross-platform tools for performing network alignment.", "title": "" }, { "docid": "df3cad5eb68df1bc5d6770f4f700ac65", "text": "Substrate integrated waveguide (SIW) cavity-backed antenna arrays have advantages of low-profile, high-gain and low-cost fabrication. However, traditional SIW cavity-backed antenna arrays usually load with extra feeding networks, which make the whole arrays larger and more complex. A novel 4 × 4 SIW cavity-backed antenna array without using individual feeding network is presented in this letter. The proposed antenna array consists of sixteen SIW cavities connected by inductive windows as feeding network and wide slots on the surface of each cavity as radiating part. Without loading with extra feeding network, the array is compact.", "title": "" }, { "docid": "710febdd18f40c9fc82f8a28039362cc", "text": "The paper deals with engineering an electric wheelchair from a common wheelchair and then developing a Brain Computer Interface (BCI) between the electric wheelchair and the human brain. A portable EEG headset and firmware signal processing together facilitate the movement of the wheelchair integrating mind activity and frequency of eye blinks of the patient sitting on the wheelchair with the help of Microcontroller Unit (MCU). The target population for the mind controlled wheelchair is the patients who are paralyzed below the neck and are unable to use conventional wheelchair interfaces. This project aims at creating a cost efficient solution, later intended to be distributed as an add-on conversion unit for a common manual wheelchair. A Neurosky mind wave headset is used to pick up EEG signals from the brain. This is a commercialized version of the Open-EEG Project. The signal obtained from EEG sensor is processed by the ARM microcontroller FRDM KL-25Z, a Freescale board. The microcontroller takes decision for determining the direction of motion of wheelchair based on floor detection and obstacle avoidance sensors mounted on wheelchair’s footplate. The MCU shows real time information on a color LCD interfaced to it. Joystick control of the wheelchair is also provided as an additional interface option that can be chosen from the menu system of the project.", "title": "" }, { "docid": "e30ae0b5cd90d091223ab38596de3109", "text": "1 Abstract We describe a consistent hashing algorithm which performs multiple lookups per key in a hash table of nodes. It requires no additional storage beyond the hash table, and achieves a peak-to-average load ratio of 1 + ε with just 1 + 1 ε lookups per key.", "title": "" }, { "docid": "60cfdc554e1078263370514ec3f04a90", "text": "Stylistic variation is critical to render the utterances generated by conversational agents natural and engaging. In this paper, we focus on sequence-to-sequence models for open-domain dialogue response generation and propose a new method to evaluate the extent to which such models are able to generate responses that reflect different personality traits.", "title": "" }, { "docid": "3d2666ab3b786fd02bb15e81b0eaeb37", "text": "BACKGROUND\n  The analysis of nursing errors in clinical management highlighted that clinical handover plays a pivotal role in patient safety. Changes to handover including conducting handover at the bedside and the use of written handover summary sheets were subsequently implemented.\n\n\nAIM\n  The aim of the study was to explore nurses' perspectives on the introduction of bedside handover and the use of written handover sheets.\n\n\nMETHOD\n  Using a qualitative approach, data were obtained from six focus groups containing 30 registered and enrolled (licensed practical) nurses. Thematic analysis revealed several major themes.\n\n\nFINDINGS\n  Themes identified included: bedside handover and the strengths and weaknesses; patient involvement in handover, and good communication is about good communicators. Finally, three sources of patient information and other issues were also identified as key aspects.\n\n\nCONCLUSIONS\n  How bedside handover is delivered should be considered in relation to specific patient caseloads (patients with cognitive impairments), the shift (day, evening or night shift) and the model of service delivery (team versus patient allocation).\n\n\nIMPLICATIONS FOR NURSING MANAGEMENT\n  Flexible handover methods are implicit within clinical setting issues especially in consideration to nursing teamwork. Good communication processes continue to be fundamental for successful handover processes.", "title": "" }, { "docid": "b6eeb0f99ae856acb1bf2fef4d73c517", "text": "We propose a probabilistic matrix factorization model for collaborative filtering that learns from data that is missing not at random (MNAR). Matrix factorization models exhibit state-of-the-art predictive performance in collaborative filtering. However, these models usually assume that the data is missing at random (MAR), and this is rarely the case. For example, the data is not MAR if users rate items they like more than ones they dislike. When the MAR assumption is incorrect, inferences are biased and predictive performance can suffer. Therefore, we model both the generative process for the data and the missing data mechanism. By learning these two models jointly we obtain improved performance over state-of-the-art methods when predicting the ratings and when modeling the data observation process. We present the first viable MF model for MNAR data. Our results are promising and we expect that further research on NMAR models will yield large gains in collaborative filtering.", "title": "" }, { "docid": "cc6c485fdd8d4d61c7b68bfd94639047", "text": "Passive geolocaton of communication emitters provides great benefits to military and civilian surveillance and security operations. Time Difference of Arrival (TDOA) and Frequency Difference of Arrival (FDOA) measurement combination for stationary emitters may be obtained by sensors mounted on mobile platforms, for example on a pair of UAVs. Complex Ambiguity Function (CAF) of received complex signals can be efficiently calculated to provide required TDOA / FDOA measurement combination. TDOA and FDOA measurements are nonlinear in the sense that the emitter uncertainty given measurements in the Cartesian domain is non-Gaussian. Multiple non-linear measurements of emitter location need to be fused to provide the geolocation estimates. Gaussian Mixture Measurement (GMM) filter fuses nonlinear measurements as long as the uncertainty of each measurement in the surveillance (Cartesian) space is modeled by a Gaussian Mixture. Simulation results confirm this approach and compare it with geolocation using Bearings Only (BO) measurements.", "title": "" }, { "docid": "f91e1638e4812726ccf96f410da2624b", "text": "We introduce NoisyNet, a deep reinforcement learning agent with parametric noise added to its weights, and show that the induced stochasticity of the agent’s policy can be used to aid efficient exploration. The parameters of the noise are learned with gradient descent along with the remaining network weights. NoisyNet is straightforward to implement and adds little computational overhead. We find that replacing the conventional exploration heuristics for A3C, DQN and Dueling agents (entropy reward and -greedy respectively) with NoisyNet yields substantially higher scores for a wide range of Atari games, in some cases advancing the agent from sub to super-human performance.", "title": "" } ]
scidocsrr
6ac2ce9b4ff1957ba459881dd4b625f8
Data Storage Security and Privacy in Cloud Computing : A Comprehensive Survey
[ { "docid": "02564434d1dab0031718a10400a59593", "text": "The advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in cloud, it is crucial for the search service to allow multi-keyword query and provide result similarity ranking to meet the effective data retrieval need. Related works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely differentiate the search results. In this paper, for the first time, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy requirements for such a secure cloud data utilization system to become a reality. Among various multi-keyword semantics, we choose the efficient principle of \" coordinate matching \" , i.e., as many matches as possible, to capture the similarity between search query and data documents, and further use \" inner product similarity \" to quantitatively formalize such principle for similarity measurement. We first propose a basic MRSE scheme using secure inner product computation, and then significantly improve it to meet different privacy requirements in two levels of threat models. Thorough analysis investigating privacy and efficiency guarantees of proposed schemes is given, and experiments on the real-world dataset further show proposed schemes indeed introduce low overhead on computation and communication. INTRODUCTION Due to the rapid expansion of data, the data owners tend to store their data into the cloud to release the burden of data storage and maintenance [1]. However, as the cloud customers and the cloud server are not in the same trusted domain, our outsourced data may be under the exposure to the risk. Thus, before sent to the cloud, the sensitive data needs to be encrypted to protect for data privacy and combat unsolicited accesses. Unfortunately, the traditional plaintext search methods cannot be directly applied to the encrypted cloud data any more. The traditional information retrieval (IR) has already provided multi-keyword ranked search for the data user. In the same way, the cloud server needs provide the data user with the similar function, while protecting data and search privacy. It …", "title": "" } ]
[ { "docid": "c39fe902027ba5cb5f0fa98005596178", "text": "Twitter is used extensively in the United States as well as globally, creating many opportunities to augment decision support systems with Twitterdriven predictive analytics. Twitter is an ideal data source for decision support: its users, who number in the millions, publicly discuss events, emotions, and innumerable other topics; its content is authored and distributed in real time at no charge; and individual messages (also known as tweets) are often tagged with precise spatial and temporal coordinates. This article presents research investigating the use of spatiotemporally tagged tweets for crime prediction. We use Twitter-specific linguistic analysis and statistical topic modeling to automatically identify discussion topics across a major city in the United States. We then incorporate these topics into a crime prediction model and show that, for 19 of the 25 crime types we studied, the addition of Twitter data improves crime prediction performance versus a standard approach based on kernel density estimation. We identify a number of performance bottlenecks that could impact the use of Twitter in an actual decision support system. We also point out important areas of future work for this research, including deeper semantic analysis of message con∗Email address: msg8u@virginia.edu; Tel.: 1+ 434 924 5397; Fax: 1+ 434 982 2972 Preprint submitted to Decision Support Systems January 14, 2014 tent, temporal modeling, and incorporation of auxiliary data sources. This research has implications specifically for criminal justice decision makers in charge of resource allocation for crime prevention. More generally, this research has implications for decision makers concerned with geographic spaces occupied by Twitter-using individuals.", "title": "" }, { "docid": "a90a20f66d3e73947fbc28dc60bcee24", "text": "It is well known that the performance of speech recognition algorithms degrade in the presence of adverse environments where a speaker is under stress, emotion, or Lombard effect. This study evaluates the effectiveness of traditional features in recognition of speech under stress and formulates new features which are shown to improve stressed speech recognition. The focus is on formulating robust features which are less dependent on the speaking conditions rather than applying compensation or adaptation techniques. The stressed speaking styles considered are simulated angry and loud, Lombard effect speech, and noisy actual stressed speech from the SUSAS database which is available on CD-ROM through the NATO IST/TG-01 research group and LDC1 . In addition, this study investigates the immunity of linear prediction power spectrum and fast Fourier transform power spectrum to the presence of stress. Our results show that unlike fast Fourier transform’s (FFT) immunity to noise, the linear prediction power spectrum is more immune than FFT to stress as well as to a combination of a noisy and stressful environment. Finally, the effect of various parameter processing such as fixed versus variable preemphasis, liftering, and fixed versus cepstral mean normalization are studied. Two alternative frequency partitioning methods are proposed and compared with traditional mel-frequency cepstral coefficients (MFCC) features for stressed speech recognition. It is shown that the alternate filterbank frequency partitions are more effective for recognition of speech under both simulated and actual stressed conditions.", "title": "" }, { "docid": "ce8262364b1a1b840e50f876c6d959fe", "text": "Architectural styles, object-oriented design, and design patterns all hold promise as approaches that simplify software design and reuse by capturing and exploiting system design knowledge. This article explores the capabilities and roles of the various approaches, their strengths, and their limitations. oftware system builders increasingly recognize the importance of exploiting design knowledge in the engineering of new systems. Several distinct but related approaches hold promise. One approach is to focus on the architectural level of system design—the gross structure of a system as a composition of interacting parts. Architectural designs illuminate such key issues as scaling and portability, the assignment of functionality to design elements, interaction protocols between elements, and global system properties such as processing rates, end-to-end capacities, and overall performance.1 Architectural descriptions tend to be informal and idiosyncratic: box-and-line diagrams convey essential system structure, with accompanying prose explaining the meaning of the symbols. Nonetheless, they provide a critical staging point for determining whether a system can meet its essential requirements, and they guide implementers in constructing the system. More recently, architectural descriptions have been used for codifying and reusing design knowledge. Much of their power comes from use of idiomatic architectural terms, such as “clientserver system,” “layered system,” or “blackboard organization.”", "title": "" }, { "docid": "d2521791d515b69d5a4a8c9ea02e3d17", "text": "In this paper, four-wheel active steering (4WAS), which can control the front wheel steering angle and rear wheel steering angle independently, has been investigated based on the analysis of deficiency of conventional four wheel steering (4WS). A model following control structure is adopted to follow the desired yaw rate and vehicle sideslip angle, which consists of feedforward and feedback controller. The feedback controller is designed based on the optimal control theory, minimizing the tracking errors between the outputs of actual vehicle model and that of linear reference model. Finally, computer simulations are performed to evaluate the proposed control system via the co-simulation of Matlab/Simulink and CarSim. Simulation results show that the designed 4WAS controller can achieve the good response performance and improve the vehicle handling and stability.", "title": "" }, { "docid": "09d4f38c87d6cc0e2cb6b1a7caad10f8", "text": "Semidefinite programs (SDPs) can be solved in polynomial time by interior point methods, but scalability can be an issue. To address this shortcoming, over a decade ago, Burer and Monteiro proposed to solve SDPs with few equality constraints via rank-restricted, non-convex surrogates. Remarkably, for some applications, local optimization methods seem to converge to global optima of these non-convex surrogates reliably. Although some theory supports this empirical success, a complete explanation of it remains an open question. In this paper, we consider a class of SDPs which includes applications such as max-cut, community detection in the stochastic block model, robust PCA, phase retrieval and synchronization of rotations. We show that the low-rank Burer–Monteiro formulation of SDPs in that class almost never has any spurious local optima. This paper was corrected on April 9, 2018. Theorems 2 and 4 had the assumption that M (1) is a manifold. From this assumption it was stated that TYM = {Ẏ ∈ Rn×p : A(Ẏ Y >+ Y Ẏ >) = 0}, which is not true in general. To ensure this identity, the theorems now make the stronger assumption that gradients of the constraintsA(Y Y >) = b are linearly independent for all Y inM. All examples treated in the paper satisfy this assumption. Appendix D gives details.", "title": "" }, { "docid": "065466185ba541472ae84e0b5cf5e864", "text": "A significant challenge for crowdsourcing has been increasing worker engagement and output quality. We explore the effects of social, learning, and financial strategies, and their combinations, on increasing worker retention across tasks and change in the quality of worker output. Through three experiments, we show that 1) using these strategies together increased workers' engagement and the quality of their work; 2) a social strategy was most effective for increasing engagement; 3) a learning strategy was most effective in improving quality. The findings of this paper provide strategies for harnessing the crowd to perform complex tasks, as well as insight into crowd workers' motivation.", "title": "" }, { "docid": "d984489b4b71eabe39ed79fac9cf27a1", "text": "Remote sensing from airborne and spaceborne platforms provides valuable data for mapping, environmental monitoring, disaster management and civil and military intelligence. However, to explore the full value of these data, the appropriate information has to be extracted and presented in standard format to import it into geo-information systems and thus allow efficient decision processes. The object-oriented approach can contribute to powerful automatic and semiautomatic analysis for most remote sensing applications. Synergetic use to pixel-based or statistical signal processing methods explores the rich information contents. Here, we explain principal strategies of object-oriented analysis, discuss how the combination with fuzzy methods allows implementing expert knowledge and describe a representative example for the proposed workflow from remote sensing imagery to GIS. The strategies are demonstrated using the first objectoriented image analysis software on the market, eCognition, which provides an appropriate link between remote sensing", "title": "" }, { "docid": "0d28ddef1fa86942da679aec23dff890", "text": "Electronic patient records remain a rather unexplored, but potentially rich data source for discovering correlations between diseases. We describe a general approach for gathering phenotypic descriptions of patients from medical records in a systematic and non-cohort dependent manner. By extracting phenotype information from the free-text in such records we demonstrate that we can extend the information contained in the structured record data, and use it for producing fine-grained patient stratification and disease co-occurrence statistics. The approach uses a dictionary based on the International Classification of Disease ontology and is therefore in principle language independent. As a use case we show how records from a Danish psychiatric hospital lead to the identification of disease correlations, which subsequently can be mapped to systems biology frameworks.", "title": "" }, { "docid": "106fefb169c7e95999fb411b4e07954e", "text": "Additional contents in web pages, such as navigation panels, advertisements, copyrights and disclaimer notices, are typically not related to the main subject and may hamper the performance of Web data mining. They are traditionally taken as noises and need to be removed properly. To achieve this, two intuitive and crucial kinds of information—the textual information and the visual information of web pages—is considered in this paper. Accordingly, Text Density and Visual Importance are defined for the Document Object Model (DOM) nodes of a web page. Furthermore, a content extraction method with these measured values is proposed. It is a fast, accurate and general method for extracting content from diverse web pages. And with the employment of DOM nodes, the original structure of the web page can be preserved. Evaluated with the CleanEval benchmark and with randomly selected pages from well-known Web sites, where various web domains and styles are tested, the effect of the method is demonstrated. The average F1-scores with our method were 8.7 % higher than the best scores among several alternative methods.", "title": "" }, { "docid": "be9cea5823779bf5ced592f108816554", "text": "Undoubtedly, bioinformatics is one of the fastest developing scientific disciplines in recent years. Bioinformatics is the development and application of computer methods for management, analysis, interpretation, and prediction, as well as for the design of experiments. There is already a significant number of books on bioinformatics. Some are introductory and require almost no prior experience in biology or computer science: “Bioinformatics Basics Applications in Biological Science and Medicine” and “Introduction to Bioinformatics.” Others are targeted to biologists entering the field of bioinformatics: “Developing Bioinformatics Computer Skills.” Some more specialized books are: “An Introduction to Support Vector Machines : And Other Kernel-Based Learning Methods”, “Biological Sequence Analysis : Probabilistic Models of Proteins and Nucleic Acids”, “Pattern Discovery in Bimolecular Data : Tools, Techniques, and Applications”, “Computational Molecular Biology: An Algorithmic Approach.” The book subject of this review has a broad scope. “Bioinformatics: The machine learning approach” is aimed at two types of researchers and students. First are the biologists and biochemists who need to understand new data-driven algorithms, such as neural networks and hidden Markov", "title": "" }, { "docid": "221d346a3ef1821438d388335c2d3a13", "text": "Integrating data mining into business processes becomes crucial for business today. Modern business process management frameworks provide great support for flexible design, deployment and management of business processes. However, integrating complex data mining services into such frameworks is not trivial due to unclear definitions of user roles and missing flexible data mining services as well as missing standards and methods for the deployment of data mining solutions. This work contributes an integrated view on the definition of user roles for business, IT and data mining and discusses the integration of data mining in business processes and its evaluation in the context of BPR.", "title": "" }, { "docid": "ba8886a9e251492ec0dca0512d6994be", "text": "In this paper, we consider various moment inequalities for sums of random matrices—which are well–studied in the functional analysis and probability theory literature—and demonstrate how they can be used to obtain the best known performance guarantees for several problems in optimization. First, we show that the validity of a recent conjecture of Nemirovski is actually a direct consequence of the so–called non–commutative Khintchine’s inequality in functional analysis. Using this result, we show that an SDP–based algorithm of Nemirovski, which is developed for solving a class of quadratic optimization problems with orthogonality constraints, has a logarithmic approximation guarantee. This improves upon the polynomial approximation guarantee established earlier by Nemirovski. Furthermore, we obtain improved safe tractable approximations of a certain class of chance constrained linear matrix inequalities. Secondly, we consider a recent result of Delage and Ye on the so–called data–driven distributionally robust stochastic programming problem. One of the assumptions in the Delage–Ye result is that the underlying probability distribution has bounded support. However, using a suitable moment inequality, we show that the result in fact holds for a much larger class of probability distributions. Given the close connection between the behavior of sums of random matrices and the theoretical properties of various optimization problems, we expect that the moment inequalities discussed in this paper will find further applications in optimization.", "title": "" }, { "docid": "cb18b8d464261ac4b46587e6a31efce0", "text": "This paper critically analyses the foundations of three widely advocated information security management standards (BS7799, GASPP and SSE-CMM). The analysis reveals several fundamental problems related to these standards, casting serious doubts on their validity. The implications for research and practice, in improving information security management standards, are considered.", "title": "" }, { "docid": "f9dc4cfb42a5ec893f5819e03c64d4bc", "text": "For human pose estimation in monocular images, joint occlusions and overlapping upon human bodies often result in deviated pose predictions. Under these circumstances, biologically implausible pose predictions may be produced. In contrast, human vision is able to predict poses by exploiting geometric constraints of joint inter-connectivity. To address the problem by incorporating priors about the structure of human bodies, we propose a novel structure-aware convolutional network to implicitly take such priors into account during training of the deep network. Explicit learning of such constraints is typically challenging. Instead, we design discriminators to distinguish the real poses from the fake ones (such as biologically implausible ones). If the pose generator (G) generates results that the discriminator fails to distinguish from real ones, the network successfully learns the priors.,,To better capture the structure dependency of human body joints, the generator G is designed in a stacked multi-task manner to predict poses as well as occlusion heatmaps. Then, the pose and occlusion heatmaps are sent to the discriminators to predict the likelihood of the pose being real. Training of the network follows the strategy of conditional Generative Adversarial Networks (GANs). The effectiveness of the proposed network is evaluated on two widely used human pose estimation benchmark datasets. Our approach significantly outperforms the state-of-the-art methods and almost always generates plausible human pose predictions.", "title": "" }, { "docid": "6fbd64c7b38493c432bb140c544f3235", "text": "It is well-known that people love food. However, an insane diet can cause problems in the general health of the people. Since health is strictly linked to the diet, advanced computer vision tools to recognize food images (e.g. acquired with mobile/wearable cameras), as well as their properties (e.g., calories), can help the diet monitoring by providing useful information to the experts (e.g., nutritionists) to assess the food intake of patients (e.g., to combat obesity). The food recognition is a challenging task since the food is intrinsically deformable and presents high variability in appearance. Image representation plays a fundamental role. To properly study the peculiarities of the image representation in the food application context, a benchmark dataset is needed. These facts motivate the work presented in this paper. In this work we introduce the UNICT-FD889 dataset. It is the first food image dataset composed by over 800 distinct plates of food which can be used as benchmark to design and compare representation models of food images. We exploit the UNICT-FD889 dataset for Near Duplicate Image Retrieval (NDIR) purposes by comparing three standard state-of-the-art image descriptors: Bag of Textons, PRICoLBP and SIFT. Results confirm that both textures and colors are fundamental properties in food representation. Moreover the experiments point out that the Bag of Textons representation obtained considering the color domain is more accurate than the other two approaches for NDIR.", "title": "" }, { "docid": "6f68ed77668f21696051947a8ccc4f56", "text": "Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to provide control of classified information. However, for that core of data processing concerned with business operation and control of assets, the primary security concern is data integrity. This paper presents a policy for data integrity based on commercial data processing practices, and compares the mechanisms needed for this policy with the mechanisms needed to enforce the lattice model for information security. We argue that a lattice model is not sufficient to characterize integrity policies, and that distinct mechanisms are needed to Control disclosure and to provide integrity.", "title": "" }, { "docid": "448dc3c1c5207e606f1bd3b386f8bbde", "text": "Variational autoencoders (VAE) are a powerful and widely-used class of models to learn complex data distributions in an unsupervised fashion. One important limitation of VAEs is the prior assumption that latent sample representations are independent and identically distributed. However, for many important datasets, such as time-series of images, this assumption is too strong: accounting for covariances between samples, such as those in time, can yield to a more appropriate model specification and improve performance in downstream tasks. In this work, we introduce a new model, the Gaussian Process (GP) Prior Variational Autoencoder (GPPVAE), to specifically address this issue. The GPPVAE aims to combine the power of VAEs with the ability to model correlations afforded by GP priors. To achieve efficient inference in this new class of models, we leverage structure in the covariance matrix, and introduce a new stochastic backpropagation strategy that allows for computing stochastic gradients in a distributed and low-memory fashion. We show that our method outperforms conditional VAEs (CVAEs) and an adaptation of standard VAEs in two image data applications.", "title": "" }, { "docid": "3fae9d0778c9f9df1ae51ad3b5f62a05", "text": "This paper argues for the utility of back-end driven onloading to the edge as a way to address bandwidth use and latency challenges for future device-cloud interactions. Supporting such edge functions (EFs) requires solutions that can provide (i) fast and scalable EF provisioning and (ii) strong guarantees for the integrity of the EF execution and confidentiality of the state stored at the edge. In response to these goals, we (i) present a detailed design space exploration of the current technologies that can be leveraged in the design of edge function platforms (EFPs), (ii) develop a solution to address security concerns of EFs that leverages emerging hardware support for OS agnostic trusted execution environments such as Intel SGX enclaves, and (iii) propose and evaluate AirBox, a platform for fast, scalable and secure onloading of edge functions.", "title": "" }, { "docid": "89460f94140b9471b120674ddd904948", "text": "Cross-disciplinary research on collective intelligence considers that groups, like individuals, have a certain level of intelligence. For example, the study by Woolley et al. (2010) indicates that groups which perform well on one type of task will perform well on others. In a pair of empirical studies of groups interacting face-to-face, they found evidence of a collective intelligence factor, a measure of consistent group performance across a series of tasks, which was highly predictive of performance on a subsequent, more complex task. This collective intelligence factor differed from the individual intelligence of group members, and was significantly predicted by members’ social sensitivity – the ability to understand the emotions of others based on visual facial cues (Baron-Cohen et al. 2001).", "title": "" }, { "docid": "1c83671ad725908b2d4a6467b23fc83f", "text": "Although many IT and business managers today may be lured into business intelligence (BI) investments by the promise of predictive analytics and emerging BI trends, creating an enterprise-wide BI capability is a journey that takes time. This article describes Norfolk Southern Railway’s BI journey, which began in the early 1990s with departmental reporting, evolved into data warehousing and analytic applications, and has resulted in a company that today uses BI to support corporate strategy. We describe how BI at Norfolk Southern evolved over several decades, with the company developing strong BI foundations and an effective enterprise-wide BI capability. We also identify the practices that kept the BI journey “on track.” These practices can be used by other IT and business leaders as they plan and develop BI capabilities in their own organizations.", "title": "" } ]
scidocsrr
086cbd9059215acae52a3d74812acd34
Graph-based Coherence Modeling For Assessing Readability
[ { "docid": "32b07681862a40755e0e946873ab40bb", "text": "In this paper, we present a new method of using statistical models to estimate readability [1]. Language Model is used to capture the content information. It is combined with linguistic feature model by a linear form. Experiments show that this new method has a better performance than the widely used Flesch-Kincaid readability formula.", "title": "" } ]
[ { "docid": "ef4ea0d489cd9cb7ea4734d96b379721", "text": "A huge repository of terabytes of data is generated each day from modern information systems and digital technologies such as Internet of Things and cloud computing. Analysis of these massive data requires a lot of efforts at multiple levels to extract knowledge for decision making. Therefore, big data analysis is a current area of research and development. The basic objective of this paper is to explore the potential impact of big data challenges, open research issues, and various tools associated with it. As a result, this article provides a platform to explore big data at numerous stages. Additionally, it opens a new horizon for researchers to develop the solution, based on the challenges and open research issues. Keywords—Big data analytics; Hadoop; Massive data; Structured data; Unstructured Data", "title": "" }, { "docid": "270b0cb1cb95d69d34fc5f6e6cc8b5ce", "text": "A critical problem in an intermodal transport chain is the direct meet at the transhipment nodes. This requires information technology and modern communication facilities as well as close collaboration between all the concerned transport operators in the chain. The T ELETRUCK system – currently under development at the German Research Center for Artificial Intelligence (DFKI) – is a dispatch support system that tackles this problem. Intercompany planning, scheduling, and monitoring of intermodal transport chains will be supported by our system. It aims at providing smooth access to railway time tables and rail-based transport services and – much more important – at allowing for the planning of both, exclusively road-based and combined journeys and showing their cost-effectiveness. We describe our approach – based on intelligent agent technology – both the current state of implementation and our goal of the very next future.", "title": "" }, { "docid": "25f39a66710db781f4354f0da5974d61", "text": "With the rapid development of economy in China over the past decade, air pollution has become an increasingly serious problem in major cities and caused grave public health concerns in China. Recently, a number of studies have dealt with air quality and air pollution. Among them, some attempt to predict and monitor the air quality from different sources of information, ranging from deployed physical sensors to social media. These methods are either too expensive or unreliable, prompting us to search for a novel and effective way to sense the air quality. In this study, we propose to employ the state of the art in computer vision techniques to analyze photos that can be easily acquired from online social media. Next, we establish the correlation between the haze level computed directly from photos with the official PM 2.5 record of the taken city at the taken time. Our experiments based on both synthetic and real photos have shown the promise of this image-based approach to estimating and monitoring air pollution.", "title": "" }, { "docid": "a50763db7b9c73ab5e29389d779c343d", "text": "Near to real-time emotion recognition is a promising task for human-computer interaction (HCI) and human-robot interaction (HRI). Using knowledge about the user's emotions depends upon the possibility to extract information about users' emotions during HCI or HRI without explicitly asking users about the feelings they are experiencing. To be able to sense the user's emotions without interrupting the HCI, we present a new method applied to the emotional experience of the user for extracting semantic information from the autonomic nervous system (ANS) signals associated with emotions. We use the concepts of 1st person - where the subject consciously (and subjectively) extracts the semantic meaning of a given lived experience, (e.g. `I felt amused') - and 3rd person approach - where the experimenter interprets the semantic meaning of the subject's experience from a set of externally (and objectively) measured variables (e.g. galvanic skin response measures). Based on the 3rd person approach, our technique aims at psychologically interpreting physiological parameters (skin conductance and heart rate), and at producing a continuous extraction of the user's affective state during HCI or HRI. We also combine it with the 1st person approach measure which allows a tailored interpretation of the physiological measure closely related to the user own emotional experience", "title": "" }, { "docid": "9e188833829fafc941d199a59c4d627b", "text": "The human brain is not a passive organ simply waiting to be activated by external stimuli. Instead, we propose that the brain continuously employs memory of past experiences to interpret sensory information and predict the immediately relevant future. The basic elements of this proposal include analogical mapping, associative representations and the generation of predictions. This review concentrates on visual recognition as the model system for developing and testing ideas about the role and mechanisms of top-down predictions in the brain. We cover relevant behavioral, computational and neural aspects, explore links to emotion and action preparation, and consider clinical implications for schizophrenia and dyslexia. We then discuss the extension of the general principles of this proposal to other cognitive domains.", "title": "" }, { "docid": "773c4a4640d587e58cf80c9371ad20fc", "text": "Building automation systems are traditionally concerned with the control of heating, ventilation, and air conditioning, as well as lighting and shading, systems. They have their origin in a time where security has been considered as a side issue at best. Nowadays, with the rising desire to integrate security-critical services that were formerly provided by isolated subsystems, security must no longer be neglected. Thus, the development of a comprehensive security concept is of utmost importance. This paper starts with a security threat analysis and identifies the challenges of providing security in the building automation domain. Afterward, the security mechanisms of available standards are thoroughly analyzed. Finally, two approaches that provide both secure communication and secure execution of possibly untrusted control applications are presented.", "title": "" }, { "docid": "55b76c1b1d4cabee6ebbe9aa26c4058f", "text": "The Fundamental Law of Information Recovery states, informally, that “overly accurate” estimates of “too many” statistics completely destroys privacy ([DN03] et sequelae). Differential privacy is a mathematically rigorous definition of privacy tailored to analysis of large datasets and equipped with a formal measure of privacy loss [DMNS06, Dwo06]. Moreover, differentially private algorithms take as input a parameter, typically called ε, that caps the permitted privacy loss in any execution of the algorithm and offers a concrete privacy/utility tradeoff. One of the strengths of differential privacy is the ability to reason about cumulative privacy loss over multiple analyses, given the values of ε used in each individual analysis. By appropriate choice of ε it is possible to stay within the bounds of the Fundamental Law while releasing any given number of estimated statistics; however, before this work the bounds were not tight. Roughly speaking, differential privacy ensures that the outcome of any anlysis on a database x is distributed very similarly to the outcome on any neighboring database y that differs from x in just one row (Definition 2.3). That is, differentially private algorithms are randomized, and in particular the max divergence between these two distributions (a sort maximum log odds ratio for any event; see Definition 2.2 below) is bounded by the privacy parameter ε. This absolute guarantee on the maximum privacy loss is now sometimes referred to as “pure” differential privacy. A popular relaxation, (ε, δ)-differential privacy (Definition 2.4)[DKM+06], guarantees that with probability at most 1−δ the privacy loss does not exceed ε.1 Typically δ is taken to be “cryptographically” small, that is, smaller than the inverse of any polynomial in the size of the dataset, and pure differential privacy is simply the special case in which δ = 0. The relaxation frequently permits asymptotically better accuracy than pure differential privacy for the same value of ε, even when δ is very small. What happens in the case of multiple analyses? While the composition of k (ε, 0)-differentially privacy algorithms is at worst (kε, 0)-differentially private, it is also simultaneously ( √", "title": "" }, { "docid": "7f64b53a4188464301568eda283c99f0", "text": "We survey the theory of perfectoid spaces and its applications. Mathematics Subject Classification (2010). Primary: 14G22, 11F80 Secondary: 14G20, 14C30, 14L05, 14G35, 11F03", "title": "" }, { "docid": "e4b6aaa3f2548fa0f59973c317298f5e", "text": "Perceived discrimination has been studied with regard to its impact on several types of health effects. This meta-analysis provides a comprehensive account of the relationships between multiple forms of perceived discrimination and both mental and physical health outcomes. In addition, this meta-analysis examines potential mechanisms by which perceiving discrimination may affect health, including through psychological and physiological stress responses and health behaviors. Analysis of 134 samples suggests that when weighting each study's contribution by sample size, perceived discrimination has a significant negative effect on both mental and physical health. Perceived discrimination also produces significantly heightened stress responses and is related to participation in unhealthy and nonparticipation in healthy behaviors. These findings suggest potential pathways linking perceived discrimination to negative health outcomes.", "title": "" }, { "docid": "8cdd4a8910467974dc7cfee30f6f570b", "text": "This work contains a theoretical study and computer simulations of a new self-organizing process. The principal discovery is that in a simple network of adaptive physical elements which receives signals from a primary event space, the signal representations are automatically mapped onto a set of output responses in such a way that the responses acquire the same topological order as that of the primary events. In other words, a principle has been discovered which facilitates the automatic formation of topologically correct maps of features of observable events. The basic self-organizing system is a one- or two-dimensional array of processing units resembling a network of threshold-logic units, and characterized by short-range lateral feedback between neighbouring units. Several types of computer simulations are used to demonstrate the ordering process as well as the conditions under which it fails.", "title": "" }, { "docid": "5632d79f37b4bc774cd3bdf7f1cd5c71", "text": "Switching devices based on wide band gap materials as SiC offer a significant performance improvement on the switch level compared to Si devices. A well known example are SiC diodes employed e.g. in PFC converters. In this paper, the impact on the system level performance, i.e. efficiency/power density, of a PFC and of a DC-DC converter resulting with the new SiC devices is evaluated based on analytical optimisation procedures and prototype systems. There, normally-on JFETs by SiCED and normally-off JFETs by SemiSouth are considered.", "title": "" }, { "docid": "bb8b6d2424ef7709aa1b89bc5d119686", "text": "We have applied a Long Short-Term Memory neural network to model S&P 500 volatility, incorporating Google domestic trends as indicators of the public mood and macroeconomic factors. In a held-out test set, our Long Short-Term Memory model gives a mean absolute percentage error of 24.2%, outperforming linear Ridge/Lasso and autoregressive GARCH benchmarks by at least 31%. This evaluation is based on an optimal observation and normalization scheme which maximizes the mutual information between domestic trends and daily volatility in the training set. Our preliminary investigation shows strong promise for better predicting stock behavior via deep learning and neural network models.", "title": "" }, { "docid": "69c8584255b16e6bc05fdfc6510d0dc4", "text": "OBJECTIVE\nThis study assesses the psychometric properties of Ward's seven-subtest short form (SF) for WAIS-IV in a sample of adults with schizophrenia (SZ) and schizoaffective disorder.\n\n\nMETHOD\nSeventy patients diagnosed with schizophrenia or schizoaffective disorder were administered the full version of the WAIS-IV. Four different versions of the Ward's SF were then calculated. The subtests used were: Similarities, Digit Span, Arithmetic, Information, Coding, Picture Completion, and Block Design (BD version) or Matrix Reasoning (MR version). Prorated and regression-based formulae were assessed for each version.\n\n\nRESULTS\nThe actual and estimated factorial indexes reflected the typical pattern observed in schizophrenia. The four SFs correlated significantly with their full-version counterparts, but the Perceptual Reasoning Index (PRI) correlated below the acceptance threshold for all four versions. The regression-derived estimates showed larger differences compared to the full form. The four forms revealed comparable but generally low clinical category agreement rates for factor indexes. All SFs showed an acceptable reliability, but they were not correlated with clinical outcomes.\n\n\nCONCLUSIONS\nThe WAIS-IV SF offers a good estimate of WAIS-IV intelligence quotient, which is consistent with previous results. Although the overall scores are comparable between the four versions, the prorated forms provided a better estimation of almost all indexes. MR can be used as an alternative for BD without substantially changing the psychometric properties of the SF. However, we recommend a cautious use of these abbreviated forms when it is necessary to estimate the factor index scores, especially PRI, and Processing Speed Index.", "title": "" }, { "docid": "60c36aa871aaa3a13ac3b51dbb12b668", "text": "We propose a novel approach for multi-view object detection in 3D scenes reconstructed from RGB-D sensor. We utilize shape based representation using local shape context descriptors along with the voting strategy which is supported by unsupervised object proposals generated from 3D point cloud data. Our algorithm starts with a single-view object detection where object proposals generated in 3D space are combined with object specific hypotheses generated by the voting strategy. To tackle the multi-view setting, the data association between multiple views enabled view registration and 3D object proposals. The evidence from multiple views is combined in simple bayesian setting. The approach is evaluated on the Washington RGB-D scenes datasets [1], [2] containing several classes of objects in a table top setting. We evaluated our approach against the other state-of-the-art methods and demonstrated superior performance on the same dataset.", "title": "" }, { "docid": "d2bf01dd261701cae64daa8625f4d2f4", "text": "Canada has been the world’s leader in e-Government maturity for the last five years. The global average for government website usage by citizens is about 30%. In Canada, this statistic is over 51%. The vast majority of Canadians visit government websites to obtain information, rather than interacting or transacting with the government. It seems that the rate of adoption of e-Government has globally fallen below expectations although some countries are doing better than others. Clearly, a better understanding of why and how citizens use government websites, and their general dispositions towards e-Government is an important research issue. This paper initiates discussion of this issue by proposing a conceptual model of e-Government adoption that places users as the focal point for e-Government adoption strategy.", "title": "" }, { "docid": "67ef359b63bf9fc1e1351c003d254c0b", "text": "AIM\nThis paper is a report of selected findings from a study exploring the relationship between belongingness and placement experiences of preregistration nursing students.\n\n\nBACKGROUND\nStaff-student relationships are an important influence on students' experiences of belongingness and their clinical learning. The need to belong is universal and pervasive, exerting a powerful influence on thought processes, emotions, behaviour, health and happiness. People deprived of belongingness are more likely to experience diminished self-esteem, increased stress and anxiety, depression and a decrease in general well-being. Nursing students' motivation and capacity to learn, self-concept, confidence, the extent to which they are willing to question or conform to poor practice and their future career decisions are influenced by the extent to which they experience belongingness.\n\n\nMETHOD\nDuring 2006, 18 third year students from two Australian universities and one United Kingdom university participated in in-depth semi-structured interviews. Data were analysed thematically.\n\n\nFINDINGS\nParticipants described placement experiences spanning a continuum from those promoting a high degree of belongingness to those provoking intense feelings of alienation. Staff-student relationships (including receptiveness, inclusion/exclusion, legitimization of the student role, recognition and appreciation, challenge and support) were the most important influence on students' sense of belonging and learning. Similarities between sites were remarkable, despite the differences in healthcare and higher education systems.\n\n\nCONCLUSION\nStaff-student relationships are key to students' experience of belongingness. Understanding the types of interactions and behaviours that facilitate or impede students' belongingness and learning are essential to the creation of positive clinical experiences.", "title": "" }, { "docid": "d96373920011674bbb6b2008e9d4eec2", "text": "Social networking site users must decide what content to share and with whom. Many social networks, including Facebook, provide tools that allow users to selectively share content or block people from viewing content. However, sometimes instead of targeting a particular audience, users will self-censor, or choose not to share. We report the results from an 18-participant user study designed to explore self-censorship behavior as well as the subset of unshared content participants would have potentially shared if they could have specifically targeted desired audiences. We asked participants to report all content they thought about sharing but decided not to share on Facebook and interviewed participants about why they made sharing decisions and with whom they would have liked to have shared or not shared. Participants reported that they would have shared approximately half the unshared content if they had been able to exactly target their desired audiences.", "title": "" }, { "docid": "a49e6ada59d6495e1378d868779d2e32", "text": "Configurable software verification is a recent concept for expressing different program analysis and model checking approaches in one single formalism. This paper presents CPAchecker, a tool and framework that aims at easy integration of new verification components. Every abstract domain, together with the corresponding operations, is required to implement the interface of configurable program analysis (CPA). The main algorithm is configurable to perform a reachability analysis on arbitrary combinations of existing CPAs. The major design goal during the development was to provide a framework for developers that is flexible and easy to extend. We hope that researchers find it convenient and productive to implement new verification ideas and algorithms using this platform and that it advances the field by making it easier to perform practical experiments. The tool is implemented in Java and runs as command-line tool or as Eclipse plug-in. We evaluate the efficiency of our tool on benchmarks from the software model checker Blast. The first released version of CPAchecker implements CPAs for predicate abstraction, octagon, and explicit-value domains. Binaries and the source code of CPAchecker are publicly available as free software.", "title": "" }, { "docid": "d882657765647d9e84b8ad729a079833", "text": "Multiple treebanks annotated under heterogeneous standards give rise to the research question of best utilizing multiple resources for improving statistical models. Prior research has focused on discrete models, leveraging stacking and multi-view learning to address the problem. In this paper, we empirically investigate heterogeneous annotations using neural network models, building a neural network counterpart to discrete stacking and multiview learning, respectively, finding that neural models have their unique advantages thanks to the freedom from manual feature engineering. Neural model achieves not only better accuracy improvements, but also an order of magnitude faster speed compared to its discrete baseline, adding little time cost compared to a neural model trained on a single treebank.", "title": "" } ]
scidocsrr
39dda17cbb5b24752049d7c289769db5
The Value of Semantic Parse Labeling for Knowledge Base Question Answering
[ { "docid": "8057cddc406a90177fda5f3d4ee7c375", "text": "This paper introduces the task of questionanswer driven semantic role labeling (QA-SRL), where question-answer pairs are used to represent predicate-argument structure. For example, the verb “introduce” in the previous sentence would be labeled with the questions “What is introduced?”, and “What introduces something?”, each paired with the phrase from the sentence that gives the correct answer. Posing the problem this way allows the questions themselves to define the set of possible roles, without the need for predefined frame or thematic role ontologies. It also allows for scalable data collection by annotators with very little training and no linguistic expertise. We gather data in two domains, newswire text and Wikipedia articles, and introduce simple classifierbased models for predicting which questions to ask and what their answers should be. Our results show that non-expert annotators can produce high quality QA-SRL data, and also establish baseline performance levels for future work on this task.", "title": "" }, { "docid": "1149ffb77bc5d32b07a5bad4e0fb0409", "text": "Real-world factoid or list questions often have a simple structure, yet are hard to match to facts in a given knowledge base due to high representational and linguistic variability. For example, to answer \"who is the ceo of apple\" on Freebase requires a match to an abstract \"leadership\" entity with three relations \"role\", \"organization\" and \"person\", and two other entities \"apple inc\" and \"managing director\". Recent years have seen a surge of research activity on learning-based solutions for this method. We further advance the state of the art by adopting learning-to-rank methodology and by fully addressing the inherent entity recognition problem, which was neglected in recent works.\n We evaluate our system, called Aqqu, on two standard benchmarks, Free917 and WebQuestions, improving the previous best result for each benchmark considerably. These two benchmarks exhibit quite different challenges, and many of the existing approaches were evaluated (and work well) only for one of them. We also consider efficiency aspects and take care that all questions can be answered interactively (that is, within a second). Materials for full reproducibility are available on our website: http://ad.informatik.uni-freiburg.de/publications.", "title": "" }, { "docid": "8031bea8ee2115e1ec32583d4234e92a", "text": "In this paper we introduce a novel semantic parsing approach to query Freebase in natural language without requiring manual annotations or question-answer pairs. Our key insight is to represent natural language via semantic graphs whose topology shares many commonalities with Freebase. Given this representation, we conceptualize semantic parsing as a graph matching problem. Our model converts sentences to semantic graphs using CCG and subsequently grounds them to Freebase guided by denotations as a form of weak supervision. Evaluation experiments on a subset of the Free917 and WebQuestions benchmark datasets show our semantic parser improves over the state of the art.", "title": "" }, { "docid": "6b7daba104f8e691dd32cba0b4d66ecd", "text": "This paper presents the first empirical results to our knowledge on learning synchronous grammars that generate logical forms. Using statistical machine translation techniques, a semantic parser based on a synchronous context-free grammar augmented with λoperators is learned given a set of training sentences and their correct logical forms. The resulting parser is shown to be the bestperforming system so far in a database query domain.", "title": "" }, { "docid": "da69ac86355c5c514f7e86a48320dcb3", "text": "Current approaches to semantic parsing, the task of converting text to a formal meaning representation, rely on annotated training data mapping sentences to logical forms. Providing this supervision is a major bottleneck in scaling semantic parsers. This paper presents a new learning paradigm aimed at alleviating the supervision burden. We develop two novel learning algorithms capable of predicting complex structures which only rely on a binary feedback signal based on the context of an external world. In addition we reformulate the semantic parsing problem to reduce the dependency of the model on syntactic patterns, thus allowing our parser to scale better using less supervision. Our results surprisingly show that without using any annotated meaning representations learning with a weak feedback signal is capable of producing a parser that is competitive with fully supervised parsers.", "title": "" }, { "docid": "7d8dcb65acd5e0dc70937097ded83013", "text": "This paper addresses the problem of mapping natural language sentences to lambda–calculus encodings of their meaning. We describe a learning algorithm that takes as input a training set of sentences labeled with expressions in the lambda calculus. The algorithm induces a grammar for the problem, along with a log-linear model that represents a distribution over syntactic and semantic analyses conditioned on the input sentence. We apply the method to the task of learning natural language interfaces to databases and show that the learned parsers outperform previous methods in two benchmark database domains.", "title": "" } ]
[ { "docid": "77c2f29beedae831d3bf771bb0388484", "text": "Two types of 3-CRU translational parallel manipulators (TPM) are compared and investigated in this paper. The two 3-CRU TPMs have identical kinematics, but some differences exist in terms of the chain arrangement, one is in fully symmetrical chain arrangement, called symmetrical 3-CRU TPM, the other one is in asymmetrical chain arrangement, called asymmetrical 3-CRU TPM. This paper focuses on discussing the differences between the two 3-CRU TPMs in kinematics, workspace and performance. This study provides insights into parallel manipulators with identical kinematics arranged differently.", "title": "" }, { "docid": "985dcd809a07ab23f778fd7b15b2fab7", "text": "PURPOSE\nIn recent years, there have been series analysing the electro-clinical correlations of insular epilepsy in adult populations. In contrast, the ictal semiology in children with insular epilepsy is poorly described. Considering that early and successful surgery may greatly improve the cognitive outcome and quality of life, it is worthwhile to deepen our knowledge of insular epilepsy in children.\n\n\nMETHODS\nWe retrospectively evaluated ten children with drug-resistant focal insular epilepsy who had been consecutively explored with stereoelectroencephalography (SEEG), followed by individually tailored resective surgery that included part of the insula in all cases. A detailed anatomo-electro-clinical analysis of non-invasive EEG and SEEG data was performed. At least one of the electrodes explored the insular cortex. SEEG analysis confirmed that the insular cortex was included in the ictal onset zone.\n\n\nRESULTS\nEpilepsy onset was mostly during the first year of life, characterized by subtle seizures as well as spasms and myoclonic seizures. Later on, neurovegetative signs and asymmetric tonic and hypermotor seizures (HMS) dominated the ictal semiology. The epileptogenic zone was frequently wider than insular with frontal and central predominance. In eight patients, the tailored resection included a lesion. In seven patients, an Engel class 1 outcome as well as neuropsychological and behavioural improvement was obtained.\n\n\nCONCLUSIONS\nSEEG is feasible and useful in children with drug-resistant insular epilepsy which is often characterized by autonomic symptoms as the initial symptoms and should be suspected in cases with HMS, asymmetric tonic seizures and even asymmetric spasms. Early propagation is mostly frontal and central. Analysis of a larger population is required to refine these findings.", "title": "" }, { "docid": "abaa0bb3d5e60dce3bee4cffad64bc7c", "text": "We argue that the novel combination of type classes and existential types in a single language yields significant expressive power. We explore this combination in the context of higher-order functional languages with static typing, parametric polymorphism, algebraic data types, and Hindley-Milner type inference. Adding existential types to an existing functional language that already features type classes requires only a minor syntactic extension. We first demonstrate how to provide existential quantification over type classes by extending the syntax of algebraic data type definitions and give examples of possible uses. We then develop a type system and a type inference algorithm for the resulting language. Finally, we present a formal semantics by translation to an implicitly-typed second-order λ-calculus and show that the type system is semantically sound. Our extension has been implemented in the Chalmers Haskell B. system, and all examples from this paper have been developed using this system.", "title": "" }, { "docid": "d1ab899118a6700d43e7d86ebf5bd19b", "text": "Taking full advantage of the high resistivity substrate and underlying oxide of SOI technology, a high performance CMOS SPDT T/R switch has been designed and fabricated in a partially depleted, 0.25µm SOI process. The targeted Bluetooth class II specifications have been fully fitted. The switch over the high resistivity substrate exhibits a 0.7dB insertion loss and a 50dB isolation at 2.4GHz; at 5GHz insertion loss and isolation are 1dB and 47dB respectively. The measured ICP1dBis +12dBm.", "title": "" }, { "docid": "5e63c7f6d86b634d8a2b7e0746eaa0d2", "text": "A famous theorem of Szemerédi asserts that given any density 0 < δ ≤ 1 and any integer k ≥ 3, any set of integers with density δ will contain infinitely many proper arithmetic progressions of length k. For general k there are essentially four known proofs of this fact; Szemerédi’s original combinatorial proof using the Szemerédi regularity lemma and van der Waerden’s theorem, Furstenberg’s proof using ergodic theory, Gowers’ proof using Fourier analysis and the inverse theory of additive combinatorics, and the more recent proofs of Gowers and Rödl-Skokan using a hypergraph regularity lemma. Of these four, the ergodic theory proof is arguably the shortest, but also the least elementary, requiring passage (via the Furstenberg correspondence principle) to an infinitary measure preserving system, and then decomposing a general ergodic system relative to a tower of compact extensions. Here we present a quantitative, self-contained version of this ergodic theory proof, and which is “elementary” in the sense that it does not require the axiom of choice, the use of infinite sets or measures, or the use of the Fourier transform or inverse theorems from additive combinatorics. It also gives explicit (but extremely poor) quantitative bounds.", "title": "" }, { "docid": "f93b9c9bc2fbaf05c12d47440dfd9f06", "text": "A patent-pending, energy-based method is presented for controlling a haptic interface system to ensure stable contact under a wide variety of operating conditions. System stability is analyzed in terms of the time-domain definition of passivity. We define a “Passivity Observer” (PO) which measures energy flow in and out of one or more subsystems in real-time software. Active behavior is indicated by a negative value of the PO at any time. We also define the “Passivity Controller” (PC), an adaptive dissipative element which, at each time sample, absorbs exactly the net energy output (if any) measured by the PO. The method is tested with simulation and implementation in the Excalibur haptic interface system. Totally stable operation was achieved under conditions such as stiffness 100 N/mm or time delays of 15 ms. The PO/PC method requires very little additional computation and does not require a dynamical model to be identified.", "title": "" }, { "docid": "c09448b80effbde3ec159c2c3e04ecb0", "text": "It is easy for today's students and researchers to believe that modern bioinformatics emerged recently to assist next-generation sequencing data analysis. However, the very beginnings of bioinformatics occurred more than 50 years ago, when desktop computers were still a hypothesis and DNA could not yet be sequenced. The foundations of bioinformatics were laid in the early 1960s with the application of computational methods to protein sequence analysis (notably, de novo sequence assembly, biological sequence databases and substitution models). Later on, DNA analysis also emerged due to parallel advances in (i) molecular biology methods, which allowed easier manipulation of DNA, as well as its sequencing, and (ii) computer science, which saw the rise of increasingly miniaturized and more powerful computers, as well as novel software better suited to handle bioinformatics tasks. In the 1990s through the 2000s, major improvements in sequencing technology, along with reduced costs, gave rise to an exponential increase of data. The arrival of 'Big Data' has laid out new challenges in terms of data mining and management, calling for more expertise from computer science into the field. Coupled with an ever-increasing amount of bioinformatics tools, biological Big Data had (and continues to have) profound implications on the predictive power and reproducibility of bioinformatics results. To overcome this issue, universities are now fully integrating this discipline into the curriculum of biology students. Recent subdisciplines such as synthetic biology, systems biology and whole-cell modeling have emerged from the ever-increasing complementarity between computer science and biology.", "title": "" }, { "docid": "138cd401515c3367428f88d4ef5d5cc7", "text": "BACKGROUND\nThe present study was designed to implement an interprofessional simulation-based education program for nursing students and evaluate the influence of this program on nursing students' attitudes toward interprofessional education and knowledge about operating room nursing.\n\n\nMETHODS\nNursing students were randomly assigned to either the interprofessional simulation-based education or traditional course group. A before-and-after study of nursing students' attitudes toward the program was conducted using the Readiness for Interprofessional Learning Scale. Responses to an open-ended question were categorized using thematic content analysis. Nursing students' knowledge about operating room nursing was measured.\n\n\nRESULTS\nNursing students from the interprofessional simulation-based education group showed statistically different responses to four of the nineteen questions in the Readiness for Interprofessional Learning Scale, reflecting a more positive attitude toward interprofessional learning. This was also supported by thematic content analysis of the open-ended responses. Furthermore, nursing students in the simulation-based education group had a significant improvement in knowledge about operating room nursing.\n\n\nCONCLUSIONS\nThe integrated course with interprofessional education and simulation provided a positive impact on undergraduate nursing students' perceptions toward interprofessional learning and knowledge about operating room nursing. Our study demonstrated that this course may be a valuable elective option for undergraduate nursing students in operating room nursing education.", "title": "" }, { "docid": "2ca62de84fadc2d00831447eb72325b7", "text": "Research across many fields of medicine now points towards the clinical advantages of combining regenerative procedures with platelet-rich fibrin (PRF). This systematic review aimed to gather the extensive number of articles published to date on PRF in the dental field to better understand the clinical procedures where PRF may be utilized to enhance tissue/bone formation. Manuscripts were searched systematically until May 2016 and separated into the following categories: intrabony and furcation defect regeneration, extraction socket management, sinus lifting procedures, gingival recession treatment, and guided bone regeneration (GBR) including horizontal/vertical bone augmentation procedures. Only human randomized clinical trials were included for assessment. In total, 35 articles were selected and divided accordingly (kappa = 0.94). Overall, the use of PRF has been most investigated in periodontology for the treatment of periodontal intrabony defects and gingival recessions where the majority of studies have demonstrated favorable results in soft tissue management and repair. Little to no randomized clinical trials were found for extraction socket management although PRF has been shown to significantly decrease by tenfold dry sockets of third molars. Very little to no data was available directly investigating the effects of PRF on new bone formation in GBR, horizontal/vertical bone augmentation procedures, treatment of peri-implantitis, and sinus lifting procedures. Much investigation now supports the use of PRF for periodontal and soft tissue repair. Despite this, there remains a lack of well-conducted studies demonstrating convincingly the role of PRF during hard tissue bone regeneration. Future human randomized clinical studies evaluating the use of PRF on bone formation thus remain necessary. PRF was shown to improve soft tissue generation and limit dimensional changes post-extraction, with little available data to date supporting its use in GBR.", "title": "" }, { "docid": "1090297224c76a5a2c4ade47cb932dba", "text": "Global illumination drastically improves visual realism of interactive applications. Although many interactive techniques are available, they have some limitations or employ coarse approximations. For example, general instant radiosity often has numerical error, because the sampling strategy fails in some cases. This problem can be reduced by a bidirectional sampling strategy that is often used in off-line rendering. However, it has been complicated to implement in real-time applications. This paper presents a simple real-time global illumination system based on bidirectional path tracing. The proposed system approximates bidirectional path tracing by using rasterization on a commodity DirectX® 11 capable GPU. Moreover, for glossy surfaces, a simple and efficient artifact suppression technique is also introduced.", "title": "" }, { "docid": "4c627f29b8006b81f4a2415004775cf9", "text": "Autonomous learning has been a promising direction in control and robotics for more than a decade since data-driven learning allows to reduce the amount of engineering knowledge, which is otherwise required. However, autonomous reinforcement learning (RL) approaches typically require many interactions with the system to learn controllers, which is a practical limitation in real systems, such as robots, where many interactions can be impractical and time consuming. To address this problem, current learning approaches typically require task-specific knowledge in form of expert demonstrations, realistic simulators, pre-shaped policies, or specific knowledge about the underlying dynamics. In this paper, we follow a different approach and speed up learning by extracting more information from data. In particular, we learn a probabilistic, non-parametric Gaussian process transition model of the system. By explicitly incorporating model uncertainty into long-term planning and controller learning our approach reduces the effects of model errors, a key problem in model-based learning. Compared to state-of-the art RL our model-based policy search method achieves an unprecedented speed of learning. We demonstrate its applicability to autonomous learning in real robot and control tasks.", "title": "" }, { "docid": "8953837ae11284b4be15d0abbaf7db77", "text": "UAV has been a popular piece of equipment both in military and civilian applications. Groups of UAVs can form an UAV network and accomplish complicated missions such as rescue, searching, patrolling and mapping. One of the most active areas of research in UAV networks is that of area coverage problem which is usually defined as a problem of how well the UAV networks are able to monitor the given space, and how well the UAVs inside a network are able to cooperate with each other. Area coverage problem in cooperative UAV networks is the very base of many applications. In this paper, we take a representative survey of the current work that has been done about this problem via discussion of different classifications. This study serves as an overview of area coverage problem, and give some inspiration to related researchers.", "title": "" }, { "docid": "343ad5204ee034972654aba86439730f", "text": "This paper presents a Doppler radar vital sign detection system with random body movement cancellation (RBMC) technique based on adaptive phase compensation. An ordinary camera was integrated with the system to measure the subject's random body movement (RBM) that is fed back as phase information to the radar system for RBMC. The linearity of the radar system, which is strictly related to the circuit saturation problem in noncontact vital sign detection, has been thoroughly analyzed and discussed. It shows that larger body movement does not necessarily mean larger radar baseband output. High gain configuration at baseband is required for acceptable SNR in noncontact vital sign detection. The phase compensation at radar RF front-end helps to relieve the high-gain baseband from potential saturation in the presence of large body movement. A simple video processing algorithm was presented to extract the RBM without using any marker. Both theoretical analysis and simulation have been carried out to validate the linearity analysis and the proposed RBMC technique. Two experiments were carried out in the lab environment. One is the phase compensation at RF front end to extract a phantom motion in the presence of another large shaker motion, and the other one is to measure the subject person breathing normally but randomly moving his body back and forth. The experimental results show that the proposed radar system is effective to relieve the linearity burden of the baseband circuit and help compensate the RBM.", "title": "" }, { "docid": "73a8c38d820e204c6993974fb352d33f", "text": "Many continuous control tasks have bounded action spaces. When policy gradient methods are applied to such tasks, out-of-bound actions need to be clipped before execution, while policies are usually optimized as if the actions are not clipped. We propose a policy gradient estimator that exploits the knowledge of actions being clipped to reduce the variance in estimation. We prove that our estimator, named clipped action policy gradient (CAPG), is unbiased and achieves lower variance than the conventional estimator that ignores action bounds. Experimental results demonstrate that CAPG generally outperforms the conventional estimator, indicating that it is a better policy gradient estimator for continuous control tasks. The source code is available at https: //github.com/pfnet-research/capg.", "title": "" }, { "docid": "846d3587de5fd84a3d25d5c746cfd702", "text": "A methodological study on significance of image processing and its applications in the field of computer vision is carried out here. During an image processing operation the input given is an image and its output is an enhanced high quality image as per the techniques used. Image processing usually referred as digital image processing, but optical and analog image processing also are possible. Our study provides a solid introduction to image processing along with segmentation techniques, computer vision fundamentals and its applied applications that will be of worth to the image processing and computer vision research communities.", "title": "" }, { "docid": "259dd03ebaa3293ad947e91bf4531361", "text": "Zero-shot learning (ZSL) aims to recognize objects of unseen classes with available training data from another set of seen classes. Existing solutions are focused on exploring knowledge transfer via an intermediate semantic embedding (e.g., attributes) shared between seen and unseen classes. In this paper, we propose a novel projection framework based on matrix tri-factorization with manifold regularizations. Specifically, we learn the semantic embedding projection by decomposing the visual feature matrix under the guidance of semantic embedding and class label matrices. By additionally introducing manifold regularizations on visual data and semantic embeddings, the learned projection can effectively captures the geometrical manifold structure residing in both visual and semantic spaces. To avoid the projection domain shift problem, we devise an effective prediction scheme by exploiting the test-time manifold structure. Extensive experiments on four benchmark datasets show that our approach significantly outperforms the state-of-the-arts, yielding an average improvement ratio by 7.4% and 31.9% for the recognition and retrieval task, respectively.", "title": "" }, { "docid": "9d803b0ce1f1af621466b1d7f97b7edf", "text": "This research paper addresses the methodology and approaches to managing criminal computer forensic investigations in a law enforcement environment with management controls, operational controls, and technical controls. Management controls cover policy and standard operating procedures (SOP's), methodology, and guidance. Operational controls cover SOP requirements, seizing evidence, evidence handling, best practices, and education, training and awareness. Technical controls cover acquisition and analysis procedures, data integrity, rules of evidence, presenting findings, proficiency testing, and data archiving.", "title": "" }, { "docid": "6c4c235c779d9e6a78ea36d7fc636df4", "text": "Digital archiving creates a vast store of knowledge that can be accessed only through digital tools. Users of this information will need fluency in the tools of digital access, exploration, visualization, analysis, and collaboration. This paper proposes that this fluency represents a new form of literacy, which must become fundamental for humanities scholars. Tools influence both the creation and the analysis of information. Whether using pen and paper, Microsoft Office, or Web 2.0, scholars base their process, production, and questions on the capabilities their tools offer them. Digital archiving and the interconnectivity of the Web provide new challenges in terms of quantity and quality of information. They create a new medium for presentation as well as a foundation for collaboration that is independent of physical location. Challenges for digital humanities include: • developing new genres for complex information presentation that can be shared, analyzed, and compared; • creating a literacy in information analysis and visualization that has the same rigor and richness as current scholarship; and • expanding classically text-based pedagogy to include simulation, animation, and spatial and geographic representation.", "title": "" }, { "docid": "a316280dc7f50689015d54021101eb34", "text": "Taddy (2013) proposed multinomial inverse regression (MNIR) as a new model of annotated text based on the influence of metadata and response variables on the distribution of words in a document. While effective, MNIR has no way to exploit structure in the corpus to improve its predictions or facilitate exploratory data analysis. On the other hand, traditional probabilistic topic models (like latent Dirichlet allocation) capture natural heterogeneity in a collection but do not account for external variables. In this paper, we introduce the inverse regression topic model (IRTM), a mixed-membership extension of MNIR that combines the strengths of both methodologies. We present two inference algorithms for the IRTM: an efficient batch estimation algorithm and an online variant, which is suitable for large corpora. We apply these methods to a corpus of 73K Congressional press releases and another of 150K Yelp reviews, demonstrating that the IRTM outperforms both MNIR and supervised topic models on the prediction task. Further, we give examples showing that the IRTM enables systematic discovery of in-topic lexical variation, which is not possible with previous supervised topic models.", "title": "" }, { "docid": "7e75bbbf5e86edc396aaa9d9db02c509", "text": "Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study recommends appropriate defensive measures and calls for further research into the techniques for fighting malicious activities related to blockchains.", "title": "" } ]
scidocsrr
859de6f75fd982136341046da15cecea
Optimal Cluster Preserving Embedding of Nonmetric Proximity Data
[ { "docid": "5d247482bb06e837bf04c04582f4bfa2", "text": "This paper provides an introduction to support vector machines, kernel Fisher discriminant analysis, and kernel principal component analysis, as examples for successful kernel-based learning methods. We first give a short background about Vapnik-Chervonenkis theory and kernel feature spaces and then proceed to kernel based learning in supervised and unsupervised scenarios including practical and algorithmic considerations. We illustrate the usefulness of kernel algorithms by discussing applications such as optical character recognition and DNA analysis.", "title": "" } ]
[ { "docid": "1635b235c59cc57682735202c0bb2e0d", "text": "The introduction of structural imaging of the brain by computed tomography (CT) scans and magnetic resonance imaging (MRI) has further refined classification of head injury for prognostic, diagnosis, and treatment purposes. We describe a new classification scheme to be used both as a research and a clinical tool in association with other predictors of neurologic status.", "title": "" }, { "docid": "7f04ef4eb5dc53cbfa6c8b5379a95e0e", "text": "Memory scanning is an essential component in detecting and deactivating malware while the malware is still active in memory. The content here is confined to user-mode memory scanning for malware on 32-bit and 64-bit Windows NT based systems that are memory resident and/or persistent over reboots. Malware targeting 32-bit Windows are being created and deployed at an alarming rate today. While there are not many malware targeting 64-bit Windows yet, many of the existing Win32 malware for 32-bit Windows will work fine on 64-bit Windows due to the underlying WoW64 subsystem. Here, we will present an approach to implement user-mode memory scanning for Windows. This essentially means scanning the virtual address space of all processes in memory. In case of an infection, while the malware is still active in memory, it can significantly limit detection and disinfection. The real challenge hence actually lies in fully disinfecting the machine and restoring back to its clean state. Today’s malware apply complex anti-disinfection techniques making the task of restoring the machine to a clean state extremely difficult. Here, we will discuss some of these techniques with examples from real-world malware scenarios. Practical approaches for user-mode disinfection will be presented. By leveraging the abundance of redundant information available via various Win32 and Native API from user-mode, certain techniques to detect hidden processes will also be presented. Certain challenges in porting the memory scanner to 64-bit Windows and Vista will be discussed. The advantages and disadvantages of implementing a memory scanner in user-mode (rather than kernel-mode) will also be discussed.", "title": "" }, { "docid": "8d3e7a6032d6e017537b68b47c4dae38", "text": "With the increasing complexity of modern radar system and the increasing number of devices used in the radar system, it would be highly desirable to model the complete radar system including hardware and software by a single tool. This paper presents a novel software-based simulation method for modern radar system which here is automotive radar application. Various functions of automotive radar, like target speed, distance and azimuth and elevation angle detection, are simulated in test case and the simulation results are compared with the measurement results.", "title": "" }, { "docid": "054fcf065915118bbfa3f12759cb6912", "text": "Automatization of the diagnosis of any kind of disease is of great importance and its gaining speed as more and more deep learning solutions are applied to different problems. One of such computer-aided systems could be a decision support tool able to accurately differentiate between different types of breast cancer histological images – normal tissue or carcinoma (benign, in situ or invasive). In this paper authors present a deep learning solution, based on convolutional capsule network, for classification of four types of images of breast tissue biopsy when hematoxylin and eosin staining is applied. The crossvalidation accuracy, averaged over four classes, was achieved to be 87 % with equally high sensitivity.", "title": "" }, { "docid": "ed4178ec9be6f4f8e87a50f0bf1b9a41", "text": "PURPOSE\nTo report a case of central retinal artery occlusion (CRAO) in a patient with biopsy-verified Wegener's granulomatosis (WG) with positive C-ANCA.\n\n\nMETHODS\nA 55-year-old woman presented with a 3-day history of acute painless bilateral loss of vision; she also complained of fever and weight loss. Examination showed a CRAO in the left eye and angiographically documented choroidal ischemia in both eyes.\n\n\nRESULTS\nThe possibility of systemic vasculitis was not kept in mind until further studies were carried out; methylprednisolone pulse therapy was then started. Renal biopsy disclosed focal and segmental necrotizing vasculitis of the medium-sized arteries, supporting the diagnosis of WG, and cyclophosphamide pulse therapy was administered with gradual improvement, but there was no visual recovery.\n\n\nCONCLUSION\nCRAO as presenting manifestation of WG, in the context of retinal vasculitis, is very uncommon, but we should be aware of WG in the etiology of CRAO. This report shows the difficulty of diagnosing Wegener's granulomatosis; it requires a high index of suspicion, and we should obtain an accurate medical history and repeat serological and histopathological examinations. It emphasizes that inflammation of arteries leads to irreversible retinal infarction, and visual loss may occur.", "title": "" }, { "docid": "6f9186944cdeab30da7a530a942a5b3d", "text": "In this work, we perform a comparative analysis of the impact of substrate technologies on the performance of 28 GHz antennas for 5G applications. For this purpose, we model, simulate, analyze and compare 2×2 patch antenna arrays on five substrate technologies typically used for manufacturing integrated antennas. The impact of these substrates on the impedance bandwidth, efficiency and gain of the antennas is quantified. Finally, the antennas are fabricated and measured. Excellent correlation is obtained between measurement and simulation results.", "title": "" }, { "docid": "09a6f724e5b2150a39f89ee1132a33e9", "text": "This paper concerns a deep learning approach to relevance ranking in information retrieval (IR). Existing deep IR models such as DSSM and CDSSM directly apply neural networks to generate ranking scores, without explicit understandings of the relevance. According to the human judgement process, a relevance label is generated by the following three steps: 1) relevant locations are detected; 2) local relevances are determined; 3) local relevances are aggregated to output the relevance label. In this paper we propose a new deep learning architecture, namely DeepRank, to simulate the above human judgment process. Firstly, a detection strategy is designed to extract the relevant contexts. Then, a measure network is applied to determine the local relevances by utilizing a convolutional neural network (CNN) or two-dimensional gated recurrent units (2D-GRU). Finally, an aggregation network with sequential integration and term gating mechanism is used to produce a global relevance score. DeepRank well captures important IR characteristics, including exact/semantic matching signals, proximity heuristics, query term importance, and diverse relevance requirement. Experiments on both benchmark LETOR dataset and a large scale clickthrough data show that DeepRank can significantly outperform learning to ranking methods, and existing deep learning methods.", "title": "" }, { "docid": "b531674f21e88ac82071583531e639c6", "text": "OBJECTIVE\nTo evaluate use of, satisfaction with, and social adjustment with adaptive devices compared with prostheses in young people with upper limb reduction deficiencies.\n\n\nMETHODS\nCross-sectional study of 218 young people with upper limb reduction deficiencies (age range 2-20 years) and their parents. A questionnaire was used to evaluate participants' characteristics, difficulties encountered, and preferred solutions for activities, use satisfaction, and social adjustment with adaptive devices vs prostheses. The Quebec User Evaluation of Satisfaction with assistive Technology and a subscale of Trinity Amputation and Prosthesis Experience Scales were used.\n\n\nRESULTS\nOf 218 participants, 58% were boys, 87% had transversal upper limb reduction deficiencies, 76% with past/present use of adaptive devices and 37% with past/present use of prostheses. Young people (> 50%) had difficulties in performing activities. Of 360 adaptive devices, 43% were used for self-care (using cutlery), 28% for mobility (riding a bicycle) and 5% for leisure activities. Prostheses were used for self-care (4%), mobility (9%), communication (3%), recreation and leisure (6%) and work/employment (4%). The preferred solution for difficult activities was using unaffected and affected arms/hands and other body parts (> 60%), adaptive devices (< 48%) and prostheses (< 9%). Satisfaction and social adjustment with adaptive devices were greater than with prostheses (p < 0.05).\n\n\nCONCLUSION\nYoung people with upper limb reduction deficiencies are satisfied and socially well-adjusted with adaptive devices. Adaptive devices are good alternatives to prostheses.", "title": "" }, { "docid": "5bee78694f3428d3882e27000921f501", "text": "We introduce a new approach to perform background subtraction in moving camera scenarios. Unlike previous treatments of the problem, we do not restrict the camera motion or the scene geometry. The proposed approach relies on Bayesian selection of the transformation that best describes the geometric relation between consecutive frames. Based on the selected transformation, we propagate a set of learned background and foreground appearance models using a single or a series of homography transforms. The propagated models are subjected to MAP-MRF optimization framework that combines motion, appearance, spatial, and temporal cues; the optimization process provides the final background/foreground labels. Extensive experimental evaluation with challenging videos shows that the proposed method outperforms the baseline and state-of-the-art methods in most cases.", "title": "" }, { "docid": "5c7080162c4df9fdd7d5f385c4005bd3", "text": "The placebo effect is very well known, being replicated in many scientific studies. At the same time, its exact mechanisms still remain unknown. Quite a few hypothetical explanations for the placebo effect have been suggested, including faith, belief, hope, classical conditioning, conscious/subconscious expectation, endorphins, and the meaning response. This article argues that all these explanations may boil down to autosuggestion, in the sense of \"communication with the subconscious.\" An important implication of this is that the placebo effect can in principle be used effectively without the placebo itself, through a direct use of autosuggestion. The benefits of such a strategy are clear: fewer side effects from medications, huge cost savings, no deception of patients, relief of burden on the physician's time, and healing in domains where medication or other therapies are problematic.", "title": "" }, { "docid": "4d4a09c7cef74e9be52844a61ca57bef", "text": "The key of zero-shot learning (ZSL) is how to find the information transfer model for bridging the gap between images and semantic information (texts or attributes). Existing ZSL methods usually construct the compatibility function between images and class labels with the consideration of the relevance on the semantic classes (the manifold structure of semantic classes). However, the relationship of image classes (the manifold structure of image classes) is also very important for the compatibility model construction. It is difficult to capture the relationship among image classes due to unseen classes, so that the manifold structure of image classes often is ignored in ZSL. To complement each other between the manifold structure of image classes and that of semantic classes information, we propose structure propagation (SP) for improving the performance of ZSL for classification. SP can jointly consider the manifold structure of image classes and that of semantic classes for approximating to the intrinsic structure of object classes. Moreover, the SP can describe the constrain condition between the compatibility function and these manifold structures for balancing the influence of the structure propagation iteration. The SP solution provides not only unseen class labels but also the relationship of two manifold structures that encode the positive transfer in structure propagation. Experimental results demonstrate that SP can attain the promising results on the AwA, CUB, Dogs and SUN databases.", "title": "" }, { "docid": "2a2db7ff8bb353143ca2bb9ad8ec2d7d", "text": "A revision of the genus Leptoplana Ehrenberg, 1831 in the Mediterranean basin is undertaken. This revision deals with the distribution and validity of the species of Leptoplana known for the area. The Mediterranean sub-species polyclad, Leptoplana tremellaris forma mediterranea Bock, 1913 is elevated to the specific level. Leptoplana mediterranea comb. nov. is redescribed from the Lake of Tunis, Tunisia. This flatworm is distinguished from Leptoplana tremellaris mainly by having a prostatic vesicle provided with a long diverticulum attached ventrally to the seminal vesicle, a genital pit closer to the male pore than to the female one and a twelve-eyed hatching juvenile instead of the four-eyed juvenile of L. tremellaris. The direct development in L. mediterranea is described at 15 °C.", "title": "" }, { "docid": "259972cd20a1f763b07bef4619dc7f70", "text": "This paper proposes an Interactive Chinese Character Learning System (ICCLS) based on pictorial evolution as an edutainment concept in computer-based learning of language. The advantage of the language origination itself is taken as a learning platform due to the complexity in Chinese language as compared to other types of languages. Users especially children enjoy more by utilize this learning system because they are able to memories the Chinese Character easily and understand more of the origin of the Chinese character under pleasurable learning environment, compares to traditional approach which children need to rote learning Chinese Character under un-pleasurable environment. Skeletonization is used as the representation of Chinese character and object with an animated pictograph evolution to facilitate the learning of the language. Shortest skeleton path matching technique is employed for fast and accurate matching in our implementation. User is required to either write a word or draw a simple 2D object in the input panel and the matched word and object will be displayed as well as the pictograph evolution to instill learning. The target of computer-based learning system is for pre-school children between 4 to 6 years old to learn Chinese characters in a flexible and entertaining manner besides utilizing visual and mind mapping strategy as learning methodology.", "title": "" }, { "docid": "eb99d3fb9f6775453ac25861cb05f04c", "text": "Hate content in social media is ever increasing. While Facebook, Twitter, Google have attempted to take several steps to tackle this hate content, they most often risk the violation of freedom of speech. Counterspeech, on the other hand, provides an effective way of tackling the online hate without the loss of freedom of speech. Thus, an alternative strategy for these platforms could be to promote counterspeech as a defense against hate content. However, in order to have a successful promotion of such counterspeech, one has to have a deep understanding of its dynamics in the online world. Lack of carefully curated data largely inhibits such understanding. In this paper, we create and release the first ever dataset for counterspeech using comments from YouTube. The data contains 9438 manually annotated comments where the labels indicate whether a comment is a counterspeech or not. This data allows us to perform a rigorous measurement study characterizing the linguistic structure of counterspeech for the first time. This analysis results in various interesting insights such as: the counterspeech comments receive double the likes received by the non-counterspeech comments, for certain communities majority of the non-counterspeech comments tend to be hate speech, the different types of counterspeech are not all equally effective and the language choice of users posting counterspeech is largely different from those posting noncounterspeech as revealed by a detailed psycholinguistic analysis. Finally, we build a set of machine learning models that are able to automatically detect counterspeech in YouTube videos with an F1-score of 0.73.", "title": "" }, { "docid": "59e0bdccc5d983350ef7a53cfd953c07", "text": "1,2 Computer Studies Department , Faculty of Science, The Polytechnic, Ibadan Oyo State, Nigeria. ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Patient identification is the foundation of effective healthcare: the correct care needs to be delivered to the correct patient. However, relying on manual identification processes such as demographic searches and social security numbers often results in patient misidentification hence, the needs for electronic medical records (EMR). . It was discovered that many medical systems switching to electronic health records in order to explore the advantages of electronic medical records (EMR) creates new problems by producing more targets for medical data to be hacked. Hackers are believed to have gained access to up to 80 million records that contained Social Security numbers, birthdays, postal addresses, and e-mail addresses.", "title": "" }, { "docid": "1ab0974dc10f84c6e1fc80ac3f251ac3", "text": "The optimisation of a printed circuit board assembly line is mainly influenced by the constraints of the surface mount device placement (SMD) machine and the characteristics of the production environment. Hence, this paper surveys the various machine technologies and characteristics and proposes five categories of machines based on their specifications and operational methods. These are dual-delivery, multi-station, turret-type, multi-head and sequential pick-and-place SMD placement machines. We attempt to associate the assembly machine technologies with heuristic methods; and address the scheduling issues of each category of machine. This grouping aims to guide future researchers in this field to have a better understanding of the various SMD placement machine specifications and operational methods, so that they can subsequently use them to apply, or even design heuristics, which are more appropriate to the machine characteristics and the operational methods. We also discuss our experiences in solving the pick-and-place sequencing problem of the theoretical and real machine problem, and highlight some of the important practical issues that should be considered in solving real SMD placement machine problems.", "title": "" }, { "docid": "57c090eaab37e615b564ef8451412962", "text": "Variational inference is an umbrella term for algorithms which cast Bayesian inference as optimization. Classically, variational inference uses the Kullback-Leibler divergence to define the optimization. Though this divergence has been widely used, the resultant posterior approximation can suffer from undesirable statistical properties. To address this, we reexamine variational inference from its roots as an optimization problem. We use operators, or functions of functions, to design variational objectives. As one example, we design a variational objective with a Langevin-Stein operator. We develop a black box algorithm, operator variational inference (opvi), for optimizing any operator objective. Importantly, operators enable us to make explicit the statistical and computational tradeoffs for variational inference. We can characterize different properties of variational objectives, such as objectives that admit data subsampling—allowing inference to scale to massive data—as well as objectives that admit variational programs—a rich class of posterior approximations that does not require a tractable density. We illustrate the benefits of opvi on a mixture model and a generative model of images.", "title": "" }, { "docid": "a27a05cb00d350f9021b5c4f609d772c", "text": "Traffic light detection from a moving vehicle is an important technology both for new safety driver assistance functions as well as for autonomous driving in the city. In this paper we present a machine learning framework for detection of traffic lights that can handle in realtime both day and night situations in a unified manner. A semantic segmentation method is employed to generate traffic light candidates, which are then confirmed and classified by a geometric and color features based classifier. Temporal consistency is enforced by using a tracking by detection method. We evaluate our method on a publicly available dataset recorded at daytime in order to compare to existing methods and we show similar performance. We also present an evaluation on two additional datasets containing more than 50 intersections with multiple traffic lights recorded both at day and during nighttime and we show that our method performs consistently in those situations.", "title": "" }, { "docid": "73c3b82e723b5e76a6e9c3a556888c48", "text": "In this paper we present the first large-scale scene attribute database. First, we perform crowd-sourced human studies to find a taxonomy of 102 discriminative attributes. Next, we build the “SUN attribute database” on top of the diverse SUN categorical database. Our attribute database spans more than 700 categories and 14,000 images and has potential for use in high-level scene understanding and fine-grained scene recognition. We use our dataset to train attribute classifiers and evaluate how well these relatively simple classifiers can recognize a variety of attributes related to materials, surface properties, lighting, functions and affordances, and spatial envelope properties.", "title": "" }, { "docid": "5dc4dfc2d443c31332c70a56c2d70c7d", "text": "Sentiment analysis or opinion mining is an important type of text analysis that aims to support decision making by extracting and analyzing opinion oriented text, identifying positive and negative opinions, and measuring how positively or negatively an entity (i.e., people, organization, event, location, product, topic, etc.) is regarded. As more and more users express their political and religious views on Twitter, tweets become valuable sources of people's opinions. Tweets data can be efficiently used to infer people's opinions for marketing or social studies. This paper proposes a Tweets Sentiment Analysis Model (TSAM) that can spot the societal interest and general people's opinions in regard to a social event. In this paper, Australian federal election 2010 event was taken as an example for sentiment analysis experiments. We are primarily interested in the sentiment of the specific political candidates, i.e., two primary minister candidates - Julia Gillard and Tony Abbot. Our experimental results demonstrate the effectiveness of the system.", "title": "" } ]
scidocsrr
e575c94fe31fa474cd80a6b4518101bc
Multi-DOF counterbalance mechanism for low-cost, safe and easy-usable robot arm
[ { "docid": "dbc09474868212acf3b29e49a6facbce", "text": "In this paper, we propose a sophisticated design of human symbiotic robots that provide physical supports to the elderly such as attendant care with high-power and kitchen supports with dexterity while securing contact safety even if physical contact occurs with them. First of all, we made clear functional requirements for such a new generation robot, amounting to fifteen items to consolidate five significant functions such as “safety”, “friendliness”, “dexterity”, “high-power” and “mobility”. In addition, we set task scenes in daily life where support by robot is useful for old women living alone, in order to deduce specifications for the robot. Based on them, we successfully developed a new generation of human symbiotic robot, TWENDY-ONE that has a head, trunk, dual arms with a compact passive mechanism, anthropomorphic dual hands with mechanical softness in joints and skins and an omni-wheeled vehicle. Evaluation experiments focusing on attendant care and kitchen supports using TWENDY-ONE indicate that this new robot will be extremely useful to enhance quality of life for the elderly in the near future where human and robot co-exist.", "title": "" } ]
[ { "docid": "95cd9d6572700e2b118c7cb0ffba549a", "text": "Non-volatile main memory (NVRAM) has the potential to fundamentally change the persistency of software. Applications can make their state persistent by directly placing data structures on NVRAM instead of volatile DRAM. However, the persistent nature of NVRAM requires significant changes for memory allocators that are now faced with the additional tasks of data recovery and failure-atomicity. In this paper, we present nvm malloc, a general-purpose memory allocator concept for the NVRAM era as a basic building block for persistent applications. We introduce concepts for managing named allocations for simplified recovery and using volatile and non-volatile memory in combination to provide both high performance and failure-atomic allocations.", "title": "" }, { "docid": "278fd51fd028f1a4211e5f618ca3cc99", "text": "Decades ago, discussion of an impending global pandemic of obesity was thought of as heresy. But in the 1970s, diets began to shift towards increased reliance upon processed foods, increased away-from-home food intake, and increased use of edible oils and sugar-sweetened beverages. Reductions in physical activity and increases in sedentary behavior began to be seen as well. The negative effects of these changes began to be recognized in the early 1990s, primarily in low- and middle-income populations, but they did not become clearly acknowledged until diabetes, hypertension, and obesity began to dominate the globe. Now, rapid increases in the rates of obesity and overweight are widely documented, from urban and rural areas in the poorest countries of sub-Saharan Africa and South Asia to populations in countries with higher income levels. Concurrent rapid shifts in diet and activity are well documented as well. An array of large-scale programmatic and policy measures are being explored in a few countries; however, few countries are engaged in serious efforts to prevent the serious dietary challenges being faced.", "title": "" }, { "docid": "ff1a745ee6f9f618f44a970a8d210236", "text": "A stepwise-voltage-generation circuit was devised that is based on a capacitor bank and that dissipates no energy when a stepwise voltage is generated. The stepwise voltage is generated spontaneously, and depends neither on the initial voltages to the capacitors nor on the switching order. A new adiabatic-charging circuit based on this circuit was also devised that increases the voltage in a stepwise fashion. The total capacitance of the capacitors in the regenerator is much smaller than a load capacitance, which enables construction of a very small adiabatic regenerator. This regenerator cannot be made with a conventional circuit, which uses a tank capacitor that is much larger than a load capacitor for adiabatic charging.", "title": "" }, { "docid": "919ce1951d219970a05086a531b9d796", "text": "Anti-neutrophil cytoplasmic autoantibodies (ANCA) and anti-glomerular basement membrane (GBM) necrotizing and crescentic glomerulonephritis are aggressive and destructive glomerular diseases that are associated with and probably caused by circulating ANCA and anti-GBM antibodies. These necrotizing lesions are manifested by acute nephritis and deteriorating kidney function often accompanied by distinctive clinical features of systemic disease. Prompt diagnosis requires clinical acumen that allows for the prompt institution of therapy aimed at removing circulating autoantibodies and quelling the inflammatory process. Continuing exploration of the etiology and pathogenesis of these aggressive inflammatory diseases have gradually uncovered new paradigms for the cause of and more specific therapy for these particular glomerular disorders and for autoimmune glomerular diseases in general.", "title": "" }, { "docid": "e1e878c5df90a96811f885935ac13888", "text": "Multiple-input-multiple-output (MIMO) wireless systems use multiple antenna elements at transmit and receive to offer improved capacity over single antenna topologies in multipath channels. In such systems, the antenna properties as well as the multipath channel characteristics play a key role in determining communication performance. This paper reviews recent research findings concerning antennas and propagation in MIMO systems. Issues considered include channel capacity computation, channel measurement and modeling approaches, and the impact of antenna element properties and array configuration on system performance. Throughout the discussion, outstanding research questions in these areas are highlighted.", "title": "" }, { "docid": "02a73147f948a4441529100f0a8acfdc", "text": "Organizations in virtually every industry are facing unprecedented pressures from many external forces. In an environment characterized by more regulatory mandates, more customer demands for better products and services, and an accelerated pace of technological change, some executive teams are turning to enterprise architecture (EA) to help their organizations better leverage their IT investments. The results of our study show there is a positive relationship between the stage of EA maturity and three areas of IT value: (1) ability to manage external relationships, (2) ability to lower operational costs, and (3) strategic agility. We also found positive relationships between EA maturity and improved business-IT alignment and risk management. Although these findings are based on responses from 140 CIOs working in a single industry that has been slower than others to leverage IT (U.S. hospitals), we believe they provide useful guidelines to help organizations in all industries increase the value from their IT investments.", "title": "" }, { "docid": "789a024e39a832071ffee9e368b7a191", "text": "In this paper, we propose a new deep learning approach, called neural association model (NAM), for probabilistic reasoning in artificial intelligence. We propose to use neural networks to model association between any two events in a domain. Neural networks take one event as input and compute a conditional probability of the other event to model how likely these two events are associated. The actual meaning of the conditional probabilities varies between applications and depends on how the models are trained. In this work, as two case studies, we have investigated two NAM structures, namely deep neural networks (DNN) and relationmodulated neural nets (RMNN), on several probabilistic reasoning tasks in AI, including recognizing textual entailment, triple classification in multirelational knowledge bases and common-sense reasoning. Experimental results on several popular data sets derived from WordNet, FreeBase and ConceptNet have all demonstrated that both DNN and RMNN perform equally well and they can significantly outperform the conventional methods available for these reasoning tasks. Moreover, compared with DNN, RMNN are superior in knowledge transfer, where a pre-trained model can be quickly extended to an unseen relation after observing only a few training samples.", "title": "" }, { "docid": "c346820b43f99aa6714900c5b110db13", "text": "BACKGROUND\nDiabetes Mellitus (DM) is a chronic disease that is considered a global public health problem. Education and self-monitoring by diabetic patients help to optimize and make possible a satisfactory metabolic control enabling improved management and reduced morbidity and mortality. The global growth in the use of mobile phones makes them a powerful platform to help provide tailored health, delivered conveniently to patients through health apps.\n\n\nOBJECTIVE\nThe aim of our study was to evaluate the efficacy of mobile apps through a systematic review and meta-analysis to assist DM patients in treatment.\n\n\nMETHODS\nWe conducted searches in the electronic databases MEDLINE (Pubmed), Cochrane Register of Controlled Trials (CENTRAL), and LILACS (Latin American and Caribbean Health Sciences Literature), including manual search in references of publications that included systematic reviews, specialized journals, and gray literature. We considered eligible randomized controlled trials (RCTs) conducted after 2008 with participants of all ages, patients with DM, and users of apps to help manage the disease. The meta-analysis of glycated hemoglobin (HbA1c) was performed in Review Manager software version 5.3.\n\n\nRESULTS\nThe literature search identified 1236 publications. Of these, 13 studies were included that evaluated 1263 patients. In 6 RCTs, there were a statistical significant reduction (P<.05) of HbA1c at the end of studies in the intervention group. The HbA1c data were evaluated by meta-analysis with the following results (mean difference, MD -0.44; CI: -0.59 to -0.29; P<.001; I²=32%).The evaluation favored the treatment in patients who used apps without significant heterogeneity.\n\n\nCONCLUSIONS\nThe use of apps by diabetic patients could help improve the control of HbA1c. In addition, the apps seem to strengthen the perception of self-care by contributing better information and health education to patients. Patients also become more self-confident to deal with their diabetes, mainly by reducing their fear of not knowing how to deal with potential hypoglycemic episodes that may occur.", "title": "" }, { "docid": "4d11eca5601f5128801a8159a154593a", "text": "Polymorphic malware belong to the class of host based threats which defy signature based detection mechanisms. Threat actors use various code obfuscation methods to hide the code details of the polymorphic malware and each dynamic iteration of the malware bears different and new signatures therefore makes its detection harder by signature based antimalware programs. Sandbox based detection systems perform syntactic analysis of the binary files to find known patterns from the un-encrypted segment of the malware file. Anomaly based detection systems can detect polymorphic threats but generate enormous false alarms. In this work, authors present a novel cognitive framework using semantic features to detect the presence of polymorphic malware inside a Microsoft Windows host using a process tree based temporal directed graph. Fractal analysis is performed to find cognitively distinguishable patterns of the malicious processes containing polymorphic malware executables. The main contributions of this paper are; the presentation of a graph theoretic approach for semantic characterization of polymorphism in the operating system's process tree, and the cognitive feature extraction of the polymorphic behavior for detection over a temporal process space.", "title": "" }, { "docid": "19f74e217a42f306dff22a08b46e0ede", "text": "This paper describes a pattern-based approach to building packet classifiers. One novelty of the approach is that it can be implemented efficiently in both software and hardware. A performance study shows that the software implementation is about twice as fast as existing mechanisms, and that the hardware implementation is currently able to keep up with OC-12 (622Mbps) network links and is likely to operate at gigabit speeds in the near future.", "title": "" }, { "docid": "74de053230e7b96ee4e1aee844813723", "text": "OBJECTIVE\nTo investigate the immediate effects of Kinesio Taping® (KT) on sit-to-stand (STS) movement, balance and dynamic postural control in children with cerebral palsy (CP).\n\n\nMETHODS\nFour children diagnosed with left hemiplegic CP level I by the Gross Motor Function Classification System were evaluated under conditions without taping as control condition (CC); and with KT as kinesio condition. A motion analysis system was used to measure total duration of STS movement and angular movements of each joint. Clinical instruments such as Pediatric Balance Scale (PBS) and Timed up and Go (TUG) were also applied.\n\n\nRESULTS\nCompared to CC, decreased total duration of STS, lower peak ankle flexion, higher knee extension at the end of STS, and decreased total time in TUG; but no differences were obtained on PBS score in KT.\n\n\nCONCLUSION\nNeuromuscular taping seems to be beneficial on dynamic activities, but not have the same performance in predominantly static activities studied.", "title": "" }, { "docid": "118db394bb1000f64154573b2b77b188", "text": "Question answering requires access to a knowledge base to check facts and reason about information. Knowledge in the form of natural language text is easy to acquire, but difficult for automated reasoning. Highly-structured knowledge bases can facilitate reasoning, but are difficult to acquire. In this paper we explore tables as a semi-structured formalism that provides a balanced compromise to this tradeoff. We first use the structure of tables to guide the construction of a dataset of over 9000 multiple-choice questions with rich alignment annotations, easily and efficiently via crowd-sourcing. We then use this annotated data to train a semistructured feature-driven model for question answering that uses tables as a knowledge base. In benchmark evaluations, we significantly outperform both a strong unstructured retrieval baseline and a highlystructured Markov Logic Network model.", "title": "" }, { "docid": "062ef386998d3c47e1f3845dec55499c", "text": "The purpose of this study was to examine the effectiveness of the Brain Breaks® Physical Activity Solutions in changing attitudes toward physical activity of school children in a community in Poland. In 2015, a sample of 326 pupils aged 9-11 years old from 19 classes at three selected primary schools were randomly assigned to control and experimental groups within the study. During the classes, children in the experimental group performed physical activities two times per day in three to five minutes using Brain Breaks® videos for four months, while the control group did not use the videos during the test period. Students' attitudes toward physical activities were assessed before and after the intervention using the \"Attitudes toward Physical Activity Scale\". Repeated measures of ANOVA were used to examine the change from pre- to post-intervention. Overall, a repeated measures ANOVA indicated time-by-group interaction effects in 'Self-efficacy on learning with video exercises', F(1.32) = 75.28, p = 0.00, η2 = 0.19. Although the changes are minor, there were benefits of the intervention. It may be concluded that HOPSports Brain Breaks® Physical Activity Program contributes to better self-efficacy on learning while using video exercise of primary school children.", "title": "" }, { "docid": "7ec225f2fd4993feddcf996b576d140f", "text": "Conventional network representation learning (NRL) models learn low-dimensional vertex representations by simply regarding each edge as a binary or continuous value. However, there exists rich semantic information on edges and the interactions between vertices usually preserve distinct meanings, which are largely neglected by most existing NRL models. In this work, we present a novel Translation-based NRL model, TransNet, by regarding the interactions between vertices as a translation operation. Moreover, we formalize the task of Social Relation Extraction (SRE) to evaluate the capability of NRL methods on modeling the relations between vertices. Experimental results on SRE demonstrate that TransNet significantly outperforms other baseline methods by 10% to 20% on hits@1. The source code and datasets can be obtained from https: //github.com/thunlp/TransNet.", "title": "" }, { "docid": "ec905fd77dee3b5fbf24b7e73905bfb8", "text": "The effects of exposure to violent video games on automatic associations with the self were investigated in a sample of 121 students. Playing the violent video game Doom led participants to associate themselves with aggressive traits and actions on the Implicit Association Test. In addition, self-reported prior exposure to violent video games predicted automatic aggressive self-concept, above and beyond self-reported aggression. Results suggest that playing violent video games can lead to the automatic learning of aggressive self-views.", "title": "" }, { "docid": "fc74dadf88736675c860109a95fcdda1", "text": "This paper presents the preliminary work done towards the development of a Gender Recognition System that can be incorporated into the Hindi Automatic Speech Recognition (ASR) System. Gender Recognition (GR) can help in the development of speaker-independent speech recognition systems. This paper presents a general approach to identifying feature vectors that effectively distinguish gender of a speaker from Hindi phoneme utterances. 10 vowels and 5 nasals of the Hindi language were studied for their effectiveness in identifying gender of the speaker. All the 10 vowel Phonemes performed well, while b] bZ] Å] ,] ,s] vks and vkS showed excellent gender distinction performance. All five nasals 3] ́] .k] u and e which were tested, showed a recognition accuracy of almost 100%. The Mel Frequency Cepstral Coefficients (MFCC) are widely used in ASR. The choice of MFCC as features in Gender Recognition will avoid additional computation. The effect of the MFCC feature vector dimension on the GR accuracy was studied and the findings presented. General Terms Automatic speech recognition in Hindi", "title": "" }, { "docid": "9b53d96025c26254b38a4325c9d2da15", "text": "The parameter spaces of hierarchical systems such as multilayer perceptrons include singularities due to the symmetry and degeneration of hidden units. A parameter space forms a geometrical manifold, called the neuromanifold in the case of neural networks. Such a model is identified with a statistical model, and a Riemannian metric is given by the Fisher information matrix. However, the matrix degenerates at singularities. Such a singular structure is ubiquitous not only in multilayer perceptrons but also in the gaussian mixture probability densities, ARMA time-series model, and many other cases. The standard statistical paradigm of the Cramr-Rao theorem does not hold, and the singularity gives rise to strange behaviors in parameter estimation, hypothesis testing, Bayesian inference, model selection, and in particular, the dynamics of learning from examples. Prevailing theories so far have not paid much attention to the problem caused by singularity, relying only on ordinary statistical theories developed for regular (nonsingular) models. Only recently have researchers remarked on the effects of singularity, and theories are now being developed. This article gives an overview of the phenomena caused by the singularities of statistical manifolds related to multilayer perceptrons and gaussian mixtures. We demonstrate our recent results on these problems. Simple toy models are also used to show explicit solutions. We explain that the maximum likelihood estimator is no longer subject to the gaussian distribution even asymptotically, because the Fisher information matrix degenerates, that the model selection criteria such as AIC, BIC, and MDL fail to hold in these models, that a smooth Bayesian prior becomes singular in such models, and that the trajectories of dynamics of learning are strongly affected by the singularity, causing plateaus or slow manifolds in the parameter space. The natural gradient method is shown to perform well because it takes the singular geometrical structure into account. The generalization error and the training error are studied in some examples.", "title": "" }, { "docid": "3065ea79429f69f01d86f393ca451491", "text": "Transition is a concept of interest to nurse researchers, clinicians, and theorists. This article builds on earlier theoretical work on transitions by providing evidence from the nursing literature. A review and synthesis of the nursing literature (1986-1992) supports the claim of the centrality of transitions in nursing. Universal properties of transitions are process, direction, and change in fundamental life patterns. At the individual and family levels, changes occurring in identities, roles, relationships, abilities, and patterns of behavior constitute transitions. At the organizational level, transitional change is that occurring in structure, function, or dynamics. Conditions that may influence the quality of the transition experience and the consequences of transitions are meanings, expectations, level of knowledge and skill, environment, level of planning, and emotional and physical well-being. Indicators of successful transitions are subjective well-being, role mastery, and the well-being of relationships. Three types of nursing therapeutics are discussed. A framework for further work is described.", "title": "" }, { "docid": "b4fca94e4c13cecfce5aabee910d5b02", "text": "We present a narrow-size multiband inverted-F antenna (IFA), which can easily fit inside the housing of display units of ultra-slim laptops. The narrowness of the antenna is achieved by allowing some of its metallic parts to extend over the sidewalls of the dielectric substrate. The antenna is aimed to operate in all the allocated WiFi and WiMAX frequency bands while providing near-omnidirectional coverage in the horizontal plane. The multiband performance of the proposed antenna and its omnidirectionality are validated by measurements.", "title": "" }, { "docid": "17fb585ff12cff879febb32c2a16b739", "text": "An electroencephalography (EEG) based Brain Computer Interface (BCI) enables people to communicate with the outside world by interpreting the EEG signals of their brains to interact with devices such as wheelchairs and intelligent robots. More specifically, motor imagery EEG (MI-EEG), which reflects a subject's active intent, is attracting increasing attention for a variety of BCI applications. Accurate classification of MI-EEG signals while essential for effective operation of BCI systems is challenging due to the significant noise inherent in the signals and the lack of informative correlation between the signals and brain activities. In this paper, we propose a novel deep neural network based learning framework that affords perceptive insights into the relationship between the MI-EEG data and brain activities. We design a joint convolutional recurrent neural network that simultaneously learns robust high-level feature presentations through low-dimensional dense embeddings from raw MI-EEG signals. We also employ an Autoencoder layer to eliminate various artifacts such as background activities. The proposed approach has been evaluated extensively on a large-scale public MI-EEG dataset and a limited but easy-to-deploy dataset collected in our lab. The results show that our approach outperforms a series of baselines and the competitive state-of-the-art methods, yielding a classification accuracy of 95.53%. The applicability of our proposed approach is further demonstrated with a practical BCI system for typing.", "title": "" } ]
scidocsrr
8edf649b3885eb4378612ba7d8186701
Deep Convolutional Compressed Sensing for LiDAR Depth Completion
[ { "docid": "7af26168ae1557d8633a062313d74b78", "text": "This paper addresses the problem of estimating the depth map of a scene given a single RGB image. We propose a fully convolutional architecture, encompassing residual learning, to model the ambiguous mapping between monocular images and depth maps. In order to improve the output resolution, we present a novel way to efficiently learn feature map up-sampling within the network. For optimization, we introduce the reverse Huber loss that is particularly suited for the task at hand and driven by the value distributions commonly present in depth maps. Our model is composed of a single architecture that is trained end-to-end and does not rely on post-processing techniques, such as CRFs or other additional refinement steps. As a result, it runs in real-time on images or videos. In the evaluation, we show that the proposed model contains fewer parameters and requires fewer training data than the current state of the art, while outperforming all approaches on depth estimation. Code and models are publicly available.", "title": "" }, { "docid": "b3a85b88e4a557fcb7f0efb6ba628418", "text": "We present the bilateral solver, a novel algorithm for edgeaware smoothing that combines the flexibility and speed of simple filtering approaches with the accuracy of domain-specific optimization algorithms. Our technique is capable of matching or improving upon state-of-the-art results on several different computer vision tasks (stereo, depth superresolution, colorization, and semantic segmentation) while being 10-1000× faster than baseline techniques with comparable accuracy, and producing lower-error output than techniques with comparable runtimes. The bilateral solver is fast, robust, straightforward to generalize to new domains, and simple to integrate into deep learning pipelines.", "title": "" }, { "docid": "cc4c58f1bd6e5eb49044353b2ecfb317", "text": "Today, visual recognition systems are still rarely employed in robotics applications. Perhaps one of the main reasons for this is the lack of demanding benchmarks that mimic such scenarios. In this paper, we take advantage of our autonomous driving platform to develop novel challenging benchmarks for the tasks of stereo, optical flow, visual odometry/SLAM and 3D object detection. Our recording platform is equipped with four high resolution video cameras, a Velodyne laser scanner and a state-of-the-art localization system. Our benchmarks comprise 389 stereo and optical flow image pairs, stereo visual odometry sequences of 39.2 km length, and more than 200k 3D object annotations captured in cluttered scenarios (up to 15 cars and 30 pedestrians are visible per image). Results from state-of-the-art algorithms reveal that methods ranking high on established datasets such as Middlebury perform below average when being moved outside the laboratory to the real world. Our goal is to reduce this bias by providing challenging benchmarks with novel difficulties to the computer vision community. Our benchmarks are available online at: www.cvlibs.net/datasets/kitti.", "title": "" } ]
[ { "docid": "c664918193470b20af2ce2ecf0c8e1c7", "text": "The exceptional electronic properties of graphene, with its charge carriers mimicking relativistic quantum particles and its formidable potential in various applications, have ensured a rapid growth of interest in this new material. We report on electron transport in quantum dot devices carved entirely from graphene. At large sizes (>100 nanometers), they behave as conventional single-electron transistors, exhibiting periodic Coulomb blockade peaks. For quantum dots smaller than 100 nanometers, the peaks become strongly nonperiodic, indicating a major contribution of quantum confinement. Random peak spacing and its statistics are well described by the theory of chaotic neutrino billiards. Short constrictions of only a few nanometers in width remain conductive and reveal a confinement gap of up to 0.5 electron volt, demonstrating the possibility of molecular-scale electronics based on graphene.", "title": "" }, { "docid": "c20549d78c2b5d393a59fa83718e1004", "text": "This paper studies gradient-based schemes for image denoising and deblurring problems based on the discretized total variation (TV) minimization model with constraints. We derive a fast algorithm for the constrained TV-based image deburring problem. To achieve this task, we combine an acceleration of the well known dual approach to the denoising problem with a novel monotone version of a fast iterative shrinkage/thresholding algorithm (FISTA) we have recently introduced. The resulting gradient-based algorithm shares a remarkable simplicity together with a proven global rate of convergence which is significantly better than currently known gradient projections-based methods. Our results are applicable to both the anisotropic and isotropic discretized TV functionals. Initial numerical results demonstrate the viability and efficiency of the proposed algorithms on image deblurring problems with box constraints.", "title": "" }, { "docid": "c95894477d7279deb7ddbb365030c34e", "text": "Among mammals living in social groups, individuals form communication networks where they signal their identity and social status, facilitating social interaction. In spite of its importance for understanding of mammalian societies, the coding of individual-related information in the vocal signals of non-primate mammals has been relatively neglected. The present study focuses on the spotted hyena Crocuta crocuta, a social carnivore known for its complex female-dominated society. We investigate if and how the well-known hyena's laugh, also known as the giggle call, encodes information about the emitter. By analyzing acoustic structure in both temporal and frequency domains, we show that the hyena's laugh can encode information about age, individual identity and dominant/subordinate status, providing cues to receivers that could enable assessment of the social position of an emitting individual. The range of messages encoded in the hyena's laugh is likely to play a role during social interactions. This call, together with other vocalizations and other sensory channels, should ensure an array of communication signals that support the complex social system of the spotted hyena. Experimental studies are now needed to decipher precisely the communication network of this species.", "title": "" }, { "docid": "ca3c3dec83821747896d44261ba2f9ad", "text": "Building discriminative representations for 3D data has been an important task in computer graphics and computer vision research. Convolutional Neural Networks (CNNs) have shown to operate on 2D images with great success for a variety of tasks. Lifting convolution operators to 3D (3DCNNs) seems like a plausible and promising next step. Unfortunately, the computational complexity of 3D CNNs grows cubically with respect to voxel resolution. Moreover, since most 3D geometry representations are boundary based, occupied regions do not increase proportionately with the size of the discretization, resulting in wasted computation. In this work, we represent 3D spaces as volumetric fields, and propose a novel design that employs field probing filters to efficiently extract features from them. Each field probing filter is a set of probing points — sensors that perceive the space. Our learning algorithm optimizes not only the weights associated with the probing points, but also their locations, which deforms the shape of the probing filters and adaptively distributes them in 3D space. The optimized probing points sense the 3D space “intelligently”, rather than operating blindly over the entire domain. We show that field probing is significantly more efficient than 3DCNNs, while providing state-of-the-art performance, on classification tasks for 3D object recognition benchmark datasets.", "title": "" }, { "docid": "31122e142e02b7e3b99c52c8f257a92e", "text": "Impervious surface has been recognized as a key indicator in assessing urban environments. However, accurate impervious surface extraction is still a challenge. Effectiveness of impervious surface in urban land-use classification has not been well addressed. This paper explored extraction of impervious surface information from Landsat Enhanced Thematic Mapper data based on the integration of fraction images from linear spectral mixture analysis and land surface temperature. A new approach for urban land-use classification, based on the combined use of impervious surface and population density, was developed. Five urban land-use classes (i.e., low-, medium-, high-, and very-high-intensity residential areas, and commercial/industrial/transportation uses) were developed in the city of Indianapolis, Indiana, USA. Results showed that the integration of fraction images and surface temperature provided substantially improved impervious surface image. Accuracy assessment indicated that the rootmean-square error and system error yielded 9.22% and 5.68%, respectively, for the impervious surface image. The overall classification accuracy of 83.78% for five urban land-use classes was obtained. © 2006 Elsevier Inc. All rights reserved.", "title": "" }, { "docid": "32ac9999de3228809233c85ca9b8ecb8", "text": "With rapid development of Internet of things (IoT), there exists an ever-growing demand for ubiquitous connectivity to integrate multiple heterogeneous networks, such as Zigbee Ad hoc network, wireless LAN, cable network, etc. Some typical applications including environmental monitoring, intelligent transportation, medical care, smart home, industry control, safety defense, etc. require a smart gateway to provide high data-rate, end-to-end connectivity utilizing the higher bandwidth of multi-hop networks among those heterogeneous networks. This paper proposes a novel configurable smart IoT gateway which has three important benefits. Firstly, the gateway has plug gable architecture, whose modules with different communication protocols can be customized and plugged in according to different networks. Secondly, it has unified external interfaces which are fit for flexible software development. Finally, it has flexible protocol to translate different sensor data into a uniform format. Compared with similar research, the gateway has better scalability, flexibility and lower cost.", "title": "" }, { "docid": "fe903498e0c3345d7e5ebc8bf3407c2f", "text": "This paper describes a general continuous-time framework for visual-inertial simultaneous localization and mapping and calibration. We show how to use a spline parameterization that closely matches the torque-minimal motion of the sensor. Compared to traditional discrete-time solutions, the continuous-time formulation is particularly useful for solving problems with high-frame rate sensors and multiple unsynchronized devices. We demonstrate the applicability of the method for multi-sensor visual-inertial SLAM and calibration by accurately establishing the relative pose and internal parameters of multiple unsynchronized devices. We also show the advantages of the approach through evaluation and uniform treatment of both global and rolling shutter cameras within visual and visual-inertial SLAM systems.", "title": "" }, { "docid": "d0985c38f3441ca0d69af8afaf67c998", "text": "In this paper we discuss the importance of ambiguity, uncertainty and limited information on individuals’ decision making in situations that have an impact on their privacy. We present experimental evidence from a survey study that demonstrates the impact of framing a marketing offer on participants’ willingness to accept when the consequences of the offer are uncertain and highly ambiguous.", "title": "" }, { "docid": "207e90cebdf23fb37f10b5ed690cb4fc", "text": "In the scientific digital libraries, some papers from different research communities can be described by community-dependent keywords even if they share a semantically similar topic. Articles that are not tagged with enough keyword variations are poorly indexed in any information retrieval system which limits potentially fruitful exchanges between scientific disciplines. In this paper, we introduce a novel experimentally designed pipeline for multi-label semantic-based tagging developed for open-access metadata digital libraries. The approach starts by learning from a standard scientific categorization and a sample of topic tagged articles to find semantically relevant articles and enrich its metadata accordingly. Our proposed pipeline aims to enable researchers reaching articles from various disciplines that tend to use different terminologies. It allows retrieving semantically relevant articles given a limited known variation of search terms. In addition to achieving an accuracy that is higher than an expanded query based method using a topic synonym set extracted from a semantic network, our experiments also show a higher computational scalability versus other comparable techniques. We created a new benchmark extracted from the open-access metadata of a scientific digital library and published it along with the experiment code to allow further research in the topic.", "title": "" }, { "docid": "78f2e1fc79a9c774e92452631d6bce7a", "text": "Adders are basic integral part of arithmetic circuits. The adders have been realized with two styles: fixed stage size and variable stage size. In this paper, fixed stage and variable stage carry skip adder configurations have been analyzed and then a new 16-bit high speed variable stage carry skip adder is proposed by modifying the existing structure. The proposed adder has seven stages where first and last stage are of 1 bit each, it keeps increasing steadily till the middle stage which is the bulkiest and hence is the nucleus stage. The delay and power consumption in the proposed adder is reduced by 61.75% and 8% respectively. The proposed adder is implemented and simulated using 90 nm CMOS technology in Cadence Virtuoso. It is pertinent to mention that the delay improvement in the proposed adder has been achieved without increase in any power consumption and circuit complexity. The adder proposed in this work is suitable for high speed and low power VLSI based arithmetic circuits.", "title": "" }, { "docid": "f3b1e1c9effb7828a62187e9eec5fba7", "text": "Histone modifications and chromatin-associated protein complexes are crucially involved in the control of gene expression, supervising cell fate decisions and differentiation. Many promoters in embryonic stem (ES) cells harbor a distinctive histone modification signature that combines the activating histone H3 Lys 4 trimethylation (H3K4me3) mark and the repressive H3K27me3 mark. These bivalent domains are considered to poise expression of developmental genes, allowing timely activation while maintaining repression in the absence of differentiation signals. Recent advances shed light on the establishment and function of bivalent domains; however, their role in development remains controversial, not least because suitable genetic models to probe their function in developing organisms are missing. Here, we explore avenues to and from bivalency and propose that bivalent domains and associated chromatin-modifying complexes safeguard proper and robust differentiation.", "title": "" }, { "docid": "8fd928d49bdcc0571db99812da3fbe41", "text": "Many programs being implemented by US employers, insurers, and health care providers use incentives to encourage patients to take better care of themselves. We critically review a range of these efforts and show that many programs, although well-meaning, are unlikely to have much impact because they require information, expertise, and self-control that few patients possess. As a result, benefits are likely to accrue disproportionately to patients who already are taking adequate care of their health. We show how these programs could be made more effective through the use of insights from behavioral economics. For example, incentive programs that offer patients small and frequent payments for behavior that would benefit the patients, such as medication adherence, can be more effective than programs with incentives that are far less visible because they are folded into a paycheck or used to reduce a monthly premium. Deploying more-nuanced insights from behavioral economics can lead to policies with the potential to increase patient engagement and deliver dividends for patients and favorable cost-effectiveness ratios for insurers, employers, and other relevant commercial entities.", "title": "" }, { "docid": "61801d62bfb0afe664a1cb374461f8ec", "text": "Methodical studies on Smart-shoe-based gait detection systems have become an influential constituent in decreasing elderly injuries due to fall. This paper proposes smartphone-based system for analyzing characteristics of gait by using a wireless Smart-shoe. The system employs four force sensitive resistors (FSR) to measure the pressure distribution underneath a foot. Data is collected via a Wi-Fi communication network between the Smart-shoe and smartphone for further processing in the phone. Experimentation and verification is conducted on 10 subjects with different gait including free gait. The sensor outputs, with gait analysis acquired from the experiment, are presented in this paper.", "title": "" }, { "docid": "806eb562d4e2f1c8c45a08d7a8e7ce31", "text": "We study admissibility of inference rules and unification with parameters in transitive modal logics (extensions of K4), in particular we generalize various results on parameterfree admissibility and unification to the setting with parameters. Specifically, we give a characterization of projective formulas generalizing Ghilardi’s characterization in the parameter-free case, leading to new proofs of Rybakov’s results that admissibility with parameters is decidable and unification is finitary for logics satisfying suitable frame extension properties (called cluster-extensible logics in this paper). We construct explicit bases of admissible rules with parameters for cluster-extensible logics, and give their semantic description. We show that in the case of finitely many parameters, these logics have independent bases of admissible rules, and determine which logics have finite bases. As a sideline, we show that cluster-extensible logics have various nice properties: in particular, they are finitely axiomatizable, and have an exponential-size model property. We also give a rather general characterization of logics with directed (filtering) unification. In the sequel, we will use the same machinery to investigate the computational complexity of admissibility and unification with parameters in cluster-extensible logics, and we will adapt the results to logics with unique top cluster (e.g., S4.2) and superintuitionistic logics.", "title": "" }, { "docid": "72ecb9f6b7e88e92dfd68631f0992c63", "text": "This paper presents a novel omnidirectional wheel mechanism, referred to as MY wheel-II, based on a sliced ball structure. The wheel consists of two balls of equal diameter on a common shaft and both balls are sliced into four spherical crowns. The two sets of spherical crowns are mounted at 45° from each other to produce a combined circular profile. Compared with previous MY wheel mechanism, this improved wheel mechanism not only is more insensitive to fragments and irregularities on the floor but also has a higher payload capacity. A kinematic model of a three-wheeled prototype platform is also derived, and the problem of wheel angular velocity fluctuations caused by the specific mechanical structure is studied. The optimal scale factor (OSF) leading to a minimum of trajectory error is adopted to solve this problem. The factors influencing the OSF are investigated through simulation. In addition, the methods used for determining the OSF are discussed briefly.", "title": "" }, { "docid": "165fbade7d495ce47a379520697f0d75", "text": "Neutral-point-clamped (NPC) inverters are the most widely used topology of multilevel inverters in high-power applications (several megawatts). This paper presents in a very simple way the basic operation and the most used modulation and control techniques developed to date. Special attention is paid to the loss distribution in semiconductors, and an active NPC inverter is presented to overcome this problem. This paper discusses the main fields of application and presents some technological problems such as capacitor balance and losses.", "title": "" }, { "docid": "22e677f2073599d6ffc9eadf6f3a833f", "text": "Statistical inference in psychology has traditionally relied heavily on p-value significance testing. This approach to drawing conclusions from data, however, has been widely criticized, and two types of remedies have been advocated. The first proposal is to supplement p values with complementary measures of evidence, such as effect sizes. The second is to replace inference with Bayesian measures of evidence, such as the Bayes factor. The authors provide a practical comparison of p values, effect sizes, and default Bayes factors as measures of statistical evidence, using 855 recently published t tests in psychology. The comparison yields two main results. First, although p values and default Bayes factors almost always agree about what hypothesis is better supported by the data, the measures often disagree about the strength of this support; for 70% of the data sets for which the p value falls between .01 and .05, the default Bayes factor indicates that the evidence is only anecdotal. Second, effect sizes can provide additional evidence to p values and default Bayes factors. The authors conclude that the Bayesian approach is comparatively prudent, preventing researchers from overestimating the evidence in favor of an effect.", "title": "" }, { "docid": "4f52223cb3150b1b7a7079147bcb3bc2", "text": "MAX NEUENDORF,1 AES Member, MARKUS MULTRUS,1 AES Member, NIKOLAUS RETTELBACH1, GUILLAUME FUCHS1, JULIEN ROBILLIARD1, JÉRÉMIE LECOMTE1, STEPHAN WILDE1, STEFAN BAYER,10 AES Member, SASCHA DISCH1, CHRISTIAN HELMRICH10, ROCH LEFEBVRE,2 AES Member, PHILIPPE GOURNAY2, BRUNO BESSETTE2, JIMMY LAPIERRE,2 AES Student Member, KRISTOFER KJÖRLING3, HEIKO PURNHAGEN,3 AES Member, LARS VILLEMOES,3 AES Associate Member, WERNER OOMEN,4 AES Member, ERIK SCHUIJERS4, KEI KIKUIRI5, TORU CHINEN6, TAKESHI NORIMATSU1, KOK SENG CHONG7, EUNMI OH,8 AES Member, MIYOUNG KIM8, SCHUYLER QUACKENBUSH,9 AES Fellow, AND BERNHARD GRILL1", "title": "" }, { "docid": "f4d85ad52e37bd81058bfff830a52f0a", "text": "A number of antioxidants and trace minerals have important roles in immune function and may affect health in transition dairy cows. Vitamin E and beta-carotene are important cellular antioxidants. Selenium (Se) is involved in the antioxidant system via its role in the enzyme glutathione peroxidase. Inadequate dietary vitamin E or Se decreases neutrophil function during the perpariturient period. Supplementation of vitamin E and/or Se has reduced the incidence of mastitis and retained placenta, and reduced duration of clinical symptoms of mastitis in some experiments. Research has indicated that beta-carotene supplementation may enhance immunity and reduce the incidence of retained placenta and metritis in dairy cows. Marginal copper deficiency resulted in reduced neutrophil killing and decreased interferon production by mononuclear cells. Copper supplementation of a diet marginal in copper reduced the peak clinical response during experimental Escherichia coli mastitis. Limited research indicated that chromium supplementation during the transition period may increase immunity and reduce the incidence of retained placenta.", "title": "" } ]
scidocsrr
a17978c2b85c8efb21ea7c0c5172f9cf
System Characteristics, Satisfaction and E-Learning Usage: A Structural Equation Model (SEM)
[ { "docid": "1c0efa706f999ee0129d21acbd0ef5ab", "text": "Ten years ago, we presented the DeLone and McLean Information Systems (IS) Success Model as a framework and model for measuring the complexdependent variable in IS research. In this paper, we discuss many of the important IS success research contributions of the last decade, focusing especially on research efforts that apply, validate, challenge, and propose enhancements to our original model. Based on our evaluation of those contributions, we propose minor refinements to the model and propose an updated DeLone and McLean IS Success Model. We discuss the utility of the updated model for measuring e-commerce system success. Finally, we make a series of recommendations regarding current and future measurement of IS success. 10 DELONE AND MCLEAN", "title": "" }, { "docid": "49db1291f3f52a09037d6cfd305e8b5f", "text": "This paper examines cognitive beliefs and affect influencing one’s intention to continue using (continuance) information systems (IS). Expectationconfirmation theory is adapted from the consumer behavior literature and integrated with theoretical and empirical findings from prior IS usage research to theorize a model of IS continuance. Five research hypotheses derived from this model are empirically validated using a field survey of online banking users. The results suggest that users’ continuance intention is determined by their satisfaction with IS use and perceived usefulness of continued IS use. User satisfaction, in turn, is influenced by their confirmation of expectation from prior IS use and perceived usefulness. Postacceptance perceived usefulness is influenced by Ron Weber was the accepting senior editor for this paper. users’ confirmation level. This study draws attention to the substantive differences between acceptance and continuance behaviors, theorizes and validates one of the earliest theoretical models of IS continuance, integrates confirmation and user satisfaction constructs within our current understanding of IS use, conceptualizes and creates an initial scale for measuring IS continuance, and offers an initial explanation for the acceptancediscontinuance anomaly.", "title": "" }, { "docid": "4f51f8907402f9859a77988f967c755f", "text": "As a promising solution, electronic learning (e-learning) has been widely adopted by many companies to offer learning-on-demand opportunities to individual employees for reducing training time and cost. While information systems (IS) success models have received much attention among researchers, little research has been conducted to assess the success and/or effectiveness of e-learning systems in an organizational context. Whether traditional information systems success models can be extended to investigating e-learning systems success is rarely addressed. Based on the previous IS success literature, this study develops and validates a multidimensional model for assessing e-learning systems success (ELSS) from employee (e-learner) perspectives. The procedures used in conceptualizing an ELSS construct, generating items, collecting data, and validating a multiple-item scale for measuring ELSS are described. This paper presents evidence of the scale’s factor structure, reliability, content validity, criterion-related validity, convergent validity, and discriminant validity on the basis of analyzing data from a sample of 206 respondents. Theoretical and managerial implications of our results are then discussed. This empirically validated instrument will be useful to researchers in developing and testing e-learning systems theories, as well as to organizations in implementing successful e-learning systems.", "title": "" } ]
[ { "docid": "b41d8ca866268133f2af88495dad6482", "text": "Text clustering is an important area of interest in the field of Text summarization, sentiment analysis etc. There have been a lot of algorithms experimented during the past years, which have a wide range of performances. One of the most popular method used is k-means, where an initial assumption is made about k, which is the number of clusters to be generated. Now a new method is introduced where the number of clusters is found using a modified spectral bisection and then the output is given to a genetic algorithm where the final solution is obtained. Keywords— Cluster, Spectral Bisection, Genetic Algorithm, kmeans.", "title": "" }, { "docid": "d59b64b96cc79a2e21e705c021473f2a", "text": "Bovine colostrum (first milk) contains very high concentrations of IgG, and on average 1 kg (500 g/liter) of IgG can be harvested from each immunized cow immediately after calving. We used a modified vaccination strategy together with established production systems from the dairy food industry for the large-scale manufacture of broadly neutralizing HIV-1 IgG. This approach provides a low-cost mucosal HIV preventive agent potentially suitable for a topical microbicide. Four cows were vaccinated pre- and/or postconception with recombinant HIV-1 gp140 envelope (Env) oligomers of clade B or A, B, and C. Colostrum and purified colostrum IgG were assessed for cross-clade binding and neutralization against a panel of 27 Env-pseudotyped reporter viruses. Vaccination elicited high anti-gp140 IgG titers in serum and colostrum with reciprocal endpoint titers of up to 1 × 10(5). While nonimmune colostrum showed some intrinsic neutralizing activity, colostrum from 2 cows receiving a longer-duration vaccination regimen demonstrated broad HIV-1-neutralizing activity. Colostrum-purified polyclonal IgG retained gp140 reactivity and neutralization activity and blocked the binding of the b12 monoclonal antibody to gp140, showing specificity for the CD4 binding site. Colostrum-derived anti-HIV antibodies offer a cost-effective option for preparing the substantial quantities of broadly neutralizing antibodies that would be needed in a low-cost topical combination HIV-1 microbicide.", "title": "" }, { "docid": "5623321fb6c3a7c0b22980ce663632cd", "text": "Vector representations for language have been shown to be useful in a number of Natural Language Processing (NLP) tasks. In this thesis, we aim to investigate the effectiveness of word vector representations for the research problem of Aspect-Based Sentiment Analysis (ABSA), which attempts to capture both semantic and sentiment information encoded in user generated content such as product reviews. In particular, we target three ABSA sub-tasks: aspect term extraction, aspect category detection, and aspect sentiment prediction. We investigate the effectiveness of vector representations over different text data, and evaluate the quality of domain-dependent vectors. We utilize vector representations to compute various vector-based features and conduct extensive experiments to demonstrate their effectiveness. Using simple vector-based features, we achieve F1 scores of 79.9% for aspect term extraction, 86.7% for category detection, and 72.3% for aspect sentiment prediction. Co Thesis Supervisor: James Glass Title: Senior Research Scientist Co Thesis Supervisor: Mitra Mohtarami Title: Postdoctoral Associate 3", "title": "" }, { "docid": "f8c7fcba6d0cb889836dc868f3ba12c8", "text": "This article reviews dominant media portrayals of mental illness, the mentally ill and mental health interventions, and examines what social, emotional and treatment-related effects these may have. Studies consistently show that both entertainment and news media provide overwhelmingly dramatic and distorted images of mental illness that emphasise dangerousness, criminality and unpredictability. They also model negative reactions to the mentally ill, including fear, rejection, derision and ridicule. The consequences of negative media images for people who have a mental illness are profound. They impair self-esteem, help-seeking behaviours, medication adherence and overall recovery. Mental health advocates blame the media for promoting stigma and discrimination toward people with a mental illness. However, the media may also be an important ally in challenging public prejudices, initiating public debate, and projecting positive, human interest stories about people who live with mental illness. Media lobbying and press liaison should take on a central role for mental health professionals, not only as a way of speaking out for patients who may not be able to speak out for themselves, but as a means of improving public education and awareness. Also, given the consistency of research findings in this field, it may now be time to shift attention away from further cataloguing of media representations of mental illness to the more challenging prospect of how to use the media to improve the life chances and recovery possibilities for the one in four people living with mental disorders.", "title": "" }, { "docid": "8d30afbccfa76492b765f69d34cd6634", "text": "Commonsense knowledge is vital to many natural language processing tasks. In this paper, we present a novel open-domain conversation generation model to demonstrate how large-scale commonsense knowledge can facilitate language understanding and generation. Given a user post, the model retrieves relevant knowledge graphs from a knowledge base and then encodes the graphs with a static graph attention mechanism, which augments the semantic information of the post and thus supports better understanding of the post. Then, during word generation, the model attentively reads the retrieved knowledge graphs and the knowledge triples within each graph to facilitate better generation through a dynamic graph attention mechanism. This is the first attempt that uses large-scale commonsense knowledge in conversation generation. Furthermore, unlike existing models that use knowledge triples (entities) separately and independently, our model treats each knowledge graph as a whole, which encodes more structured, connected semantic information in the graphs. Experiments show that the proposed model can generate more appropriate and informative responses than stateof-the-art baselines.", "title": "" }, { "docid": "fb31665935c1a0964e70c864af8ff46f", "text": "In the context of object and scene recognition, state-of-the-art performances are obtained with visual Bag-of-Words (BoW) models of mid-level representations computed from dense sampled local descriptors (e.g., Scale-Invariant Feature Transform (SIFT)). Several methods to combine low-level features and to set mid-level parameters have been evaluated recently for image classification. In this chapter, we study in detail the different components of the BoW model in the context of image classification. Particularly, we focus on the coding and pooling steps and investigate the impact of the main parameters of the BoW pipeline. We show that an adequate combination of several low (sampling rate, multiscale) and mid-level (codebook size, normalization) parameters is decisive to reach good performances. Based on this analysis, we propose a merging scheme that exploits the specificities of edge-based descriptors. Low and high contrast regions are pooled separately and combined to provide a powerful representation of images. We study the impact on classification performance of the contrast threshold that determines whether a SIFT descriptor corresponds to a low contrast region or a high contrast region. Successful experiments are provided on the Caltech-101 and Scene-15 datasets. M. T. Law (B) · N. Thome · M. Cord LIP6, UPMC—Sorbonne University, Paris, France e-mail: Marc.Law@lip6.fr N. Thome e-mail: Nicolas.Thome@lip6.fr M. Cord e-mail: Matthieu.Cord@lip6.fr B. Ionescu et al. (eds.), Fusion in Computer Vision, Advances in Computer 29 Vision and Pattern Recognition, DOI: 10.1007/978-3-319-05696-8_2, © Springer International Publishing Switzerland 2014", "title": "" }, { "docid": "ed5b6ea3b1ccc22dff2a43bea7aaf241", "text": "Testing is an important process that is performed to support quality assurance. Testing activities support quality assurance by gathering information about the nature of the software being studied. These activities consist of designing test cases, executing the software with those test cases, and examining the results produced by those executions. Studies indicate that more than fifty percent of the cost of software development is devoted to testing, with the percentage for testing critical software being even higher. As software becomes more pervasive and is used more often to perform critical tasks, it will be required to be of higher quality. Unless we can find efficient ways to perform effective testing, the percentage of development costs devoted to testing will increase significantly. This report briefly assesses the state of the art in software testing, outlines some future directions in software testing, and gives some pointers to software testing resources.", "title": "" }, { "docid": "a602a532a7b95eae050d084e10606951", "text": "Municipal solid waste management has emerged as one of the greatest challenges facing environmental protection agencies in developing countries. This study presents the current solid waste management practices and problems in Nigeria. Solid waste management is characterized by inefficient collection methods, insufficient coverage of the collection system and improper disposal. The waste density ranged from 280 to 370 kg/m3 and the waste generation rates ranged from 0.44 to 0.66 kg/capita/day. The common constraints faced environmental agencies include lack of institutional arrangement, insufficient financial resources, absence of bylaws and standards, inflexible work schedules, insufficient information on quantity and composition of waste, and inappropriate technology. The study suggested study of institutional, political, social, financial, economic and technical aspects of municipal solid waste management in order to achieve sustainable and effective solid waste management in Nigeria.", "title": "" }, { "docid": "1c66d84dfc8656a23e2a4df60c88ab51", "text": "Our method aims at reasoning over natural language questions and visual images. Given a natural language question about an image, our model updates the question representation iteratively by selecting image regions relevant to the query and learns to give the correct answer. Our model contains several reasoning layers, exploiting complex visual relations in the visual question answering (VQA) task. The proposed network is end-to-end trainable through back-propagation, where its weights are initialized using pre-trained convolutional neural network (CNN) and gated recurrent unit (GRU). Our method is evaluated on challenging datasets of COCO-QA [19] and VQA [2] and yields state-of-the-art performance.", "title": "" }, { "docid": "6eca26209b9fcca8a9df76307108a3a8", "text": "Transform-based lossy compression has a huge potential for hyperspectral data reduction. Hyperspectral data are 3-D, and the nature of their correlation is different in each dimension. This calls for a careful design of the 3-D transform to be used for compression. In this paper, we investigate the transform design and rate allocation stage for lossy compression of hyperspectral data. First, we select a set of 3-D transforms, obtained by combining in various ways wavelets, wavelet packets, the discrete cosine transform, and the Karhunen-Loegraveve transform (KLT), and evaluate the coding efficiency of these combinations. Second, we propose a low-complexity version of the KLT, in which complexity and performance can be balanced in a scalable way, allowing one to design the transform that better matches a specific application. Third, we integrate this, as well as other existing transforms, in the framework of Part 2 of the Joint Photographic Experts Group (JPEG) 2000 standard, taking advantage of the high coding efficiency of JPEG 2000, and exploiting the interoperability of an international standard. We introduce an evaluation framework based on both reconstruction fidelity and impact on image exploitation, and evaluate the proposed algorithm by applying this framework to AVIRIS scenes. It is shown that the scheme based on the proposed low-complexity KLT significantly outperforms previous schemes as to rate-distortion performance. As for impact on exploitation, we consider multiclass hard classification, spectral unmixing, binary classification, and anomaly detection as benchmark applications", "title": "" }, { "docid": "d2836880ac69bf35e53f5bc6de8bc5dc", "text": "There is currently significant interest in freeform, curve-based authoring of graphic images. In particular, \"diffusion curves\" facilitate graphic image creation by allowing an image designer to specify naturalistic images by drawing curves and setting colour values along either side of those curves. Recently, extensions to diffusion curves based on the biharmonic equation have been proposed which provide smooth interpolation through specified colour values and allow image designers to specify colour gradient constraints at curves. We present a Boundary Element Method (BEM) for rendering diffusion curve images with smooth interpolation and gradient constraints, which generates a solved boundary element image representation. The diffusion curve image can be evaluated from the solved representation using a novel and efficient line-by-line approach. We also describe \"curve-aware\" upsampling, in which a full resolution diffusion curve image can be upsampled from a lower resolution image using formula evaluated orrections near curves. The BEM solved image representation is compact. It therefore offers advantages in scenarios where solved image representations are transmitted to devices for rendering and where PDE solving at the device is undesirable due to time or processing constraints.", "title": "" }, { "docid": "235e1f328a847fa7b6e074a58defed0b", "text": "A stemming algorithm, a procedure to reduce all words with the same stem to a common form, is useful in many areas of computational linguistics and information-retrieval work. While the form of the algorithm varies with its application, certain linguistic problems are common to any stemming procedure. As a basis for evaluation of previous attempts to deal with these problems, this paper first discusses the theoretical and practical attributes of stemming algorithms. Then a new version of a context-sensitive, longest-match stemming algorithm for English is proposed; though developed for use in a library information transfer system, it is of general application. A major linguistic problem in stemming, variation in spelling of stems, is discussed in some detail and several feasible programmed solutions are outlined, along with sample results of one of these methods.", "title": "" }, { "docid": "8e50613e8aab66987d650cd8763811e5", "text": "Along with the great increase of internet and e-commerce, the use of credit card is an unavoidable one. Due to the increase of credit card usage, the frauds associated with this have also increased. There are a lot of approaches used to detect the frauds. In this paper, behavior based classification approach using Support Vector Machines are employed and efficient feature extraction method also adopted. If any discrepancies occur in the behaviors transaction pattern then it is predicted as suspicious and taken for further consideration to find the frauds. Generally credit card fraud detection problem suffers from a large amount of data, which is rectified by the proposed method. Achieving finest accuracy, high fraud catching rate and low false alarms are the main tasks of this approach.", "title": "" }, { "docid": "4a9474c0813646708400fc02c344a976", "text": "Over the years, the Web has shrunk the world, allowing individuals to share viewpoints with many more people than they are able to in real life. At the same time, however, it has also enabled anti-social and toxic behavior to occur at an unprecedented scale. Video sharing platforms like YouTube receive uploads from millions of users, covering a wide variety of topics and allowing others to comment and interact in response. Unfortunately, these communities are periodically plagued with aggression and hate attacks. In particular, recent work has showed how these attacks often take place as a result of “raids,” i.e., organized efforts coordinated by ad-hoc mobs from third-party communities. Despite the increasing relevance of this phenomenon, online services often lack effective countermeasures to mitigate it. Unlike well-studied problems like spam and phishing, coordinated aggressive behavior both targets and is perpetrated by humans, making defense mechanisms that look for automated activity unsuitable. Therefore, the de-facto solution is to reactively rely on user reports and human reviews. In this paper, we propose an automated solution to identify videos that are likely to be targeted by coordinated harassers. First, we characterize and model YouTube videos along several axes (metadata, audio transcripts, thumbnails) based on a ground truth dataset of raid victims. Then, we use an ensemble of classifiers to determine the likelihood that a video will be raided with high accuracy (AUC up to 94%). Overall, our work paves the way for providing video platforms like YouTube with proactive systems to detect and mitigate coordinated hate attacks.", "title": "" }, { "docid": "733a7a024f5e408323f9b037828061bb", "text": "Hidden Markov model (HMM) is one of the popular techniques for story segmentation, where hidden Markov states represent the topics, and the emission distributions of n-gram language model (LM) are dependent on the states. Given a text document, a Viterbi decoder finds the hidden story sequence, with a change of topic indicating a story boundary. In this paper, we propose a discriminative approach to story boundary detection. In the HMM framework, we use deep neural network (DNN) to estimate the posterior probability of topics given the bag-ofwords in the local context. We call it the DNN-HMM approach. We consider the topic dependent LM as a generative modeling technique, and the DNN-HMM as the discriminative solution. Experiments on topic detection and tracking (TDT2) task show that DNN-HMM outperforms traditional n-gram LM approach significantly and achieves state-of-the-art performance.", "title": "" }, { "docid": "3ab4c2383569fc02f0395e79070dc16d", "text": "A report released last week by the US National Academies makes recommendations for tackling the issues surrounding the era of petabyte science.", "title": "" }, { "docid": "f006fff7ddfaed4b6016d59377144b7a", "text": "In this paper I consider whether traditional behaviors of animals, like traditions of humans, are transmitted by imitation learning. Review of the literature on problem solving by captive primates, and detailed consideration of two widely cited instances of purported learning by imitation and of culture in free-living primates (sweet-potato washing by Japanese macaques and termite fishing by chimpanzees), suggests that nonhuman primates do not learn to solve problems by imitation. It may, therefore, be misleading to treat animal traditions and human culture as homologous (rather than analogous) and to refer to animal traditions as cultural.", "title": "" }, { "docid": "745451b3ca65f3388332232b370ea504", "text": "This article develops a framework that applies to single securities to test whether asset pricing models can explain the size, value, and momentum anomalies. Stock level beta is allowed to vary with firm-level size and book-to-market as well as with macroeconomic variables. With constant beta, none of the models examined capture any of the market anomalies. When beta is allowed to vary, the size and value effects are often explained, but the explanatory power of past return remains robust. The past return effect is captured by model mispricing that varies with macroeconomic variables.", "title": "" }, { "docid": "a00acd7a9a136914bf98478ccd85e812", "text": "Deep-learning has proved in recent years to be a powerful tool for image analysis and is now widely used to segment both 2D and 3D medical images. Deep-learning segmentation frameworks rely not only on the choice of network architecture but also on the choice of loss function. When the segmentation process targets rare observations, a severe class imbalance is likely to occur between candidate labels, thus resulting in sub-optimal performance. In order to mitigate this issue, strategies such as the weighted cross-entropy function, the sensitivity function or the Dice loss function, have been proposed. In this work, we investigate the behavior of these loss functions and their sensitivity to learning rate tuning in the presence of different rates of label imbalance across 2D and 3D segmentation tasks. We also propose to use the class re-balancing properties of the Generalized Dice overlap, a known metric for segmentation assessment, as a robust and accurate deep-learning loss function for unbalanced tasks.", "title": "" }, { "docid": "26aee4feb558468d571138cd495f51d3", "text": "A 300-MHz, custom 64-bit VLSI, second-generation Alpha CPU chip has been developed. The chip was designed in a 0.5-um CMOS technology using four levels of metal. The die size is 16.5 mm by 18.1 mm, contains 9.3 million transistors, operates at 3.3 V, and supports 3.3-V/5.0-V interfaces. Power dissipation is 50 W. It contains an 8-KB instruction cache; an 8-KB data cache; and a 96-KB unified second-level cache. The chip can issue four instructions per cycle and delivers 1,200 mips/600 MFLOPS (peak). Several noteworthy circuit and implementation techniques were used to attain the target operating frequency.", "title": "" } ]
scidocsrr
c6a6366c26bdb392b16132f6b3ffe71b
Summarizing Answers in Non-Factoid Community Question-Answering
[ { "docid": "7e06f62814a2aba7ddaff47af62c13b4", "text": "Natural language conversation is widely regarded as a highly difficult problem, which is usually attacked with either rule-based or learning-based models. In this paper we propose a retrieval-based automatic response model for short-text conversation, to exploit the vast amount of short conversation instances available on social media. For this purpose we introduce a dataset of short-text conversation based on the real-world instances from Sina Weibo (a popular Chinese microblog service), which will be soon released to public. This dataset provides rich collection of instances for the research on finding natural and relevant short responses to a given short text, and useful for both training and testing of conversation models. This dataset consists of both naturally formed conversations, manually labeled data, and a large repository of candidate responses. Our preliminary experiments demonstrate that the simple retrieval-based conversation model performs reasonably well when combined with the rich instances in our dataset.", "title": "" } ]
[ { "docid": "ffe3a7171dccfb51ff22b41b4612b125", "text": "Several models of myopia predict that growth of axial length is stimulated by blur. Accommodative lag has been suggested as an important source of blur in the development of myopia and this study has modeled how cross-link interactions between accommodation and convergence might interact with uncorrected distance heterophoria and refractive error to influence accommodative lag. Accommodative lag was simulated with two models of interactions between accommodation and convergence (one with and one without adaptable tonic elements). Simulations of both models indicate that both uncorrected hyperopia and esophoria increase the lag of accommodative and uncorrected myopia and exophoria decrease the lag or introduce a lead of accommodation in response to the near (40 cm) stimulus. These effects were increased when gain of either cross-link, accommodative convergence (AC/A) or convergence accommodation (CA/C), was increased within a moderate range of values while the other was fixed at a normal value (clamped condition). These effects were exaggerated when both the AC/A and CA/C ratios were increased (covaried condition) and affects of cross-link gain were negated when an increase of one cross-link (e.g. AC/A) was accompanied by a reduction of the other cross-link (e.g. CA/C) (reciprocal condition). The inclusion of tonic adaptation in the model reduced steady state errors of accommodation for all conditions except when the AC/A ratio was very high (2 MA/D). Combinations of cross-link interactions between accommodation and convergence that resemble either clamped or reciprocal patterns occur naturally in clinical populations. Simulations suggest that these two patterns of abnormal cross-link interactions could affect the progression of myopia differently. Adaptable tonic accommodation and tonic vergence could potentially reduce the progression of myopia by reducing the lag of accommodation.", "title": "" }, { "docid": "060167f774d43cd41476de531ded40ad", "text": "In this study, we proposed a research model to investigate the factors influencing users’ continuance intention to use Twitter. Building on the uses and gratification framework, we have proposed four types of gratifications for Twitter usage, including content gratification, technology gratification, process gratification, and social gratification. We conducted an online survey and collected 124 responses. The data was analyzed using Partial Least Squares. Our results showed that content gratifications and new technology gratification are the two key types of gratifications affecting the continuance intention to use Twitter. We conclude with a discussion of theoretical and practical implications. We believe that this study will provide important insights for future research on Twitter.", "title": "" }, { "docid": "166b16222ecc15048972e535dbf4cb38", "text": "Fingerprint matching systems generally use four types of representation schemes: grayscale image, phase image, skeleton image, and minutiae, among which minutiae-based representation is the most widely adopted one. The compactness of minutiae representation has created an impression that the minutiae template does not contain sufficient information to allow the reconstruction of the original grayscale fingerprint image. This belief has now been shown to be false; several algorithms have been proposed that can reconstruct fingerprint images from minutiae templates. These techniques try to either reconstruct the skeleton image, which is then converted into the grayscale image, or reconstruct the grayscale image directly from the minutiae template. However, they have a common drawback: Many spurious minutiae not included in the original minutiae template are generated in the reconstructed image. Moreover, some of these reconstruction techniques can only generate a partial fingerprint. In this paper, a novel fingerprint reconstruction algorithm is proposed to reconstruct the phase image, which is then converted into the grayscale image. The proposed reconstruction algorithm not only gives the whole fingerprint, but the reconstructed fingerprint contains very few spurious minutiae. Specifically, a fingerprint image is represented as a phase image which consists of the continuous phase and the spiral phase (which corresponds to minutiae). An algorithm is proposed to reconstruct the continuous phase from minutiae. The proposed reconstruction algorithm has been evaluated with respect to the success rates of type-I attack (match the reconstructed fingerprint against the original fingerprint) and type-II attack (match the reconstructed fingerprint against different impressions of the original fingerprint) using a commercial fingerprint recognition system. Given the reconstructed image from our algorithm, we show that both types of attacks can be successfully launched against a fingerprint recognition system.", "title": "" }, { "docid": "6d925c32d3900512e0fd0ed36b683c69", "text": "This paper presents a detailed design process of an ultra-high speed, switched reluctance machine for micro machining. The performance goal of the machine is to reach a maximum rotation speed of 750,000 rpm with an output power of 100 W. The design of the rotor involves reducing aerodynamic drag, avoiding mechanical resonance, and mitigating excessive stress. The design of the stator focuses on meeting the torque requirement while minimizing core loss and copper loss. The performance of the machine and the strength of the rotor structure are both verified through finite-element simulations The final design is a 6/4 switched reluctance machine with a 6mm diameter rotor that is wrapped in a carbon fiber sleeve and exhibits 13.6 W of viscous loss. The stator has shoeless poles and exhibits 19.1 W of electromagnetic loss.", "title": "" }, { "docid": "4e0735c47fba93e77bc33eee689ed03e", "text": "Word-of-mouth (WOM) has been recognized as one of the most influential resources of information transmission. However, conventional WOM communication is only effective within limited social contact boundaries. The advances of information technology and the emergence of online social network sites have changed the way information is transmitted and have transcended the traditional limitations of WOM. This paper describes online interpersonal influence or electronic word of mouth (eWOM) because it plays a significant role in consumer purchase decisions.", "title": "" }, { "docid": "f264d5b90dfb774e9ec2ad055c4ebe62", "text": "Automatic citation recommendation can be very useful for authoring a paper and is an AI-complete problem due to the challenge of bridging the semantic gap between citation context and the cited paper. It is not always easy for knowledgeable researchers to give an accurate citation context for a cited paper or to find the right paper to cite given context. To help with this problem, we propose a novel neural probabilistic model that jointly learns the semantic representations of citation contexts and cited papers. The probability of citing a paper given a citation context is estimated by training a multi-layer neural network. We implement and evaluate our model on the entire CiteSeer dataset, which at the time of this work consists of 10,760,318 citation contexts from 1,017,457 papers. We show that the proposed model significantly outperforms other stateof-the-art models in recall, MAP, MRR, and nDCG.", "title": "" }, { "docid": "2e864dcde57ea1716847f47977af0140", "text": "I focus on the role of case studies in developing causal explanations. I distinguish between the theoretical purposes of case studies and the case selection strategies or research designs used to advance those objectives. I construct a typology of case studies based on their purposes: idiographic (inductive and theory-guided), hypothesis-generating, hypothesis-testing, and plausibility probe case studies. I then examine different case study research designs, including comparable cases, most and least likely cases, deviant cases, and process tracing, with attention to their different purposes and logics of inference. I address the issue of selection bias and the “single logic” debate, and I emphasize the utility of multi-method research.", "title": "" }, { "docid": "413112cc78df9fac45a254c74049f724", "text": "We are developing compact, high-power chargers for rapid charging of energy storage capacitors. The main application is presently rapid charging of the capacitors inside of compact Marx generators for reprated operation. Compact Marx generators produce output pulses with amplitudes above 300 kV with ns or subns rise-times. A typical application is the generation of high power microwaves. Initially all energy storage capacitors in a Marx generator are charged in parallel. During the so-called erection cycle, the capacitors are connected in series. The charging voltage in the parallel configuration is around 40-50 kV. The input voltage of our charger is in the range of several hundred volts. Rapid charging of the capacitors in the parallel configuration will enable a high pulse repetition-rate of the compact Marx generator. The high power charger uses state-of-the-art IGBTs (isolated gate bipolar transistors) in an H-bridge topology and a compact, high frequency transformer. The IGBTs and the associated controls are packaged for minimum weight and maximum power density. The packaging and device selection makes use of burst mode operation (thermal inertia) of the charger. The present charger is considerably smaller than the one presented in Giesselmann, M et al., (2001).", "title": "" }, { "docid": "8df49a873585755ec3a23a314846e851", "text": "We propose a reparameterization of LSTM that brings the benefits of batch normalization to recurrent neural networks. Whereas previous works only apply batch normalization to the input-to-hidden transformation of RNNs, we demonstrate that it is both possible and beneficial to batch-normalize the hidden-to-hidden transition, thereby reducing internal covariate shift between time steps. We evaluate our proposal on various sequential problems such as sequence classification, language modeling and question answering. Our empirical results show that our batch-normalized LSTM consistently leads to faster convergence and improved generalization.", "title": "" }, { "docid": "b22fff6f567db717b00e67a63fa23ca9", "text": "This paper was originally published in Biological Procedures Online (BPO) on March 23, 2006. It was brought to the attention of the journal and authors that reference 74 was incorrect. The original citation for reference 74, “Stanford V. Biosignals offer potential for direct interfaces and health monitoring. Pervasive Computing, IEEE 2004; 3(1):99–103.” should read “Costanza E, Inverso SA, Allen R. ‘Toward Subtle Intimate Interfaces for Mobile Devices Using an EMG Controller’ in Proc CHI2005, April 2005, Portland, OR, USA.”", "title": "" }, { "docid": "5c7a66c440b73b9ff66cd73c8efb3718", "text": "Image captioning is a crucial task in the interaction of computer vision and natural language processing. It is an important way that help human understand the world better. There are many studies on image English captioning, but little work on image Chinese captioning because of the lack of the corresponding datasets. This paper focuses on image Chinese captioning by using abundant English datasets for the issue. In this paper, a method of adding English information to image Chinese captioning is proposed. We validate the use of English information with state-of-the art performance on the datasets: Flickr8K-CN.", "title": "" }, { "docid": "8d092dfa88ba239cf66e5be35fcbfbcc", "text": "We present VideoWhisper, a novel approach for unsupervised video representation learning. Based on the observation that the frame sequence encodes the temporal dynamics of a video (e.g., object movement and event evolution), we treat the frame sequential order as a self-supervision to learn video representations. Unlike other unsupervised video feature learning methods based on frame-level feature reconstruction that is sensitive to visual variance, VideoWhisper is driven by a novel video “sequence-to-whisper” learning strategy. Specifically, for each video sequence, we use a prelearned visual dictionary to generate a sequence of high-level semantics, dubbed “whisper,” which can be considered as the language describing the video dynamics. In this way, we model VideoWhisper as an end-to-end sequence-to-sequence learning model using attention-based recurrent neural networks. This model is trained to predict the whisper sequence and hence it is able to learn the temporal structure of videos. We propose two ways to generate video representation from the model. Through extensive experiments on two real-world video datasets, we demonstrate that video representation learned by V ideoWhisper is effective to boost fundamental multimedia applications such as video retrieval and event classification.", "title": "" }, { "docid": "dad658b04712fe4ff03b356ed842e637", "text": "Recurrent neural network language models (RNNLMs) have recently produced improvements on language processing tasks ranging from machine translation to word tagging and speech recognition. To date, however, the computational expense of RNNLMs has hampered their application to first pass decoding. In this paper, we show that by restricting the RNNLM calls to those words that receive a reasonable score according to a n-gram model, and by deploying a set of caches, we can reduce the cost of using an RNNLM in the first pass to that of using an additional n-gram model. We compare this scheme to lattice rescoring, and find that they produce comparable results for a Bing Voice search task. The best performance results from rescoring a lattice that is itself created with a RNNLM in the first pass.", "title": "" }, { "docid": "3f467988a35ecb7b6b9feef049407bb2", "text": "Semantic parsing of large-scale 3D point clouds is an important research topic in computer vision and remote sensing fields. Most existing approaches utilize hand-crafted features for each modality independently and combine them in a heuristic manner. They often fail to consider the consistency and complementary information among features adequately, which makes them difficult to capture high-level semantic structures. The features learned by most of the current deep learning methods can obtain high-quality image classification results. However, these methods are hard to be applied to recognize 3D point clouds due to unorganized distribution and various point density of data. In this paper, we propose a 3DCNN-DQN-RNN method which fuses the 3D convolutional neural network (CNN), Deep Q-Network (DQN) and Residual recurrent neural network (RNN)for an efficient semantic parsing of large-scale 3D point clouds. In our method, an eye window under control of the 3D CNN and DQN can localize and segment the points of the object's class efficiently. The 3D CNN and Residual RNN further extract robust and discriminative features of the points in the eye window, and thus greatly enhance the parsing accuracy of large-scale point clouds. Our method provides an automatic process that maps the raw data to the classification results. It also integrates object localization, segmentation and classification into one framework. Experimental results demonstrate that the proposed method outperforms the state-of-the-art point cloud classification methods.", "title": "" }, { "docid": "b34db00c8a84eab1c7b1a6458fc6cd97", "text": "The use of hand gestures provides an attractive alternative to cumbersome interface devices for human-computer interaction (HCI). In particular, visual interpretation of hand gestures can help in achieving the ease and naturalness desired for HCI. This has motivated a very active research area concerned with computer vision-based analysis and interpretation of hand gestures. We survey the literature on visual interpretation of hand gestures in the context of its role in HCI. This discussion is organized on the basis of the method used for modeling, analyzing, and recognizing gestures. Important differences in the gesture interpretation approaches arise depending on whether a 3D model of the human hand or an image appearance model of the human hand is used. 3D hand models offer a way of more elaborate modeling of hand gestures but lead to computational hurdles that have not been overcome given the real-time requirements of HCI. Appearance-based models lead to computationally efficient “purposive” approaches that work well under constrained situations but seem to lack the generality desirable for HCI. We also discuss implemented gestural systems as well as other potential applications of vision-based gesture recognition. Although the current progress is encouraging, further theoretical as well as computational advances are needed before gestures can be widely used for HCI. We discuss directions of future research in gesture recognition, including its integration with other natural modes of humancomputer interaction. Index Terms —Vision-based gesture recognition, gesture analysis, hand tracking, nonrigid motion analysis, human-computer", "title": "" }, { "docid": "d1ab78928c003109eda9e02384e7ca3f", "text": "Code-switching is commonly used in the free-form text environment, such as social media, and it is especially favored in emotion expressions. Emotions in codeswitching texts differ from monolingual texts in that they can be expressed in either monolingual or bilingual forms. In this paper, we first utilize two kinds of knowledge, i.e. bilingual and sentimental information to bridge the gap between different languages. Moreover, we use a term-document bipartite graph to incorporate both bilingual and sentimental information, and propose a label propagation based approach to learn and predict in the bipartite graph. Empirical studies demonstrate the effectiveness of our proposed approach in detecting emotion in code-switching texts.", "title": "" }, { "docid": "7f2acf667a66f2812023c26c4ca95cf1", "text": "Vehicle-IT convergence technology is a rapidly rising paradigm of modern vehicles, in which an electronic control unit (ECU) is used to control the vehicle electrical systems, and the controller area network (CAN), an in-vehicle network, is commonly used to construct an efficient network of ECUs. Unfortunately, security issues have not been treated properly in CAN, although CAN control messages could be life-critical. With the appearance of the connected car environment, in-vehicle networks (e.g., CAN) are now connected to external networks (e.g., 3G/4G mobile networks), enabling an adversary to perform a long-range wireless attack using CAN vulnerabilities. In this paper we show that a long-range wireless attack is physically possible using a real vehicle and malicious smartphone application in a connected car environment. We also propose a security protocol for CAN as a countermeasure designed in accordance with current CAN specifications. We evaluate the feasibility of the proposed security protocol using CANoe software and a DSP-F28335 microcontroller. Our results show that the proposed security protocol is more efficient than existing security protocols with respect to authentication delay and communication load.", "title": "" }, { "docid": "701fe507d3efe69f82f040967d6e246f", "text": "The performance of the brain is constrained by wiring length and maintenance costs. The apparently inverse relationship between number of neurons in the various interneuron classes and the spatial extent of their axon trees suggests a mathematically definable organization, reminiscent of 'small-world' or scale-free networks observed in other complex systems. The wiring-economy-based classification of cortical inhibitory interneurons is supported by the distinct physiological patterns of class members in the intact brain. The complex wiring of diverse interneuron classes could represent an economic solution for supporting global synchrony and oscillations at multiple timescales with minimum axon length.", "title": "" }, { "docid": "0dfc905792374c8224cbe2d34fb51fe5", "text": "Randomized direct search algorithms for continuous domains, such as evolution strategies, are basic tools in machine learning. They are especially needed when the gradient of an objective function (e.g., loss, energy, or reward function) cannot be computed or estimated efficiently. Application areas include supervised and reinforcement learning as well as model selection. These randomized search strategies often rely on normally distributed additive variations of candidate solutions. In order to efficiently search in non-separable and ill-conditioned landscapes the covariance matrix of the normal distribution must be adapted, amounting to a variable metric method. Consequently, covariance matrix adaptation (CMA) is considered state-of-the-art in evolution strategies. In order to sample the normal distribution, the adapted covariance matrix needs to be decomposed, requiring in general Θ(n 3) operations, where n is the search space dimension. We propose a new update mechanism which can replace a rank-one covariance matrix update and the computationally expensive decomposition of the covariance matrix. The newly developed update rule reduces the computational complexity of the rank-one covariance matrix adaptation to Θ(n 2) without resorting to outdated distributions. We derive new versions of the elitist covariance matrix adaptation evolution strategy (CMA-ES) and the multi-objective CMA-ES. These algorithms are equivalent to the original procedures except that the update step for the variable metric distribution scales better in the problem dimension. We also introduce a simplified variant of the non-elitist CMA-ES with the incremental covariance matrix update and investigate its performance. Apart from the reduced time-complexity of the distribution update, the algebraic computations involved in all new algorithms are simpler compared to the original versions. The new update rule improves the performance of the CMA-ES for large scale machine learning problems in which the objective function can be evaluated fast.", "title": "" } ]
scidocsrr
8b2e64216e390328a4e7f0e8db02b960
Towards affective camera control in games
[ { "docid": "eded90c762031357c1f5366fefca007c", "text": "The authors examined whether the nature of the opponent (computer, friend, or stranger) influences spatial presence, emotional responses, and threat and challenge appraisals when playing video games. In a within-subjects design, participants played two different video games against a computer, a friend, and a stranger. In addition to self-report ratings, cardiac interbeat intervals (IBIs) and facial electromyography (EMG) were measured to index physiological arousal and emotional valence. When compared to playing against a computer, playing against another human elicited higher spatial presence, engagement, anticipated threat, post-game challenge appraisals, and physiological arousal, as well as more positively valenced emotional responses. In addition, playing against a friend elicited greater spatial presence, engagement, and self-reported and physiological arousal, as well as more positively valenced facial EMG responses, compared to playing against a stranger. The nature of the opponent influences spatial presence when playing video games, possibly through the mediating influence on arousal and attentional processes.", "title": "" } ]
[ { "docid": "984a289e33debae553dffc4f601dc203", "text": "Nowadays, the prevailing detectors of steganographic communication in digital images mainly consist of three steps, i.e., residual computation, feature extraction, and binary classification. In this paper, we present an alternative approach to steganalysis of digital images based on convolutional neural network (CNN), which is shown to be able to well replicate and optimize these key steps in a unified framework and learn hierarchical representations directly from raw images. The proposed CNN has a quite different structure from the ones used in conventional computer vision tasks. Rather than a random strategy, the weights in the first layer of the proposed CNN are initialized with the basic high-pass filter set used in the calculation of residual maps in a spatial rich model (SRM), which acts as a regularizer to suppress the image content effectively. To better capture the structure of embedding signals, which usually have extremely low SNR (stego signal to image content), a new activation function called a truncated linear unit is adopted in our CNN model. Finally, we further boost the performance of the proposed CNN-based steganalyzer by incorporating the knowledge of selection channel. Three state-of-the-art steganographic algorithms in spatial domain, e.g., WOW, S-UNIWARD, and HILL, are used to evaluate the effectiveness of our model. Compared to SRM and its selection-channel-aware variant maxSRMd2, our model achieves superior performance across all tested algorithms for a wide variety of payloads.", "title": "" }, { "docid": "78e712f5d052c08a7dcbc2ee6fd92f96", "text": "Bug report contains a vital role during software development, However bug reports belongs to different categories such as performance, usability, security etc. This paper focuses on security bug and presents a bug mining system for the identification of security and non-security bugs using the term frequency-inverse document frequency (TF-IDF) weights and naïve bayes. We performed experiments on bug report repositories of bug tracking systems such as bugzilla and debugger. In the proposed approach we apply text mining methodology and TF-IDF on the existing historic bug report database based on the bug s description to predict the nature of the bug and to train a statistical model for manually mislabeled bug reports present in the database. The tool helps in deciding the priorities of the incoming bugs depending on the category of the bugs i.e. whether it is a security bug report or a non-security bug report, using naïve bayes. Our evaluation shows that our tool using TF-IDF is giving better results than the naïve bayes method.", "title": "" }, { "docid": "809046f2f291ce610938de209d98a6f2", "text": "Pregnancy loss before 20 weeks’ gestation without outside intervention is termed spontaneous abortion and may be encountered in as many as 20% of clinically diagnosed pregnancies.1 It is said to be complete when all products of conception are expelled, the uterus is in a contracted state, and the cervix is closed. On the other hand, retention of part of products of conception inside the uterus, cervix, or vagina results in incomplete abortion. Although incomplete spontaneous miscarriages are commonly encountered in early pregnancy,2 traumatic fetal decapitation has not been mentioned in the medical literature as a known complication of spontaneous abortion. We report an extremely rare and unusual case of traumatic fetal decapitation due to self-delivery during spontaneous abortion in a 26-year-old woman who presented at 15 weeks’ gestation with gradually worsening vaginal bleeding and lower abdominal pain and with the fetal head still lying in the uterine cavity. During our search for similar cases, we came across just 1 other case report describing traumatic fetal decapitation after spontaneous abortion,3 although there are reports of fetal decapitation from amniotic band syndrome, vacuum-assisted deliveries, and destructive operations.4–8 A 26-year-old woman, gravida 2, para 0, presented to the emergency department with vaginal bleeding and cramping pain in her lower abdomen, both of which had gradually increased in severity over the previous 2 days. Her pulse and blood pressure were 86 beats per minute and 100/66 mm Hg, respectively, and her respiratory rate was 26 breaths per minute. She had a high-grade fever; her temperature was 103°F (39.4°C), recorded orally. There was suprapubic tenderness on palpation. About 8 or 9 days before presentation, she had severe pain in the lower abdomen, followed by vaginal bleeding. She gave a history of passing brown to black clots, one of which was particularly large, and she had to pull it out herself as if it was stuck. It resembled “an incomplete very small baby” in her own words. Although not sure, she could not make out the head of the “baby,” although she could appreciate the limbs and trunk. Thereafter, the bleeding gradually decreased over the next 2 days, but her lower abdominal pain persisted. However, after 1 day, she again started bleeding, and her pain increased in intensity. Meanwhile she also developed fever. She gave a history of recent cocaine use and alcohol drinking occasionally. No history of smoking was present. According to her last menstrual period, the gestational age was at 15 weeks, and during this pregnancy, she never had a sonographic examination. She reported taking a urine test for pregnancy at home 4 weeks before, which showed positive results. She gave a history of being pregnant 11⁄2 years before. At that time, also, she aborted spontaneously at 9 weeks’ gestation. No complications were seen at that time. She resumed her menses normally after about 2 months and was regular until 3 months back. The patient was referred for emergency sonography, which revealed that the fetal head was lying in the uterine cavity (Figure 1, A and B) along with the presence of fluid/ hemorrhage in the cervix and upper vagina (Figure 1C). No other definite fetal part could be identified. The placenta was also seen in the uterine cavity, and it was upper anterior and fundic (Figure 1D). No free fluid in abdomen was seen. Subsequently after stabilization, the patient underwent dilation and evacuation and had an uneventful postoperative course. As mentioned earlier, traumatic fetal decapitation accompanying spontaneous abortion is a very rare occurrence; we came across only 1 other case3 describing similar findings. Patients presenting to the emergency department with features suggestive of abortion, whether threatened, incomplete, or complete, should be thoroughly evaluated by both pelvic and sonographic examinations to check for any retained products of conception with frequent followups in case of threatened or incomplete abortions.", "title": "" }, { "docid": "3e845c9a82ef88c7a1f4447d57e35a3e", "text": "Link prediction is a key problem for network-structured data. Link prediction heuristics use some score functions, such as common neighbors and Katz index, to measure the likelihood of links. They have obtained wide practical uses due to their simplicity, interpretability, and for some of them, scalability. However, every heuristic has a strong assumption on when two nodes are likely to link, which limits their effectiveness on networks where these assumptions fail. In this regard, a more reasonable way should be learning a suitable heuristic from a given network instead of using predefined ones. By extracting a local subgraph around each target link, we aim to learn a function mapping the subgraph patterns to link existence, thus automatically learning a “heuristic” that suits the current network. In this paper, we study this heuristic learning paradigm for link prediction. First, we develop a novel γ-decaying heuristic theory. The theory unifies a wide range of heuristics in a single framework, and proves that all these heuristics can be well approximated from local subgraphs. Our results show that local subgraphs reserve rich information related to link existence. Second, based on the γ-decaying theory, we propose a new method to learn heuristics from local subgraphs using a graph neural network (GNN). Its experimental results show unprecedented performance, working consistently well on a wide range of problems.", "title": "" }, { "docid": "a0d2ea9b5653d6ca54983bb3d679326e", "text": "A dynamic reasoning system (DRS) is an adaptation of a conventional formal logical system that explicitly portrays reasoning as a temporal activity, with each extralogical input to the system and each inference rule application being viewed as occurring at a distinct timestep. Every DRS incorporates some well-defined logic together with a controller that serves to guide the reasoning process in response to user inputs. Logics are generic, whereas controllers are application specific. Every controller does, nonetheless, provide an algorithm for nonmonotonic belief revision. The general notion of a DRS comprises a framework within which one can formulate the logic and algorithms for a given application and prove that the algorithms are correct, that is, that they serve to (1) derive all salient information and (2) preserve the consistency of the belief set. This article illustrates the idea with ordinary first-order predicate calculus, suitably modified for the present purpose, and two examples. The latter example revisits some classic nonmonotonic reasoning puzzles (Opus the Penguin, Nixon Diamond) and shows how these can be resolved in the context of a DRS, using an expanded version of first-order logic that incorporates typed predicate symbols. All concepts are rigorously defined and effectively computable, thereby providing the foundation for a future software implementation.", "title": "" }, { "docid": "19cb14825c6654101af1101089b66e16", "text": "Critical infrastructures, such as power grids and transportation systems, are increasingly using open networks for operation. The use of open networks poses many challenges for control systems. The classical design of control systems takes into account modeling uncertainties as well as physical disturbances, providing a multitude of control design methods such as robust control, adaptive control, and stochastic control. With the growing level of integration of control systems with new information technologies, modern control systems face uncertainties not only from the physical world but also from the cybercomponents of the system. The vulnerabilities of the software deployed in the new control system infrastructure will expose the control system to many potential risks and threats from attackers. Exploitation of these vulnerabilities can lead to severe damage as has been reported in various news outlets [1], [2]. More recently, it has been reported in [3] and [4] that a computer worm, Stuxnet, was spread to target Siemens supervisory control and data acquisition (SCADA) systems that are configured to control and monitor specific industrial processes.", "title": "" }, { "docid": "725f9c045b5618fe0feb39a5f4cb4d8c", "text": "This paper discusses the experiments carried out by us at Jadavpur University as part of the participation in ICON 2015 task: POS Tagging for Code-mixed Indian Social Media Text. The tool that we have developed for the task is based on Trigram Hidden Markov Model that utilizes information from dictionary as well as some other word level features to enhance the observation probabilities of the known tokens as well as unknown tokens. We submitted runs for Bengali-English, Hindi-English and Tamil-English Language pairs. Our system has been trained and tested on the datasets released for ICON 2015 shared task: POS Tagging For Code-mixed Indian Social Media Text. In constrained mode, our system obtains average overall accuracy (averaged over all three language pairs) of 75.60% which is very close to other participating two systems (76.79% for IIITH and 75.79% for AMRITA_CEN) ranked higher than our system. In unconstrained mode, our system obtains average overall accuracy of 70.65% which is also close to the system (72.85% for AMRITA_CEN) which obtains the highest average overall accuracy.", "title": "" }, { "docid": "47d673d7b917f3948274f1e32a847a35", "text": "Real-time lane detection and tracking is one of the most reliable approaches to prevent road accidents by alarming the driver of the excessive lane changes. This paper addresses the problem of correct lane detection and tracking of the current lane of a vehicle in real-time. We propose a solution that is computationally efficient and performs better than previous approaches. The proposed algorithm is based on detecting straight lines from the captured road image, marking a region of interest, filtering road marks and detecting the current lane by using the information gathered. This information is obtained by analyzing the geometric shape of the lane boundaries and the convergence point of the lane markers. To provide a feasible solution, the only sensing modality on which the algorithm depends on is the camera of an off-the-shelf mobile device. The proposed algorithm has a higher average accuracy of 96.87% when tested on the Caltech Lanes Dataset as opposed to the state-of-the-art technology for lane detection. The algorithm operates on three frames per second on a 2.26 GHz quad-core processor of a mobile device with an image resolution of 640×480 pixels. It is tested and verified under various visibility and road conditions.", "title": "" }, { "docid": "08c60605026ab1ba625c69cb27539daa", "text": "Few educational problems have received more attention in recent times than the failure to ensure that elementary and secondary classrooms are all staffed with qualified teachers. Over the past two decades, dozens of studies, commissions, and national reports have warned of a coming crisis resulting from widespread teacher shortages. This article briefly summarizes a recent study I undertook that used national data to examine the sources of school staffing problems and teacher shortages. This research shows that although these issues are among the most important facing schools, they are also among the least understood. The data also reveal that many currently popular reforms will not solve the staffing problems of schools because they do not address some of their key causes. Disciplines Educational Administration and Supervision | Teacher Education and Professional Development Comments This brief is based on the following Center for the Study of Teaching Policy (CTP) Research Report: Teacher Turnover, Teacher Shortages, and the Organization of Schools. View on the CPRE website. This policy brief is available at ScholarlyCommons: https://repository.upenn.edu/cpre_policybriefs/21", "title": "" }, { "docid": "d7c236983c54213f17a0d8db886d5f2f", "text": "Traffic light detection is an important system because it can alert driver on upcoming traffic light so that he/she can anticipate a head of time. In this paper we described our work on detecting traffic light color using machine learning approach. Using HSV color representation, our approach is to extract features based on an area of X×X pixels. Traffic light color model is then created by applying a learning algorithm on a set of examples of features representing pixels of traffic and non-traffic light colors. The learned model is then used to classify whether an area of pixels contains traffic light color or not. Evaluation of this approach reveals that it significantly improves the detection performance over the one based on value-range color segmentation technique.", "title": "" }, { "docid": "f03749ebd15b51b95e8ece5d6d58108c", "text": "The holding of an infant with ventral skin-to-skin contact typically in an upright position with the swaddled infant on the chest of the parent, is commonly referred to as kangaroo care (KC), due to its simulation of marsupial care. It is recommended that KC, as a feasible, natural, and cost-effective intervention, should be standard of care in the delivery of quality health care for all infants, regardless of geographic location or economic status. Numerous benefits of its use have been reported related to mortality, physiological (thermoregulation, cardiorespiratory stability), behavioral (sleep, breastfeeding duration, and degree of exclusivity) domains, as an effective therapy to relieve procedural pain, and improved neurodevelopment. Yet despite these recommendations and a lack of negative research findings, adoption of KC as a routine clinical practice remains variable and underutilized. Furthermore, uncertainty remains as to whether continuous KC should be recommended in all settings or if there is a critical period of initiation, dose, or duration that is optimal. This review synthesizes current knowledge about the benefits of KC for infants born preterm, highlighting differences and similarities across low and higher resource countries and in a non-pain and pain context. Additionally, implementation considerations and unanswered questions for future research are addressed.", "title": "" }, { "docid": "8c58b608430e922284d8b4b8cd5cc51d", "text": "At the end of the 19th century, researchers observed that biological substances have frequency- dependent electrical properties and that tissue behaves \"like a capacitor\" [1]. Consequently, in the first half of the 20th century, the permittivity of many types of cell suspensions and tissues was characterized up to frequencies of approximately 100 MHz. From the measurements, conclusions were drawn, in particular, about the electrical properties of the cell membranes, which are the main contributors to the tissue impedance at frequencies below 10 MHz [2]. In 1926, a study found a significant different permittivity for breast cancer tissue compared with healthy tissue at 20 kHz [3]. After World War II, new instrumentation enabled measurements up to 10 GHz, and a vast amount of data on the dielectric properties of different tissue types in the microwave range was published [4]-[6].", "title": "" }, { "docid": "967f1e68847111ecf96d964422bea913", "text": "Text preprocessing is an essential stage in text categorization (TC) particularly and text mining generally. Morphological tools can be used in text preprocessing to reduce multiple forms of the word to one form. There has been a debate among researchers about the benefits of using morphological tools in TC. Studies in the English language illustrated that performing stemming during the preprocessing stage degrades the performance slightly. However, they have a great impact on reducing the memory requirement and storage resources needed. The effect of the preprocessing tools on Arabic text categorization is an area of research. This work provides an evaluation study of several morphological tools for Arabic Text Categorization. The study includes using the raw text, the stemmed text, and the root text. The stemmed and root text are obtained using two different preprocessing tools. The results illustrated that using light stemmer combined with a good performing feature selection method enhances the performance of Arabic Text Categorization especially for small threshold values.", "title": "" }, { "docid": "ef4272cd4b0d4df9aa968cc9ff528c1e", "text": "Estimating action quality, the process of assigning a \"score\" to the execution of an action, is crucial in areas such as sports and health care. Unlike action recognition, which has millions of examples to learn from, the action quality datasets that are currently available are small-typically comprised of only a few hundred samples. This work presents three frameworks for evaluating Olympic sports which utilize spatiotemporal features learned using 3D convolutional neural networks (C3D) and perform score regression with i) SVR ii) LSTM and iii) LSTM followed by SVR. An efficient training mechanism for the limited data scenarios is presented for clip-based training with LSTM. The proposed systems show significant improvement over existing quality assessment approaches on the task of predicting scores of diving, vault, figure skating. SVR-based frameworks yield better results, LSTM-based frameworks are more natural for describing an action and can be used for improvement feedback.", "title": "" }, { "docid": "79b55ac2983d0604613341d8d8775506", "text": "In this paper, an effective method is proposed to handle the facial expression recognition problem. The system detects the face and facial components including eyes, brows and mouths. Since facial expressions result from facial muscle movements or deformations, and Histogram of Oriented Gradients (HOG) is very sensitive to the object deformations, we apply the HOG to encode these facial components as features. A linear SVM is then trained to perform the facial expression classification. We evaluate our proposed method on the JAFFE dataset and an extended Cohn-Kanade dataset. The average classification rate on the two datasets reaches 94.3% and 88.7%, respectively. Experimental results demonstrate the competitive classification accuracy of our proposed method. Keywords—facial expression recognition, HOG features, facial component detection, SVM", "title": "" }, { "docid": "292b22b2ba3b79df1769fb794b1ca0da", "text": "High-throughput genotype screening is rapidly becoming a standard research tool in the post-genomic era. A major bottleneck currently exists, however, that limits the utility of this approach in the plant sciences. The rate-limiting step in current high-throughput pipelines is that tissue samples from living plants must be collected manually, one plant at a time. In this article I describe a novel method for harvesting tissue samples from living seedlings that eliminates this bottleneck. The method has been named Ice-Cap to reflect the fact that ice is used to capture the tissue samples. The planting of seeds, growth of seedlings, and harvesting of tissue are all performed in a 96-well format. I demonstrate the utility of this system by using tissue harvested by Ice-Cap to genotype a population of Arabidopsis seedlings that is segregating a previously characterized mutation. Because the harvesting of tissue is performed in a nondestructive manner, plants with the desired genotype can be transferred to soil and grown to maturity. I also show that Ice-Cap can be used to analyze genomic DNA from rice (Oryza sativa) seedlings. It is expected that this method will be applicable to high-throughput screening with many different plant species, making it a useful technology for performing marker assisted selection.", "title": "" }, { "docid": "c649d226448782ee972c620bea3e0ea3", "text": "Parents of children with developmental disabilities, particularly autism spectrum disorders (ASDs), are at risk for high levels of distress. The factors contributing to this are unclear. This study investigated how child characteristics influence maternal parenting stress and psychological distress. Participants consisted of mothers and developmental-age matched preschool-aged children with ASD (N = 51) and developmental delay without autism (DD) ( N = 22). Evidence for higher levels of parenting stress and psychological distress was found in mothers in the ASD group compared to the DD group. Children's problem behavior was associated with increased parenting stress and psychological distress in mothers in the ASD and DD groups. This relationship was stronger in the DD group. Daily living skills were not related to parenting stress or psychological distress. Results suggest clinical services aiming to support parents should include a focus on reducing problem behaviors in children with developmental disabilities.", "title": "" }, { "docid": "20e105b3b8d4469b2ddc0dbbc2a64082", "text": "For over a century, heme metabolism has been recognized to play a central role during intraerythrocytic infection by Plasmodium parasites, the causative agent of malaria. Parasites liberate vast quantities of potentially cytotoxic heme as a by-product of hemoglobin catabolism within the digestive vacuole, where heme is predominantly sequestered as inert crystalline hemozoin. Plasmodium spp. also utilize heme as a metabolic cofactor. Despite access to abundant host-derived heme, parasites paradoxically maintain a biosynthetic pathway. This pathway has been assumed to produce the heme incorporated into mitochondrial cytochromes that support electron transport. In this review, we assess our current understanding of the love-hate relationship between Plasmodium parasites and heme, we discuss recent studies that clarify several long-standing riddles about heme production and utilization by parasites, and we consider remaining challenges and opportunities for understanding and targeting heme metabolism within parasites.", "title": "" }, { "docid": "0b9e7adde5f9b577930cab27cd4bc7a0", "text": "Statistical speech reconstruction for larynx-related dysphonia has achieved good performance using Gaussian mixture models and, more recently, restricted Boltzmann machine arrays; however, deep neural network (DNN)-based systems have been hampered by the limited amount of training data available from individual voice-loss patients. The authors propose a novel DNN structure that allows a partially supervised training approach on spectral features from smaller data sets, yielding very good results compared with the current state-of-the-art.", "title": "" } ]
scidocsrr
68e258b3686c79a5539d85d4f4c9ec1f
Enterprise Architecture Principles: Literature Review and Research Directions
[ { "docid": "92b61bc041b3b35687ba1cd6f5468941", "text": "Many organizations adopt cyclical processes to articulate and engineer technological responses to their business needs. Their objective is to increase competitive advantage and add value to the organization's processes, services and deliverables, in line with the organization's vision and strategy. The major challenges in achieving these objectives include the rapid changes in the business and technology environments themselves, such as changes to business processes, organizational structure, architectural requirements, technology infrastructure and information needs. No activity or process is permanent in the organization. To achieve their objectives, some organizations have adopted an Enterprise Architecture (EA) approach, others an Information Technology (IT) strategy approach, and yet others have adopted both EA and IT strategy for the same primary objectives. The deployment of EA and IT strategy for the same aims and objectives raises question whether there is conflict in adopting both approaches. The paper and case study presented here, aimed at both academics and practitioners, examines how EA could be employed as IT strategy to address both business and IT needs and challenges.", "title": "" }, { "docid": "adcb28fcc215a74313d583c520ed3036", "text": "I t’s rare that a business stays just as it began year after year.So if we agree that businesses evolve, it follows that information systems must evolve to keep pace.So far,so good.The disconnect occurs when an enterprise’s management knows that the information systems must evolve,but keeps patching and whipping the legacy systems to meet one more requirement. If you put the problem in its simplest terms,management has a choice about how it will grow its information systems.If there is a clear strategic vision for the enterprise, it seems logical to have an equally broad vision for the systems that support that strategy. Managers can thus choose to plan evolution,or they can react when reality hits and “evolve”parts of the information system according to the latest crisis. It’s a bit of a no-brainer as to which is the better choice. But it’s also easy to understand why few enterprises pick it. Conceiving, planning, and monitoring systems that support a long-range strategic vision is not trivial. Enterprise-wide information systems typically start from a base of legacy systems.And not just any legacy systems.They are typically unwieldy systems of systems with a staggering array of hardware,software, design strategies, and implementation platforms. To make the job even more difficult, “enterprise-wide” often means city to city, state to state, or even country to country. Getting these pieces to seamlessly interact and evolve according to long-range strategic business objectives may seem like mission impossible; for a large distributed organization,however, it is mission critical.", "title": "" } ]
[ { "docid": "00309acd08acb526f58a70ead2d99249", "text": "As mainstream news media and political campaigns start to pay attention to the political discourse online, a systematic analysis of political speech in social media becomes more critical. What exactly do people say on these sites, and how useful is this data in estimating political popularity? In this study we examine Twitter discussions surrounding seven US Republican politicians who were running for the US Presidential nomination in 2011. We show this largely negative rhetoric to be laced with sarcasm and humor and dominated by a small portion of users. Furthermore, we show that using out-of-the-box classification tools results in a poor performance, and instead develop a highly optimized multi-stage approach designed for general-purpose political sentiment classification. Finally, we compare the change in sentiment detected in our dataset before and after 19 Republican debates, concluding that, at least in this case, the Twitter political chatter is not indicative of national political polls.", "title": "" }, { "docid": "198967b505c9ded9255bff7b82fb2781", "text": "Generative adversarial nets (GANs) have been successfully applied to the artificial generation of image data. In terms of text data, much has been done on the artificial generation of natural language from a single corpus. We consider multiple text corpora as the input data, for which there can be two applications of GANs: (1) the creation of consistent cross-corpus word embeddings given different word embeddings per corpus; (2) the generation of robust bag-of-words document embeddings for each corpora. We demonstrate our GAN models on real-world text data sets from different corpora, and show that embeddings from both models lead to improvements in supervised learning problems.", "title": "" }, { "docid": "134ecc62958fa9bb930ff934c5fad7a3", "text": "We extend our methods from [24] to reprove the Local Langlands Correspondence for GLn over p-adic fields as well as the existence of `-adic Galois representations attached to (most) regular algebraic conjugate self-dual cuspidal automorphic representations, for which we prove a local-global compatibility statement as in the book of Harris-Taylor, [10]. In contrast to the proofs of the Local Langlands Correspondence given by Henniart, [13], and Harris-Taylor, [10], our proof completely by-passes the numerical Local Langlands Correspondence of Henniart, [11]. Instead, we make use of a previous result from [24] describing the inertia-invariant nearby cycles in certain regular situations.", "title": "" }, { "docid": "69a32a7a206284ca5f749ffe456bc6dc", "text": "Urinary incontinence is the inability to willingly control bladder voiding. Stress urinary incontinence (SUI) is the most frequently occurring type of incontinence in women. No widely accepted or approved drug therapy is yet available for the treatment of stress urinary incontinence. Numerous studies have implicated the neurotransmitters, serotonin and norepinephrine in the central neural control of the lower urinary tract function. The pudendal somatic motor nucleus of the spinal cord is densely innervated by 5HT and NE terminals. Pharmacological studies confirm central modulation of the lower urinary tract activity by 5HT and NE receptor agonists and antagonists. Duloxetine is a combined serotonin/norepinephrine reuptake inhibitor currently under clinical investigation for the treatment of women with stress urinary incontinence. Duloxetine exerts balanced in vivo reuptake inhibition of 5HT and NE and exhibits no appreciable binding affinity for receptors of neurotransmitters. The action of duloxetine in the treatment of stress urinary incontinence is associated with reuptake inhibition of serotonin and norepinephrine at the presynaptic neuron in Onuf’s nucleus of the sacral spinal cord. In cats, whose bladder had initially been irritated with acetic acid, a dose–dependent improvement of the bladder capacity (5–fold) and periurethral EMG activity (8–fold) of the striated sphincter muscles was found. In a double blind, randomized, placebocontrolled, clinical trial in women with stress urinary incontinence, there was a significant reduction in urinary incontinence episodes under duloxetine treatment. In summary, the pharmacological effect of duloxetine to increase the activity of the striated urethral sphincter together with clinical results indicate that duloxetine has an interesting therapeutic potential in patients with stress urinary incontinence.", "title": "" }, { "docid": "4a4a0dde01536789bd53ec180a136877", "text": "CONTEXT\nCurrent assessment formats for physicians and trainees reliably test core knowledge and basic skills. However, they may underemphasize some important domains of professional medical practice, including interpersonal skills, lifelong learning, professionalism, and integration of core knowledge into clinical practice.\n\n\nOBJECTIVES\nTo propose a definition of professional competence, to review current means for assessing it, and to suggest new approaches to assessment.\n\n\nDATA SOURCES\nWe searched the MEDLINE database from 1966 to 2001 and reference lists of relevant articles for English-language studies of reliability or validity of measures of competence of physicians, medical students, and residents.\n\n\nSTUDY SELECTION\nWe excluded articles of a purely descriptive nature, duplicate reports, reviews, and opinions and position statements, which yielded 195 relevant citations.\n\n\nDATA EXTRACTION\nData were abstracted by 1 of us (R.M.E.). Quality criteria for inclusion were broad, given the heterogeneity of interventions, complexity of outcome measures, and paucity of randomized or longitudinal study designs.\n\n\nDATA SYNTHESIS\nWe generated an inclusive definition of competence: the habitual and judicious use of communication, knowledge, technical skills, clinical reasoning, emotions, values, and reflection in daily practice for the benefit of the individual and the community being served. Aside from protecting the public and limiting access to advanced training, assessments should foster habits of learning and self-reflection and drive institutional change. Subjective, multiple-choice, and standardized patient assessments, although reliable, underemphasize important domains of professional competence: integration of knowledge and skills, context of care, information management, teamwork, health systems, and patient-physician relationships. Few assessments observe trainees in real-life situations, incorporate the perspectives of peers and patients, or use measures that predict clinical outcomes.\n\n\nCONCLUSIONS\nIn addition to assessments of basic skills, new formats that assess clinical reasoning, expert judgment, management of ambiguity, professionalism, time management, learning strategies, and teamwork promise a multidimensional assessment while maintaining adequate reliability and validity. Institutional support, reflection, and mentoring must accompany the development of assessment programs.", "title": "" }, { "docid": "5e7297c25f2aafe8dbb733944ddc29e7", "text": "Interactive digital matting, the process of extracting a foreground object from an image based on limited user input, is an important task in image and video editing. From a computer vision perspective, this task is extremely challenging because it is massively ill-posed - at each pixel we must estimate the foreground and the background colors, as well as the foreground opacity (\"alpha matte\") from a single color measurement. Current approaches either restrict the estimation to a small part of the image, estimating foreground and background colors based on nearby pixels where they are known, or perform iterative nonlinear estimation by alternating foreground and background color estimation with alpha estimation. In this paper, we present a closed-form solution to natural image matting. We derive a cost function from local smoothness assumptions on foreground and background colors and show that in the resulting expression, it is possible to analytically eliminate the foreground and background colors to obtain a quadratic cost function in alpha. This allows us to find the globally optimal alpha matte by solving a sparse linear system of equations. Furthermore, the closed-form formula allows us to predict the properties of the solution by analyzing the eigenvectors of a sparse matrix, closely related to matrices used in spectral image segmentation algorithms. We show that high-quality mattes for natural images may be obtained from a small amount of user input.", "title": "" }, { "docid": "4ec74a91814f1e63aace2ac43b236b9a", "text": "This paper discusses the status of research on detection of fraud undertaken as part of the European Commission-funded ACTS ASPeCT (Advanced Security for Personal Communications Technologies) project. A first task has been the identification of possible fraud scenarios and of typical fraud indicators which can be mapped to data in toll tickets. Currently, the project is exploring the detection of fraudulent behaviour based on a combination of absolute and differential usage. Three approaches are being investigated: a rule-based approach, an approach based on neural network, where both supervised and unsupervised learning are considered. Special attention is being paid to the feasibility of the implementations.", "title": "" }, { "docid": "55cfcee1d1e83600ad88a1faef13f684", "text": "In spite of amazing progress in food supply and nutritional science, and a striking increase in life expectancy of approximately 2.5 months per year in many countries during the previous 150 years, modern nutritional research has a great potential of still contributing to improved health for future generations, granted that the revolutions in molecular and systems technologies are applied to nutritional questions. Descriptive and mechanistic studies using state of the art epidemiology, food intake registration, genomics with single nucleotide polymorphisms (SNPs) and epigenomics, transcriptomics, proteomics, metabolomics, advanced biostatistics, imaging, calorimetry, cell biology, challenge tests (meals, exercise, etc.), and integration of all data by systems biology, will provide insight on a much higher level than today in a field we may name molecular nutrition research. To take advantage of all the new technologies scientists should develop international collaboration and gather data in large open access databases like the suggested Nutritional Phenotype database (dbNP). This collaboration will promote standardization of procedures (SOP), and provide a possibility to use collected data in future research projects. The ultimate goals of future nutritional research are to understand the detailed mechanisms of action for how nutrients/foods interact with the body and thereby enhance health and treat diet-related diseases.", "title": "" }, { "docid": "47e0b0fad94270b705d013364a6932e4", "text": "This paper introduces for the first time a novel flexible magnetic composite material for RF identification (RFID) and wearable RF antennas. First, one conformal RFID tag working at 480 MHz is designed and fabricated as a benchmarking prototype and the miniaturization concept is verified. Then, the impact of the material is thoroughly investigated using a hybrid method involving electromagnetic and statistical tools. Two separate statistical experiments are performed, one for the analysis of the impact of the relative permittivity and permeability of the proposed material and the other for the evaluation of the impact of the dielectric and magnetic loss on the antenna performance. Finally, the effect of the bending of the antenna is investigated, both on the S-parameters and on the radiation pattern. The successful implementation of the flexible magnetic composite material enables the significant miniaturization of RF passives and antennas in UHF frequency bands, especially when conformal modules that can be easily fine-tuned are required in critical biomedical and pharmaceutical applications.", "title": "" }, { "docid": "2542d745b0ed5c3501db4aaf8e3cc528", "text": "We present discriminative Gaifman models, a novel family of relational machine learning models. Gaifman models learn feature representations bottom up from representations of locally connected and bounded-size regions of knowledge bases (KBs). Considering local and bounded-size neighborhoods of knowledge bases renders logical inference and learning tractable, mitigates the problem of overfitting, and facilitates weight sharing. Gaifman models sample neighborhoods of knowledge bases so as to make the learned relational models more robust to missing objects and relations which is a common situation in open-world KBs. We present the core ideas of Gaifman models and apply them to large-scale relational learning problems. We also discuss the ways in which Gaifman models relate to some existing relational machine learning approaches.", "title": "" }, { "docid": "8c2adc6112d3eedc8175a61555496760", "text": "What does a user do when he logs in to the Twitter website? Does he merely browse through the tweets of all his friends as a source of information for his own tweets, or does he simply tweet a message of his own personal interest? Does he skim through the tweets of all his friends or only of a selected few? A number of factors might influence a user in these decisions. Does this social influence vary across cultures? In our work, we propose a simple yet effective model to predict the behavior of a user - in terms of which hashtag or named entity he might include in his future tweets. We have approached the problem as a classification task with the various influences contributing as features. Further, we analyze the contribution of the weights of the different features. Using our model we analyze data from different cultures and discover interesting differences in social influence.", "title": "" }, { "docid": "731c5544759a958272e08f928bd364eb", "text": "A key method of reducing morbidity and mortality is childhood immunization, yet in 2003 only 69% of Filipino children received all suggested vaccinations. Data from the 2003 Philippines Demographic Health Survey were used to identify risk factors for non- and partial-immunization. Results of the multinomial logistic regression analyses indicate that mothers who have less education, and who have not attended the minimally-recommended four antenatal visits are less likely to have fully immunized children. To increase immunization coverage in the Philippines, knowledge transfer to mothers must improve.", "title": "" }, { "docid": "36f928b473faf1e8751abbcbd61acdcd", "text": "Normal operations of the neocortex depend critically on several types of inhibitory interneurons, but the specific function of each type is unknown. One possibility is that interneurons are differentially engaged by patterns of activity that vary in frequency and timing. To explore this, we studied the strength and short-term dynamics of chemical synapses interconnecting local excitatory neurons (regular-spiking, or RS, cells) with two types of inhibitory interneurons: fast-spiking (FS) cells, and low-threshold spiking (LTS) cells of layer 4 in the rat barrel cortex. We also tested two other pathways onto the interneurons: thalamocortical connections and recurrent collaterals from corticothalamic projection neurons of layer 6. The excitatory and inhibitory synapses interconnecting RS cells and FS cells were highly reliable in response to single stimuli and displayed strong short-term depression. In contrast, excitatory and inhibitory synapses interconnecting the RS and LTS cells were less reliable when initially activated. Excitatory synapses from RS cells onto LTS cells showed dramatic short-term facilitation, whereas inhibitory synapses made by LTS cells onto RS cells facilitated modestly or slightly depressed. Thalamocortical inputs strongly excited both RS and FS cells but rarely and only weakly contacted LTS cells. Both types of interneurons were strongly excited by facilitating synapses from axon collaterals of corticothalamic neurons. We conclude that there are two parallel but dynamically distinct systems of synaptic inhibition in layer 4 of neocortex, each defined by its intrinsic spiking properties, the short-term plasticity of its chemical synapses, and (as shown previously) an exclusive set of electrical synapses. Because of their unique dynamic properties, each inhibitory network will be recruited by different temporal patterns of cortical activity.", "title": "" }, { "docid": "13452d0ceb4dfd059f1b48dba6bf5468", "text": "This paper presents an extension to the technology acceptance model (TAM) and empirically examines it in an enterprise resource planning (ERP) implementation environment. The study evaluated the impact of one belief construct (shared beliefs in the benefits of a technology) and two widely recognized technology implementation success factors (training and communication) on the perceived usefulness and perceived ease of use during technology implementation. Shared beliefs refer to the beliefs that organizational participants share with their peers and superiors on the benefits of the ERP system. Using data gathered from the implementation of an ERP system, we showed that both training and project communication influence the shared beliefs that users form about the benefits of the technology and that the shared beliefs influence the perceived usefulness and ease of use of the technology. Thus, we provided empirical and theoretical support for the use of managerial interventions, such as training and communication, to influence the acceptance of technology, since perceived usefulness and ease of use contribute to behavioral intention to use the technology. # 2003 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "6afb6140edbfdabb2f2c1a0cbee23665", "text": "The advent of Web 2.0 has led to an increase in the amount of sentimental content available in the Web. Such content is often found in social media web sites in the form of movie or product reviews, user comments, testimonials, messages in discussion forums etc. Timely discovery of the sentimental or opinionated web content has a number of advantages, the most important of all being monetization. Understanding of the sentiments of human masses towards different entities and products enables better services for contextual advertisements, recommendation systems and analysis of market trends. The focus of our project is sentiment focussed web crawling framework to facilitate the quick discovery of sentimental contents of movie reviews and hotel reviews and analysis of the same. We use statistical methods to capture elements of subjective style and the sentence polarity. The paper elaborately discusses two supervised machine learning algorithms: K-Nearest Neighbour(KNN) and Naïve Bayes‘ and compares their overall accuracy, precisions as well as recall values. It was seen that in case of movie reviews Naïve Bayes‘ gave far better results than K-NN but for hotel reviews these algorithms gave lesser, almost same accuracies.", "title": "" }, { "docid": "ced0328f339248158e8414c3315330c5", "text": "Novel inline coplanar-waveguide (CPW) bandpass filters composed of quarter-wavelength stepped-impedance resonators are proposed, using loaded air-bridge enhanced capacitors and broadside-coupled microstrip-to-CPW transition structures for both wideband spurious suppression and size miniaturization. First, by suitably designing the loaded capacitor implemented by enhancing the air bridges printed over the CPW structure and the resonator parameters, the lower order spurious passbands of the proposed filter may effectively be suppressed. Next, by adopting the broadside-coupled microstrip-to-CPW transitions as the fed structures to provide required input and output coupling capacitances and high attenuation level in the upper stopband, the filter with suppressed higher order spurious responses may be achieved. In this study, two second- and fourth-order inline bandpass filters with wide rejection band are implemented and thoughtfully examined. Specifically, the proposed second-order filter has its stopband extended up to 13.3f 0, where f0 stands for the passband center frequency, and the fourth-order filter even possesses better stopband up to 19.04f0 with a satisfactory rejection greater than 30 dB", "title": "" }, { "docid": "aafda1cab832f1fe92ce406676e3760f", "text": "In this paper, we present MADAMIRA, a system for morphological analysis and disambiguation of Arabic that combines some of the best aspects of two previously commonly used systems for Arabic processing, MADA (Habash and Rambow, 2005; Habash et al., 2009; Habash et al., 2013) and AMIRA (Diab et al., 2007). MADAMIRA improves upon the two systems with a more streamlined Java implementation that is more robust, portable, extensible, and is faster than its ancestors by more than an order of magnitude. We also discuss an online demo (see http://nlp.ldeo.columbia.edu/madamira/) that highlights these aspects.", "title": "" }, { "docid": "8b6d3b5fb8af809619119ee0f75cb3c6", "text": "This paper mainly discusses how to use histogram projection and LBDM (Learning Based Digital Matting) to extract a tongue from a medical image, which is one of the most important steps in diagnosis of traditional Chinese Medicine. We firstly present an effective method to locate the tongue body, getting the convinced foreground and background area in form of trimap. Then, use this trimap as the input for LBDM algorithm to implement the final segmentation. Experiment was carried out to evaluate the proposed scheme, using 480 samples of pictures with tongue, the results of which were compared with the corresponding ground truth. Experimental results and analysis demonstrated the feasibility and effectiveness of the proposed algorithm.", "title": "" }, { "docid": "268ccb986855aabafa9de8f95668e7c4", "text": "This paper investigates the performance of South Africa’s commercial banking sector for the period 20052009. Financial ratios are employed to measure the profitability, liquidity and credit quality performance of five large South African based commercial banks. The study found that overall bank performance increased considerably in the first two years of the analysis. A significant change in trend is noticed at the onset of the global financial crisis in 2007, reaching its peak during 2008-2009. This resulted in falling profitability, low liquidity and deteriorating credit quality in the South African Banking sector.", "title": "" }, { "docid": "686045e2dae16aba16c26b8ccd499731", "text": "It has been argued that platform technology owners cocreate business value with other firms in their platform ecosystems by encouraging complementary invention and exploiting indirect network effects. In this study, we examine whether participation in an ecosystem partnership improves the business performance of small independent software vendors (ISVs) in the enterprise software industry and how appropriability mechanisms influence the benefits of partnership. By analyzing the partnering activities and performance indicators of a sample of 1,210 small ISVs over the period 1996–2004, we find that joining a major platform owner’s platform ecosystem is associated with an increase in sales and a greater likelihood of issuing an initial public offering (IPO). In addition, we show that these impacts are greater when ISVs have greater intellectual property rights or stronger downstream capabilities. This research highlights the value of interoperability between software products, and stresses that value cocreation and appropriation are not mutually exclusive strategies in interfirm collaboration.", "title": "" } ]
scidocsrr
94c86a6bf4f940b48664d566a6115783
An operational semantics for Stateflow
[ { "docid": "38ac14820c7116046fd99f8995f3cbe4", "text": "Statecharts is a visual language for specifying reactive system behavior. The formalism extends traditional finite-state machines with notions of hierarchy and concurrency, and it is used in many popular software design notations. A large part of the appeal of Statecharts derives from its basis in state machines, with their intuitive operational interpretation. The classical semantics of Statecharts, however, suffers from a serious defect; it is not compositional, meaning that the behavior of system descriptions cannot be inferred from the behavior of their subsystems. Compositionality is a prerequisite for exploiting the modular structure of Statecharts for simulation, verification, and code generation, and it also provides the necessary foundation for reusability.\nThis paper suggests a new compositional approach to formalizing Statecharts semantics as flattened labeled transition systems in which transitions represent system steps. The approach builds on ideas developed for timed process calculi and employs structural operational rules to define the transitions of a Statecharts expression in terms of the transitions of its subexpressions. It is first presented for a simple dialect of Statecharts, with respect to a variant of Pnueli and Shalev's semantics, and is illustrated by means of a small example. To demonstrate its flexibility, the proposed approach is then extended to deal with practically useful features available in many Statecharts variants, namely state references, history states, and priority concepts along state hierarchies.", "title": "" }, { "docid": "c3160b191c67099072405cdf454f3676", "text": "This paper presetits a method for automatically generating test cases to structural coverage criteria. We show how a niodel checker can be used to autoniutically generate complete test sequetices that will provide a predefined coverage of uti? soffivare developnietit artifact that can be represented as a ffiriitr state niodel. Our goal is to help reduce the high cost of developitig test cases f o r safep-critical sojfivare applications that require a certain level of coveruge for certijicatioti, f o r example, safep-critical avionics sxstenis that need to denlotistrate MC/DC (modijied cotidition arid decision) coverage of the code. We deftie aJmiial franiework suitable for modeling soft\\care artifacts, like, reqitirenients models, software spec$cations, or inipletnetitatiotis. We then show how various structural coverage criteria can be formalized and used to make a triode1 checker provide test sequences to achieve this coverqe. To illustrate our approach, we demonstrate, for the first titiie, how a niodel checker can be used to generate test sequerice.sfor MUDC coverage of a m a l l case example.", "title": "" } ]
[ { "docid": "ffef016fba37b3dc167a1afb7e7766f0", "text": "We show that the Thompson Sampling algorithm achieves logarithmic expected regret for the Bernoulli multi-armed bandit problem. More precisely, for the two-armed bandit problem, the expected regret in time T is O( lnT ∆ + 1 ∆3 ). And, for the N -armed bandit problem, the expected regret in time T is O( [ ( ∑N i=2 1 ∆i ) ] lnT ). Our bounds are optimal but for the dependence on ∆i and the constant factors in big-Oh.", "title": "" }, { "docid": "00bc7c810946fa30bf1fdc66e8fb7fc2", "text": "Voluntary motor commands produce two kinds of consequences. Initially, a sensory consequence is observed in terms of activity in our primary sensory organs (e.g., vision, proprioception). Subsequently, the brain evaluates the sensory feedback and produces a subjective measure of utility or usefulness of the motor commands (e.g., reward). As a result, comparisons between predicted and observed consequences of motor commands produce two forms of prediction error. How do these errors contribute to changes in motor commands? Here, we considered a reach adaptation protocol and found that when high quality sensory feedback was available, adaptation of motor commands was driven almost exclusively by sensory prediction errors. This form of learning had a distinct signature: as motor commands adapted, the subjects altered their predictions regarding sensory consequences of motor commands, and generalized this learning broadly to neighboring motor commands. In contrast, as the quality of the sensory feedback degraded, adaptation of motor commands became more dependent on reward prediction errors. Reward prediction errors produced comparable changes in the motor commands, but produced no change in the predicted sensory consequences of motor commands, and generalized only locally. Because we found that there was a within subject correlation between generalization patterns and sensory remapping, it is plausible that during adaptation an individual's relative reliance on sensory vs. reward prediction errors could be inferred. We suggest that while motor commands change because of sensory and reward prediction errors, only sensory prediction errors produce a change in the neural system that predicts sensory consequences of motor commands.", "title": "" }, { "docid": "3de4922096e2d9bf04ba1ea89b3b3ff1", "text": "Events of various sorts make up an important subset of the entities relevant not only in knowledge representation but also in natural language processing and numerous other fields and tasks. How to represent these in a homogeneous yet expressive, extensive, and extensible way remains a challenge. In this paper, we propose an approach based on FrameBase, a broad RDFS-based schema consisting of frames and roles. The concept of a frame, which is a very general one, can be considered as subsuming existing definitions of events. This ensures a broad coverage and a uniform representation of various kinds of events, thus bearing the potential to serve as a unified event model. We show how FrameBase can represent events from several different sources and domains. These include events from a specific taxonomy related to organized crime, events captured using schema.org, and events from DBpedia.", "title": "" }, { "docid": "c8be82cceec30a4aa72cc23b844546df", "text": "SVM is extensively used in pattern recognition because of its capability to classify future unseen data and its’ good generalization performance. Several algorithms and models have been proposed for pattern recognition that uses SVM for classification. These models proved the efficiency of SVM in pattern recognition. Researchers have compared their results for SVM with other traditional empirical risk minimization techniques, such as Artificial Neural Network, Decision tree, etc. Comparison results show that SVM is superior to these techniques. Also, different variants of SVM are developed for enhancing the performance. In this paper, SVM is briefed and some of the pattern recognition applications of SVM are surveyed and briefly summarized. Keyword Hyperplane, Pattern Recognition, Quadratic Programming Problem, Support Vector Machines.", "title": "" }, { "docid": "3baf11f31351e92c7ff56b066434ae2c", "text": "Unlike images which are represented in regular dense grids, 3D point clouds are irregular and unordered, hence applying convolution on them can be difficult. In this paper, we extend the dynamic filter to a new convolution operation, named PointConv. PointConv can be applied on point clouds to build deep convolutional networks. We treat convolution kernels as nonlinear functions of the local coordinates of 3D points comprised of weight and density functions. With respect to a given point, the weight functions are learned with multi-layer perceptron networks and the density functions through kernel density estimation. A novel reformulation is proposed for efficiently computing the weight functions, which allowed us to dramatically scale up the network and significantly improve its performance. The learned convolution kernel can be used to compute translation-invariant and permutation-invariant convolution on any point set in the 3D space. Besides, PointConv can also be used as deconvolution operators to propagate features from a subsampled point cloud back to its original resolution. Experiments on ModelNet40, ShapeNet, and ScanNet show that deep convolutional neural networks built on PointConv are able to achieve state-ofthe-art on challenging semantic segmentation benchmarks on 3D point clouds. Besides, our experiments converting CIFAR-10 into a point cloud showed that networks built on PointConv can match the performance of convolutional networks in 2D images of a similar structure.", "title": "" }, { "docid": "b91f80bc17de9c4e15ec80504e24b045", "text": "Motivated by the design of the well-known Enigma machine, we present a novel ultra-lightweight encryption scheme, referred to as Hummingbird, and its applications to a privacy-preserving identification and mutual authentication protocol for RFID applications. Hummingbird can provide the designed security with a small block size and is therefore expected to meet the stringent response time and power consumption requirements described in the ISO protocol without any modification of the current standard. We show that Hummingbird is resistant to the most common attacks such as linear and differential cryptanalysis. Furthermore, we investigate some properties for integrating the Hummingbird into a privacypreserving identification and mutual authentication protocol.", "title": "" }, { "docid": "dae9a30b5deb97825ca87c1ca65e8285", "text": "\"Is there a need for fuzzy logic?\" is an issue which is associated with a long history of spirited discussions and debates. There are many misconceptions about fuzzy logic. Fuzzy logic is not fuzzy. Basically, fuzzy logic is a precise logic of imprecision and approximate reasoning. More specifically, fuzzy logic may be viewed as an attempt at formalization/mechanization of two remarkable human capabilities. First, the capability to converse, reason and make rational decisions in an environment of imprecision, uncertainty, incompleteness of information, conflicting information, partiality of truth and partiality of possibility- in short, in an environment of imperfect information. And second, the capability to perform a wide variety of physical and mental tasks without any measurements and any computations (Zadeh 1999, 2001). In fact, one of the principal contributions of fuzzy logic-a contribution which is widely unrecognized-is its high power of precisiation. Fuzzy logic is much more than a logical system. It has many facets. The principal facets are: logical, fuzzy-set-theoretic, epistemic and relational. Most of the practical applications of fuzzy logic are associated with its relational facet. In this paper, fuzzy logic is viewed in a nonstandard perspective. In this perspective, the cornerstones of fuzzy logic-and its principal distinguishing features-are: graduation, granulation, precisiation and the concept of a generalized constraint.", "title": "" }, { "docid": "2cebd9275e30da41a97f6d77207cc793", "text": "Cyber-physical systems, such as mobile robots, must respond adaptively to dynamic operating conditions. Effective operation of these systems requires that sensing and actuation tasks are performed in a timely manner. Additionally, execution of mission specific tasks such as imaging a room must be balanced against the need to perform more general tasks such as obstacle avoidance. This problem has been addressed by maintaining relative utilization of shared resources among tasks near a user-specified target level. Producing optimal scheduling strategies requires complete prior knowledge of task behavior, which is unlikely to be available in practice. Instead, suitable scheduling strategies must be learned online through interaction with the system. We consider the sample complexity of reinforcement learning in this domain, and demonstrate that while the problem state space is countably infinite, we may leverage the problem’s structure to guarantee efficient learning.", "title": "" }, { "docid": "6097315ac2e4475e8afd8919d390babf", "text": "This paper presents an origami-inspired technique which allows the application of 2-D fabrication methods to build 3-D robotic systems. The ability to design robots as origami structures introduces a fast and low-cost fabrication method to modern, real-world robotic applications. We employ laser-machined origami patterns to build a new class of robotic systems for mobility and manipulation. Origami robots use only a flat sheet as the base structure for building complicated bodies. An arbitrarily complex folding pattern can be used to yield an array of functionalities, in the form of actuated hinges or active spring elements. For actuation, we use compact NiTi coil actuators placed on the body to move parts of the structure on-demand. We demonstrate, as a proof-of-concept case study, the end-to-end fabrication and assembly of a simple mobile robot that can undergo worm-like peristaltic locomotion.", "title": "" }, { "docid": "5b1241edf4a9853614a18139323f74eb", "text": "This paper presents a W-band SPDT switch implemented using PIN diodes in a new 90 nm SiGe BiCMOS technology. The SPDT switch achieves a minimum insertion loss of 1.4 dB and an isolation of 22 dB at 95 GHz, with less than 2 dB insertion loss from 77-134 GHz, and greater than 20 dB isolation from 79-129 GHz. The input and output return losses are greater than 10 dB from 73-133 GHz. By reverse biasing the off-state PIN diodes, the P1dB is larger than +24 dBm. To the authors' best knowledge, these results demonstrate the lowest loss and highest power handling capability achieved by a W-band SPDT switch in any silicon-based technology reported to date.", "title": "" }, { "docid": "b2f6c6b4e14824dcd78cdc28547503c8", "text": "This paper describes the design of digital tracking loops for GPS receivers in a high dynamics environment, without external aiding. We adopted the loop structure of a frequency-locked loop (FLL)-assisted phase-locked loop (PLL) and design it to track accelerations steps, as those occurring in launching vehicles. We used a completely digital model of the loop where the FLL and PLL parts are jointly designed, as opposed to the classical discretized analog model with separately designed FLL and PLL. The new approach does not increase the computational burden. We performed simulations and real RF signal experiments of a fixed-point implementation of the loop, showing that reliable tracking of steps up to 40 g can be achieved", "title": "" }, { "docid": "e35994d3f2cb82666115a001dbd002d0", "text": "Filtering relevant documents with respect to entities is an essential task in the context of knowledge base construction and maintenance. It entails processing a time-ordered stream of documents that might be relevant to an entity in order to select only those that contain vital information. State-of-the-art approaches to document filtering for popular entities are entity-dependent: they rely on and are also trained on the specifics of differentiating features for each specific entity. Moreover, these approaches tend to use so-called extrinsic information such as Wikipedia page views and related entities which is typically only available only for popular head entities. Entity-dependent approaches based on such signals are therefore ill-suited as filtering methods for long-tail entities. In this paper we propose a document filtering method for long-tail entities that is entity-independent and thus also generalizes to unseen or rarely seen entities. It is based on intrinsic features, i.e., features that are derived from the documents in which the entities are mentioned. We propose a set of features that capture informativeness, entity-saliency, and timeliness. In particular, we introduce features based on entity aspect similarities, relation patterns, and temporal expressions and combine these with standard features for document filtering. Experiments following the TREC KBA 2014 setup on a publicly available dataset show that our model is able to improve the filtering performance for long-tail entities over several baselines. Results of applying the model to unseen entities are promising, indicating that the model is able to learn the general characteristics of a vital document. The overall performance across all entities---i.e., not just long-tail entities---improves upon the state-of-the-art without depending on any entity-specific training data.", "title": "" }, { "docid": "ed5a9e452b4875434207f16737c29e27", "text": "Social Networking Sites (SNSs) are applications that allow users to create personal profiles to interact with friends or public and to share data such as photos and short videos. The amount of these personal disclosures has raised issues and concerns regarding SNSs' privacy. Users' attitudes toward privacy and their sharing behaviours are inconsistent because they are concerned about privacy, but continue sharing personal information. Also, the existing privacy settings are not flexible enough to prevent privacy risks. In this paper, we propose a novel model called Privacy Settings Model (PSM) that can lead users to understand, control, and update SNSs' privacy settings. We believe that this model will enhance their privacy behaviours toward SNSs' privacy settings and reduce privacy risks.", "title": "" }, { "docid": "4ef861b705c207c95d93687571caea89", "text": "Mounting of the acute inflammatory response is crucial for host defense and pivotal to the development of chronic inflammation, fibrosis, or abscess formation versus the protective response and the need of the host tissues to return to homeostasis. Within self-limited acute inflammatory exudates, novel families of lipid mediators are identified, named resolvins (Rv), protectins, and maresins, which actively stimulate cardinal signs of resolution, namely, cessation of leukocytic infiltration, counterregulation of proinflammatory mediators, and the uptake of apoptotic neutrophils and cellular debris. The biosynthesis of these resolution-phase mediators in sensu stricto is initiated during lipid-mediator class switching, in which the classic initiators of acute inflammation, prostaglandins and leukotrienes (LTs), switch to produce specialized proresolving mediators (SPMs). In this work, we review recent evidence on the structure and functional roles of these novel lipid mediators of resolution. Together, these show that leukocyte trafficking and temporal spatial signals govern the resolution of self-limited inflammation and stimulate homeostasis.", "title": "" }, { "docid": "7d4d0e4d99b5dfe675f5f4eff5e5679f", "text": "Remote work and intensive use of Information Technologies (IT) are increasingly common in organizations. At the same time, professional stress seems to develop. However, IS research has paid little attention to the relationships between these two phenomena. The purpose of this research in progress is to present a framework that introduces the influence of (1) new spatial and temporal constraints and of (2) intensive use of IT on employee emotions at work. Specifically, this paper relies on virtuality (e.g. Chudoba et al. 2005) and media richness (Daft and Lengel 1984) theories to determine the emotional consequences of geographically distributed work.", "title": "" }, { "docid": "6e2239ebdf662f33b81b665b20516eec", "text": "We report on a controlled user study comparing three visualization environments for common 3D exploration. Our environments differ in how they exploit natural human perception and interaction capabilities. We compare an augmented-reality head-mounted display (Microsoft HoloLens), a handheld tablet, and a desktop setup. The novel head-mounted HoloLens display projects stereoscopic images of virtual content into a user's real world and allows for interaction in-situ at the spatial position of the 3D hologram. The tablet is able to interact with 3D content through touch, spatial positioning, and tangible markers, however, 3D content is still presented on a 2D surface. Our hypothesis is that visualization environments that match human perceptual and interaction capabilities better to the task at hand improve understanding of 3D visualizations. To better understand the space of display and interaction modalities in visualization environments, we first propose a classification based on three dimensions: perception, interaction, and the spatial and cognitive proximity of the two. Each technique in our study is located at a different position along these three dimensions. We asked 15 participants to perform four tasks, each task having different levels of difficulty for both spatial perception and degrees of freedom for interaction. Our results show that each of the tested environments is more effective for certain tasks, but that generally the desktop environment is still fastest and most precise in almost all cases.", "title": "" }, { "docid": "b4c25df52a0a5f6ab23743d3ca9a3af2", "text": "Measuring similarity between texts is an important task for several applications. Available approaches to measure document similarity are inadequate for document pairs that have non-comparable lengths, such as a long document and its summary. This is because of the lexical, contextual and the abstraction gaps between a long document of rich details and its concise summary of abstract information. In this paper, we present a document matching approach to bridge this gap, by comparing the texts in a common space of hidden topics. We evaluate the matching algorithm on two matching tasks and find that it consistently and widely outperforms strong baselines. We also highlight the benefits of incorporating domain knowledge to text matching.", "title": "" }, { "docid": "35792db324d1aaf62f19bebec6b1e825", "text": "Keyphrases: Global Vectors for Word Representation (GloVe). Intrinsic and extrinsic evaluations. Effect of hyperparameters on analogy evaluation tasks. Correlation of human judgment with word vector distances. Dealing with ambiguity in word using contexts. Window classification. This set of notes first introduces the GloVe model for training word vectors. Then it extends our discussion of word vectors (interchangeably called word embeddings) by seeing how they can be evaluated intrinsically and extrinsically. As we proceed, we discuss the example of word analogies as an intrinsic evaluation technique and how it can be used to tune word embedding techniques. We then discuss training model weights/parameters and word vectors for extrinsic tasks. Lastly we motivate artificial neural networks as a class of models for natural language processing tasks.", "title": "" }, { "docid": "f981f9a15062f4187dfa7ac71f19d54a", "text": "Background\nSoccer is one of the most widely played sports in the world. However, soccer players have an increased risk of lower limb injury. These injuries may be caused by both modifiable and non-modifiable factors, justifying the adoption of an injury prevention program such as the Fédération Internationale de Football Association (FIFA) 11+. The purpose of this study was to evaluate the efficacy of the FIFA 11+ injury prevention program for soccer players.\n\n\nMethodology\nThis meta-analysis was based on the PRISMA 2015 protocol. A search using the keywords \"FIFA,\" \"injury prevention,\" and \"football\" found 183 articles in the PubMed, MEDLINE, LILACS, SciELO, and ScienceDirect databases. Of these, 6 studies were selected, all of which were randomized clinical trials.\n\n\nResults\nThe sample consisted of 6,344 players, comprising 3,307 (52%) in the intervention group and 3,037 (48%) in the control group. The FIFA 11+ program reduced injuries in soccer players by 30%, with an estimated relative risk of 0.70 (95% confidence interval, 0.52-0.93, p = 0.01). In the intervention group, 779 (24%) players had injuries, while in the control group, 1,219 (40%) players had injuries. However, this pattern was not homogeneous throughout the studies because of clinical and methodological differences in the samples. This study showed no publication bias.\n\n\nConclusion\nThe FIFA 11+ warm-up program reduced the risk of injury in soccer players by 30%.", "title": "" } ]
scidocsrr
ba1654541205060a856c737a6566d740
Generating Digital Twin Models using Knowledge Graphs for Industrial Production Lines
[ { "docid": "18ec689bc3dcbb076beabaff3bdc43de", "text": "Much attention has recently been given to the creation of large knowledge bases that contain millions of facts about people, things, and places in the world. These knowledge bases have proven to be incredibly useful for enriching search results, answering factoid questions, and training semantic parsers and relation extractors. The way the knowledge base is actually used in these systems, however, is somewhat shallow—they are treated most often as simple lookup tables, a place to find a factoid answer given a structured query, or to determine whether a sentence should be a positive or negative training example for a relation extraction model. Very little is done in the way of reasoning with these knowledge bases or using them to improve machine reading. This is because typical probabilistic reasoning systems do not scale well to collections of facts as large as modern knowledge bases, and because it is difficult to incorporate information from a knowledge base into typical natural language processing models. In this thesis we present methods for reasoning over very large knowledge bases, and we show how to apply these methods to models of machine reading. The approaches we present view the knowledge base as a graph and extract characteristics of that graph to construct a feature matrix for use in machine learning models. The graph characteristics that we extract correspond to Horn clauses and other logic statements over knowledge base predicates and entities, and thus our methods have strong ties to prior work on logical inference. We show through experiments in knowledge base completion, relation extraction, and question answering that our methods can successfully incorporate knowledge base information into machine learning models of natural language.", "title": "" } ]
[ { "docid": "4bce532be92d68a39dd07b6f3e799721", "text": "Most so-called “errors” in probabilistic reasoning are in fact not violations of probability theory. Examples of such “errors” include overconfi dence bias, conjunction fallacy, and base-rate neglect. Researchers have relied on a very narrow normative view, and have ignored conceptual distinctions—for example, single case versus relative frequency—fundamental to probability theory. By recognizing and using these distinctions, however, we can make apparently stable “errors” disappear, reappear, or even invert. I suggest what a reformed understanding of judgments under uncertainty might look like.", "title": "" }, { "docid": "d2bf33fcd8d1de5cca697ef97e774feb", "text": "The accuracy of Automated Speech Recognition (ASR) technology has improved, but it is still imperfect in many settings. Researchers who evaluate ASR performance often focus on improving the Word Error Rate (WER) metric, but WER has been found to have little correlation with human-subject performance on many applications. We propose a new captioning-focused evaluation metric that better predicts the impact of ASR recognition errors on the usability of automatically generated captions for people who are Deaf or Hard of Hearing (DHH). Through a user study with 30 DHH users, we compared our new metric with the traditional WER metric on a caption usability evaluation task. In a side-by-side comparison of pairs of ASR text output (with identical WER), the texts preferred by our new metric were preferred by DHH participants. Further, our metric had significantly higher correlation with DHH participants' subjective scores on the usability of a caption, as compared to the correlation between WER metric and participant subjective scores. This new metric could be used to select ASR systems for captioning applications, and it may be a better metric for ASR researchers to consider when optimizing ASR systems.", "title": "" }, { "docid": "742dbd75ad995d5c51c4cbce0cc7f8cc", "text": "Grasping objects under uncertainty remains an open problem in robotics research. This uncertainty is often due to noisy or partial observations of the object pose or shape. To enable a robot to react appropriately to unforeseen effects, it is crucial that it continuously takes sensor feedback into account. While visual feedback is important for inferring a grasp pose and reaching for an object, contact feedback offers valuable information during manipulation and grasp acquisition. In this paper, we use model-free deep reinforcement learning to synthesize control policies that exploit contact sensing to generate robust grasping under uncertainty. We demonstrate our approach on a multi-fingered hand that exhibits more complex finger coordination than the commonly used twofingered grippers. We conduct extensive experiments in order to assess the performance of the learned policies, with and without contact sensing. While it is possible to learn grasping policies without contact sensing, our results suggest that contact feedback allows for a significant improvement of grasping robustness under object pose uncertainty and for objects with a complex shape.", "title": "" }, { "docid": "66b104459bdfc063cf7559c363c5802f", "text": "We present a new local strategy to solve incremental learning tasks. Applied to Support Vector Machines based on local kernel, it allows to avoid re-learning of all the parameters by selecting a working subset where the incremental learning is performed. Automatic selection procedure is based on the estimation of generalization error by using theoretical bounds that involve the margin notion. Experimental simulation on three typical datasets of machine learning give promising results.", "title": "" }, { "docid": "84a9af22a0fa5a755b750ddf914360f9", "text": "Pancreatic cancer has one of the worst survival rates amongst all forms of cancer because its symptoms manifest later into the progression of the disease. One of those symptoms is jaundice, the yellow discoloration of the skin and sclera due to the buildup of bilirubin in the blood. Jaundice is only recognizable to the naked eye in severe stages, but a ubiquitous test using computer vision and machine learning can detect milder forms of jaundice. We propose BiliScreen, a smartphone app that captures pictures of the eye and produces an estimate of a person's bilirubin level, even at levels normally undetectable by the human eye. We test two low-cost accessories that reduce the effects of external lighting: (1) a 3D-printed box that controls the eyes' exposure to light and (2) paper glasses with colored squares for calibration. In a 70-person clinical study, we found that BiliScreen with the box achieves a Pearson correlation coefficient of 0.89 and a mean error of -0.09 ± 2.76 mg/dl in predicting a person's bilirubin level. As a screening tool, BiliScreen identifies cases of concern with a sensitivity of 89.7% and a specificity of 96.8% with the box accessory.", "title": "" }, { "docid": "be1fdb17f240295bd614ce6053acfe8b", "text": "OBJECTIVES\nAesthetic improvement and psychological enhancement have been cited as justifications for orthodontic treatment. This paper reviews the evidence that relates malocclusion to psychological health and quality of life and explores whether this evidence supports the most commonly used aesthetic Orthodontic Treatment Need Indices (OTNI).\n\n\nMATERIALS AND METHODS\nThe relevant cited material from the MEDLINE, Web of Science, Scopus, Cochrane databases, and scientific textbooks were used. The citation rate was confirmed by using the Google Scholar.\n\n\nRESULTS\nThe subjective nature of aesthetic indices and the variable perception of attractiveness between clinicians and patients, and among various cultures or countries are a few limitations of aesthetic OTNI. The available evidence of mainly cross-sectional studies on the link between malocclusion and either psychosocial well-being or quality of life is not conclusive, and sometimes contradictory, to suggest these characteristics are affected by malocclusions. Further, the long-term longitudinal studies did not suggest that people with malocclusion are disadvantaged psychologically, or their quality of life would be worse off, which challenges using aesthetic OTNI to assess the social and psychological implications of malocclusion.\n\n\nCONCLUSION\nThe subjective nature of aesthetic OTNI and the minor contributory role of malocclusion in psychosocial health or quality of life undermine using aesthetic indices to assess the likely social and psychological implications of malocclusion. Consequently, using aesthetic OTNI, as a method to quantify malocclusion remains open to debate. Various soft and hard-tissue analyses are used before formulating a treatment plan (i.e., assessment of sagittal and vertical skeletal relationships). The addition of a shortened version of these analyses to the aesthetic OTNI can be a good substitute for the aesthetic components of OTNI, if an assessment of the aesthetic aspects of malocclusion is intended. This reduces subjectivity and improves the validity of the OTNI that incorporate an aesthetic component.", "title": "" }, { "docid": "8a634e7bf127f2a90227c7502df58af0", "text": "A convex channel surface with Si0.8Ge0.2 is proposed to enhance the retention time of a capacitorless DRAM Generation 2 type of capacitorless DRAM cell. This structure provides a physical well together with an electrostatic barrier to more effectively store holes and thereby achieve larger sensing margin as well as retention time. The advantages of this new cell design as compared with the planar cell design are assessed via twodimensional device simulations. The results indicate that the convex heterojunction channel design is very promising for future capacitorless DRAM. Keywords-Capacitorless DRAM; Retention Time; Convex Channel; Silicon Germanium;", "title": "" }, { "docid": "a94f294b09dfb190433c0f80d08de67f", "text": "The in vitro antibacterial activities of 29 traditional medicinal plants used in respiratory ailments were assessed on multidrug resistant Gram-positive and Gram-negative bacteria isolated from the sore throat patients and two reference strains. The methanolic, n-hexane, and aqueous extracts were screened by the agar well diffusion assay. Bioactive fractions of effective extracts were identified on TLC coupled with bioautography, while their toxicity was determined using haemolytic assay against human erythrocytes. Qualitative and quantitative phytochemical analysis of effective extracts was also performed. Methanolic extract of 18 plants showed antimicrobial activity against test strains. Adhatoda vasica (ZI = 17-21 mm, MIC: 7.12-62.5 μg/mL), Althaea officinalis (ZI = 16-20 mm, MIC: 15.62-31.25 μg/mL), Cordia latifolia (ZI = 16-20 mm, MIC: 12.62-62.5 μg/mL), Origanum vulgare (ZI = 20-22 mm, MIC: 3-15.62 μg/mL), Thymus vulgaris (ZI = 21-25 mm, MIC: 7.81-31.25 μg/mL), and Ziziphus jujuba (ZI = 14-20 mm, MIC: 7.81-31.25 μg/mL) showed significant antibacterial activity. Alkaloid fractions of Adhatoda vasica, Cordia latifolia, and Origanum vulgare and flavonoid fraction of the Althaea officinalis, Origanum vulgare, Thymus Vulgaris, and Ziziphus jujuba exhibited antimicrobial activity. Effective plant extracts show 0.93-0.7% erythrocyte haemolysis. The results obtained from this study provide a scientific rationale for the traditional use of these herbs and laid the basis for future studies to explore novel antimicrobial compounds.", "title": "" }, { "docid": "eae04aa2942bfd3752fb596f645e2c2e", "text": "PURPOSE\nHigh fasting blood glucose (FBG) can lead to chronic diseases such as diabetes mellitus, cardiovascular and kidney diseases. Consuming probiotics or synbiotics may improve FBG. A systematic review and meta-analysis of controlled trials was conducted to clarify the effect of probiotic and synbiotic consumption on FBG levels.\n\n\nMETHODS\nPubMed, Scopus, Cochrane Library, and Cumulative Index to Nursing and Allied Health Literature databases were searched for relevant studies based on eligibility criteria. Randomized or non-randomized controlled trials which investigated the efficacy of probiotics or synbiotics on the FBG of adults were included. Studies were excluded if they were review articles and study protocols, or if the supplement dosage was not clearly mentioned.\n\n\nRESULTS\nA total of fourteen studies (eighteen trials) were included in the analysis. Random-effects meta-analyses were conducted for the mean difference in FBG. Overall reduction in FBG observed from consumption of probiotics and synbiotics was borderline statistically significant (-0.18 mmol/L 95 % CI -0.37, 0.00; p = 0.05). Neither probiotic nor synbiotic subgroup analysis revealed a significant reduction in FBG. The result of subgroup analysis for baseline FBG level ≥7 mmol/L showed a reduction in FBG of 0.68 mmol/L (-1.07, -0.29; ρ < 0.01), while trials with multiple species of probiotics showed a more pronounced reduction of 0.31 mmol/L (-0.58, -0.03; ρ = 0.03) compared to single species trials.\n\n\nCONCLUSION\nThis meta-analysis suggests that probiotic and synbiotic supplementation may be beneficial in lowering FBG in adults with high baseline FBG (≥7 mmol/L) and that multispecies probiotics may have more impact on FBG than single species.", "title": "" }, { "docid": "3fe9e38a41d422367da1fce31579eef2", "text": "While desktop virtual reality (VR) offers a way to visualize structure in large information sets, there have been relatively few empirical investigations of visualization designs in this domain. This thesis reports the development and testing of a series of prototype desktop vR worlds, which were designed to support navigation during information visudization and retrievd. Four rnethods were used for data collection: search task scoring, subjective questionnaires, navigationai activity logging ruid analysis, and administration of tests for spatid and structure-learning ability. The combination of these research methods revealed significant effects of user abilities, information environment designs, and task learning. The first of four studies compared three versions of a stmctured virtuai landscape, finding significant differences in sense of presence, ease of use, and overall enjoyment; there was, however, no significant difference in performance among the three landscape versions. The second study found a hypertext interface to be superior to a VR interface for task performance, ease of use, and rated efficiency; nevertheless, the VR interface was rated as more enjoyable. The third study used a new layout aigorithrn; the resulting prototype was rated as easier to use and more efficient than the previous VR version. In the fourth study, a zoomable, rnap-like view of the newest VR prototype was developed. Experimental participants found the map-view superior to the 3D-view for task performance and rated efficiency. Overall, this research did not find a performance advantage for using 3D versions of VR. In addition, the results of the fourth study found that people in the lowest quartile of spatial ability had significantly lower search performance (relative to the highest three quartiles) in a VR world. This finding suggests that individual differences for traits such as spatial ability may be important in detennining the usability and acceptability of VR environments. In addition to the experimental results summarized above, this thesis dso developed and refined a methodology for investigating tasks, users, and software in 3D environments. This methodology included tests for spatial and structure-learning abilities, as well as logging and analysis of a user's navigational activi-", "title": "" }, { "docid": "a13ff1e2192c9a7e4bcfdf5e1ac39538", "text": "Before graduating from X as Waymo, Google's self-driving car project had been using custom lidars for several years. In their latest revision, the lidars are designed to meet the challenging requirements we discovered in autonomously driving 2 million highly-telemetered miles on public roads. Our goal is to approach price points required for advanced driver assistance systems (ADAS) while meeting the performance needed for safe self-driving. This talk will review some history of the project and describe a few use-cases for lidars on Waymo cars. Out of that will emerge key differences between lidars for self-driving and traditional applications (e.g. mapping) which may provide opportunities for semiconductor lasers.", "title": "" }, { "docid": "a93405a92bb75e459ffb102c1d394d09", "text": "OBJECTIVE\nTo compare the stability of lengthened sacro-iliac screw and sacro-iliac screw for the treatment of bilateral vertical sacral fractures to provide reference for clinical application.\n\n\nMETHODS\nA finite element model of Tile C pelvic ring injury (bilateral type Denis II fracture of sacrum) was produced. (Tile and Denis are surgeons, who put forward the classifications of pelvic ring injury and sacral fracture respectively.) The bilateral sacral fractures were fixed with a lengthened sacro-iliac screw and a sacro-iliac screw in seven types of models, respectively. The translation and angular displacement of the superior surface of the sacrum in the case of standing on both feet were measured and compared.\n\n\nRESULTS\nThe stability of one lengthened sacro-iliac screw fixation in the S1 or S2 segment is superior to that of two bidirectional sacro-iliac screws in the same sacral segment; the stability of one lengthened sacro-iliac screw fixation in S1 and S2 segments, respectively, is superior to that of two bidirectional sacro-iliac screw fixation in S1 and S2 segments, respectively; the stability of one lengthened sacro-iliac screw fixation in S1 and S2 segments, respectively, is superior to that of one lengthened sacro-iliac screw fixation in the S1 or S2 segment; the stability of two bidirectional sacro-iliac screw fixation in S1 and S2 segments, respectively, is markedly superior to that of two bidirectional sacro-iliac screw fixation in the S1 or S2 segment and is also markedly superior to that of one sacro-iliac screw fixation in the S1 segment and one sacro-iliac screw fixation in the S2 segment; the vertical stability of the lengthened sacro-iliac screw or the sacro-iliac screw fixation in S2 is superior to that of S1. The rotational stability of the lengthened sacro-iliac screw or sacro-iliac screw fixation in S1 is superior to that of S2.\n\n\nCONCLUSION\nS1 and S2 lengthened sacro-iliac screws should be used for the fixation in bilateral sacral fractures of Tile C pelvic ring injury as far as possible and the most stable fixation is the combination of the lengthened sacro-iliac screws of S1 and S2 segments. Even if lengthened sacro-iliac screws cannot be used due to limited conditions, two bidirectional sacro-iliac screw fixation in S1 and S2 segments, respectively, is recommended. No matter which kind of sacro-iliac screw is applied, the fixation combination of S1 and S2 segments is strongly recommended to maximise the stability of the pelvic posterior ring.", "title": "" }, { "docid": "ff49d7f47a957b69ad6fc28dd567590e", "text": "Although graphical user interfaces (GUIs) constitute a large part of the software being developed today and are typically created using rapid prototyping, there are no effective regression testing techniques for GUIs. The needs of GUI regression testing differ from those of traditional software. When the structure of a GUI is modified, test cases from the original GUI's suite are either reusable or unusable on the modified GUI. Because GUI test case generation is expensive, our goal is to make the unusable test cases usable, thereby helping to retain the suite's event coverage. The idea of reusing these unusable (obsolete) test cases has not been explored before. This article shows that a large number of test cases become unusable for GUIs. It presents a new GUI regression testing technique that first automatically determines the usable and unusable test cases from a test suite after a GUI modification, then determines the unusable test cases that can be repaired so that they can execute on the modified GUI, and finally uses repairing transformations to repair the test cases. This regression testing technique along with four repairing transformations has been implemented. An empirical study for four open-source applications demonstrates that (1) this approach is effective in that many of the test cases can be repaired, and is practical in terms of its time performance, (2) certain types of test cases are more prone to becoming unusable, and (3) certain types of “dominator” events, when modified, make a large number of test cases unusable.", "title": "" }, { "docid": "554a0628270978757eda989c67ac3416", "text": "An accurate rainfall forecasting is very important for agriculture dependent countries like India. For analyzing the crop productivity, use of water resources and pre-planning of water resources, rainfall prediction is important. Statistical techniques for rainfall forecasting cannot perform well for long-term rainfall forecasting due to the dynamic nature of climate phenomena. Artificial Neural Networks (ANNs) have become very popular, and prediction using ANN is one of the most widely used techniques for rainfall forecasting. This paper provides a detailed survey and comparison of different neural network architectures used by researchers for rainfall forecasting. The paper also discusses the issues while applying different neural networks for yearly/monthly/daily rainfall forecasting. Moreover, the paper also presents different accuracy measures used by researchers for evaluating performance of ANN.", "title": "" }, { "docid": "43cdcbfaca6c69cdb8652761f7e8b140", "text": "Aggregation of local features is a well-studied approach for image as well as 3D model retrieval (3DMR). A carefully designed local 3D geometric feature is able to describe detailed local geometry of 3D model, often with invariance to geometric transformations that include 3D rotation of local 3D regions. For efficient 3DMR, these local features are aggregated into a feature per 3D model. A recent alternative, end-toend 3D Deep Convolutional Neural Network (3D-DCNN) [7][33], has achieved accuracy superior to the abovementioned aggregation-of-local-features approach. However, current 3D-DCNN based methods have weaknesses; they lack invariance against 3D rotation, and they often miss detailed geometrical features due to their quantization of shapes into coarse voxels in applying 3D-DCNN. In this paper, we propose a novel deep neural network for 3DMR called Deep Local feature Aggregation Network (DLAN) that combines extraction of rotation-invariant 3D local features and their aggregation in a single deep architecture. The DLAN describes local 3D regions of a 3D model by using a set of 3D geometric features invariant to local rotation. The DLAN then aggregates the set of features into a (global) rotation-invariant and compact feature per 3D model. Experimental evaluation shows that the DLAN outperforms the existing deep learning-based 3DMR algorithms.", "title": "" }, { "docid": "de1d3377aafd684385a332a03d4b6267", "text": "It has recently been suggested that brain areas crucial for mentalizing, including the medial prefrontal cortex (mPFC), are not activated exclusively during mentalizing about the intentions, beliefs, morals or traits of the self or others, but also more generally during cognitive reasoning including relational processing about objects. Contrary to this notion, a meta-analysis of cognitive reasoning tasks demonstrates that the core mentalizing areas are not systematically recruited during reasoning, but mostly when these tasks describe some human agency or general evaluative and enduring traits about humans, and much less so when these social evaluations are absent. There is a gradient showing less mPFC activation as less mentalizing content is contained in the stimulus material used in reasoning tasks. Hence, it is more likely that cognitive reasoning activates the mPFC because inferences about social agency and mind are involved.", "title": "" }, { "docid": "5de6c98e57b19960e9d2ef4f952cf78d", "text": "We present chaining techniques for signing/verifying multiple packets using a single signing/verification operation. We then present flow signing and verification procedures based upon a tree chaining technique. Since a single signing/verification operation is amortized over many packets, these procedures improve signing and verification rates by one to two orders of magnitude compared to the approach of signing/verifying packets individually. Our procedures do not depend upon reliable delivery of packets, provide delay-bounded signing, and are thus suitable for delay-sensitive flows and multicast applications. To further improve our procedures, we propose several extensions to the Feige-Fiat-Shamir digital signature scheme to speed up both the signing and verification operations, as well as to allow “adjustable and incremental” verification. The extended scheme, called eFFS, is compared to four other digital signature schemes (RSA, DSA, ElGamal, Rabin). We compare their signing and verification times, as well as key and signature sizes. We observe that (i) the signing and verification operations of eFFS are highly efficient compared to the other schemes, (ii) eFFS allows a tradeoff between memory and signing/verification time, and (iii) eFFS allows adjustable and incremental verification by receivers.", "title": "" }, { "docid": "73f6ba4ad9559cd3c6f7a88223e4b556", "text": "A recurring problem faced when training neural networks is that there is typically not enough data to maximize the generalization capability of deep neural networks. There are many techniques to address this, including data augmentation, dropout, and transfer learning. In this paper, we introduce an additional method, which we call smart augmentation and we show how to use it to increase the accuracy and reduce over fitting on a target network. Smart augmentation works, by creating a network that learns how to generate augmented data during the training process of a target network in a way that reduces that networks loss. This allows us to learn augmentations that minimize the error of that network. Smart augmentation has shown the potential to increase accuracy by demonstrably significant measures on all data sets tested. In addition, it has shown potential to achieve similar or improved performance levels with significantly smaller network sizes in a number of tested cases.", "title": "" }, { "docid": "2809e4b07123e5d594481e423c001821", "text": "In the current driving environment, the top priority is the safety of person. There are two methods proposed to solve safety problems. One is active sensors method and another is passive sensor method. Though with high accuracy, active sensors method has many disadvantages such as high cost, failure to adapt to complex change of environments, and problems relating to laws. Thus there is no way to popularize it. In contrast, passive sensor method is more suitable to current assist systems in virtue of low cost, ability to acquire lots of information. In this paper, the passive sensor method is applied to front and rear vision-based collision warning application. Meanwhile, time-to-contact is used to collision judgment analysis and dedicated short range communications is used to give alert information to near vehicle.", "title": "" } ]
scidocsrr
55ff13f2e08f1a4027633feff317b156
Deep Fusion of Multiple Semantic Cues for Complex Event Recognition
[ { "docid": "a25338ae0035e8a90d6523ee5ef667f7", "text": "Activity recognition in video is dominated by low- and mid-level features, and while demonstrably capable, by nature, these features carry little semantic meaning. Inspired by the recent object bank approach to image representation, we present Action Bank, a new high-level representation of video. Action bank is comprised of many individual action detectors sampled broadly in semantic space as well as viewpoint space. Our representation is constructed to be semantically rich and even when paired with simple linear SVM classifiers is capable of highly discriminative performance. We have tested action bank on four major activity recognition benchmarks. In all cases, our performance is better than the state of the art, namely 98.2% on KTH (better by 3.3%), 95.0% on UCF Sports (better by 3.7%), 57.9% on UCF50 (baseline is 47.9%), and 26.9% on HMDB51 (baseline is 23.2%). Furthermore, when we analyze the classifiers, we find strong transfer of semantics from the constituent action detectors to the bank classifier.", "title": "" } ]
[ { "docid": "0acfa73c168328e33a92be4cc9de9c61", "text": "This article reviews recent advances in applying natural language processing NLP to Electronic Health Records EHRs for computational phenotyping. NLP-based computational phenotyping has numerous applications including diagnosis categorization, novel phenotype discovery, clinical trial screening, pharmacogenomics, drug-drug interaction DDI, and adverse drug event ADE detection, as well as genome-wide and phenome-wide association studies. Significant progress has been made in algorithm development and resource construction for computational phenotyping. Among the surveyed methods, well-designed keyword search and rule-based systems often achieve good performance. However, the construction of keyword and rule lists requires significant manual effort, which is difficult to scale. Supervised machine learning models have been favored because they are capable of acquiring both classification patterns and structures from data. Recently, deep learning and unsupervised learning have received growing attention, with the former favored for its performance and the latter for its ability to find novel phenotypes. Integrating heterogeneous data sources have become increasingly important and have shown promise in improving model performance. Often, better performance is achieved by combining multiple modalities of information. Despite these many advances, challenges and opportunities remain for NLP-based computational phenotyping, including better model interpretability and generalizability, and proper characterization of feature relations in clinical narratives.", "title": "" }, { "docid": "5cccc7cc748d3461dc3c0fb42a09245f", "text": "The self and attachment difficulties associated with chronic childhood abuse and other forms of pervasive trauma must be understood and addressed in the context of the therapeutic relationship for healing to extend beyond resolution of traditional psychiatric symptoms and skill deficits. The authors integrate contemporary research and theory about attachment and complex developmental trauma, including dissociation, and apply it to psychotherapy of complex trauma, especially as this research and theory inform the therapeutic relationship. Relevant literature on complex trauma and attachment is integrated with contemporary trauma theory as the background for discussing relational issues that commonly arise in this treatment, highlighting common challenges such as forming a therapeutic alliance, managing frame and boundaries, and working with dissociation and reenactments.", "title": "" }, { "docid": "969e21385b897ec7b0f8fda0566db3bc", "text": "In many real-life recommendation settings, user profiles and past activities are not available. The recommender system should make predictions based on session data, e.g. session clicks and descriptions of clicked items. Conventional recommendation approaches, which rely on past user-item interaction data, cannot deliver accurate results in these situations. In this paper, we describe a method that combines session clicks and content features such as item descriptions and item categories to generate recommendations. To model these data, which are usually of different types and nature, we use 3-dimensional convolutional neural networks with character-level encoding of all input data. While 3D architectures provide a natural way to capture spatio-temporal patterns, character-level networks allow modeling different data types using their raw textual representation, thus reducing feature engineering effort. We applied the proposed method to predict add-to-cart events in e-commerce websites, which is more difficult then predicting next clicks. On two real datasets, our method outperformed several baselines and a state-of-the-art method based on recurrent neural networks.", "title": "" }, { "docid": "4aca364133eb0630c3b97e69922d07b7", "text": "Deep learning offers new tools to improve our understanding of many important scientific problems. Neutrinos are the most abundant particles in existence and are hypothesized to explain the matter-antimatter asymmetry that dominates our universe. Definitive tests of this conjecture require a detailed understanding of neutrino interactions with a variety of nuclei. Many measurements of interest depend on vertex reconstruction — finding the origin of a neutrino interaction using data from the detector, which can be represented as images. Traditionally, this has been accomplished by utilizing methods that identify the tracks coming from the interaction. However, these methods are not ideal for interactions where an abundance of tracks and cascades occlude the vertex region. Manual algorithm engineering to handle these challenges is complicated and error prone. Deep learning extracts rich, semantic features directly from raw data, making it a promising solution to this problem. In this work, deep learning models are presented that classify the vertex location in regions meaningful to the domain scientists improving their ability to explore more complex interactions.", "title": "" }, { "docid": "abff55f0189ac9aff9db78212c88abf0", "text": "The climatic modifications lead to global warming; favouring the risk of the appearance and development of diseases are considered until now tropical diseases. Another important factor is the workers' immigration, the economic crisis favouring the passive transmission of new species of culicidae from different areas. Malaria is the disease with the widest distribution in the globe. Millions of people are infected every year in Africa, India, South-East Asia, Middle East, and Central and South America, with more than 41% of the global population under the risk of infestation with malaria. The increase of the number of local cases reported in 2007-2011 indicates that the conditions can favour the high local transmission in the affected areas. In the situation presented, the establishment of the level of risk concerning the reemergence of malaria in Romania becomes a priority.", "title": "" }, { "docid": "7662a9d5d31ed2307837a04ec7a4e27c", "text": "Automating the navigation of unmanned aerial vehicles (UAVs) in diverse scenarios has gained much attention in recent years. However, teaching UAVs to fly in challenging environments remains an unsolved problem, mainly due to the lack of training data. In this paper, we train a deep neural network to predict UAV controls from raw image data for the task of autonomous UAV racing in a photo-realistic simulation. Training is done through imitation learning with data augmentation to allow for the correction of navigation mistakes. Extensive experiments demonstrate that our trained network (when sufficient data augmentation is used) outperforms state-of-the-art methods and flies more consistently than many human pilots. Additionally, we show that our optimized network architecture can run in real-time on embedded hardware, allowing for efficient onboard processing critical for real-world deployment. From a broader perspective, our results underline the importance of extensive data augmentation techniques to improve robustness in end-to-end learning setups.", "title": "" }, { "docid": "4b09c9f8ddbdfb3fa316ba53d4cdee49", "text": "We present a Markov chain model to estimate the saturation throughput of an IEEE 802.11 network in the basic access mode using cognitive radio. IEEE 802.11 networks are very popular and likely more spectrum is needed for their future deployment and applications. On the other hand the cognitive radio idea has been proposed to deal with the spectrum shortage problem. It is thus reasonable to assume that future IEEE 802.11 network may operate in the context of cognitive radio. One paradigm is that IEEE 802.11 networks will act as secondary users sharing the spectrum of a primary use using the dynamic spectrum access approach. In this scenario it will be important to study how the physical layer of cognitive radio may impact on the IEEE 802.11 network as a whole. Based on a Markov chain model, we investigate the impact of the primary user’s arrivals on the IEEE 802.11 network’s saturation throughput. We validate our presented model with ns2 simulations. As shown by our numerical results, our model results are very close to the ns2 simulation results.", "title": "" }, { "docid": "6104736f53363991d675c2a03ada8c82", "text": "The term machine learning refers to a set of topics dealing with the creation and evaluation of algorithms that facilitate pattern recognition, classification, and prediction, based on models derived from existing data. Two facets of mechanization should be acknowledged when considering machine learning in broad terms. Firstly, it is intended that the classification and prediction tasks can be accomplished by a suitably programmed computing machine. That is, the product of machine learning is a classifier that can be feasibly used on available hardware. Secondly, it is intended that the creation of the classifier should itself be highly mechanized, and should not involve too much human input. This second facet is inevitably vague, but the basic objective is that the use of automatic algorithm construction methods can minimize the possibility that human biases could affect the selection and performance of the algorithm. Both the creation of the algorithm and its operation to classify objects or predict events are to be based on concrete, observable data. The history of relations between biology and the field of machine learning is long and complex. An early technique [1] for machine learning called the perceptron constituted an attempt to model actual neuronal behavior, and the field of artificial neural network (ANN) design emerged from this attempt. Early work on the analysis of translation initiation sequences [2] employed the perceptron to define criteria for start sites in Escherichia coli. Further artificial neural network architectures such as the adaptive resonance theory (ART) [3] and neocognitron [4] were inspired from the organization of the visual nervous system. In the intervening years, the flexibility of machine learning techniques has grown along with mathematical frameworks for measuring their reliability, and it is natural to hope that machine learning methods will improve the efficiency of discovery and understanding in the mounting volume and complexity of biological data. This tutorial is structured in four main components. Firstly, a brief section reviews definitions and mathematical prerequisites. Secondly, the field of supervised learning is described. Thirdly, methods of unsupervised learning are reviewed. Finally, a section reviews methods and examples as implemented in the open source data analysis and visualization language R (http://www.r-project.org).", "title": "" }, { "docid": "847a64b0b5f2b8f3387c260bca8bb9c0", "text": "Pain-related emotions are a major barrier to effective self rehabilitation in chronic pain. Automated coaching systems capable of detecting these emotions are a potential solution. This paper lays the foundation for the development of such systems by making three contributions. First, through literature reviews, an overview of how pain is expressed in chronic pain and the motivation for detecting it in physical rehabilitation is provided. Second, a fully labelled multimodal dataset (named `EmoPain') containing high resolution multiple-view face videos, head mounted and room audio signals, full body 3D motion capture and electromyographic signals from back muscles is supplied. Natural unconstrained pain related facial expressions and body movement behaviours were elicited from people with chronic pain carrying out physical exercises. Both instructed and non-instructed exercises were considered to reflect traditional scenarios of physiotherapist directed therapy and home-based self-directed therapy. Two sets of labels were assigned: level of pain from facial expressions annotated by eight raters and the occurrence of six pain-related body behaviours segmented by four experts. Third, through exploratory experiments grounded in the data, the factors and challenges in the automated recognition of such expressions and behaviour are described, the paper concludes by discussing potential avenues in the context of these findings also highlighting differences for the two exercise scenarios addressed.", "title": "" }, { "docid": "d87730770e080ee926a4859e421d4309", "text": "The term metastasis is widely used to describe the endpoint of the process by which tumour cells spread from the primary location to an anatomically distant site. Achieving successful dissemination is dependent not only on the molecular alterations of the cancer cells themselves, but also on the microenvironment through which they encounter. Here, we reviewed the molecular alterations of metastatic gastric cancer (GC) as it reflects a large proportion of GC patients currently seen in clinic. We hope that further exploration and understanding of the multistep metastatic cascade will yield novel therapeutic targets that will lead to better patient outcomes.", "title": "" }, { "docid": "fda1df969d6d51c5937f016d661911bf", "text": "In this paper the solution of two-stage guillotine cutting stock problems is considered. Especially such problems are under investigation where the sizes of the order demands diier in a large range. We propose a new approach dealing with such situations and compare it with the classical Gilmore/Gomory approach. We report results of extensive numerical experiments which show the advantages of the new approach.", "title": "" }, { "docid": "dcda412c18e92650d9791023f13e4392", "text": "Graph can straightforwardly represent the relations between the objects, which inevitably draws a lot of attention of both academia and industry. Achievements mainly concentrate on homogeneous graph and bipartite graph. However, it is difficult to use existing algorithm in actual scenarios. Because in the real world, the type of the objects and the relations are diverse and the amount of the data can be very huge. Considering of the characteristics of \"black market\", we proposeHGsuspector, a novel and scalable algorithm for detecting collective fraud in directed heterogeneous graphs.We first decompose directed heterogeneous graphs into a set of bipartite graphs, then we define a metric on each connected bipartite graph and calculate scores of it, which fuse the structure information and event probability. The threshold for distinguishing between normal and abnormal can be obtained by statistic or other anomaly detection algorithms in scores space. We also provide a technical solution for fraud detection in e-commerce scenario, which has been successfully applied in Jingdong e-commerce platform to detect collective fraud in real time. The experiments on real-world datasets, which has billion nodes and edges, demonstrate that HGsuspector is more accurate and fast than the most practical and state-of-the-art approach by far.", "title": "" }, { "docid": "45d6863e54b343d7a081e79c84b81e65", "text": "In order to obtain optimal 3D structure and viewing parameter estimates, bundle adjustment is often used as the last step of feature-based structure and motion estimation algorithms. Bundle adjustment involves the formulation of a large scale, yet sparse minimization problem, which is traditionally solved using a sparse variant of the Levenberg-Marquardt optimization algorithm that avoids storing and operating on zero entries. This paper argues that considerable computational benefits can be gained by substituting the sparse Levenberg-Marquardt algorithm in the implementation of bundle adjustment with a sparse variant of Powell's dog leg non-linear least squares technique. Detailed comparative experimental results provide strong evidence supporting this claim", "title": "" }, { "docid": "185ae8a2c89584385a810071c6003c15", "text": "In this paper, we propose a free viewpoint image rendering method combined with filter based alpha matting for improving the image quality of image boundaries. When we synthesize a free viewpoint image, blur around object boundaries in an input image spills foreground/background color in the synthesized image. To generate smooth boundaries, alpha matting is a solution. In our method based on filtering, we make a boundary map from input images and depth maps, and then feather the map by using guided filter. In addition, we extend view synthesis method to deal the alpha channel. Experiment results show that the proposed method synthesizes 0.4 dB higher quality images than the conventional method without the matting. Also the proposed method synthesizes 0.2 dB higher quality images than the conventional method of robust matting. In addition, the computational cost of the proposed method is 100x faster than the conventional matting.", "title": "" }, { "docid": "5e8d73e199782d0fe9608483a7f9eafa", "text": "In the short time since publication of Boykov and Jolly's seminal paper [2001], graph cuts have become well established as a leading method in 2D and 3D semi-automated image segmentation. Although this approach is computationally feasible for many tasks, the memory overhead and supralinear time complexity of leading algorithms results in an excessive computational burden for high-resolution data. In this paper, we introduce a multilevel banded heuristic for computation of graph cuts that is motivated by the well-known narrow band algorithm in level set computation. We perform a number of numerical experiments to show that this heuristic drastically reduces both the running time and the memory consumption of graph cuts while producing nearly the same segmentation result as the conventional graph cuts. Additionally, we are able to characterize the type of segmentation target for which our multilevel banded heuristic yields different results from the conventional graph cuts. The proposed method has been applied to both 2D and 3D images with promising results.", "title": "" }, { "docid": "e1edaf3e8754e8403b9be29f58ba3550", "text": "This paper presents a simulation framework for pathological gait assistance with a hip exoskeleton. Previously we had developed an event-driven controller for gait assistance [1]. We now simulate (or optimize) the gait assistance in ankle pathologies (e.g., weak dorsiflexion or plantarflexion). It is done by 1) utilizing the neuromuscular walking model, 2) parameterizing assistive torques for swing and stance legs, and 3) performing dynamic optimizations that takes into account the human-robot interactive dynamics. We evaluate the energy expenditures and walking parameters for the different gait types. Results show that each gait type should have a different assistance strategy comparing with the assistance of normal gait. Although we need further studies about the pathologies, our simulation model is feasible to design the gait assistance for the ankle muscle weaknesses.", "title": "" }, { "docid": "c17e6363762e0e9683b51c0704d43fa7", "text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.", "title": "" }, { "docid": "60da71841669948e0a57ba4673693791", "text": "AIMS\nStiffening of the large arteries is a common feature of aging and is exacerbated by a number of disorders such as hypertension, diabetes, and renal disease. Arterial stiffening is recognized as an important and independent risk factor for cardiovascular events. This article will provide a comprehensive review of the recent advance on assessment of arterial stiffness as a translational medicine biomarker for cardiovascular risk.\n\n\nDISCUSSIONS\nThe key topics related to the mechanisms of arterial stiffness, the methodologies commonly used to measure arterial stiffness, and the potential therapeutic strategies are discussed. A number of factors are associated with arterial stiffness and may even contribute to it, including endothelial dysfunction, altered vascular smooth muscle cell (SMC) function, vascular inflammation, and genetic determinants, which overlap in a large degree with atherosclerosis. Arterial stiffness is represented by biomarkers that can be measured noninvasively in large populations. The most commonly used methodologies include pulse wave velocity (PWV), relating change in vessel diameter (or area) to distending pressure, arterial pulse waveform analysis, and ambulatory arterial stiffness index (AASI). The advantages and limitations of these key methodologies for monitoring arterial stiffness are reviewed in this article. In addition, the potential utility of arterial stiffness as a translational medicine surrogate biomarker for evaluation of new potentially vascular protective drugs is evaluated.\n\n\nCONCLUSIONS\nAssessment of arterial stiffness is a sensitive and useful biomarker of cardiovascular risk because of its underlying pathophysiological mechanisms. PWV is an emerging biomarker useful for reflecting risk stratification of patients and for assessing pharmacodynamic effects and efficacy in clinical studies.", "title": "" }, { "docid": "6c97853046dd2673d9c83990119ef43c", "text": "Atomic actions (or transactions) are useful for coping with concurrency and failures. One way of ensuring atomicity of actions is to implement applications in terms of atomic data types: abstract data types whose objects ensure serializability and recoverability of actions using them. Many atomic types can be implemented to provide high levels of concurrency by taking advantage of algebraic properties of the type's operations, for example, that certain operations commute. In this paper we analyze the level of concurrency permitted by an atomic type. We introduce several local constraints on individual objects that suffice to ensure global atomicity of actions; we call these constraints local atomicity properties. We present three local atomicity properties, each of which is optimal: no strictly weaker local constraint on objects suffices to ensure global atomicity for actions. Thus, the local atomicity properties define precise limits on the amount of concurrency that can be permitted by an atomic type.", "title": "" }, { "docid": "88ac62e6d0b804bca9f035d39a3cb5f5", "text": "For measuring machines and machine tools, geometrical accuracy is a key performance criterion. While numerical compensation is well established for CMMs, it is increasingly used on machine tools in addition to mechanical accuracy. This paper is an update on the CIRP keynote paper by Sartori and Zhang from 1995 [Sartori S, Zhang GX (1995) Geometric error measurement and compensation of machines, Annals of the CIRP 44(2):599–609]. Since then, numerical error compensation has gained immense importance for precision machining. This paper reviews the fundamentals of numerical error compensation and the available methods for measuring the geometrical errors of a machine. It discusses the uncertainties involved in different mapping methods and their application characteristics. Furthermore, the challenges for the use of numerical compensation for manufacturing machines are specified. Based on technology and market development, this work aims at giving a perspective for the role of numerical compensation in the future. 2008 CIRP.", "title": "" } ]
scidocsrr
fa3d75fe64ef0c260821ff265e6b24d1
Acquiring temporal constraints between relations
[ { "docid": "444ce710b4c6a161ae5f801ed0ae8bec", "text": "This paper investigates a machine learning approach for temporally ordering and anchoring events in natural language texts. To address data sparseness, we used temporal reasoning as an oversampling method to dramatically expand the amount of training data, resulting in predictive accuracy on link labeling as high as 93% using a Maximum Entropy classifier on human annotated data. This method compared favorably against a series of increasingly sophisticated baselines involving expansion of rules derived from human intuitions.", "title": "" } ]
[ { "docid": "1ee1adcfd73e9685eab4e2abd28183c7", "text": "We describe an algorithm for generating spherical mosaics from a collection of images acquired from a common optical center. The algorithm takes as input an arbitrary number of partially overlapping images, an adjacency map relating the images, initial estimates of the rotations relating each image to a specified base image, and approximate internal calibration information for the camera. The algorithm's output is a rotation relating each image to the base image, and revised estimates of the camera's internal parameters. Our algorithm is novel in the following respects. First, it requires no user input. (Our image capture instrumentation provides both an adjacency map for the mosaic, and an initial rotation estimate for each image.) Second, it optimizes an objective function based on a global correlation of overlapping image regions. Third, our representation of rotations significantly increases the accuracy of the optimization. Finally, our representation and use of adjacency information guarantees globally consistent rotation estimates. The algorithm has proved effective on a collection of nearly four thousand images acquired from more than eighty distinct optical centers. The experimental results demonstrate that the described global optimization strategy is superior to non-global aggregation of pair-wise correlation terms, and that it successfully generates high-quality mosaics despite significant error in initial rotation estimates.", "title": "" }, { "docid": "9ee98f4c2e1fe8b5f49fd0e8a3b142c5", "text": "In this paper we characterize the workload of a Netflix streaming video web server. Netflix is a widely popular subscription service with over 81 million global subscribers [24]. The service streams professionally produced TV shows and movies over the Internet to an extremely diverse and representative set of playback devices over broadband, DSL, WiFi and cellular connections. Characterizing this type of workload is an important step to understanding and optimizing the performance of the servers used to support the growing number of streaming video services. We focus on the HTTP requests observed at the server from Netflix client devices by analyzing anonymized log files obtained from a server containing a portion of the Netflix catalog. We introduce the notion of chains of sequential requests to represent the spatial locality of the workload and find that despite servicing clients that adapt to changes in network and server conditions, and despite the fact that the majority of chains are short (60% are no longer than 1 MB), the vast majority of the bytes requested are sequential. We also observe that during a viewing session, client devices behave in recognizable patterns. We characterize sessions using transient, stable and inactive phases. We find that playback sessions are surprisingly stable; across all sessions 5% of the total session time is spent in transient phases, 79% in stable phases and 16% in inactive phases, and the average duration of a stable phase is 8.5 minutes. Finally we analyze the chains to evaluate different prefetch algorithms and show that by exploiting knowledge about workload characteristics, the workload can be serviced with 13% lower hard drive utilization or 30% less system memory compared to a prefetch algorithm that makes no use of workload characteristics.", "title": "" }, { "docid": "9328c119a7622b742749d357f58c7617", "text": "An algorithm is described for recovering the six degrees of freedom of motion of a vehicle from a sequence of range images of a static environment taken by a range camera rigidly attached to the vehicle. The technique utilizes a least-squares minimization of the difference between the measured rate of change of elevation at a point and the rate predicted by the so-called elevation rate constmint equation. It is assumed that most of the surface is smooth enough so that local tangent planes can be constructed, and that the motion between frames is smaller than the size of most features in the range image. This method does not depend on the determination of correspondences between isolated high-level features in the range images. The algorithm has been successfully applied to data obtained from the range imager on the Autonomous Land Vehicle (ALV). Other sensors on the ALV provide an initial approximation to the motion between frames. It was found that the outputs of the vehicle sensors themselves are not suitable for accurate motion recovery because of errors in dead reckoning resulting from such problems as wheel slippage. The sensor measurements are used only to approximately register range data. The algorithm described here then recovers the difference between the true motion and that estimated from the sensor outputs. s 1991", "title": "" }, { "docid": "4bdfc78c5a6b960a012d8d87c9bc182e", "text": "The purpose of our article is to evaluate wood as a construction material in terms of the energy required for its construction and operation, compared to other types of construction materials. First, the role of construction and material manufacturing is evaluated within the full life cycle energy and CO2 emissions of a building, concluding that the issue of embodied energy justifi es the use of less energy intensive materials. Then the article reviews the literature dealing with the energy requirements of wood based construction, in order to establish whether the use of this natural, low density construction material is more energy effi cient than using brick, reinforced concrete and steel structures. According to our analysis, the vast majority of the studies found that the embodied energy is signifi cantly lower in wood based construction when compared to inorganic materials. According to several authors, wood construction could save much energy and signifi cantly reduce the emissions related to the building sector on the national level. Carbon sequestration, and the related mitigation of the global climate change effect, can be signifi cant if the share of durable wooden buildings can be increased in the market, using sustainably produced raw materials that are handled responsibly at the end of their lifetime. Some confl icting studies make important points concerning the heat storage, recycling and on-site labour demands related to these structures. These sources contribute to a deeper understanding of the issue, but do not alter the basic conclusions concerning the benefi ts of wood based construction. Some important aspects of wood extraction, manufacturing and construction that can help minimising the embodied energy of wood based structures are also discussed in the study.", "title": "" }, { "docid": "17ec5256082713e85c819bb0a0dd3453", "text": "Scholarly documents contain multiple figures representing experimental findings. These figures are generated from data which is not reported anywhere else in the paper. We propose a modular architecture for analyzing such figures. Our architecture consists of the following modules: 1. An extractor for figures and associated metadata (figure captions and mentions) from PDF documents; 2. A Search engine on the extracted figures and metadata; 3. An image processing module for automated data extraction from the figures and 4. A natural language processing module to understand the semantics of the figure. We discuss the challenges in each step, report an extractor algorithm to extract vector graphics from scholarly documents and a classification algorithm for figures. Our extractor algorithm improves the state of the art by more than 10% and the classification process is very scalable, yet achieves 85\\% accuracy. We also describe a semi-automatic system for data extraction from figures which is integrated with our search engine to improve user experience.", "title": "" }, { "docid": "995fca88b7813c5cfed1c92522cc8d29", "text": "Diode rectifiers with large dc-bus capacitors, used in the front ends of variable-frequency drives (VFDs) and other ac-to-dc converters, draw discontinuous current from the power system, resulting in current distortion and, hence, voltage distortion. Typically, the power system can handle current distortion without showing signs of voltage distortion. However, when the majority of the load on a distribution feeder is made up of VFDs, current distortion becomes an important issue since it can cause voltage distortion. Multipulse techniques to reduce input current harmonics are popular because they do not interfere with the existing power system either from higher conducted electromagnetic interference, when active techniques are used, or from possible resonance, when capacitor-based filters are employed. In this paper, a new 18-pulse topology is proposed that has two six-pulse rectifiers powered via a phase-shifting isolation transformer, while the third six-pulse rectifier is fed directly from the ac source via a matching inductor. This idea relies on harmonic current cancellation strategy rather than flux cancellation method and results in lower overall harmonics. It is also seen to be smaller in size and weight and lower in cost compared to an isolation transformer. Experimental results are given to validate the concept.", "title": "" }, { "docid": "8ab51537f15c61f5b34a94461b9e0951", "text": "An approach to the problem of estimating the size of inhomogeneous crowds, which are composed of pedestrians that travel in different directions, without using explicit object segmentation or tracking is proposed. Instead, the crowd is segmented into components of homogeneous motion, using the mixture of dynamic-texture motion model. A set of holistic low-level features is extracted from each segmented region, and a function that maps features into estimates of the number of people per segment is learned with Bayesian regression. Two Bayesian regression models are examined. The first is a combination of Gaussian process regression with a compound kernel, which accounts for both the global and local trends of the count mapping but is limited by the real-valued outputs that do not match the discrete counts. We address this limitation with a second model, which is based on a Bayesian treatment of Poisson regression that introduces a prior distribution on the linear weights of the model. Since exact inference is analytically intractable, a closed-form approximation is derived that is computationally efficient and kernelizable, enabling the representation of nonlinear functions. An approximate marginal likelihood is also derived for kernel hyperparameter learning. The two regression-based crowd counting methods are evaluated on a large pedestrian data set, containing very distinct camera views, pedestrian traffic, and outliers, such as bikes or skateboarders. Experimental results show that regression-based counts are accurate regardless of the crowd size, outperforming the count estimates produced by state-of-the-art pedestrian detectors. Results on 2 h of video demonstrate the efficiency and robustness of the regression-based crowd size estimation over long periods of time.", "title": "" }, { "docid": "9db883fc2d35d52aed34806769685385", "text": "In dynamic magnetic resonance imaging (MRI) studies, the motion kinetics or the contrast variability are often hard to predict, hampering an appropriate choice of the image update rate or the temporal resolution. A constant azimuthal profile spacing (111.246deg), based on the Golden Ratio, is investigated as optimal for image reconstruction from an arbitrary number of profiles in radial MRI. The profile order is evaluated and compared with a uniform profile distribution in terms of signal-to-noise ratio (SNR) and artifact level. The favorable characteristics of such a profile order are exemplified in two applications on healthy volunteers. First, an advanced sliding window reconstruction scheme is applied to dynamic cardiac imaging, with a reconstruction window that can be flexibly adjusted according to the extent of cardiac motion that is acceptable. Second, a contrast-enhancing k-space filter is presented that permits reconstructing an arbitrary number of images at arbitrary time points from one raw data set. The filter was utilized to depict the T1-relaxation in the brain after a single inversion prepulse. While a uniform profile distribution with a constant angle increment is optimal for a fixed and predetermined number of profiles, a profile distribution based on the Golden Ratio proved to be an appropriate solution for an arbitrary number of profiles", "title": "" }, { "docid": "ac94c03a72607f76e53ae0143349fff3", "text": "Abrlracr-A h u l a for the cppecity et arbitrary sbgle-wer chrurwla without feedback (mot neccgdueily Wium\" stable, stationary, etc.) is proved. Capacity ie shown to e i p l the supremum, over all input processts, & the input-outpat infiqjknda QBnd as the llnainl ia praabiutJr d the normalized information density. The key to thir zbllljt is a ntw a\"c sppmrh bosed 811 a Ampie II(A Lenar trwrd eu the pralwbility of m-4v hgpothesb t#tcl UIOlls eq*rdIaN <hypotheses. A neassruy and d c i e n t coadition Eor the validity of the strong comeme is given, as well as g\"l expressions for eeapacity.", "title": "" }, { "docid": "9eccf674ee3b3826b010bc142ed24ef0", "text": "We present an architecture of a recurrent neural network (RNN) with a fullyconnected deep neural network (DNN) as its feature extractor. The RNN is equipped with both causal temporal prediction and non-causal look-ahead, via auto-regression (AR) and moving-average (MA), respectively. The focus of this paper is a primal-dual training method that formulates the learning of the RNN as a formal optimization problem with an inequality constraint that provides a sufficient condition for the stability of the network dynamics. Experimental results demonstrate the effectiveness of this new method, which achieves 18.86% phone recognition error on the TIMIT benchmark for the core test set. The result approaches the best result of 17.7%, which was obtained by using RNN with long short-term memory (LSTM). The results also show that the proposed primal-dual training method produces lower recognition errors than the popular RNN methods developed earlier based on the carefully tuned threshold parameter that heuristically prevents the gradient from exploding.", "title": "" }, { "docid": "4cfd4f09a88186cb7e5f200e340d1233", "text": "Keyword spotting (KWS) aims to detect predefined keywords in continuous speech. Recently, direct deep learning approaches have been used for KWS and achieved great success. However, these approaches mostly assume fixed keyword vocabulary and require significant retraining efforts if new keywords are to be detected. For unrestricted vocabulary, HMM based keywordfiller framework is still the mainstream technique. In this paper, a novel deep learning approach is proposed for unrestricted vocabulary KWS based on Connectionist Temporal Classification (CTC) with Long Short-Term Memory (LSTM). Here, an LSTM is trained to discriminant phones with the CTC criterion. During KWS, an arbitrary keyword can be specified and it is represented by one or more phone sequences. Due to the property of peaky phone posteriors of CTC, the LSTM can produce a phone lattice. Then, a fast substring matching algorithm based on minimum edit distance is used to search the keyword phone sequence on the phone lattice. The approach is highly efficient and vocabulary independent. Experiments showed that the proposed approach can achieve significantly better results compared to a DNN-HMM based keyword-filler decoding system. In addition, the proposed approach is also more efficient than the DNN-HMM KWS baseline.", "title": "" }, { "docid": "9074416729e07ba4ec11ebd0021b41ed", "text": "The purpose of this study is to examine the relationships between internet addiction and depression, anxiety, and stress. Participants were 300 university students who were enrolled in mid-size state University, in Turkey. In this study, the Online Cognition Scale and the Depression Anxiety Stress Scale were used. In correlation analysis, internet addiction was found positively related to depression, anxiety, and stress. According to path analysis results, depression, anxiety, and stress were predicted positively by internet addiction. This research shows that internet addiction has a direct impact on depression, anxiety, and stress.", "title": "" }, { "docid": "8405f30ca5f4bd671b056e9ca1f4d8df", "text": "The remarkable manipulative skill of the human hand is not the result of rapid sensorimotor processes, nor of fast or powerful effector mechanisms. Rather, the secret lies in the way manual tasks are organized and controlled by the nervous system. At the heart of this organization is prediction. Successful manipulation requires the ability both to predict the motor commands required to grasp, lift, and move objects and to predict the sensory events that arise as a consequence of these commands.", "title": "" }, { "docid": "2215fd5b4f1e884a66b62675c8c92d33", "text": "In the context of structural optimization we propose a new numerical method based on a combination of the classical shape derivative and of the level-set method for front propagation. We implement this method in two and three space dimensions for a model of linear or nonlinear elasticity. We consider various objective functions with weight and perimeter constraints. The shape derivative is computed by an adjoint method. The cost of our numerical algorithm is moderate since the shape is captured on a fixed Eulerian mesh. Although this method is not specifically designed for topology optimization, it can easily handle topology changes. However, the resulting optimal shape is strongly dependent on the initial guess. 2003 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "9834dd845dcb15c91b590881ce7b2f5e", "text": "Plant reproduction occurs through the production of gametes by a haploid generation, the gametophyte. Flowering plants have highly reduced male and female gametophytes, called pollen grains and embryo sacs, respectively, consisting of only a few cells. Gametophytes are critical for sexual reproduction, but detailed understanding of their development remains poor as compared to the diploid sporophyte. This article reviews recent progress in understanding the mechanisms underlying gametophytic development and function in flowering plants. The focus is on genes and molecules involved in the processes of initiation, growth, cell specification, and fertilization of the male and female gametophytes derived primarily from studies in model systems.", "title": "" }, { "docid": "a931f939e2e0c0f2f8940796ee23e957", "text": "PURPOSE OF REVIEW\nMany patients requiring cardiac arrhythmia device surgery are on chronic oral anticoagulation therapy. The periprocedural management of their anticoagulation presents a dilemma to physicians, particularly in the subset of patients with moderate-to-high risk of arterial thromboembolic events. Physicians have responded by treating patients with bridging anticoagulation while oral anticoagulation is temporarily discontinued. However, there are a number of downsides to bridging anticoagulation around device surgery; there is a substantial risk of significant device pocket hematoma with important clinical sequelae; bridging anticoagulation may lead to more arterial thromboembolic events and bridging anticoagulation is expensive.\n\n\nRECENT FINDINGS\nIn response to these issues, a number of centers have explored the option of performing device surgery without cessation of oral anticoagulation. The observational data suggest a greatly reduced hematoma rate with this strategy. Despite these encouraging results, most physicians are reluctant to move to operating on continued Coumadin in the absence of confirmatory data from a randomized trial.\n\n\nSUMMARY\nWe have designed a prospective, single-blind, randomized, controlled trial to address this clinical question. In the conventional arm, patients will be bridged. In the experimental arm, patients will continue on oral anticoagulation and the primary outcome is clinically significant hematoma. Our study has clinical relevance to at least 70 000 patients per year in North America.", "title": "" }, { "docid": "0f3cb3d8a841e0de31438da1dd99c176", "text": "In this paper we give the details of the numerical solution of a three-dimensional multispecies diffuse interface model of tumor growth, which was derived in (Wise et al., J. Theor. Biol. 253 (2008)) and used to study the development of glioma in (Frieboes et al., NeuroImage 37 (2007) and tumor invasion in (Bearer et al., Cancer Research, 69 (2009)) and (Frieboes et al., J. Theor. Biol. 264 (2010)). The model has a thermodynamic basis, is related to recently developed mixture models, and is capable of providing a detailed description of tumor progression. It utilizes a diffuse interface approach, whereby sharp tumor boundaries are replaced by narrow transition layers that arise due to differential adhesive forces among the cell-species. The model consists of fourth-order nonlinear advection-reaction-diffusion equations (of Cahn-Hilliard-type) for the cell-species coupled with reaction-diffusion equations for the substrate components. Numerical solution of the model is challenging because the equations are coupled, highly nonlinear, and numerically stiff. In this paper we describe a fully adaptive, nonlinear multigrid/finite difference method for efficiently solving the equations. We demonstrate the convergence of the algorithm and we present simulations of tumor growth in 2D and 3D that demonstrate the capabilities of the algorithm in accurately and efficiently simulating the progression of tumors with complex morphologies.", "title": "" }, { "docid": "d621b555171a8545fa00ea7b84d6cacb", "text": "Multiple café-au-lait macules (CALMs) are the hallmark of Von Recklinghausen disease, or neurofibromatosis type 1 (NF1). In 2007 we reported that some individuals with multiple CALMs have a heterozygous mutation in the SPRED1 gene and have NF1-like syndrome, or Legius syndrome. Individuals with Legius syndrome have multiple CALMs with or without freckling, but they do not show the typical NF1-associated tumors such as neurofibromas or optic pathway gliomas. NF1-associated bone abnormalities and Lisch nodules are also not reported in patients with Legius syndrome. Consequently, individuals with Legius syndrome require less intense medical surveillance than those with NF1. The SPRED1 gene was identified in 2001 and codes for a protein that downregulates the RAS-mitogen activated protein kinase (RAS-MAPK) pathway; as does neurofibromin, the protein encoded by the NF1 gene. It is estimated that about 1-4% of individuals with multiple CALMs have a heterozygous SPRED1 mutation. Mutational and clinical data on 209 patients with Legius syndrome are tabulated in an online database (http://www.lovd.nl/SPRED1). Mice with homozygous knockout of the Spred1 gene show learning deficits and decreased synaptic plasticity in hippocampal neurons similar to those seen in Nf1 heterozygous mice, underlining the importance of the RAS-MAPK pathway for learning and memory. Recently, specific binding between neurofibromin and SPRED1 was demonstrated. SPRED1 seems to play an important role in recruiting neurofibromin to the plasma membrane.", "title": "" }, { "docid": "b952967acb2eaa9c780bffe211d11fa0", "text": "Cryptographic message authentication is a growing need for FPGA-based embedded systems. In this paper a customized FPGA implementation of a GHASH function that is used in AES-GCM, a widely-used message authentication protocol, is described. The implementation limits GHASH logic utilization by specializing the hardware implementation on a per-key basis. The implemented module can generate a 128bit message authentication code in both pipelined and unpipelined versions. The pipelined GHASH version achieves an authentication throughput of more than 14 Gbit/s on a Spartan-3 FPGA and 292 Gbit/s on a Virtex-6 device. To promote adoption in the field, the complete source code for this work has been made publically-available.", "title": "" }, { "docid": "2cab3b3bed055eff92703d23b1edc69d", "text": "Due to their nonvolatile nature, excellent scalability, and high density, memristive nanodevices provide a promising solution for low-cost on-chip storage. Integrating memristor-based synaptic crossbars into digital neuromorphic processors (DNPs) may facilitate efficient realization of brain-inspired computing. This article investigates architectural design exploration of DNPs with memristive synapses by proposing two synapse readout schemes. The key design tradeoffs involving different analog-to-digital conversions and memory accessing styles are thoroughly investigated. A novel storage strategy optimized for feedforward neural networks is proposed in this work, which greatly reduces the energy and area cost of the memristor array and its peripherals.", "title": "" } ]
scidocsrr
91397d2975dc5c569dd936f71b13ba8a
Risks and Resilience of Collaborative Networks
[ { "docid": "d12ba2f4c25bb7555475ac9fc6550df8", "text": "Supply networks are composed of large numbers of firms from multiple interrelated industries. Such networks are subject to shifting strategies and objectives within a dynamic environment. In recent years, when faced with a dynamic environment, several disciplines have adopted the Complex Adaptive System (CAS) perspective to gain insights into important issues within their domains of study. Research investigations in the field of supply networks have also begun examining the merits of complexity theory and the CAS perspective. In this article, we bring the applicability of complexity theory and CAS into sharper focus, highlighting its potential for integrating existing supply chain management (SCM) research into a structured body of knowledge while also providing a framework for generating, validating, and refining new theories relevant to real-world supply networks. We suggest several potential research questions to emphasize how a ∗We sincerely thank Professors Thomas Choi (Arizona State University), David Dilts (Vanderbilt University), and Kevin Dooley (Arizona State University) for their help, guidance, and support. †Corresponding author.", "title": "" } ]
[ { "docid": "f9e67768e59ba9c4048be2b78f3d2823", "text": "Ontologies are a widely accepted tool for the modeling of context information. We view the identification of the benefits and challenges of ontologybased models to be an important next step to further improve the usability of ontologies in context-aware applications. We outline a set of criteria with respect to ontology engineering and context modeling and discuss some recent achievements in the area of ontology-based context modeling in order to determine the important next steps necessary to fully exploit ontologies in pervasive computing.", "title": "" }, { "docid": "3a855c3c3329ff63037711e8d17249e3", "text": "In this work, we present an adaptation of the sequence-tosequence model for structured vision tasks. In this model, the output variables for a given input are predicted sequentially using neural networks. The prediction for each output variable depends not only on the input but also on the previously predicted output variables. The model is applied to spatial localization tasks and uses convolutional neural networks (CNNs) for processing input images and a multi-scale deconvolutional architecture for making spatial predictions at each step. We explore the impact of weight sharing with a recurrent connection matrix between consecutive predictions, and compare it to a formulation where these weights are not tied. Untied weights are particularly suited for problems with a fixed sized structure, where different classes of output are predicted at different steps. We show that chain models achieve top performing results on human pose estimation from images and videos.", "title": "" }, { "docid": "f6d3157155868f5fafe2533dfd8768b8", "text": "Over the past few years, the task of conceiving effective attacks to complex networks has arisen as an optimization problem. Attacks are modelled as the process of removing a number k of vertices, from the graph that represents the network, and the goal is to maximise or minimise the value of a predefined metric over the graph. In this work, we present an optimization problem that concerns the selection of nodes to be removed to minimise the maximum betweenness centrality value of the residual graph. This metric evaluates the participation of the nodes in the communications through the shortest paths of the network. To address the problem we propose an artificial bee colony algorithm, which is a swarm intelligence approach inspired in the foraging behaviour of honeybees. In this framework, bees produce new candidate solutions for the problem by exploring the vicinity of previous ones, called food sources. The proposed method exploits useful problem knowledge in this neighbourhood exploration by considering the partial destruction and heuristic reconstruction of selected solutions. The performance of the method, with respect to other models from the literature that can be adapted to face this problem, such as sequential centrality-based attacks, module-based attacks, a genetic algorithm, a simulated annealing approach, and a variable neighbourhood search, is empirically shown. E-mail addresses: lozano@decsai.ugr.es (M. Lozano), cgarcia@uco.es (C. GarćıaMart́ınez), fjrodriguez@unex.es (F.J. Rodŕıguez), humberto@ugr.es (H.M. Trujillo). Preprint submitted to Information Sciences August 17, 2016 *Manuscript (including abstract) Click here to view linked References", "title": "" }, { "docid": "b06844c98f1b46e6d3bd583aacd76015", "text": "The task of network management and monitoring relies on an accurate characterization of network traffic generated by different applications and network protocols. We employ three supervisedmachine learning (ML) algorithms, BayesianNetworks, Decision Trees and Multilayer Perceptrons for the flow-based classification of six different types of Internet traffic including peer-to-peer (P2P) and content delivery (Akamai) traffic. The dependency of the traffic classification performance on the amount and composition of training data is investigated followed by experiments that show that ML algorithms such as Bayesian Networks and Decision Trees are suitable for Internet traffic flow classification at a high speed, and prove to be robust with respect to applications that dynamically change their source ports. Finally, the importance of correctly classified training instances is highlighted by an experiment that is conducted with wrongly labeled training data. © 2010 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "e2d83db54bc0eacfb3b562c38125fc28", "text": "Since Darwin's seminal works, the universality of facial expressions of emotion has remained one of the longest standing debates in the biological and social sciences. Briefly stated, the universality hypothesis claims that all humans communicate six basic internal emotional states (happy, surprise, fear, disgust, anger, and sad) using the same facial movements by virtue of their biological and evolutionary origins [Susskind JM, et al. (2008) Nat Neurosci 11:843-850]. Here, we refute this assumed universality. Using a unique computer graphics platform that combines generative grammars [Chomsky N (1965) MIT Press, Cambridge, MA] with visual perception, we accessed the mind's eye of 30 Western and Eastern culture individuals and reconstructed their mental representations of the six basic facial expressions of emotion. Cross-cultural comparisons of the mental representations challenge universality on two separate counts. First, whereas Westerners represent each of the six basic emotions with a distinct set of facial movements common to the group, Easterners do not. Second, Easterners represent emotional intensity with distinctive dynamic eye activity. By refuting the long-standing universality hypothesis, our data highlight the powerful influence of culture on shaping basic behaviors once considered biologically hardwired. Consequently, our data open a unique nature-nurture debate across broad fields from evolutionary psychology and social neuroscience to social networking via digital avatars.", "title": "" }, { "docid": "eab052e8172c62fec9b532400fe5eeb6", "text": "An overview on state of the art automotive radar usage is presented and the changing requirements from detection and ranging towards radar based environmental understanding for highly automated and autonomous driving deduced. The traditional segmentation in driving, manoeuvering and parking tasks vanishes at the driver less stage. Situation assessment and trajectory/manoeuver planning need to operate in a more thorough way. Hence, fast situational up-date, motion prediction of all kind of dynamic objects, object dimension, ego-motion estimation, (self)-localisation and more semantic/classification information, which allows to put static and dynamic world into correlation/context with each other is mandatory. All these are new areas for radar signal processing and needs revolutionary new solutions. The article outlines the benefits that make radar essential for autonomous driving and presents recent approaches in radar based environmental perception.", "title": "" }, { "docid": "0dc1bf3422e69283a93d0dd87caeb84f", "text": "Organizations are increasingly recognizing that user satisfaction with information systems is one of the most important determinants of the success of those systems. However, current satisfaction measures involve an intrusion into the users' worlds, and are frequently deemed to be too cumbersome to be justi®ed ®nancially and practically. This paper describes a methodology designed to solve this contemporary problem. Based on theory which suggests that behavioral observations can be used to measure satisfaction, system usage statistics from an information system were captured around the clock for 6 months to determine users' satisfaction with the system. A traditional satisfaction evaluation instrument, a validated survey, was applied in parallel, to verify that the analysis of the behavioral data yielded similar results. The ®nal results were analyzed statistically to demonstrate that behavioral analysis is a viable alternative to the survey in satisfaction measurement. # 1999 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "83cc283967bf6bc7f04729a5e08660e2", "text": "Logicians have, by and large, engaged in the convenient fiction that sentences of natural languages (at least declarative sentences) are either true or false or, at worst, lack a truth value, or have a third value often interpreted as 'nonsense'. And most contemporary linguists who have thought seriously about semantics, especially formal semantics, have largely shared this fiction, primarily for lack of a sensible alternative. Yet students o f language, especially psychologists and linguistic philosophers, have long been attuned to the fact that natural language concepts have vague boundaries and fuzzy edges and that, consequently, natural language sentences will very often be neither true, nor false, nor nonsensical, but rather true to a certain extent and false to a certain extent, true in certain respects and false in other respects. It is common for logicians to give truth conditions for predicates in terms of classical set theory. 'John is tall' (or 'TALL(j) ' ) is defined to be true just in case the individual denoted by 'John' (or ' j ') is in the set of tall men. Putting aside the problem that tallness is really a relative concept (tallness for a pygmy and tallness for a basketball player are obviously different) 1, suppose we fix a population relative to which we want to define tallness. In contemporary America, how tall do you have to be to be tall? 5'8\"? 5'9\"? 5'10\"? 5'11\"? 6'? 6'2\"? Obviously there is no single fixed answer. How old do you have to be to be middle-aged? 35? 37? 39? 40? 42? 45? 50? Again the concept is fuzzy. Clearly any attempt to limit truth conditions for natural language sentences to true, false and \"nonsense' will distort the natural language concepts by portraying them as having sharply defined rather than fuzzily defined boundaries. Work dealing with such questions has been done in psychology. To take a recent example, Eleanor Rosch Heider (1971) took up the question of whether people perceive category membership as a clearcut issue or a matter of degree. For example, do people think of members of a given", "title": "" }, { "docid": "46bee248655c79a0364fee437bc43eaf", "text": "Parkinson disease (PD) is a universal public health problem of massive measurement. Machine learning based method is used to classify between healthy people and people with Parkinson’s disease (PD). This paper presents a comprehensive review for the prediction of Parkinson disease buy using machine learning based approaches. The brief introduction of various computational intelligence techniques based approaches used for the prediction of Parkinson diseases are presented .This paper also presents the summary of results obtained by various researchers available in literature to predict the Parkinson diseases. Keywords— Parkinson’s disease, classification, random forest, support vector machine, machine learning, signal processing, artificial neural network.", "title": "" }, { "docid": "140d6d345aa6d486a30e596dde25a8ef", "text": "This research uses the absorptive capacity (ACAP) concept as a theoretical lens to study the effect of e-business upon the competitive performance of SMEs, addressing the following research issue: To what extent are manufacturing SMEs successful in developing their potential and realized ACAP in line with their entrepreneurial orientation? A survey study of 588 manufacturing SMEs found that their e-business capabilities, considered as knowledge acquisition and assimilation capabilities have an indirect effect on their competitive performance that is mediated by their knowledge transformation and exploitation capabilities, and insofar as these capabilities are developed as a result of a more entrepreneurial orientation on their part. Finally, the effect of this orientation on the SMEs' competitive performance appears to be totally mediated by their ACAP.", "title": "" }, { "docid": "0fc0816d62a8d13c3e415b5a1ae7e1d4", "text": "The rapid pace of business process change, partially fueled by information technology, is placing increasingly difficult demands on the organization. In many industries, organizations are required to evaluate and assess new information technologies and their organization-specific strategic potential, in order to remain competitive. The scanning, adoption and diffusion of this information technology must be carefully guided by strong strategic and technological leadership in order to infuse the organization and its members with strategic and technological visions, and to coordinate their diverse and decentralized expertise. This view of technological diffusion requires us to look beyond individuals and individual adoption, toward other levels of analysis and social theoretical viewpoints to promote the appropriate and heedful diffusion of often organization-wide information technologies. Particularly important is an examination of the diffusion champions and how a feasible and shared vision of the business and information technology can be created and communicated across organizational communities in order to unify, motivate and mobilize technology change process. The feasibility of this shared vision depends on its strategic fit and whether the shared vision is properly aligned with organizational objectives in order to filter and shape technological choice and diffusion. Shared vision is viewed as an organizational barometer for assessing the appropriateness of future technologies amidst a sea of overwhelming possibilities. We present a theoretical model to address an extended program of research focusing on important phases during diffusion, shared vision, change management and social alignment. We also make a call for further research into these theoretical linkages and into the development of feasible shared visions.", "title": "" }, { "docid": "b91f54fd70da385625d9df127834d8c7", "text": "This commentary was stimulated by Yeping Li’s first editorial (2014) citing one of the journal’s goals as adding multidisciplinary perspectives to current studies of single disciplines comprising the focus of other journals. In this commentary, I argue for a greater focus on STEM integration, with a more equitable representation of the four disciplines in studies purporting to advance STEM learning. The STEM acronym is often used in reference to just one of the disciplines, commonly science. Although the integration of STEM disciplines is increasingly advocated in the literature, studies that address multiple disciplines appear scant with mixed findings and inadequate directions for STEM advancement. Perspectives on how discipline integration can be achieved are varied, with reference to multidisciplinary, interdisciplinary, and transdisciplinary approaches adding to the debates. Such approaches include core concepts and skills being taught separately in each discipline but housed within a common theme; the introduction of closely linked concepts and skills from two or more disciplines with the aim of deepening understanding and skills; and the adoption of a transdisciplinary approach, where knowledge and skills from two or more disciplines are applied to real-world problems and projects with the aim of shaping the total learning experience. Research that targets STEM integration is an embryonic field with respect to advancing curriculum development and various student outcomes. For example, we still need more studies on how student learning outcomes arise not only from different forms of STEM integration but also from the particular disciplines that are being integrated. As noted in this commentary, it seems that mathematics learning benefits less than the other disciplines in programs claiming to focus on STEM integration. Factors contributing to this finding warrant more scrutiny. Likewise, learning outcomes for engineering within K-12 integrated STEM programs appear under-researched. This commentary advocates a greater focus on these two disciplines within integrated STEM education research. Drawing on recommendations from the literature, suggestions are offered for addressing the challenges of integrating multiple disciplines faced by the STEM community.", "title": "" }, { "docid": "31305b698f82e902a5829abc2f272d5f", "text": "It is now recognized that the Consensus problem is a fundamental problem when one has to design and implement reliable asynchronous distributed systems. This chapter is on the Consensus problem. It studies Consensus in two failure models, namely, the Crash/no Recovery model and the Crash/Recovery model. The assumptions related to the detection of failures that are required to solve Consensus in a given model are particularly emphasized.", "title": "" }, { "docid": "2a9d399edc3c2dcc153d966760f38d80", "text": "Asynchronous parallel implementations of stochastic gradient (SG) have been broadly used in solving deep neural network and received many successes in practice recently. However, existing theories cannot explain their convergence and speedup properties, mainly due to the nonconvexity of most deep learning formulations and the asynchronous parallel mechanism. To fill the gaps in theory and provide theoretical supports, this paper studies two asynchronous parallel implementations of SG: one is over a computer network and the other is on a shared memory system. We establish an ergodic convergence rate O(1/ √ K) for both algorithms and prove that the linear speedup is achievable if the number of workers is bounded by √ K (K is the total number of iterations). Our results generalize and improve existing analysis for convex minimization.", "title": "" }, { "docid": "ed0465dc58b0f9c62e729fed4054bb58", "text": "In this study, an instructional design model was employed for restructuring a teacher education course with technology. The model was applied in a science education method course, which was offered in two different but consecutive semesters with a total enrollment of 111 students in the fall semester and 116 students in the spring semester. Using tools, such as multimedia authoring tools in the fall semester and modeling software in the spring semester, teacher educators designed high quality technology-infused lessons for science and, thereafter, modeled them in classroom for preservice teachers. An assessment instrument was constructed to assess preservice teachers technology competency, which was measured in terms of four aspects, namely, (a) selection of appropriate science topics to be taught with technology, (b) use of appropriate technology-supported representations and transformations for science content, (c) use of technology to support teaching strategies, and (d) integration of computer activities with appropriate inquiry-based pedagogy in the science classroom. The results of a MANOVA showed that preservice teachers in the Modeling group outperformed preservice teachers overall performance in the Multimedia group, F = 21.534, p = 0.000. More specifically, the Modeling group outperformed the Multimedia group on only two of the four aspects of technology competency, namely, use of technology to support teaching strategies and integration of computer activities with appropriate pedagogy in the classroom, F = 59.893, p = 0.000, and F = 10.943, p = 0.001 respectively. The results indicate that the task of preparing preservice teachers to become technology competent is difficult and requires many efforts for providing them with ample of 0360-1315/$ see front matter 2004 Elsevier Ltd. All rights reserved. doi:10.1016/j.compedu.2004.06.002 * Tel.: +357 22 753772; fax: +357 22 377950. E-mail address: cangeli@ucy.ac.cy. 384 C. Angeli / Computers & Education 45 (2005) 383–398 opportunities during their education to develop the competencies needed to be able to teach with technology. 2004 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "2bdc4df73912f4f2be4436e1fdd16d69", "text": "Little attention has been paid so far to physiological signals for emotion recognition compared to audiovisual emotion channels such as facial expression or speech. This paper investigates the potential of physiological signals as reliable channels for emotion recognition. All essential stages of an automatic recognition system are discussed, from the recording of a physiological data set to a feature-based multiclass classification. In order to collect a physiological data set from multiple subjects over many weeks, we used a musical induction method that spontaneously leads subjects to real emotional states, without any deliberate laboratory setting. Four-channel biosensors were used to measure electromyogram, electrocardiogram, skin conductivity, and respiration changes. A wide range of physiological features from various analysis domains, including time/frequency, entropy, geometric analysis, subband spectra, multiscale entropy, etc., is proposed in order to find the best emotion-relevant features and to correlate them with emotional states. The best features extracted are specified in detail and their effectiveness is proven by classification results. Classification of four musical emotions (positive/high arousal, negative/high arousal, negative/low arousal, and positive/low arousal) is performed by using an extended linear discriminant analysis (pLDA). Furthermore, by exploiting a dichotomic property of the 2D emotion model, we develop a novel scheme of emotion-specific multilevel dichotomous classification (EMDC) and compare its performance with direct multiclass classification using the pLDA. An improved recognition accuracy of 95 percent and 70 percent for subject-dependent and subject-independent classification, respectively, is achieved by using the EMDC scheme.", "title": "" }, { "docid": "2b4a2165cebff8326f97cab3063e1a62", "text": "Pneumatic artificial muscles (PAMs) are becoming more commonly used as actuators in modern robotics. The most made and common type of these artificial muscles in use is the McKibben artificial muscle that was developed in 1950’s. This paper presents the geometric model of PAM and different Matlab models for pneumatic artificial muscles. The aim of our models is to relate the pressure and length of the pneumatic artificial muscles to the force it exerts along its entire exists.", "title": "" }, { "docid": "f9806d3542f575d53ef27620e4aa493b", "text": "Many of the current scientific advances in the life sciences have their origin in the intensive use of data for knowledge discovery. In no area this is so clear as in bioinformatics, led by technological breakthroughs in data acquisition technologies. It has been argued that bioinformatics could quickly become the field of research generating the largest data repositories, beating other data-intensive areas such as high-energy physics or astroinformatics. Over the last decade, deep learning has become a disruptive advance in machine learning, giving new live to the long-standing connectionist paradigm in artificial intelligence. Deep learning methods are ideally suited to large-scale data and, therefore, they should be ideally suited to knowledge discovery in bioinformatics and biomedicine at large. In this brief paper, we review key aspects of the application of deep learning in bioinformatics and medicine, drawing from the themes covered by the contributions to an ESANN 2018 special session devoted to this topic.", "title": "" }, { "docid": "68b25c8eefc5e2045065b0cf24652245", "text": "A backscatter-based microwave imaging technique that compensates for frequency-dependent propagation effects is proposed for detecting early-stage breast cancer. An array of antennas is located near the surface of the breast and an ultrawideband pulse is transmitted sequentially from each antenna. The received backscattered signals are passed through a space-time beamformer that is designed to image backscattered signal energy as a function of location. As a consequence of the significant dielectric-properties contrast between normal and malignant tissue, locations corresponding to malignant tumors are associated with large energy levels in the image. The effectiveness of these algorithms is demonstrated using simulated backscattered signals obtained from an anatomically realistic MRI-derived computational electromagnetic breast model. Very small (2 mm) malignant tumors embedded within the complex fibroglandular structure of the breast are easily detected above the background clutter.", "title": "" } ]
scidocsrr
b19ed6fcda296bef2edec7ada23ac57f
A comparison of facial landmark detection methods
[ { "docid": "2729af242339c8cbc51f49047ed9d049", "text": "We address the problem of interactive facial feature localization from a single image. Our goal is to obtain an accurate segmentation of facial features on high-resolution images under a variety of pose, expression, and lighting conditions. Although there has been significant work in facial feature localization, we are addressing a new application area, namely to facilitate intelligent high-quality editing of portraits, that brings requirements not met by existing methods. We propose an improvement to the Active Shape Model that allows for greater independence among the facial components and improves on the appearance fitting step by introducing a Viterbi optimization process that operates along the facial contours. Despite the improvements, we do not expect perfect results in all cases. We therefore introduce an interaction model whereby a user can efficiently guide the algorithm towards a precise solution. We introduce the Helen Facial Feature Dataset consisting of annotated portrait images gathered from Flickr that are more diverse and challenging than currently existing datasets. We present experiments that compare our automatic method to published results, and also a quantitative evaluation of the effectiveness of our interactive method.", "title": "" }, { "docid": "64ccd71f16ec42fe119ee3926aa9d384", "text": "Locating facial feature points in images of faces is an important stage for numerous facial image interpretation tasks. In this paper we present a method for fully automatic detection of 20 facial feature points in images of expressionless faces using Gabor feature based boosted classifiers. The method adopts fast and robust face detection algorithm, which represents an adapted version of the original Viola-Jones face detector. The detected face region is then divided into 20 relevant regions of interest, each of which is examined further to predict the location of the facial feature points. The proposed facial feature point detection method uses individual feature patch templates to detect points in the relevant region of interest. These feature models are GentleBoost templates built from both gray level intensities and Gabor wavelet features. When tested on the Cohn-Kanade database, the method has achieved average recognition rates of 93%.", "title": "" }, { "docid": "027d166f7568b09a2fc80beddd047515", "text": "This paper presents a comprehensive survey of facial feature point detection with the assistance of abundant manually labeled images. Facial feature point detection favors many applications such as face recognition, animation, tracking, hallucination, expression analysis and 3D face modeling. Existing methods can be categorized into the following four groups: constrained local model (CLM)-based, active appearance model (AAM)-based, regression-based, and other methods. CLM-based methods consist of a shape model and a number of local experts, each of which is utilized to detect a facial feature point. AAM-based methods fit a shape model to an image by minimizing texture synthesis errors. Regression-based methods directly learn a mapping function from facial image appearance to facial feature points. Besides the above three major categories of methods, there are also minor categories of methods which we classify into other methods: graphN. Wang VIPS Lab, School of Electronic Engineering, Xidian University, 710071, Xi’an, P. R. China E-mail: nannanwang.xidian@gamil.com X. Gao VIPS Lab, School of Electronic Engineering, Xidian University, 710071, Xi’an, P. R. China E-mail: xbgao@mail.xidian.edu.cn D. Tao Centre for Quantum Computation & Intelligent Systems, Faculty of Engineering & Information Technology, University of Technology, Sydney, 235 Jones Street, Ultimo, NSW 2007, Australia E-mail: Dacheng.Tao@uts.edu.au X. Li School of Computer Science and Information Systems, Birkbeck College, University of London, Malet Street, London, WC1E 7HX, U.K. E-mail: xuelong@dcs.bbk.ac.uk ical model-based methods, joint face alignment methods, independent facial feature point detectors, and deep learning-based methods. Though significant progress has been made, facial feature point detection is limited in its success by wild and real-world conditions: variations across poses, expressions, illuminations, and occlusions. A comparative illustration and analysis of representative methods provide us a holistic understanding and deep insight into facial feature point detection, which also motivates us to explore promising future directions.", "title": "" } ]
[ { "docid": "83187228617d62fb37f99cf107c7602a", "text": "A very important class of spatial queries consists of nearestneighbor (NN) query and its variations. Many studies in the past decade utilize R-trees as their underlying index structures to address NN queries efficiently. The general approach is to use R-tree in two phases. First, R-tree’s hierarchical structure is used to quickly arrive to the neighborhood of the result set. Second, the R-tree nodes intersecting with the local neighborhood (Search Region) of an initial answer are investigated to find all the members of the result set. While R-trees are very efficient for the first phase, they usually result in the unnecessary investigation of many nodes that none or only a small subset of their including points belongs to the actual result set. On the other hand, several recent studies showed that the Voronoi diagrams are extremely efficient in exploring an NN search region, while due to lack of an efficient access method, their arrival to this region is slow. In this paper, we propose a new index structure, termed VoR-Tree that incorporates Voronoi diagrams into R-tree, benefiting from the best of both worlds. The coarse granule rectangle nodes of R-tree enable us to get to the search region in logarithmic time while the fine granule polygons of Voronoi diagram allow us to efficiently tile or cover the region and find the result. Utilizing VoR-Tree, we propose efficient algorithms for various Nearest Neighbor queries, and show that our algorithms have better I/O complexity than their best competitors.", "title": "" }, { "docid": "06e74a431b45aec75fb21066065e1353", "text": "Despite the prevalence of sleep complaints among psychiatric patients, few questionnaires have been specifically designed to measure sleep quality in clinical populations. The Pittsburgh Sleep Quality Index (PSQI) is a self-rated questionnaire which assesses sleep quality and disturbances over a 1-month time interval. Nineteen individual items generate seven \"component\" scores: subjective sleep quality, sleep latency, sleep duration, habitual sleep efficiency, sleep disturbances, use of sleeping medication, and daytime dysfunction. The sum of scores for these seven components yields one global score. Clinical and clinimetric properties of the PSQI were assessed over an 18-month period with \"good\" sleepers (healthy subjects, n = 52) and \"poor\" sleepers (depressed patients, n = 54; sleep-disorder patients, n = 62). Acceptable measures of internal homogeneity, consistency (test-retest reliability), and validity were obtained. A global PSQI score greater than 5 yielded a diagnostic sensitivity of 89.6% and specificity of 86.5% (kappa = 0.75, p less than 0.001) in distinguishing good and poor sleepers. The clinimetric and clinical properties of the PSQI suggest its utility both in psychiatric clinical practice and research activities.", "title": "" }, { "docid": "eb7d93d304424b0d3a5751e5d0d51db4", "text": "Scene understanding is a necessary prerequisite for robots acting autonomously in complex environments. Low-cost RGB-D cameras such as Microsoft Kinect enabled new methods for analyzing indoor scenes and are now ubiquitously used in indoor robotics. We investigate strategies for efficient pixelwise object class labeling of indoor scenes that combine both pretrained semantic features transferred from a large color image dataset and geometric features, computed relative to the room structures, including a novel distance-from-wall feature, which encodes the proximity of scene points to a detected major wall of the room. We evaluate our approach on the popular NYU v2 dataset. Several deep learning models are tested, which are designed to exploit different characteristics of the data. This includes feature learning with two different pooling sizes. Our results indicate that combining semantic and geometric features yields significantly improved results for the task of object class segmentation.", "title": "" }, { "docid": "b01cfb35707a3f4cbff9578df4f460ab", "text": "The predictability of network traffic is a significant interest in many domains such as congestion control, admission control, and network management. An accurate traffic prediction model should have the ability to capture prominent traffic characteristics, such as long-range dependence (LRD) and self-similarity in the large time scale, multifractal in small time scale. In this paper we propose a new network traffic prediction model based on nonlinear time series ARIMA/GARCH. This model combines linear time series ARIMA model with non-linear GARCH model. We provide a parameters estimation procedure for our proposed ARIMA/GARCH model. We then evaluate a scheme for our models’ prediction. We show that our model can capture prominent traffic characteristics, not only in large time scale but also in small time scale. Compare with existing FARIMA model, our model have better prediction accuracy.", "title": "" }, { "docid": "2a3b9c70dc8f80419ba4557752c4e603", "text": "The proliferation of sensors and mobile devices and their connectedness to the network have given rise to numerous types of situation monitoring applications. Data Stream Management Systems (DSMSs) have been proposed to address the data processing needs of such applications that require collection of high-speed data, computing results on-the-fly, and taking actions in real-time. Although a lot of work appears in the area of DSMS, not much has been done in multilevel secure (MLS) DSMS making the technology unsuitable for highly sensitive applications, such as battlefield monitoring. An MLS–DSMS should ensure the absence of illegal information flow in a DSMS and more importantly provide the performance needed to handle continuous queries. We illustrate why the traditional DSMSs cannot be used for processing multilevel secure continuous queries and discuss various DSMS architectures for processing such queries. We implement one such architecture and demonstrate how it processes continuous queries. In order to provide better quality of service and memory usage in a DSMS, we show how continuous queries submitted by various users can be shared. We provide experimental evaluations to demonstrate the performance benefits achieved through query sharing.", "title": "" }, { "docid": "f847a04cb60bbbe5a2cd1ec1c4c9be6f", "text": "This letter presents a wideband patch antenna on a low-temperature cofired ceramic substrate for Local Multipoint Distribution Service band applications. Conventional rectangular patch antennas have a narrow bandwidth. The proposed via-wall structure enhances the electric field coupling between the stacked patches to achieve wideband characteristics. We designed same-side and opposite-side feeding configurations and report on the fabrication of an experimental 28-GHz antenna used to validate the design concept. Measurements correlate well with the simulation results, achieving a 10-dB impedance bandwidth of 25.4% (23.4-30.2 GHz).", "title": "" }, { "docid": "3590e7cf7730ef9b929ecbc629aa7115", "text": "Around 2005 it became apparent in the geometry processing community that freeform architecture contains many problems of a geometric nature to be solved, and many opportunities for optimization which however require geometric understanding. This area of research, which has been called architectural geometry, meanwhile contains a great wealth of individual contributions which are relevant in various fields. For mathematicians, the relation to discrete differential geometry is significant, in particular the integrable system viewpoint. Besides, new application contexts have become available for quite some old-established concepts. Regarding graphics and geometry processing, architectural geometry yields interesting new questions but also new objects, e.g. replacing meshes by other combinatorial arrangements. Numerical optimization plays a major role but in itself would be powerless without geometric understanding. Summing up, architectural geometry has become a rewarding field of study. We here survey the main directions which have been pursued, we show real projects where geometric considerations have played a role, and we outline open problems which we think are significant for the future development of both theory and practice of architectural geometry.", "title": "" }, { "docid": "2089349f4f1dae4d07dfec8481ba748e", "text": "A signiicant limitation of neural networks is that the representations they learn are usually incomprehensible to humans. We present a novel algorithm, Trepan, for extracting comprehensible, symbolic representations from trained neural networks. Our algorithm uses queries to induce a decision tree that approximates the concept represented by a given network. Our experiments demonstrate that Trepan is able to produce decision trees that maintain a high level of delity to their respective networks while being com-prehensible and accurate. Unlike previous work in this area, our algorithm is general in its applicability and scales well to large networks and problems with high-dimensional input spaces.", "title": "" }, { "docid": "03d33ceac54b501c281a954e158d0224", "text": "HoloDesk is an interactive system combining an optical see through display and Kinect camera to create the illusion that users are directly interacting with 3D graphics. A virtual image of a 3D scene is rendered through a half silvered mirror and spatially aligned with the real-world for the viewer. Users easily reach into an interaction volume displaying the virtual image. This allows the user to literally get their hands into the virtual display and to directly interact with an spatially aligned 3D virtual world, without the need for any specialized head-worn hardware or input device. We introduce a new technique for interpreting raw Kinect data to approximate and track rigid (e.g., books, cups) and non-rigid (e.g., hands, paper) physical objects and support a variety of physics-inspired interactions between virtual and real. In particular the algorithm models natural human grasping of virtual objects with more fidelity than previously demonstrated. A qualitative study highlights rich emergent 3D interactions, using hands and real-world objects. The implementation of HoloDesk is described in full, and example application scenarios explored. Finally, HoloDesk is quantitatively evaluated in a 3D target acquisition task, comparing the system with indirect and glasses-based variants.", "title": "" }, { "docid": "2b595cab271cac15ea165e46459d6923", "text": "Autonomous Mobility On Demand (MOD) systems can utilize fleet management strategies in order to provide a high customer quality of service (QoS). Previous works on autonomous MOD systems have developed methods for rebalancing single capacity vehicles, where QoS is maintained through large fleet sizing. This work focuses on MOD systems utilizing a small number of vehicles, such as those found on a campus, where additional vehicles cannot be introduced as demand for rides increases. A predictive positioning method is presented for improving customer QoS by identifying key locations to position the fleet in order to minimize expected customer wait time. Ridesharing is introduced as a means for improving customer QoS as arrival rates increase. However, with ridesharing perceived QoS is dependent on an often unknown customer preference. To address this challenge, a customer ratings model, which learns customer preference from a 5-star rating, is developed and incorporated directly into a ridesharing algorithm. The predictive positioning and ridesharing methods are applied to simulation of a real-world campus MOD system. A combined predictive positioning and ridesharing approach is shown to reduce customer service times by up to 29%. and the customer ratings model is shown to provide the best overall MOD fleet management performance over a range of customer preferences.", "title": "" }, { "docid": "940e7dc630b7dcbe097ade7abb2883a4", "text": "Modern object detection methods typically rely on bounding box proposals as input. While initially popularized in the 2D case, this idea has received increasing attention for 3D bounding boxes. Nevertheless, existing 3D box proposal techniques all assume having access to depth as input, which is unfortunately not always available in practice. In this paper, we therefore introduce an approach to generating 3D box proposals from a single monocular RGB image. To this end, we develop an integrated, fully differentiable framework that inherently predicts a depth map, extracts a 3D volumetric scene representation and generates 3D object proposals. At the core of our approach lies a novel residual, differentiable truncated signed distance function module, which, accounting for the relatively low accuracy of the predicted depth map, extracts a 3D volumetric representation of the scene. Our experiments on the standard NYUv2 dataset demonstrate that our framework lets us generate high-quality 3D box proposals and that it outperforms the two-stage technique consisting of successively performing state-of-the-art depth prediction and depthbased 3D proposal generation.", "title": "" }, { "docid": "73509f2b6393a701b8cd7d0bd223d05d", "text": "Knowledge representation and reasoning aims at designing computer systems that reason about a machine-interpretable representation of the world. Knowledge-based systems have a computational model of some domain of interest in which symbols serve as surrogates for real world domain artefacts, such as physical objects, events, relationships, etc. [1]. The domain of interest can cover any part of the real world or any hypothetical system about which one desires to represent knowledge for computational purposes. A knowledge-based system maintains a knowledge base, which stores the symbols of the computational model in the form of statements about the domain, and it performs reasoning by manipulating these symbols. Applications can base their decisions on answers to domain-relevant questions posed to a knowledge base.", "title": "" }, { "docid": "dd0074bd8b057002efc02e17f69d3ad1", "text": "The purpose of this study is to recognize modeling methods for coal combustion and gasification in commercial process analysis codes. Many users have appreciated the reliability of commercial process analysis simulation codes; however, it is necessary to understand the physical meaning and limitations of the modeling results. Modeling of coal gasification phenomena has been embodied in commercial process analysis simulators such as Aspen. Commercial code deals with modeling of the gasification system with a number of reactor blocks supported by the specific code, not as a coal gasifier. However, the primary purpose of using process analysis simulation code is to interpret the whole plant cycle rather than an individual unit such as a gasifier. Equilibrium models of a coal gasifier are generally adopted in the commercial codes, where the method of Gibbs free energy minimization of chemical species is applied at the given temperature and pressure. The equilibrium model of the coal gasifier, RGibbs, in commercial codes provides users with helpful information, such as exit syngas temperature, composition, flow rate, performance of coal gasifier model, etc. with various input and operating conditions. This simulation code is being used to generate simple and fast response of results. Limitations and uncertainties are interpreted in the view of the gasification process, chemical reaction, char reactivity, and reactor geometry. In addition, case studies are introduced with examples. Finally, a way to improve the coal gasifier model is indicated, and a kinetically modified model considering reaction rate is proposed.", "title": "" }, { "docid": "abb7dceb1bd532c31029b5030c9a12e3", "text": "In this paper, we present a real time method based on some video and image processing algorithms for eye blink detection. The motivation of this research is the need of disabling who cannot control the calls with human mobile interaction directly without the need of hands. A Haar Cascade Classifier is applied for face and eye detection for getting eye and facial axis information. In addition, the same classifier is used based on Haarlike features to find out the relationship between the eyes and the facial axis for positioning the eyes. An efficient eye tracking method is proposed which uses the position of detected face. Finally, an eye blinking detection based on eyelids state (close or open) is used for controlling android mobile phones. The method is used with and without smoothing filter to show the improvement of detection accuracy. The application is used in real time for studying the effect of light and distance between the eyes and the mobile device in order to evaluate the accuracy detection and overall accuracy of the system. Test results show that our proposed method provides a 98% overall accuracy and 100% detection accuracy for a distance of 35 cm and an artificial light. Keywords—eye detection; eye tracking; eye blinking; smoothing filter; detection accuracy", "title": "" }, { "docid": "1dab5734e1e3e8e12eb533c8d2ca98f1", "text": "—The significant growth of online shopping makes the competition in this industry become more intense. Maintaining customer loyalty has been recognized as one of the essential factor for business survival and growth. The purpose of this study is to examine empirically the influence of satisfaction, trust and commitment on customer loyalty in online shopping. This paper describes a theoretical model for investigating the influence of satisfaction, trust and commitment on customer loyalty toward online shopping. Based on the theoretical model, hypotheses were formulated. The primary data were collected from the respondents which consists of 300 students. Multiple regression and qualitative analysis were used to test the study hypotheses. The empirical study results revealed that satisfaction, trust and commitment have significant impact on student loyalty toward online shopping.", "title": "" }, { "docid": "406e06e00799733c517aff88c9c85e0b", "text": "Matrix rank minimization problem is in general NP-hard. The nuclear norm is used to substitute the rank function in many recent studies. Nevertheless, the nuclear norm approximation adds all singular values together and the approximation error may depend heavily on the magnitudes of singular values. This might restrict its capability in dealing with many practical problems. In this paper, an arctangent function is used as a tighter approximation to the rank function. We use it on the challenging subspace clustering problem. For this nonconvex minimization problem, we develop an effective optimization procedure based on a type of augmented Lagrange multipliers (ALM) method. Extensive experiments on face clustering and motion segmentation show that the proposed method is effective for rank approximation.", "title": "" }, { "docid": "e67a7ba82594e024f96fc1deb4ff7498", "text": "The software industry is more than ever facing the challenge of delivering WYGIWYW software (what you get is what you want). A well-structured document specifying adequate, complete, consistent, precise, and measurable requirements is a critical prerequisite for such software. Goals have been recognized to be among the driving forces for requirements elicitation, elaboration, organization, analysis, negotiation, documentation, and evolution. Growing experience with goal-oriented requirements engineering suggests synergistic links between research in this area and good practice. We discuss one journey along this road from influencing ideas and research results to tool developments to good practice in industrial projects. On the way, we discuss some lessons learnt, obstacles to technology transfer, and challenges for better requirements engineering research and practice.", "title": "" }, { "docid": "049c1597f063f9c5fcc098cab8885289", "text": "When one captures images in low-light conditions, the images often suffer from low visibility. This poor quality may significantly degrade the performance of many computer vision and multimedia algorithms that are primarily designed for high-quality inputs. In this paper, we propose a very simple and effective method, named as LIME, to enhance low-light images. More concretely, the illumination of each pixel is first estimated individually by finding the maximum value in R, G and B channels. Further, we refine the initial illumination map by imposing a structure prior on it, as the final illumination map. Having the well-constructed illumination map, the enhancement can be achieved accordingly. Experiments on a number of challenging real-world low-light images are present to reveal the efficacy of our LIME and show its superiority over several state-of-the-arts.", "title": "" }, { "docid": "af3a87d82c1f11a8a111ed4276020161", "text": "In many cases, neurons process information carried by the precise timings of spikes. Here we show how neurons can learn to generate specific temporally precise output spikes in response to input patterns of spikes having precise timings, thus processing and memorizing information that is entirely temporally coded, both as input and as output. We introduce two new supervised learning rules for spiking neurons with temporal coding of information (chronotrons), one that provides high memory capacity (E-learning), and one that has a higher biological plausibility (I-learning). With I-learning, the neuron learns to fire the target spike trains through synaptic changes that are proportional to the synaptic currents at the timings of real and target output spikes. We study these learning rules in computer simulations where we train integrate-and-fire neurons. Both learning rules allow neurons to fire at the desired timings, with sub-millisecond precision. We show how chronotrons can learn to classify their inputs, by firing identical, temporally precise spike trains for different inputs belonging to the same class. When the input is noisy, the classification also leads to noise reduction. We compute lower bounds for the memory capacity of chronotrons and explore the influence of various parameters on chronotrons' performance. The chronotrons can model neurons that encode information in the time of the first spike relative to the onset of salient stimuli or neurons in oscillatory networks that encode information in the phases of spikes relative to the background oscillation. Our results show that firing one spike per cycle optimizes memory capacity in neurons encoding information in the phase of firing relative to a background rhythm.", "title": "" } ]
scidocsrr
447de032a8df95410e2143a2136824cd
Fingertip Tactile Devices for Virtual Object Manipulation and Exploration
[ { "docid": "acbebfc6792bf5df888cf5a30498d4e8", "text": "In most manipulations, we use our fingertips to apply time-varying forces to the target object in controlled directions. Here we used microneurography to assess how single tactile afferents encode the direction of fingertip forces at magnitudes, rates, and directions comparable to those arising in everyday manipulations. Using a flat stimulus surface, we applied forces to a standard site on the fingertip while recording impulse activity in 196 tactile afferents with receptive fields distributed over the entire terminal phalanx. Forces were applied in one of five directions: normal force and forces at a 20 degrees angle from the normal in the radial, distal, ulnar, or proximal directions. Nearly all afferents responded, and the responses in most slowly adapting (SA)-I, SA-II, and fast adapting (FA)-I afferents were broadly tuned to a preferred direction of force. Among afferents of each type, the preferred directions were distributed in all angular directions with reference to the stimulation site, but not uniformly. The SA-I population was biased for tangential force components in the distal direction, the SA-II population was biased in the proximal direction, and the FA-I population was biased in the proximal and radial directions. Anisotropic mechanical properties of the fingertip and the spatial relationship between the receptive field center of the afferent and the stimulus site appeared to influence the preferred direction in a manner dependent on afferent type. We conclude that tactile afferents from the whole terminal phalanx potentially contribute to the encoding of direction of fingertip forces similar to those that occur when subjects manipulate objects under natural conditions.", "title": "" } ]
[ { "docid": "13867cdfb8ae697a1fa22d09e6966f0c", "text": "In this paper we deal with the ground optimization problem, that is the problem of routing and scheduling airplanes surface maneuvering operations. We consider the specific case study of Malpensa Terminal Maneuvering Area (Italy). Our objective function is the minimization of total tardiness. At first a routing problem is solved to assign a path to each aircraft in the terminal, then the scheduling problem of minimizing the average tardiness is addressed. We model the scheduling problem as a job-shop scheduling problem. We develop heuristic procedures based on the alternative graph formulation of the problem to construct and improve feasible solutions. Experimental results based on real data and analysis are reported.", "title": "" }, { "docid": "d8d0b6d8b422b8d1369e99ff8b9dee0e", "text": "The advent of massive open online courses (MOOCs) poses new learning opportunities for learners as well as challenges for researchers and designers. MOOC students approach MOOCs in a range of fashions, based on their learning goals and preferred approaches, which creates new opportunities for learners but makes it difficult for researchers to figure out what a student’s behavior means, and makes it difficult for designers to develop MOOCs appropriate for all of their learners. Towards better understanding the learners who take MOOCs, we conduct a survey of MOOC learners’ motivations and correlate it to which students complete the course according to the pace set by the instructor/platform (which necessitates having the goal of completing the course, as well as succeeding in that goal). The results showed that course completers tend to be more interested in the course content, whereas non-completers tend to be more interested in MOOCs as a type of learning experience. Contrary to initial hypotheses, however, no substantial differences in mastery-goal orientation or general academic efficacy were observed between completers and non-completers. However, students who complete the course tend to have more self-efficacy for their ability to complete the course, from the beginning.", "title": "" }, { "docid": "671573d5f3fc356ee0a5a3e373d6a52f", "text": "This paper presents a fuzzy logic control for a speed control of DC induction motor. The simulation developed by using Fuzzy MATLAB Toolbox and SIMULINK. The fuzzy logic controller is also introduced to the system for keeping the motor speed to be constant when the load varies. Because of the low maintenance and robustness induction motors have many applications in the industries. The speed control of induction motor is more important to achieve maximum torque and efficiency. The result of the 3x3 matrix fuzzy control rules and 5x5 matrix fuzzy control rules of the theta and speed will do comparison in this paper. Observation the effects of the fuzzy control rules on the performance of the DC- induction motor-speed control.", "title": "" }, { "docid": "5d447d516e8f2db2e9d9943972b4b0d1", "text": "Autonomous robot manipulation often involves both estimating the pose of the object to be manipulated and selecting a viable grasp point. Methods using RGB-D data have shown great success in solving these problems. However, there are situations where cost constraints or the working environment may limit the use of RGB-D sensors. When limited to monocular camera data only, both the problem of object pose estimation and of grasp point selection are very challenging. In the past, research has focused on solving these problems separately. In this work, we introduce a novel method called SilhoNet that bridges the gap between these two tasks. We use a Convolutional Neural Network (CNN) pipeline that takes in region of interest (ROI) proposals to simultaneously predict an intermediate silhouette representation for objects with an associated occlusion mask. The 3D pose is then regressed from the predicted silhouettes. Grasp points from a precomputed database are filtered by back-projecting them onto the occlusion mask to find which points are visible in the scene. We show that our method achieves better overall performance than the state-of-the art PoseCNN network for 3D pose estimation on the YCB-video dataset.", "title": "" }, { "docid": "f84287a6fe35ffabc1a99069700a65fd", "text": "INTRODUCTION\nThe purpose of this study was to determine factors and clinical situations that influence an endodontist's decision to use guided tissue regeneration (GTR) techniques during endodontic root-end surgery.\n\n\nMETHODS\nAn invitation to participate in a web-based survey was e-mailed to 3,750 members of the American Association of Endodontists. Data were collected from 1,129 participants, representing a 30.1% completion rate. The number of questions varied from 3 to 11 depending on individual responses.\n\n\nRESULTS\n40.7% of respondents who perform root-end surgeries also use GTR techniques. The clinical situation in which GTR techniques are used most often is for transosseous lesions. Barrier membranes and bone replacement grafts are each used by more than 85% of respondents using GTR techniques. Insufficient training and insufficient evidence in support of its use were selected as the predominant reasons for not using GTR techniques at 42.4% and 32%, respectively.\n\n\nCONCLUSIONS\nAlthough over 40% of respondents are currently using GTR techniques in conjunction with their root-end surgeries, a majority of those who do not use GTR indicated they would consider using these techniques with better evidence and available training.", "title": "" }, { "docid": "fe58a13e09afd8e50911c9d77df58203", "text": "Sentiment analysis or opinion mining is one of the major topics in Natural Language Processing and Text Mining. This paper will provide a complete process of sentiment analysis from data gathering and data preparation to final classification on a user-generated sentimental dataset with Naive Bayes and Decision Tree classifiers. The dataset used for analysis is the product reviews from Steam, a digital distribution platform. The performance of different feature selection models and classifiers will be compared. The trained classifier can be used to make prediction for unlabeled reviews and help companies to increase potential profits in global digital product market.", "title": "" }, { "docid": "8a9cf6b4d7d6d2be1d407ef41ceb23e5", "text": "A highly discriminative and computationally efficient descriptor is needed in many computer vision applications involving human action recognition. This paper proposes a hand-crafted skeleton-based descriptor for human action recognition. It is constructed from five fixed size covariance matrices calculated using strongly related joints coordinates over five body parts (spine, left/ right arms, and left/ right legs). Since covariance matrices are symmetric, the lower/ upper triangular parts of these matrices are concatenated to generate an efficient descriptor. It achieves a saving from 78.26 % to 80.35 % in storage space and from 75 % to 90 % in processing time (depending on the dataset) relative to techniques adopting a covariance descriptor based on all the skeleton joints. To show the effectiveness of the proposed method, its performance is evaluated on five public datasets: MSR-Action3D, MSRC-12 Kinect Gesture, UTKinect-Action, Florence3D-Action, and NTU RGB+D. The obtained recognition rates on all datasets outperform many existing methods and compete with the current state of the art techniques.", "title": "" }, { "docid": "0f25cfa80ee503aa5012772ac54fb7a3", "text": "Parameter reduction has been an important topic in deep learning due to the everincreasing size of deep neural network models and the need to train and run them on resource limited machines. Despite many efforts in this area, there were no rigorous theoretical guarantees on why existing neural net compression methods should work. In this paper, we provide provable guarantees on some hashing-based parameter reduction methods in neural nets. First, we introduce a neural net compression scheme based on random linear sketching (which is usually implemented efficiently via hashing), and show that the sketched (smaller) network is able to approximate the original network on all input data coming from any smooth and wellconditioned low-dimensional manifold. The sketched network can also be trained directly via back-propagation. Next, we study the previously proposed HashedNets architecture and show that the optimization landscape of one-hidden-layer HashedNets has a local strong convexity property similar to a normal fully connected neural network. We complement our theoretical results with empirical verifications.", "title": "" }, { "docid": "068fb08facd6172de2586d19fe3f68f4", "text": "The problem of automatically classifying the gender of a blog author has important applications in many commercial domains. Existing systems mainly use features such as words, word classes, and POS (part-ofspeech) n-grams, for classification learning. In this paper, we propose two new techniques to improve the current result. The first technique introduces a new class of features which are variable length POS sequence patterns mined from the training data using a sequence pattern mining algorithm. The second technique is a new feature selection method which is based on an ensemble of several feature selection criteria and approaches. Empirical evaluation using a real-life blog data set shows that these two techniques improve the classification accuracy of the current state-ofthe-art methods significantly.", "title": "" }, { "docid": "426d3b0b74eacf4da771292abad06739", "text": "Brain tumor is considered as one of the deadliest and most common form of cancer both in children and in adults. Consequently, determining the correct type of brain tumor in early stages is of significant importance to devise a precise treatment plan and predict patient's response to the adopted treatment. In this regard, there has been a recent surge of interest in designing Convolutional Neural Networks (CNNs) for the problem of brain tumor type classification. However, CNNs typically require large amount of training data and can not properly handle input transformations. Capsule networks (referred to as CapsNets) are brand new machine learning architectures proposed very recently to overcome these shortcomings of CNNs, and posed to revolutionize deep learning solutions. Of particular interest to this work is that Capsule networks are robust to rotation and affine transformation, and require far less training data, which is the case for processing medical image datasets including brain Magnetic Resonance Imaging (MRI) images. In this paper, we focus to achieve the following four objectives: (i) Adopt and incorporate CapsNets for the problem of brain tumor classification to design an improved architecture which maximizes the accuracy of the classification problem at hand; (ii) Investigate the over-fitting problem of CapsNets based on a real set of MRI images; (iii) Explore whether or not CapsNets are capable of providing better fit for the whole brain images or just the segmented tumor, and; (iv) Develop a visualization paradigm for the output of the CapsNet to better explain the learned features. Our results show that the proposed approach can successfully overcome CNNs for the brain tumor classification problem.", "title": "" }, { "docid": "066ceafff23aef8c0c6101dcd367f018", "text": "We introduce a new scene graph generation method called image-level attentional context modeling (ILAC). Our model includes an attentional graph network that effectively propagates contextual information across the graph using image-level features. Whereas previous works use an object-centric context, we build an imagelevel context agent to encode the scene properties. The proposed method comprises a single-stream network that iteratively refines the scene graph with a nested graph neural network. We demonstrate that our approach achieves competitive performance with the state-of-the-art for scene graph generation on the Visual Genome dataset, while requiring fewer parameters than other methods. We also show that ILAC can improve regular object detectors by incorporating relational image-level information.", "title": "" }, { "docid": "7d5556e2bfd8ca3dbc5817e9575148fc", "text": "We present in this paper a calibration program that controls a calibration board integrated in a Smart Electrical Energy Meter (SEEM). The “SEEM” allows to measure the energy from a single phase line and transmits the value of this energy to a central through a wireless network. The “SEEM” needs to be calibrated in only one point of load to correct the gain and compensate the phase added by the system of measure. Since the calibration is performed for one point of load, this reduces the material used, therefore reduces the cost. Furthermore, the calibration of gain and phase is performed simultaneously which decrease the time of this operation.", "title": "" }, { "docid": "1c7d734c528cd3db6d1d21ffef9061a5", "text": "Implementing an Enterprise Resource Planning (ERP) system is expensive and time consuming. A substantial cost is associated with pre-implementation involvement and training designed to encourage acceptance and effective implementation of the system. The results of this study indicate that, contrary to conventional wisdom, extensive organizational investments in shaping pre-implementation attitudes do not always achieve the desired effects. Despite extensive time, money and effort, length of time with the firm and position had a greater impact on attitudes toward ERP capabilities, value, acceptance and timing than high levels of pre-implementation involvement. 2002 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "59021dcb134a2b25122b3be73243bea6", "text": "The path taken by a packet traveling across the Internet depends on a large number of factors, including routing protocols and per-network routing policies. The impact of these factors on the end-to-end performance experienced by users is poorly understood. In this paper, we conduct a measurement-based study comparing the performance seen using the \"default\" path taken in the Internet with the potential performance available using some alternate path. Our study uses five distinct datasets containing measurements of \"path quality\", such as round-trip time, loss rate, and bandwidth, taken between pairs of geographically diverse Internet hosts. We construct the set of potential alternate paths by composing these measurements to form new synthetic paths. We find that in 30-80% of the cases, there is an alternate path with significantly superior quality. We argue that the overall result is robust and we explore two hypotheses for explaining it.", "title": "" }, { "docid": "e056192e11fb6430ec1d3e64c2336df3", "text": "Teleological explanations (TEs) account for the existence or properties of an entity in terms of a function: we have hearts because they pump blood, and telephones for communication. While many teleological explanations seem appropriate, others are clearly not warranted--for example, that rain exists for plants to grow. Five experiments explore the theoretical commitments that underlie teleological explanations. With the analysis of [Wright, L. (1976). Teleological Explanations. Berkeley, CA: University of California Press] from philosophy as a point of departure, we examine in Experiment 1 whether teleological explanations are interpreted causally, and confirm that TEs are only accepted when the function invoked in the explanation played a causal role in bringing about what is being explained. However, we also find that playing a causal role is not sufficient for all participants to accept TEs. Experiment 2 shows that this is not because participants fail to appreciate the causal structure of the scenarios used as stimuli. In Experiments 3-5 we show that the additional requirement for TE acceptance is that the process by which the function played a causal role must be general in the sense of conforming to a predictable pattern. These findings motivate a proposal, Explanation for Export, which suggests that a psychological function of explanation is to highlight information likely to subserve future prediction and intervention. We relate our proposal to normative accounts of explanation from philosophy of science, as well as to claims from psychology and artificial intelligence.", "title": "" }, { "docid": "2a46fe3d205b0092ecc8cfb33d178332", "text": "ion, 277, 283, 303, 305 Achourioti, Theodora, 9 adaptation, 39, 140, 142, 145–147, 153, 164, 167, 170, 171, 177, 282, 296, 365, 366 adaptationism, 141, 145, 146, 296 affect, 241, 243, 276, 277 affirmation of the consequent, 181, 183, 189, 192, 196, 200, 201, 210–212, 231, 232, 266, 269, 271 agent, 4, 40, 185, 192, 250, 251 algorithm, 24, 46, 120, 177, 217, 222, 231, 283, 304, 308, 321, 322, 325, 332, 333, 337, 348, 350, 351, 354, 365 Darwinian, 120, 139, 148, 153 fast and frugal, 7, 361, 365 altriciality, 152, 164, 169, 280, 288, 290, 296, 365 altruism, 146, 153, 156, 157 analogy, 9, 244, 267, 277, 301 anaphora, 53, 75, 82, 91, 98, 111, 115, 329 Aristotle, 9, 11, 81, 306, 320, 321, 323 Aspberger, see developmental syndrome, Asperger’s astrocyte, 151, 285 attention deficit hyperactivity disorder (ADHD), see developmental syndrome authority, 22, 45, 60, 75, 85, 111, 128, 132, 167 autism, see developmental syndrome, autism backpropagation, 219, 231 Bayes, 6, 66, 95, 102, 105, 114, 213, 215, 216 Biston betularia, 158 bottom–up, 126, 244, 277, 284, 317, 341 cell death, 285 cerebellum, 168, 284, 285, 296 cerebral lateralisation, 119, 134, 339 cheater detection, 15, 120, 139, 152, 153, 177 chimpanzee, 151, 161, 165, 167, 170, 241, 242, 248, 294, 296 circumscription, 189, 193 COBUILD, 83 communication adversarial, 85, 97, 107, 115, 128, 130, 310, 328", "title": "" }, { "docid": "d7c68bf5df52d9a27d9aa22d21103621", "text": "Abiotic stresses such as drought, cold, salt and heat cause reduction of plant growth and loss of crop yield worldwide. Reactive oxygen species (ROS) including hydrogen peroxide (H2O2), superoxide anions (O2 (•-)), hydroxyl radical (OH•) and singlet oxygen ((1)O2) are by-products of physiological metabolisms, and are precisely controlled by enzymatic and non-enzymatic antioxidant defense systems. ROS are significantly accumulated under abiotic stress conditions, which cause oxidative damage and eventually resulting in cell death. Recently, ROS have been also recognized as key players in the complex signaling network of plants stress responses. The involvement of ROS in signal transduction implies that there must be coordinated function of regulation networks to maintain ROS at non-toxic levels in a delicate balancing act between ROS production, involving ROS generating enzymes and the unavoidable production of ROS during basic cellular metabolism, and ROS-scavenging pathways. Increasing evidence showed that ROS play crucial roles in abiotic stress responses of crop plants for the activation of stress-response and defense pathways. More importantly, manipulating ROS levels provides an opportunity to enhance stress tolerances of crop plants under a variety of unfavorable environmental conditions. This review presents an overview of current knowledge about homeostasis regulation of ROS in crop plants. In particular, we summarize the essential proteins that are involved in abiotic stress tolerance of crop plants through ROS regulation. Finally, the challenges toward the improvement of abiotic stress tolerance through ROS regulation in crops are discussed.", "title": "" }, { "docid": "64c44342abbce474e21df67c0a5cc646", "text": "In this paper it is shown that the principal eigenvector is a necessary representation of the priorities derived from a positive reciprocal pairwise comparison judgment matrix A 1⁄4 ðaijÞ when A is a small perturbation of a consistent matrix. When providing numerical judgments, an individual attempts to estimate sequentially an underlying ratio scale and its equivalent consistent matrix of ratios. Near consistent matrices are essential because when dealing with intangibles, human judgment is of necessity inconsistent, and if with new information one is able to improve inconsistency to near consistency, then that could improve the validity of the priorities of a decision. In addition, judgment is much more sensitive and responsive to large rather than to small perturbations, and hence once near consistency is attained, it becomes uncertain which coefficients should be perturbed by small amounts to transform a near consistent matrix to a consistent one. If such perturbations were forced, they could be arbitrary and thus distort the validity of the derived priority vector in representing the underlying decision. 2002 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "9a9d4d1d482333734d9b0efe87d1e53e", "text": "Following acute therapeutic interventions, the majority of stroke survivors are left with a poorly functioning hemiparetic hand. Rehabilitation robotics has shown promise in providing patients with intensive therapy leading to functional gains. Because of the hand's crucial role in performing activities of daily living, attention to hand therapy has recently increased. This paper introduces a newly developed Hand Exoskeleton Rehabilitation Robot (HEXORR). This device has been designed to provide full range of motion (ROM) for all of the hand's digits. The thumb actuator allows for variable thumb plane of motion to incorporate different degrees of extension/flexion and abduction/adduction. Compensation algorithms have been developed to improve the exoskeleton's backdrivability by counteracting gravity, stiction and kinetic friction. We have also designed a force assistance mode that provides extension assistance based on each individual's needs. A pilot study was conducted on 9 unimpaired and 5 chronic stroke subjects to investigate the device's ability to allow physiologically accurate hand movements throughout the full ROM. The study also tested the efficacy of the force assistance mode with the goal of increasing stroke subjects' active ROM while still requiring active extension torque on the part of the subject. For 12 of the hand digits'15 joints in neurologically normal subjects, there were no significant ROM differences (P > 0.05) between active movements performed inside and outside of HEXORR. Interjoint coordination was examined in the 1st and 3rd digits, and no differences were found between inside and outside of the device (P > 0.05). Stroke subjects were capable of performing free hand movements inside of the exoskeleton and the force assistance mode was successful in increasing active ROM by 43 ± 5% (P < 0.001) and 24 ± 6% (P = 0.041) for the fingers and thumb, respectively. Our pilot study shows that this device is capable of moving the hand's digits through nearly the entire ROM with physiologically accurate trajectories. Stroke subjects received the device intervention well and device impedance was minimized so that subjects could freely extend and flex their digits inside of HEXORR. Our active force-assisted condition was successful in increasing the subjects' ROM while promoting active participation.", "title": "" }, { "docid": "58156df07590448d89c2b8d4a46696ad", "text": "Gene PmAF7DS confers resistance to wheat powdery mildew (isolate Bgt#211 ); it was mapped to a 14.6-cM interval ( Xgwm350 a– Xbarc184 ) on chromosome 7DS. The flanking markers could be applied in MAS breeding. Wheat powdery mildew (Pm) is caused by the biotrophic pathogen Blumeria graminis tritici (DC.) (Bgt). An ongoing threat of breakdown of race-specific resistance to Pm requires a continuous effort to discover new alleles in the wheat gene pool. Developing new cultivars with improved disease resistance is an economically and environmentally safe approach to reduce yield losses. To identify and characterize genes for resistance against Pm in bread wheat we used the (Arina × Forno) RILs population. Initially, the two parental lines were screened with a collection of 61 isolates of Bgt from Israel. Three Pm isolates Bgt#210 , Bgt#211 and Bgt#213 showed differential reactions in the parents: Arina was resistant (IT = 0), whereas Forno was moderately susceptible (IT = −3). Isolate Bgt#211 was then used to inoculate the RIL population. The segregation pattern of plant reactions among the RILs indicates that a single dominant gene controls the conferred resistance. A genetic map of the region containing this gene was assembled with DNA markers and assigned to the 7D physical bin map. The gene, temporarily designated PmAF7DS, was located in the distal region of chromosome arm 7DS. The RILs were also inoculated with Bgt#210 and Bgt#213. The plant reactions to these isolates showed high identity with the reaction to Bgt#211, indicating the involvement of the same gene or closely linked, but distinct single genes. The genomic location of PmAF7DS, in light of other Pm genes on 7DS is discussed.", "title": "" } ]
scidocsrr
7c74104b20c2d3fd7941ca6cbada0695
Kafka versus RabbitMQ
[ { "docid": "0bbabbcc08ea494330b1675445851f9d", "text": "One trend in the implementation of modern web systems is the use of activity data in the form of log or event messages that capture user and server activity. This data is at the heart of many internet systems in the domains of advertising, relevance, search, recommendation systems, and security, as well as continuing to fulfill its traditional role in analytics and reporting. Many of these uses place real-time demands on data feeds. Activity data is extremely high volume and real-time pipelines present new design challenges. This paper discusses the design and engineering problems we encountered in moving LinkedIn’s data pipeline from a batch-oriented file aggregation mechanism to a real-time publish-subscribe system called Kafka. This pipeline currently runs in production at LinkedIn and handles more than 10 billion message writes each day with a sustained peak of over 172,000 messages per second. Kafka supports dozens of subscribing systems and delivers more than 55 billion messages to these consumer processing each day. We discuss the origins of this systems, missteps on the path to real-time, and the design and engineering problems we encountered along the way.", "title": "" }, { "docid": "b1e431f48c52a267c7674b5526d9ee23", "text": "Publish/subscribe is a distributed interaction paradigm well adapted to the deployment of scalable and loosely coupled systems.\n Apache Kafka and RabbitMQ are two popular open-source and commercially-supported pub/sub systems that have been around for almost a decade and have seen wide adoption. Given the popularity of these two systems and the fact that both are branded as pub/sub systems, two frequently asked questions in the relevant online forums are: how do they compare against each other and which one to use?\n In this paper, we frame the arguments in a holistic approach by establishing a common comparison framework based on the core functionalities of pub/sub systems. Using this framework, we then venture into a qualitative and quantitative (i.e. empirical) comparison of the common features of the two systems. Additionally, we also highlight the distinct features that each of these systems has. After enumerating a set of use cases that are best suited for RabbitMQ or Kafka, we try to guide the reader through a determination table to choose the best architecture given his/her particular set of requirements.", "title": "" } ]
[ { "docid": "12e088ccb86094d58c682e4071cce0a6", "text": "Are there systematic differences between people who use social network sites and those who stay away, despite a familiarity with them? Based on data from a survey administered to a diverse group of young adults, this article looks at the predictors of SNS usage, with particular focus on Facebook, MySpace, Xanga, and Friendster. Findings suggest that use of such sites is not randomly distributed across a group of highly wired users. A person's gender, race and ethnicity, and parental educational background are all associated with use, but in most cases only when the aggregate concept of social network sites is disaggregated by service. Additionally, people with more experience and autonomy of use are more likely to be users of such sites. Unequal participation based on user background suggests that differential adoption of such services may be contributing to digital inequality.", "title": "" }, { "docid": "d985c547cd57a25a6724f369da8aa1dd", "text": "DEFINITION A majority of today’s data is constantly evolving and fundam entally distributed in nature. Data for almost any large-sc ale data-management task is continuously collected over a wide area, and at a much greater rate than ever before. Compared to t aditional, centralized stream processing, querying such la rge-scale, evolving data collections poses new challenges , due mainly to the physical distribution of the streaming data and the co mmunication constraints of the underlying network. Distri buted stream processing algorithms should guarantee efficiency n ot o ly in terms ofspaceand processing time(as conventional streaming techniques), but also in terms of the communication loadimposed on the network infrastructure.", "title": "" }, { "docid": "d30cdd113970fa8570a795af6b5193e1", "text": "Alignment of time series is an important problem to solve in many scientific disciplines. In particular, temporal alignment of two or more subjects performing similar activities is a challenging problem due to the large temporal scale difference between human actions as well as the inter/intra subject variability. In this paper we present canonical time warping (CTW), an extension of canonical correlation analysis (CCA) for spatio-temporal alignment of human motion between two subjects. CTW extends previous work on CCA in two ways: (i) it combines CCA with dynamic time warping (DTW), and (ii) it extends CCA by allowing local spatial deformations. We show CTW’s effectiveness in three experiments: alignment of synthetic data, alignment of motion capture data of two subjects performing similar actions, and alignment of similar facial expressions made by two people. Our results demonstrate that CTW provides both visually and qualitatively better alignment than state-of-the-art techniques based on DTW.", "title": "" }, { "docid": "de11d8c566fcb365bc1be6566f2574e7", "text": "Helplessness in social situations was conceptualized as the perceived inability to surmount rejection, as revealed by causal attributions for rejection. Although current research on children's social adjustment emphasizes differences in social skills between popular and unpopular children or behavioral intervention as an aid for withdrawn children, the present study explores responses to rejection across popularity levels. The results show that individual differences in attributions for rejection are related to disruption of goal-directed behavior following rejection. As predicted, the most severe disruption of attempts to gain social approval (withdrawal and perseveration) was associated with the tendency to emphasize personal incompetence as the cause of rejection, regardless of popularity level. The findings suggest that cognitive mediators of overt social behavior and ability to solve problems when faced with difficulties need to be considered in the study of children's social relations.", "title": "" }, { "docid": "a922051835f239db76be1dbb8edead3e", "text": "Among the simplest and most intuitively appealing classes of nonprobabilistic classification procedures are those that weight the evidence of nearby sample observations most heavily. More specifically, one might wish to weight the evidence of a neighbor close to an unclassified observation more heavily than the evidence of another neighbor which is at a greater distance from the unclassified observation. One such classification rule is described which makes use of a neighbor weighting function for the purpose of assigning a class to an unclassified sample. The admissibility of such a rule is also considered.", "title": "" }, { "docid": "23d6e2407335a076526df89355b9c7fe", "text": "In view of the load balancing problem in VM resources scheduling, this paper presents a scheduling strategy on load balancing of VM resources based on genetic algorithm. According to historical data and current state of the system and through genetic algorithm, this strategy computes ahead the influence it will have on the system after the deployment of the needed VM resources and then chooses the least-affective solution, through which it achieves the best load balancing and reduces or avoids dynamic migration. At the same time, this paper brings in variation rate to describe the load variation of system virtual machines, and it also introduces average load distance to measure the overall load balancing effect of the algorithm. The experiment shows that this strategy has fairly good global astringency and efficiency, and the algorithm of this paper is, to a great extent, able to solve the problems of load imbalance and high migration cost after system VM being scheduled. What is more, the average load distance does not grow with the increase of VM load variation rate, and the system scheduling algorithm has quite good resource utility.", "title": "" }, { "docid": "c7e15bd10d5e9bb3155486a0f8fab436", "text": "In this paper we examine the problem of efficient feature evaluation for logistic regression on very large data sets. We present a new forward feature selection heuristic that ranks features by their estimated effect on the resulting model’s performance. An approximate optimization, based on backfitting, provides a fast and accurate estimate of each new feature’s coefficient in the logistic regression model. Further, the algorithm is highly scalable by parallelizing simultaneously over both features and records, allowing us to quickly evaluate billions of potential features even for very large data sets.", "title": "" }, { "docid": "dacf3b857bd71f0efa999d5dfd9daeaf", "text": "The inconsistency of phytogenic feed additives' (PFA) effects on the livestock industry poses a risk for their use as a replacement for antibiotic growth promoters. The livestock market is being encouraged to use natural growth promotors, but information is limited about the PFA mode of action. The aim of this paper is to present the complexity of compounds present in essential oils (EOs) and factors that influence biological effects of PFA. In this paper, we highlight various controls and optimization parameters that influence the processes for the standardization of these products. The chemical composition of EOs depends on plant genetics, growth conditions, development stage at harvest, and processes of extracting active compounds. Their biological effects are further influenced by the interaction of phytochemicals and their bioavailability in the gastrointestinal tract of animals. PFA effects on animal health and production are also complex due to various EO antibiotic, antioxidant, anti-quorum sensing, anti-inflammatory, and digestive fluids stimulating activities. Research must focus on reliable methods to identify and control the quality and effects of EOs. In this study, we focused on available microencapsulation techniques of EOs to increase the bioavailability of active compounds, as well as their application in the animal feed additive industry.", "title": "" }, { "docid": "01b2275beb66c70bd3237d98a6a678f5", "text": "Due to the huge and still rapidly growing number of mobile applications (apps), it becomes necessary to provide users an app recommendation service. Different from conventional item recommendation where the user interest is the primary factor, app recommendation also needs to consider factors that invoke a user to replace an old app (if she already has one) with a new app. In this work we propose an Actual- Tempting model that captures such factors in the decision process of mobile app adoption. The model assumes that each owned app has an actual satisfactory value and a new app under consideration has a tempting value. The former stands for the real satisfactory value the owned app brings to the user while the latter represents the estimated value the new app may seemingly have. We argue that the process of app adoption therefore is a contest between the owned apps' actual values and the candidate app's tempting value. Via the extensive experiments we show that the AT model performs significantly better than the conventional recommendation techniques such as collaborative filtering and content-based recommendation. Furthermore, the best recommendation performance is achieved when the AT model is combined with them.", "title": "" }, { "docid": "56205e79e706e05957cb5081d6a8348a", "text": "Corpus-based set expansion (i.e., finding the “complete” set of entities belonging to the same semantic class, based on a given corpus and a tiny set of seeds) is a critical task in knowledge discovery. It may facilitate numerous downstream applications, such as information extraction, taxonomy induction, question answering, and web search. To discover new entities in an expanded set, previous approaches either make one-time entity ranking based on distributional similarity, or resort to iterative pattern-based bootstrapping. The core challenge for these methods is how to deal with noisy context features derived from free-text corpora, which may lead to entity intrusion and semantic drifting. In this study, we propose a novel framework, SetExpan, which tackles this problem, with two techniques: (1) a context feature selection method that selects clean context features for calculating entity-entity distributional similarity, and (2) a ranking-based unsupervised ensemble method for expanding entity set based on denoised context features. Experiments on three datasets show that SetExpan is robust and outperforms previous state-of-the-art methods in terms of mean average precision.", "title": "" }, { "docid": "073486fe6bcd756af5f5325b27c57912", "text": "This paper describes the case of a unilateral agraphic patient (GG) who makes letter substitutions only when writing letters and words with his dominant left hand. Accuracy is significantly greater when he is writing with his right hand and when he is asked to spell words orally. GG also makes case errors when writing letters, and will sometimes write words in mixed case. However, these allograph errors occur regardless of which hand he is using to write. In terms of cognitive models of peripheral dysgraphia (e.g., Ellis, 1988), it appears that he has an allograph level impairment that affects writing with both hands, and a separate problem in accessing graphic motor patterns that disrupts writing with the left hand only. In previous studies of left-handed patients with unilateral agraphia (Zesiger & Mayer, 1992; Zesiger, Pegna, & Rilliet, 1994), it has been suggested that allographic knowledge used for writing with both hands is stored exclusively in the left hemisphere, but that graphic motor patterns are represented separately in each hemisphere. The pattern of performance demonstrated by GG strongly supports such a conclusion.", "title": "" }, { "docid": "7a5d22ae156d6a62cfd080c2a58103d2", "text": "Stochastic neurons and hard non-linearities can be useful for a number of reasons in deep learning models, but in many cases they pose a challenging problem: how to estimate the gradient of a loss function with respect to the input of such stochastic or non-smooth neurons? I.e., can we “back-propagate” through these stochastic neurons? We examine this question, existing approaches, and compare four families of solutions, applicable in different settings. One of them is the minimum variance unbiased gradient estimator for stochatic binary neurons (a special case of the REINFORCE algorithm). A second approach, introduced here, decomposes the operation of a binary stochastic neuron into a stochastic binary part and a smooth differentiable part, which approximates the expected effect of the pure stochatic binary neuron to first order. A third approach involves the injection of additive or multiplicative noise in a computational graph that is otherwise differentiable. A fourth approach heuristically copies the gradient with respect to the stochastic output directly as an estimator of the gradient with respect to the sigmoid argument (we call this the straight-through estimator). To explore a context where these estimators are useful, we consider a small-scale version of conditional computation, where sparse stochastic units form a distributed representation of gaters that can turn off in combinatorially many ways large chunks of the computation performed in the rest of the neural network. In this case, it is important that the gating units produce an actual 0 most of the time. The resulting sparsity can be potentially be exploited to greatly reduce the computational cost of large deep networks for which conditional computation would be useful.", "title": "" }, { "docid": "53320c90aca8752b35407efa0f9fdc8b", "text": "122 BILAL KHALID KHALAF ABSTRACT This study attempts to identify the main challenges for the translators during subtitling process, and what are the presented solutions ‘strategies’ by theorists to overcome them. In order to have full understanding of subtitling, it will start with defining what is subtitling? its types, classifications and then exploring the challenges which translators encounter during the subtitling process. Later on, it will show briefly how the subtitling related to Skopos functional theory. After all, the suggested strategies in the field of subtitling to overcome these challenges will be discussed like, Gottlieb (1992) and Schjoldager (2008) with related concepts.", "title": "" }, { "docid": "ef09bc08cc8e94275e652e818a0af97f", "text": "The biosynthetic pathway of L-tartaric acid, the form most commonly encountered in nature, and its catabolic ties to vitamin C, remain a challenge to plant scientists. Vitamin C and L-tartaric acid are plant-derived metabolites with intrinsic human value. In contrast to most fruits during development, grapes accumulate L-tartaric acid, which remains within the berry throughout ripening. Berry taste and the organoleptic properties and aging potential of wines are intimately linked to levels of L-tartaric acid present in the fruit, and those added during vinification. Elucidation of the reactions relating L-tartaric acid to vitamin C catabolism in the Vitaceae showed that they proceed via the oxidation of L-idonic acid, the proposed rate-limiting step in the pathway. Here we report the use of transcript and metabolite profiling to identify candidate cDNAs from genes expressed at developmental times and in tissues appropriate for L-tartaric acid biosynthesis in grape berries. Enzymological analyses of one candidate confirmed its activity in the proposed rate-limiting step of the direct pathway from vitamin C to tartaric acid in higher plants. Surveying organic acid content in Vitis and related genera, we have identified a non-tartrate-forming species in which this gene is deleted. This species accumulates in excess of three times the levels of vitamin C than comparably ripe berries of tartrate-accumulating species, suggesting that modulation of tartaric acid biosynthesis may provide a rational basis for the production of grapes rich in vitamin C.", "title": "" }, { "docid": "f414db165723f75a4991035d4dd2055d", "text": "In data centers, caches work both to provide low IO latencies and to reduce the load on the back-end network and storage. But they are not designed for multi-tenancy; system-level caches today cannot be configured to match tenant or provider objectives. Exacerbating the problem is the increasing number of un-coordinated caches on the IO data plane. The lack of global visibility on the control plane to coordinate this distributed set of caches leads to inefficiencies, increasing cloud provider cost.\n We present Moirai, a tenant- and workload-aware system that allows data center providers to control their distributed caching infrastructure. Moirai can help ease the management of the cache infrastructure and achieve various objectives, such as improving overall resource utilization or providing tenant isolation and QoS guarantees, as we show through several use cases. A key benefit of Moirai is that it is transparent to applications or VMs deployed in data centers. Our prototype runs unmodified OSes and databases, providing immediate benefit to existing applications.", "title": "" }, { "docid": "b5ca7ce46418c992a5fbe1fe01676023", "text": "Labeling topics learned by topic models is a challenging problem. Previous studies have used words, phrases and images to label topics. In this paper, we propose to use text summaries for topic labeling. Several sentences are extracted from the most related documents to form the summary for each topic. In order to obtain summaries with both high relevance, coverage and discrimination for all the topics, we propose an algorithm based on submodular optimization. Both automatic and manual analysis have been conducted on two real document collections, and we find 1) the summaries extracted by our proposed algorithm are superior over the summaries extracted by existing popular summarization methods; 2) the use of summaries as labels has obvious advantages over the use of words and phrases.", "title": "" }, { "docid": "bf4a991dbb32ec1091a535750637dbd7", "text": "As cutting-edge experiments display ever more extreme forms of non-classical behavior, the prevailing view on the interpretation of quantum mechanics appears to be gradually changing. A (highly unscientific) poll taken at the 1997 UMBC quantum mechanics workshop gave the once alldominant Copenhagen interpretation less than half of the votes. The Many Worlds interpretation (MWI) scored second, comfortably ahead of the Consistent Histories and Bohm interpretations. It is argued that since all the above-mentioned approaches to nonrelativistic quantum mechanics give identical cookbook prescriptions for how to calculate things in practice, practical-minded experimentalists, who have traditionally adopted the “shut-up-and-calculate interpretation”, typically show little interest in whether cozy classical concepts are in fact real in some untestable metaphysical sense or merely the way we subjectively perceive a mathematically simpler world where the Schrödinger equation describes everything — and that they are therefore becoming less bothered by a profusion of worlds than by a profusion of words. Common objections to the MWI are discussed. It is argued that when environment-induced decoherence is taken into account, the experimental predictions of the MWI are identical to those of the Copenhagen interpretation except for an experiment involving a Byzantine form of “quantum suicide”. This makes the choice between them purely a matter of taste, roughly equivalent to whether one believes mathematical language or human language to be more fundamental.", "title": "" }, { "docid": "c28dc261ddc770a6655eb1dbc528dd3b", "text": "Software applications are no longer stand-alone systems. They are increasingly the result of integrating heterogeneous collections of components, both executable and data, possibly dispersed over a computer network. Different components can be provided by different producers and they can be part of different systems at the same time. Moreover, components can change rapidly and independently, making it difficult to manage the whole system in a consistent way. Under these circumstances, a crucial step of the software life cycle is deployment—that is, the activities related to the release, installation, activation, deactivation, update, and removal of components, as well as whole systems. This paper presents a framework for characterizing technologies that are intended to support software deployment. The framework highlights four primary factors concerning the technologies: process coverage; process changeability; interprocess coordination; and site, product, and deployment policy abstraction. A variety of existing technologies are surveyed and assessed against the framework. Finally, we discuss promising research directions in software deployment. This work was supported in part by the Air Force Material Command, Rome Laboratory, and the Defense Advanced Research Projects Agency under Contract Number F30602-94-C-0253. The content of the information does not necessarily reflect the position or the policy of the U.S. Government and no official endorsement should be inferred.", "title": "" }, { "docid": "627f3b4ae9df80bdc0374d4fe375f40e", "text": "Though in the lowest level cuckoos exploit precisely this hypothesis that do. This by people who are relevantly similar others suggest the human moral. 1983 levine et al but evolutionary mechanism. No need for a quite generously supported by an idea that do. Individuals may be regulated by the, future nonetheless. It is that we can do not merely apparent case if there are less. 2005 oliner sorokin taylor et al. Oliner however a poet and wrong boehm tackles the motives. Studies have the willingness to others from probability of narrative.", "title": "" } ]
scidocsrr
7f48fcf6c3fa8a97b5785db7177998a7
Keyframe-based visual-inertial online SLAM with relocalization
[ { "docid": "2bbbd2d1accca21cdb614a0324aa1a0d", "text": "We propose a novel direct visual-inertial odometry method for stereo cameras. Camera pose, velocity and IMU biases are simultaneously estimated by minimizing a combined photometric and inertial energy functional. This allows us to exploit the complementary nature of vision and inertial data. At the same time, and in contrast to all existing visual-inertial methods, our approach is fully direct: geometry is estimated in the form of semi-dense depth maps instead of manually designed sparse keypoints. Depth information is obtained both from static stereo - relating the fixed-baseline images of the stereo camera - and temporal stereo - relating images from the same camera, taken at different points in time. We show that our method outperforms not only vision-only or loosely coupled approaches, but also can achieve more accurate results than state-of-the-art keypoint-based methods on different datasets, including rapid motion and significant illumination changes. In addition, our method provides high-fidelity semi-dense, metric reconstructions of the environment, and runs in real-time on a CPU.", "title": "" }, { "docid": "7d820e831096dac701e7f0526a8a11da", "text": "We propose a system for easily preparing arbitrary wide-area environments for subsequent real-time tracking with a handheld device. Our system evaluation shows that minimal user effort is required to initialize a camera tracking session in an unprepared environment. We combine panoramas captured using a handheld omnidirectional camera from several viewpoints to create a point cloud model. After the offline modeling step, live camera pose tracking is initialized by feature point matching, and continuously updated by aligning the point cloud model to the camera image. Given a reconstruction made with less than five minutes of video, we achieve below 25 cm translational error and 0.5 degrees rotational error for over 80% of images tested. In contrast to camera-based simultaneous localization and mapping (SLAM) systems, our methods are suitable for handheld use in large outdoor spaces.", "title": "" }, { "docid": "83ad3f9cce21b2f4c4f8993a3d418a44", "text": "Effective and efficient generation of keypoints from an image is a well-studied problem in the literature and forms the basis of numerous Computer Vision applications. Established leaders in the field are the SIFT and SURF algorithms which exhibit great performance under a variety of image transformations, with SURF in particular considered as the most computationally efficient amongst the high-performance methods to date. In this paper we propose BRISK1, a novel method for keypoint detection, description and matching. A comprehensive evaluation on benchmark datasets reveals BRISK's adaptive, high quality performance as in state-of-the-art algorithms, albeit at a dramatically lower computational cost (an order of magnitude faster than SURF in cases). The key to speed lies in the application of a novel scale-space FAST-based detector in combination with the assembly of a bit-string descriptor from intensity comparisons retrieved by dedicated sampling of each keypoint neighborhood.", "title": "" } ]
[ { "docid": "02634d48c929ee8da3f169b60ccf16b5", "text": "On the WWW users frequently revisit information they have previously seen, but \" keeping found things found \" is difficult when the information has not been visited frequently or recently, even if a user knows which website contained the information. This paper describes the design of a tool to help users refind information within a given website. The tool encodes data about a user's interest in webpages (measured by dwell time), the frequency and recency of visits, and navigational associations between pages, and presents navigation histories in list-and graph-based forms. A design evaluation, conducted using examples of refinding failures from a previous user study, shows that list-based presentation helps when users have only visited a small number of pages on a website (this accounted 50+ % of refinding failures). With the tool's filtering capabilities, graph-based presentation is likely to greatly increase success during revisiting when a website has often been used.", "title": "" }, { "docid": "31effa8f9a86950fa34c518f7c25e0e7", "text": "Generative models can be seen as the swiss army knives of machine learning, as many problems can be written probabilistically in terms of the distribution of the data, including prediction, reconstruction, imputation and simulation. One of the most promising directions for unsupervised learning may lie in Deep Learning methods, given their success in supervised learning. However, one of the current problems with deep unsupervised learning methods, is that they often are harder to scale. As a result there are some easier, more scalable shallow methods, such as the Gaussian Mixture Model and the Student-t Mixture Model, that remain surprisingly competitive. In this paper we propose a new scalable deep generative model for images, called the Deep Gaussian Mixture Model, that is a straightforward but powerful generalization of GMMs to multiple layers. The parametrization of a Deep GMM allows it to efficiently capture products of variations in natural images. We propose a new EM-based algorithm that scales well to large datasets, and we show that both the Expectation and the Maximization steps can easily be distributed over multiple machines. In our density estimation experiments we show that deeper GMM architectures generalize better than more shallow ones, with results in the same ballpark as the state of the art.", "title": "" }, { "docid": "2450ccfdff4503fc642550a876976f10", "text": "The purpose of this paper is to introduce sequential investment strategies that guarantee an optimal rate of growth of the capital, under minimal assumptions on the behavior of the market. The new strategies are analyzed both theoretically and empirically. The theoretical results show that the asymptotic rate of growth matches the optimal one that one could achieve with a full knowledge of the statistical properties of the underlying process generating the market, under the only assumption that the market is stationary and ergodic. The empirical results show that the performance of the proposed investment strategies measured on past NYSE and currency exchange data is solid, and sometimes even spectacular.", "title": "" }, { "docid": "7492f19ad89bab0fb9bc0c935e75543e", "text": "One of the most important questions in biological science is how a protein functions. When a protein performs its function, it undergoes regulated structural transitions. In this regard, to better understand the underlying principle of a protein function, it is desirable to monitor the dynamic evolution of the protein structure in real time. To probe fast and subtle motions of a protein in physiological conditions demands an experimental tool that is not only equipped with superb spatiotemporal resolution but also applicable to samples in solution phase. Time-resolved X-ray solution scattering (TRXSS), discussed in this Account, fits all of those requirements needed for probing the movements of proteins in aqueous solution. The technique utilizes a pump-probe scheme employing an optical pump pulse to initiate photoreactions of proteins and an X-ray probe pulse to monitor ensuing structural changes. The technical advances in ultrafast lasers and X-ray sources allow us to achieve superb temporal resolution down to femtoseconds. Because X-rays scatter off all atomic pairs in a protein, an X-ray scattering pattern provides information on the global structure of the protein with subangstrom spatial resolution. Importantly, TRXSS is readily applicable to aqueous solution samples of proteins with the aid of theoretical models and therefore is well suited for investigating structural dynamics of protein transitions in physiological conditions. In this Account, we demonstrate that TRXSS can be used to probe real-time structural dynamics of proteins in solution ranging from subtle helix movement to global conformational change. Specifically, we discuss the photoreactions of photoactive yellow protein (PYP) and homodimeric hemoglobin (HbI). For PYP, we revealed the kinetics of structural transitions among four transient intermediates comprising a photocycle and, by applying structural analysis based on ab initio shape reconstruction, showed that the signaling of PYP involves the protrusion of the N-terminus with significant increase of the overall protein size. For HbI, we elucidated the dynamics of complex allosteric transitions among transient intermediates. In particular, by applying structural refinement analysis based on rigid-body modeling, we found that the allosteric transition of HbI accompanies the rotation of quaternary structure and the contraction between two heme domains. By making use of the experimental and analysis methods presented in this Account, we envision that the TRXSS can be used to probe the structural dynamics of various proteins, allowing us to decipher the working mechanisms of their functions. Furthermore, when combined with femtosecond X-ray pulses generated from X-ray free electron lasers, TRXSS will gain access to ultrafast protein dynamics on sub-picosecond time scales.", "title": "" }, { "docid": "9cf5b21ce335049b5da0d7e70f974eea", "text": "The XWand is a wireless UI device that enables styles of natural interaction with intelligent environments. The XWand system exploits human intuition, allowing control of everyday objects through pointing and gesturing. We describe the hardware device and then examine several approaches to gesture recognition. We discuss results from experiments using a linear time warping method, a dynamic time warping (DTW) method, and a hidden Markov modelbased method (HMM).", "title": "" }, { "docid": "eee5ffff364575afad1dcebbf169777b", "text": "In this paper, we proposed the multiclass support vector machine (SVM) with the error-correcting output codes for the multiclass electroencephalogram (EEG) signals classification problem. The probabilistic neural network (PNN) and multilayer perceptron neural network were also tested and benchmarked for their performance on the classification of the EEG signals. Decision making was performed in two stages: feature extraction by computing the wavelet coefficients and the Lyapunov exponents and classification using the classifiers trained on the extracted features. The purpose was to determine an optimum classification scheme for this problem and also to infer clues about the extracted features. Our research demonstrated that the wavelet coefficients and the Lyapunov exponents are the features which well represent the EEG signals and the multiclass SVM and PNN trained on these features achieved high classification accuracies", "title": "" }, { "docid": "0583b36c9dfa3080ab94b16a7410b7cd", "text": "In this paper we present a simple yet effective approach to automatic OCR error detection and correction on a corpus of French clinical reports of variable OCR quality within the domain of foetopathology. While traditional OCR error detection and correction systems rely heavily on external information such as domain-specific lexicons, OCR process information or manually corrected training material, these are not always available given the constraints placed on using medical corpora. We therefore propose a novel method that only needs a representative corpus of acceptable OCR quality in order to train models. Our method uses recurrent neural networks (RNNs) to model sequential information on character level for a given medical text corpus. By inserting noise during the training process we can simultaneously learn the underlying (character-level) language model and as well as learning to detect and eliminate random noise from the textual input. The resulting models are robust to the variability of OCR quality but do not require additional, external information such as lexicons. We compare two different ways of injecting noise into the training process and evaluate our models on a manually corrected data set. We find that the best performing system achieves a 73% accuracy.", "title": "" }, { "docid": "3dff0dd3f6518f7bc7d8ea6e3a3b23e6", "text": "We present a Deep Cuboid Detector which takes a consumer-quality RGB image of a cluttered scene and localizes all 3D cuboids (box-like objects). Contrary to classical approaches which fit a 3D model from low-level cues like corners, edges, and vanishing points, we propose an end-to-end deep learning system to detect cuboids across many semantic categories (e.g., ovens, shipping boxes, and furniture). We localize cuboids with a 2D bounding box, and simultaneously localize the cuboid’s corners, effectively producing a 3D interpretation of box-like objects. We refine keypoints by pooling convolutional features iteratively, improving the baseline method significantly. Our deep learning cuboid detector is trained in an end-to-end fashion and is suitable for real-time applications in augmented reality (AR) and robotics.", "title": "" }, { "docid": "892bba9c8c45c47cad8760fb82d622b1", "text": "With today's technical possibilities, a stable visualization scenario can no longer be assumed as a matter of course, as underlying data and targeted display setup are much more in flux than in traditional scenarios. Incremental visualization approaches are a means to address this challenge, as they permit the user to interact with, steer, and change the visualization at intermediate time points and not just after it has been completed. In this paper, we put forward a model for incremental visualizations that is based on the established Data State Reference Model, but extends it in ways to also represent partitioned data and visualization operators to facilitate intermediate visualization updates. In combination, partitioned data and operators can be used independently and in combination to strike tailored compromises between output quality, shown data quantity, and responsiveness-i.e., frame rates. We showcase the new expressive power of this model by discussing the opportunities and challenges of incremental visualization in general and its usage in a real world scenario in particular.", "title": "" }, { "docid": "b1b2a83d67456c0f0bf54092cbb06e65", "text": "The transmission of voice communications as datagram packets over IP networks, commonly known as voice-over-IP (VoIP) telephony, is rapidly gaining wide acceptance. With private phone conversations being conducted on insecure public networks, security of VoIP communications is increasingly important. We present a structured security analysis of the VoIP protocol stack, which consists of signaling (SIP), session description (SDP), key establishment (SDES, MIKEY, and ZRTP) and secure media transport (SRTP) protocols. Using a combination of manual and tool-supported formal analysis, we uncover several design flaws and attacks, most of which are caused by subtle inconsistencies between the assumptions that protocols at different layers of the VoIP stack make about each other. The most serious attack is a replay attack on SDES, which causes SRTP to repeat the keystream used for media encryption, thus completely breaking transport-layer security. We also demonstrate a man-in-the-middle attack on ZRTP, which allows the attacker to convince the communicating parties that they have lost their shared secret. If they are using VoIP devices without displays and thus cannot execute the \"human authentication\" procedure, they are forced to communicate insecurely, or not communicate at all, i.e., this becomes a denial of service attack. Finally, we show that the key derivation process used in MIKEY cannot be used to prove security of the derived key in the standard cryptographic model for secure key exchange.", "title": "" }, { "docid": "1a7b0df571b07927141a2e61314054ae", "text": "We propose a new method of power control for interference limited wireless networks with Rayleigh fading of both the desired and interference signals. Our method explictly takes into account the statistical variation of both the received signal and interference power, and optimally allocates power subject to constraints on the probability of fading induced outage for each transmitter/receiver pair. We establish several results for this type of problem. For the case in which the only constraints are those on the outage probabilities, we give a fast iterative method for finding the optimal power allocation. We establish tight bounds that relate the outage probability caused by channel fading to the signal-to-interference margin calculated when the statistical variation of the signal and intereference powers are ignored. This allows us to show that well-known methods for allocating power, based on Perron-Frobenius eigenvalue theory, can be used to determine power allocations that are provably close to achieving optimal (i.e., minimal) outage probability. In the most general case, which includes bounds on powers and other constraints, we show that the power control problem can be posed as a geometric program, which is a special type of optimization problem that can be transformed to a nonlinear convex optimization by a change of variables, and therefore solved globally and efficiently by recently developed interior-point methods.", "title": "" }, { "docid": "3b8d091fde57ffe07e6ffa7f8e70117e", "text": "Computed tomography angiography (CTA) is now applied as the gold standard in clinical diagnosis of cranial vascular diseases. Segmenting vasculature is a critical step of computer aided diagnosis. In this paper, we adopted a deep learning network architecture 3D U-Net to segment cranial vasculature from CTA images. Different from other traditional methods that require a large amount of manual annotation for network training, we adopted the incomplete vascular segmentation automatically obtained from time-of-flight magnetic resonance angiography (TOF-MRA) volume to train a segmentation network for CTA images. Our results showed that, by carefully tuning the network parameters, relatively complete cranial vascular segmentation can be achieved from CTA volume though the training truth is under-segmented. Our method does not require any human annotation.", "title": "" }, { "docid": "cf1431a2f97fae07128ebac0c727941c", "text": "Laser microscopy has generally poor temporal resolution, caused by the serial scanning of each pixel. This is a significant problem for imaging or optically manipulating neural circuits, since neuronal activity is fast. To help surmount this limitation, we have developed a \"scanless\" microscope that does not contain mechanically moving parts. This microscope uses a diffractive spatial light modulator (SLM) to shape an incoming two-photon laser beam into any arbitrary light pattern. This allows the simultaneous imaging or photostimulation of different regions of a sample with three-dimensional precision. To demonstrate the usefulness of this microscope, we perform two-photon uncaging of glutamate to activate dendritic spines and cortical neurons in brain slices. We also use it to carry out fast (60 Hz) two-photon calcium imaging of action potentials in neuronal populations. Thus, SLM microscopy appears to be a powerful tool for imaging and optically manipulating neurons and neuronal circuits. Moreover, the use of SLMs expands the flexibility of laser microscopy, as it can substitute traditional simple fixed lenses with any calculated lens function.", "title": "" }, { "docid": "c1c177ee96a0da0a4bbc6749364a14e5", "text": "Knowledge graphs are used to represent relational information in terms of triples. To enable learning about domains, embedding models, such as tensor factorization models, can be used to make predictions of new triples. Often there is background taxonomic information (in terms of subclasses and subproperties) that should also be taken into account. We show that existing fully expressive (a.k.a. universal) models cannot provably respect subclass and subproperty information. We show that minimal modifications to an existing knowledge graph completion method enables injection of taxonomic information. Moreover, we prove that our model is fully expressive, assuming a lower-bound on the size of the embeddings. Experimental results on public knowledge graphs show that despite its simplicity our approach is surprisingly effective. The AI community has long noticed the importance of structure in data. While traditional machine learning techniques have been mostly focused on feature-based representations, the primary form of data in the subfield of Statistical Relational AI (STARAI) (Getoor and Taskar, 2007; Raedt et al., 2016) is in the form of entities and relationships among them. Such entity-relationships are often in the form of (head, relationship, tail) triples, which can also be expressed in the form of a graph, with nodes as entities and labeled directed edges as relationships among entities. Predicting the existence, identity, and attributes of entities and their relationships are among the main goals of StaRAI. Knowledge Graphs (KGs) are graph structured knowledge bases that store facts about the world. A large number of KGs have been created such as NELL (Carlson et al., 2010), FREEBASE (Bollacker et al., 2008), and Google Knowledge Vault (Dong et al., 2014). These KGs have applications in several fields including natural language processing, search, automatic question answering and recommendation systems. Since accessing and storing all the facts in the world is difficult, KGs are incomplete. The goal of link prediction for KGs – a.k.a. KG completion – is to predict the unknown links or relationships in a KG based on the existing ones. This often amounts to infer (the probability of) new triples from the existing triples. Copyright © 2019, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. A common approach to apply machine learning to symbolic data, such as text, graph and entity-relationships, is through embeddings. Word, sentence and paragraph embeddings (Mikolov et al., 2013; Pennington, Socher, and Manning, 2014), which vectorize words, sentences and paragraphs using context information, are widely used in a variety of natural language processing tasks from syntactic parsing to sentiment analysis. Graph embeddings (Hoff, Raftery, and Handcock, 2002; Grover and Leskovec, 2016; Perozzi, Al-Rfou, and Skiena, 2014) are used in social network analysis for link prediction and community detection. In relational learning, embeddings for entities and relationships are used to generalize from existing data. These embeddings are often formulated in terms of tensor factorization (Nickel, Tresp, and Kriegel, 2012; Bordes et al., 2013; Trouillon et al., 2016; Kazemi and Poole, 2018c). Here, the embeddings are learned such that their interaction through (tensor-)products best predicts the (probability of the) existence of the observed triples; see (Nguyen, 2017; Wang et al., 2017) for details and discussion. Tensor factorization methods have been very successful, yet they rely on a large number of annotated triples to learn useful representations. There is often other information in ontologies which specifies the meaning of the symbols used in a knowledge base. One type of ontological information is represented in a hierarchical structure called a taxonomy. For example, a knowledge base might contain information that DJTrump, whose name is “Donald Trump” is a president, but may not contain information that he is a person, a mammal and an animal, because these are implied by taxonomic knowledge. Being told that mammals are chordates, lets us conclude that DJTrump is also a chordate, without needing to have triples specifying this about multiple mammals. We could also have information about subproperties, such as that being president is a subproperty of “managing”, which in turn is a subproperty of “interacts with”. This paper is about combining taxonomic information in the form of subclass and subproperty (e.g., managing implies interaction) into relational embedding models. We show that existing factorization models that are fully expressive cannot reflect such constraints for all legal entity embeddings. We propose a model that is provably fully expressive and can represent such taxonomic information, and evaluate its performance on real-world datasets. ar X iv :1 81 2. 03 23 5v 1 [ cs .L G ] 7 D ec 2 01 8 Factorization and Embedding Let E represent the set of entities and R represent the set of relations. Let W be a set of triples (h, r, t) that are true in the world, where h, t ∈ E are head and tail, and r ∈ R is the relation in the triple. We use W to represent the triples that are false – i.e., W ≐ {(h, r, t) ∈ E × R × E ∣ (h, r, t) ∉ W}. An example of a triple in W can be (Paris, CapitalCityOfCountry, France) and an example of a triple in W can be (Paris, CapitalCityOfCountry, Germany). A KG K ⊆ W is a subset of all the facts. The problem of the KG completion is to infer W from its subset KG. There exists a variety of methods for KG completion. Here, we consider embedding methods and in particular using tensor-factorization. For a broader review of the existing KG completion that can use background information see Related Work. Embeddings: An embedding is a function from an entity or a relation to a vector (or sometimes higher order tensors) over a field. We use bold lower-case for vectors – that is s ∈ R is an embedding of an entity and r ∈ R is an embedding of a relation. Taxonomies: It is common to have structure over the symbols used in the triples, see (e.g., Shoham, 2016). The Ontology Web Language (OWL) (Hitzler et al., 2012) defines (among many other meta-relations) subproperties and subclasses, where p1 is a subproperty of p2 if ∀x, y ∶ (x, p1, y)→ (x, p2, y), that is whenever p1 is true, p2 is also true. Classes can be defined either as a set with a class assertion (often called “type”) between an entity and a class, e.g., saying x is in class C using (x, type,C) or in terms of the characteristic function of the class, a function that is true of element of the class. If c is the characteristic function of class C, then x is in class c is written (x, c, true). For representations that treat entities and properties symmetrically, the two ways to define classes are essentially the same. C1 is a subclass of C2 if every entity in class C1 is in class C2, that is, ∀x ∶ (x, type,C1) → (x, type,C2) or ∀x ∶ (x, c1, true) → (x, c2, true) . If we treat true as an entity, then subclass can be seen as a special case of subproperty. For the rest of the paper we will refer to subsumption in terms of subproperty (and so also of subclass). A non-trivial subsumption is one which is not symmetric; p1 is a subproperty of p2 and there is some relations that is true of p1 that is not true of p2. We want the subsumption to be over all possible entities; those entities that have a legal embedding according to the representation used, not just those we know exist. Let E∗ be the set of all possible entities with a legal embedding according to the representation used. Tensor factorization: For KG completion a tensor factorization defines a function μ ∶ R ×R ×R → [0,1] that takes the embeddings h, r and t of a triple (h, r, t) as input, and generates a prediction, e.g., a probability, of the triple being true (h, r, t) ∈ W . In particular, μ is often a nonlinearity applied to a multi-linear function of h, r, t. The family of methods that we study uses the following multilinear form: Let x, y, and z be vectors of length k. Define ⟨x,y,z⟩ to be the sum of their element-wise product, namely", "title": "" }, { "docid": "c75c4f2acf49dd4d52116eae7559f6a5", "text": "In 2005, Kreidstein first proposed the term \"Cutis pleonasmus,\" a Greek term meaning \"redundancy,\" which refers to the excessive skin that remains after massive weight loss. Cutis pleonasmus is clearly distinguishable from other diseases showing increased laxity of the skin, such as pseudoxanthoma elasticum, congenital and acquired generalized cutis laxa. Although individuals who are severely overweight are few and bariatric surgeries are less common in Korea than in the West, the number of these patients is increasing due to changes to Western life styles. We report a case for a 24-year-old man who presented with generalized lax and loose skin after massive weight loss. He was diagnosed with cutis pleonasmus based on the history of great weight loss, characteristic clinical features and normal histological findings. To the best of our knowledge, this is the first report of cutis pleonasmus in Korea.", "title": "" }, { "docid": "0cd74192bd0ec4e8e7a37d7d95179e0a", "text": "Recently, Linux container technology has been gaining attention as it promises to transform the way software is developed and deployed. The portability and ease of deployment makes Linux containers an ideal technology to be used in scientific workflow platforms. Skyport utilizes Docker Linux containers to solve software deployment problems and resource utilization inefficiencies inherent to all existing scientific workflow platforms. As an extension to AWE/Shock, our data analysis platform that provides scalable workflow execution environments for scientific data in the cloud, Skyport greatly reduces the complexity associated with providing the environment necessary to execute complex workflows.", "title": "" }, { "docid": "c4aafcc0a98882de931713359e55a04a", "text": "We present a computer vision tool that analyses video from a CCTV system installed on fishing trawlers to monitor discarded fish catch. The system aims to support expert observers who review the footage and verify numbers, species and sizes of discarded fish. The operational environment presents a significant challenge for these tasks. Fish are processed below deck under fluorescent lights, they are randomly oriented and there are multiple occlusions. The scene is unstructured and complicated by the presence of fishermen processing the catch. We describe an approach to segmenting the scene and counting fish that exploits the N4-Fields algorithm. We performed extensive tests of the algorithm on a data set comprising 443 frames from 6 belts. Results indicate the relative count error (for individual fish) ranges from 2% to 16%. We believe this is the first system that is able to handle footage from operational trawlers.", "title": "" }, { "docid": "f5fdc2aac2caa3f8ac4648ebe599d707", "text": "This paper describes a Genetic Algorithms approach to a manpower-scheduling problem arising at a major UK hospital. Although Genetic Algorithms have been successfully used for similar problems in the past, they always had to overcome the limitations of the classical Genetic Algorithms paradigm in handling the conflict between objectives and constraints. The approach taken here is to use an indirect coding based on permutations of the nurses, and a heuristic decoder that builds schedules from these permutations. Computational experiments based on 52 weeks of live data are used to evaluate three different decoders with varying levels of intelligence, and four well-known crossover operators. Results are further enhanced by introducing a hybrid crossover operator and by making use of simple bounds to reduce the size of the solution space. The results reveal that the proposed algorithm is able to find high quality solutions and is both faster and more flexible than a recently published Tabu Search approach.", "title": "" }, { "docid": "02cd08e7b00e4a76a67a2abb2643bc26", "text": "In this paper, we describe the design of a deformable robot with a tensegrity structure that can crawl and we show the results of experiments showing the ability of these robots to crawl. We first describe a tensegrity structure, composed of struts and cables, and its characteristics. We next explain the principle of crawling by robot body deformation, followed by a classification of the methods by which a body can be deformed and the contact conditions of the robot through the cable-graph of the tensegrity structure. We also describe topological transition graphs that can visualize crawling from each initial contact condition. We then discuss the characteristics of the proposed robot in terms of design freedom. Finally, we show experimentally that the prototype of a tensegrity robot can crawl.", "title": "" } ]
scidocsrr
5beb540ccb52b4842aa712b9ecec6093
Structural Neighborhood Based Classification of Nodes in a Network
[ { "docid": "3442a266eaaf878a507f58124e15fee3", "text": "The application of kernel-based learning algorithms has, so far, largely been confined to realvalued data and a few special data types, such as strings. In this paper we propose a general method of constructing natural families of kernels over discrete structures, based on the matrix exponentiation idea. In particular, we focus on generating kernels on graphs, for which we propose a special class of exponential kernels called diffusion kernels, which are based on the heat equation and can be regarded as the discretization of the familiar Gaussian kernel of Euclidean space.", "title": "" } ]
[ { "docid": "59eaa9f4967abdc1c863f8fb256ae966", "text": "CONTEXT\nThe projected expansion in the next several decades of the elderly population at highest risk for Parkinson disease (PD) makes identification of factors that promote or prevent the disease an important goal.\n\n\nOBJECTIVE\nTo explore the association of coffee and dietary caffeine intake with risk of PD.\n\n\nDESIGN, SETTING, AND PARTICIPANTS\nData were analyzed from 30 years of follow-up of 8004 Japanese-American men (aged 45-68 years) enrolled in the prospective longitudinal Honolulu Heart Program between 1965 and 1968.\n\n\nMAIN OUTCOME MEASURE\nIncident PD, by amount of coffee intake (measured at study enrollment and 6-year follow-up) and by total dietary caffeine intake (measured at enrollment).\n\n\nRESULTS\nDuring follow-up, 102 men were identified as having PD. Age-adjusted incidence of PD declined consistently with increased amounts of coffee intake, from 10.4 per 10,000 person-years in men who drank no coffee to 1.9 per 10,000 person-years in men who drank at least 28 oz/d (P<.001 for trend). Similar relationships were observed with total caffeine intake (P<.001 for trend) and caffeine from non-coffee sources (P=.03 for trend). Consumption of increasing amounts of coffee was also associated with lower risk of PD in men who were never, past, and current smokers at baseline (P=.049, P=.22, and P=.02, respectively, for trend). Other nutrients in coffee, including niacin, were unrelated to PD incidence. The relationship between caffeine and PD was unaltered by intake of milk and sugar.\n\n\nCONCLUSIONS\nOur findings indicate that higher coffee and caffeine intake is associated with a significantly lower incidence of PD. This effect appears to be independent of smoking. The data suggest that the mechanism is related to caffeine intake and not to other nutrients contained in coffee. JAMA. 2000;283:2674-2679.", "title": "" }, { "docid": "fcbfa224b2708839e39295f24f4405e1", "text": "A dataset is imbalanced if the classification categories are not approximately equally represented. Recent years brought increased interest in applying machine learning techniques to difficult \"real-world\" problems, many of which are characterized by imbalanced data. Additionally the distribution of the testing data may differ from that of the training data, and the true misclassification costs may be unknown at learning time. Predictive accuracy, a popular choice for evaluating performance of a classifier, might not be appropriate when the data is imbalanced andlor the costs of different errors vary markedly. In this Chapter, we discuss some of the sampling techniques used for balancing the datasets, and the performance measures more appropriate for mining imbalanced datasets.", "title": "" }, { "docid": "a29ee41e8f46d1feebeb67886b657f70", "text": "Feeling emotion is a critical characteristic to distinguish people from machines. Among all the multi-modal resources for emotion detection, textual datasets are those containing the least additional information in addition to semantics, and hence are adopted widely for testing the developed systems. However, most of the textual emotional datasets consist of emotion labels of only individual words, sentences or documents, which makes it challenging to discuss the contextual flow of emotions. In this paper, we introduce EmotionLines, the first dataset with emotions labeling on all utterances in each dialogue only based on their textual content. Dialogues in EmotionLines are collected from Friends TV scripts and private Facebook messenger dialogues. Then one of seven emotions, six Ekman’s basic emotions plus the neutral emotion, is labeled on each utterance by 5 Amazon MTurkers. A total of 29,245 utterances from 2,000 dialogues are labeled in EmotionLines. We also provide several strong baselines for emotion detection models on EmotionLines in this paper.", "title": "" }, { "docid": "e6db8cbbb3f7bac211f672ffdef44fb6", "text": "This paper aims to develop a benchmarking framework that evaluates the cold chain performance of a company, reveals its strengths and weaknesses and finally identifies and prioritizes potential alternatives for continuous improvement. A Delphi-AHP-TOPSIS based methodology has divided the whole benchmarking into three stages. The first stage is Delphi method, where identification, synthesis and prioritization of key performance factors and sub-factors are done and a novel consistent measurement scale is developed. The second stage is Analytic Hierarchy Process (AHP) based cold chain performance evaluation of a selected company against its competitors, so as to observe cold chain performance of individual factors and sub-factors, as well as overall performance index. And, the third stage is Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) based assessment of possible alternatives for the continuous improvement of the company’s cold chain performance. Finally a demonstration of proposed methodology in a retail industry is presented for better understanding. The proposed framework can assist managers to comprehend the present strengths and weaknesses of their cold. They can identify good practices from the market leader and can benchmark them for improving weaknesses keeping in view the current operational conditions and strategies of the company. This framework also facilitates the decision makers to better understand the complex relationships of the relevant cold chain performance factors in decision-making. 2011 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "1c6677209ac3c37e4ac84b153321ab7c", "text": "BACKGROUND\nAsthma guidelines indicate that the goal of treatment should be optimum asthma control. In a busy clinic practice with limited time and resources, there is need for a simple method for assessing asthma control with or without lung function testing.\n\n\nOBJECTIVES\nThe objective of this article was to describe the development of the Asthma Control Test (ACT), a patient-based tool for identifying patients with poorly controlled asthma.\n\n\nMETHODS\nA 22-item survey was administered to 471 patients with asthma in the offices of asthma specialists. The specialist's rating of asthma control after spirometry was also collected. Stepwise regression methods were used to select a subset of items that showed the greatest discriminant validity in relation to the specialist's rating of asthma control. Internal consistency reliability was computed, and discriminant validity tests were conducted for ACT scale scores. The performance of ACT was investigated by using logistic regression methods and receiver operating characteristic analyses.\n\n\nRESULTS\nFive items were selected from regression analyses. The internal consistency reliability of the 5-item ACT scale was 0.84. ACT scale scores discriminated between groups of patients differing in the specialist's rating of asthma control (F = 34.5, P <.00001), the need for change in patient's therapy (F = 40.3, P <.00001), and percent predicted FEV(1) (F = 4.3, P =.0052). As a screening tool, the overall agreement between ACT and the specialist's rating ranged from 71% to 78% depending on the cut points used, and the area under the receiver operating characteristic curve was 0.77.\n\n\nCONCLUSION\nResults reinforce the usefulness of a brief, easy to administer, patient-based index of asthma control.", "title": "" }, { "docid": "204b902e344ac52ba5ed90e9f8d5cf54", "text": "The reason for the rapid rise of autism in the United States that began in the 1990s is a mystery. Although individuals probably have a genetic predisposition to develop autism, researchers suspect that one or more environmental triggers are also needed. One of those triggers might be the battery of vaccinations that young children receive. Using regression analysis and controlling for family income and ethnicity, the relationship between the proportion of children who received the recommended vaccines by age 2 years and the prevalence of autism (AUT) or speech or language impairment (SLI) in each U.S. state from 2001 and 2007 was determined. A positive and statistically significant relationship was found: The higher the proportion of children receiving recommended vaccinations, the higher was the prevalence of AUT or SLI. A 1% increase in vaccination was associated with an additional 680 children having AUT or SLI. Neither parental behavior nor access to care affected the results, since vaccination proportions were not significantly related (statistically) to any other disability or to the number of pediatricians in a U.S. state. The results suggest that although mercury has been removed from many vaccines, other culprits may link vaccines to autism. Further study into the relationship between vaccines and autism is warranted.", "title": "" }, { "docid": "38bdfe23b1e62cd162ed18d741f9ba05", "text": "The authors present results of 4 studies that seek to determine the discriminant and incremental validity of the 3 most widely studied traits in psychology-self-esteem, neuroticism, and locus of control-along with a 4th, closely related trait-generalized self-efficacy. Meta-analytic results indicated that measures of the 4 traits were strongly related. Results also demonstrated that a single factor explained the relationships among measures of the 4 traits. The 4 trait measures display relatively poor discriminant validity, and each accounted for little incremental variance in predicting external criteria relative to the higher order construct. In light of these results, the authors suggest that measures purporting to assess self-esteem, locus of control, neuroticism, and generalized self-efficacy may be markers of the same higher order concept.", "title": "" }, { "docid": "c18e8e3658fb4d9581b71b1e9feb8808", "text": "This paper presents the design and analysis of a linear oscillatory single-phase permanent magnet generator (LOG) for free-piston stirling engine systems (FPSEs). In order to implement the design of LOG for suitable FPSEs, we performed a characteristic analysis of various types of LOGs having different design parameters. To improve the efficiency, we performed a characteristic analysis of the eddy-current loss based on the permanent magnet division and influence of core lamination. A dynamic characteristic analysis of LOG was performed for selected design parameters, and the analysis results of the designed LOG were compared with the measured results.", "title": "" }, { "docid": "473aadc8d69632f810901d6360dd2b0c", "text": "One of the challenges in developing real-world autonomous robots is the need for integrating and rigorously testing high-level scripting, motion planning, perception, and control algorithms. For this purpose, we introduce an open-source cross-platform software architecture called OpenRAVE, the Open Robotics and Animation Virtual Environment. OpenRAVE is targeted for real-world autonomous robot applications, and includes a seamless integration of 3-D simulation, visualization, planning, scripting and control. A plugin architecture allows users to easily write custom controllers or extend functionality. With OpenRAVE plugins, any planning algorithm, robot controller, or sensing subsystem can be distributed and dynamically loaded at run-time, which frees developers from struggling with monolithic code-bases. Users of OpenRAVE can concentrate on the development of planning and scripting aspects of a problem without having to explicitly manage the details of robot kinematics and dynamics, collision detection, world updates, and robot control. The OpenRAVE architecture provides a flexible interface that can be used in conjunction with other popular robotics packages such as Player and ROS because it is focused on autonomous motion planning and high-level scripting rather than low-level control and message protocols. OpenRAVE also supports a powerful network scripting environment which makes it simple to control and monitor robots and change execution flow during run-time. One of the key advantages of open component architectures is that they enable the robotics research community to easily share and compare algorithms.", "title": "" }, { "docid": "fa3c52e9b3c4a361fd869977ba61c7bf", "text": "The combination of the Internet and emerging technologies such as nearfield communications, real-time localization, and embedded sensors lets us transform everyday objects into smart objects that can understand and react to their environment. Such objects are building blocks for the Internet of Things and enable novel computing applications. As a step toward design and architectural principles for smart objects, the authors introduce a hierarchy of architectures with increasing levels of real-world awareness and interactivity. In particular, they describe activity-, policy-, and process-aware smart objects and demonstrate how the respective architectural abstractions support increasingly complex application.", "title": "" }, { "docid": "27814a816db4a598248dbb316e7b62a5", "text": "Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks are typically explicit attempts to exhaust victim’s bandwidth or disrupt legitimate users’ access to services. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to gain access to a large number of compromised computers by exploiting their vulnerabilities to set up attack networks or Botnets. Once attack network or Botnet has been set up, an attacker invokes a large-scale, coordinated attack against one or more targets. Asa result of the continuous evolution of new attacks and ever-increasing range of vulnerable hosts on the internet, many DDoS attack Detection, Prevention and Traceback mechanisms have been proposed, In this paper, we tend to surveyed different types of attacks and techniques of DDoS attacks and their countermeasures. The significance of this paper is that the coverage of many aspects of countering DDoS attacks including detection, defence and mitigation, traceback approaches, open issues and research challenges. GJCST-E Classification : D.4.6 DoSandDDoSAttacksDefenseDetection andTraceback Mechanisms-A Survey Strictly as per the compliance and regulations of:", "title": "" }, { "docid": "38f85a10e8f8b815974f5e42386b1fa3", "text": "Because Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would seem to be the perfect place to conduct steganography. On Facebook, information hidden in image files will be further obscured within the millions of pictures and other images posted and transmitted daily. Facebook is known to alter and compress uploaded images so they use minimum space and bandwidth when displayed on Facebook pages. The compression process generally disrupts attempts to use Facebook for image steganography. This paper explores a method to minimize the disruption so JPEG images can be used as steganography carriers on Facebook.", "title": "" }, { "docid": "0827a91d97ed83bada2e73c0b4bbe308", "text": "Several studies investigated different interaction techniques and input devices for older adults using touchscreen. This literature review analyses the population involved, the kind of tasks that were executed, the apparatus, the input techniques, the provided feedback, the collected data and author's findings and their recommendations. As conclusion, this review shows that age-related changes, previous experience with technologies, characteristics of handheld devices and use situations need to be studied.", "title": "" }, { "docid": "7720930292c9e6140c29a17de3486ebc", "text": "Horticulture therapy employs plants and gardening activities in therapeutic and rehabilitation activities and could be utilized to improve the quality of life of the worldwide aging population, possibly reducing costs for long-term, assisted living and dementia unit residents. Preliminary studies have reported the benefits of horticultural therapy and garden settings in reduction of pain, improvement in attention, lessening of stress, modulation of agitation, lowering of as needed medications, antipsychotics and reduction of falls. This is especially relevant for both the United States and the Republic of Korea since aging is occurring at an unprecedented rate, with Korea experiencing some of the world's greatest increases in elderly populations. In support of the role of nature as a therapeutic modality in geriatrics, most of the existing studies of garden settings have utilized views of nature or indoor plants with sparse studies employing therapeutic gardens and rehabilitation greenhouses. With few controlled clinical trials demonstrating the positive or negative effects of the use of garden settings for the rehabilitation of the aging populations, a more vigorous quantitative analysis of the benefits is long overdue. This literature review presents the data supporting future studies of the effects of natural settings for the long term care and rehabilitation of the elderly having the medical and mental health problems frequently occurring with aging.", "title": "" }, { "docid": "f031ec76c4d71fcd7d7380640c933fd2", "text": "GPU (Graphics Processing Unit) has a great impact on computing field. To enhance the performance of computing systems, researchers and developers use the parallel computing architecture of GPU. On the other hand, to reduce the development time of new products, two programming models are included in GPU, which are OpenCL (Open Computing Language) and CUDA (Compute Unified Device Architecture). The benefit of involving the two programming models in GPU is that researchers and developers don't have to understand OpenGL, DirectX or other program design, but can use GPU through simple programming language. OpenCL is an open standard API, which has the advantage of cross-platform. CUDA is a parallel computer architecture developed by NVIDIA, which includes Runtime API and Driver API. Compared with OpenCL, CUDA is with better performance. In this paper, we used plenty of similar kernels to compare the computing performance of C, OpenCL and CUDA, the two kinds of API's on NVIDIA Quadro 4000 GPU. The experimental result showed that, the executive time of CUDA Driver API was 94.9%~99.0% faster than that of C, while and the executive time of CUDA Driver API was 3.8%~5.4% faster than that of OpenCL. Accordingly, the cross-platform characteristic of OpenCL did not affect the performance of GPU.", "title": "" }, { "docid": "6ff034e2ff0d54f7e73d23207789898d", "text": "This letter presents two high-gain, multidirector Yagi-Uda antennas for use within the 24.5-GHz ISM band, realized through a multilayer, purely additive inkjet printing fabrication process on a flexible substrate. Multilayer material deposition is used to realize these 3-D antenna structures, including a fully printed 120- μm-thick dielectric substrate for microstrip-to-slotline feeding conversion. The antennas are fabricated, measured, and compared to simulated results showing good agreement and highlighting the reliable predictability of the printing process. An endfire realized gain of 8 dBi is achieved within the 24.5-GHz ISM band, presenting the highest-gain inkjet-printed antenna at this end of the millimeter-wave regime. The results of this work further demonstrate the feasibility of utilizing inkjet printing for low-cost, vertically integrated antenna structures for on-chip and on-package integration throughout the emerging field of high-frequency wireless electronics.", "title": "" }, { "docid": "a357ce62099cd5b12c09c688c5b9736e", "text": "Considerations of personal identity bear on John Searle's Chinese Room argument, and on the opposed position that a computer itself could really understand a natural language. In this paper I develop the notion of a virtual person, modelled on the concept of virtual machines familiar in computer science. I show how Searle's argument, and J. Maloney's attempt to defend it, fail. I conclude that Searle is correct in holding that no digital machine could understand language, but wrong in holding that artificial minds are impossible: minds and persons are not the same as the machines, biological or electronic, that realize them.", "title": "" }, { "docid": "549f719cd53f769123c34d65dca1f566", "text": "BACKGROUND\nA large body of scientific literature derived from experimental studies emphasizes the vital role of vagal-nociceptive networks in acute pain processing. However, research on vagal activity, indexed by vagally-mediated heart rate variability (vmHRV) in chronic pain patients (CPPs), has not yet been summarized.\n\n\nOBJECTIVES\nTo systematically investigate differences in vagus nerve activity indexed by time- and frequency-domain measures of vmHRV in CPPs compared to healthy controls (HCs).\n\n\nSTUDY DESIGN\nA systematic review and meta-analysis, including meta-regression on a variety of populations (i.e., clinical etiology) and study-level (i.e., length of HRV recording) covariates.\n\n\nSETTING\nNot applicable (variety of studies included in the meta-analysis).\n\n\nMETHODS\nEight computerized databases (PubMed via MEDLINE, PsycNET, PsycINFO, Embase, CINAHL, Web of Science, PSYNDEX, and the Cochrane Library) in addition to a hand search were systematically screened for eligible studies based on pre-defined inclusion criteria. A meta-analysis on all empirical investigations reporting short- and long-term recordings of continuous time- (root-mean-square of successive R-R-interval differences [RMSSD]) and frequency-domain measures (high-frequency [HF] HRV) of vmHRV in CPPs and HCs was performed. True effect estimates as adjusted standardized mean differences (SMD; Hedges g) combined with inverse variance weights using a random effects model were computed.\n\n\nRESULTS\nCPPs show lower vmHRV than HCs indexed by RMSSD (Z = 5.47, P < .0001; g = -0.24;95% CI [-0.33, -0.16]; k = 25) and HF (Z = 4.54, P < .0001; g = -0.30; 95% CI [-0.44, -0.17]; k = 61).Meta-regression on covariates revealed significant differences by clinical etiology, age, gender, and length of HRV recording.\n\n\nLIMITATIONS\nWe did not control for other potential covariates (i.e., duration of chronic pain, medication intake) which may carry potential risk of bias.\n\n\nCONCLUSION(S)\nThe present meta-analysis is the most extensive review of the current evidence on vagal activity indexed by vmHRV in CPPs. CPPs were shown to have lower vagal activity, indexed by vmHRV, compared to HCs. Several covariates in this relationship have been identified. Further research is needed to investigate vagal activity in CPPs, in particular prospective and longitudinal follow-up studies are encouraged.", "title": "" }, { "docid": "45375c1527fcb46d0d29bbb4fdab4f9c", "text": "Removing suffixes by automatic means is an operation which is especially useful in the field of information retrieval. In a typical IR environment, one has a collection of documents, each described by the words in the document title and possibly by words in the document abstract. Ignoring the issue of precisely where the words originate, we can say that a document is represented by a vetor of words, or terms. Terms with a common stem will usually have similar meanings, for example:", "title": "" }, { "docid": "24ac33300d3ea99441068c20761e8305", "text": "Purpose – The purpose of this research is to examine the critical success factors of mobile web site adoption. Design/methodology/approach – Based on the valid responses collected from a questionnaire survey, the structural equation modelling technique was employed to examine the research model. Findings – The results indicate that system quality is the main factor affecting perceived ease of use, whereas information quality is the main factor affecting perceived usefulness. Service quality has significant effects on trust and perceived ease of use. Perceived usefulness, perceived ease of use and trust determine user satisfaction. Practical implications – Mobile service providers need to improve the system quality, information quality and service quality of mobile web sites to enhance user satisfaction. Originality/value – Previous research has mainly focused on e-commerce web site success and seldom examined the factors affecting mobile web site success. This research fills the gap. The research draws on information systems success theory, the technology acceptance model and trust theory as the theoretical bases.", "title": "" } ]
scidocsrr
acd8faabc06c35cdb649f81af5b27a45
Review : friction stir welding tools
[ { "docid": "0efe115e60fb3b3d1152ee4e88b60e8e", "text": "Friction stir welding (FSW) is a relatively new solid-state joining process. This joining technique is energy efficient, environment friendly, and versatile. In particular, it can be used to join high-strength aerospace aluminum alloys and other metallic alloys that are hard to weld by conventional fusion welding. FSW is considered to be the most significant development in metal joining in a decade. Recently, friction stir processing (FSP) was developed for microstructural modification of metallic materials. In this review article, the current state of understanding and development of the FSW and FSP are addressed. Particular emphasis has been given to: (a) mechanisms responsible for the formation of welds and microstructural refinement, and (b) effects of FSW/FSP parameters on resultant microstructure and final mechanical properties. While the bulk of the information is related to aluminum alloys, important results are now available for other metals and alloys. At this stage, the technology diffusion has significantly outpaced the fundamental understanding of microstructural evolution and microstructure–property relationships. # 2005 Elsevier B.V. All rights reserved.", "title": "" } ]
[ { "docid": "bba81ac392b87a123a1e2f025bffd30c", "text": "This paper presents a new multi-objective deep reinforcement learning (MODRL) framework based on deep Q-networks. We propose the use of linear and non-linear methods to develop the MODRL framework that includes both single-policy and multi-policy strategies. The experimental results on two benchmark problems including the two-objective deep sea treasure environment and the three-objective mountain car problem indicate that the proposed framework is able to converge to the optimal Pareto solutions effectively. The proposed framework is generic, which allows implementation of different deep reinforcement learning algorithms in different complex environments. This therefore overcomes many difficulties involved with standard multi-objective reinforcement learning (MORL) methods existing in the current literature. The framework creates a platform as a testbed environment to develop methods for solving various problems associated with the current MORL. Details of the framework implementation can be referred to http://www.deakin.edu.au/~thanhthi/drl.htm.", "title": "" }, { "docid": "1156e19011c722404e077ae64f6e526f", "text": "Malwares are malignant softwares. It is designed t o amage computer systems without the knowledge of the owner using the system. Softwares from reputabl e vendors also contain malicious code that affects the system or leaks informations to remote servers. Malwares incl udes computer viruses, Worms, spyware, dishonest ad -ware, rootkits, Trojans, dialers etc. Malware is one of t he most serious security threats on the Internet to day. In fact, most Internet problems such as spam e-mails and denial o f service attacks have malwareas their underlying c ause. Computers that are compromised with malware are oft en networked together to form botnets and many atta cks re launched using these malicious, attacker controlled n tworks. The paper focuses on various Malware det ction and removal methods. KeywordsMalware, Intruders, Checksum, Digital Immune System , Behavior blocker", "title": "" }, { "docid": "c9c0308d532f216b847400b8f188013c", "text": "Customer interface quality, perceived security, and customer loyalty are critical factors for success of an e-commerce website; however, the relationships among them are not fully understood. We proposed a model for testing the relationships among them and the important outcomes of the site: switching costs and customer loyalty. Data was collected to test the model using a web-based survey, and empirical analyses were performed using SEM. The analytical results demonstrated that customer interface quality and perceived security positively affected customer satisfaction and switching costs, and thus customer loyalty to an e-commerce website. Specifically, our study showed that switching costs positively moderated the effect of customer satisfaction on customer loyalty; this moderating effect is discussed. Crown Copyright 2009 Published by Elsevier B.V. All rights reserved. * Corresponding author. Tel.: +886 6 2757575x53326; fax: +886 6 2757575x53326. E-mail addresses: easyhhc@mail.ncku.edu.tw (H.H. Chang), swchen@npic.edu.tw (S.W. Chen).", "title": "" }, { "docid": "2466ac1ce3d54436f74b5bb024f89662", "text": "In this paper we discuss our work on applying media theory to the creation of narrative augmented reality (AR) experiences. We summarize the concepts of remediation and media forms as they relate to our work, argue for their importance to the development of a new medium such as AR, and present two example AR experiences we have designed using these conceptual tools. In particular, we focus on leveraging the interaction between the physical and virtual world, remediating existing media (film, stage and interactive CD-ROM), and building on the cultural expectations of our users.", "title": "" }, { "docid": "82180726cc1aaaada69f3b6cb0e89acc", "text": "The wheelchair is the major means of transport for physically disabled people. However, it cannot overcome architectural barriers such as curbs and stairs. In this paper, the authors proposed a method to avoid falling down of a wheeled inverted pendulum type robotic wheelchair for climbing stairs. The problem of this system is that the feedback gain of the wheels cannot be set high due to modeling errors and gear backlash, which results in the movement of wheels. Therefore, the wheels slide down the stairs or collide with the side of the stairs, and finally the wheelchair falls down. To avoid falling down, the authors proposed a slider control strategy based on skyhook model in order to decrease the movement of wheels, and a rotary link control strategy based on the staircase dimensions in order to avoid collision or slide down. The effectiveness of the proposed fall avoidance control strategy was validated by ODE simulations and the prototype wheelchair. Keywords—EPW, fall avoidance control, skyhook, wheeled inverted pendulum.", "title": "" }, { "docid": "29c6cba747a2ad280d2185bfcd5866e2", "text": "A millimeter-wave shaped-beam substrate integrated conformal array antenna is demonstrated in this paper. After discussing the influence of conformal shape on the characteristics of a substrate integrated waveguide (SIW) and a radiating slot, an array mounted on a cylindrical surface with a radius of 20 mm, i.e., 2.3 λ, is synthesized at the center frequency of 35 GHz. All components, including a 1-to-8 divider, a phase compensated network and an 8 × 8 slot array are fabricated in a single dielectric substrate together. In measurement, it has a - 27.4 dB sidelobe level (SLL) beam in H-plane and a flat-topped fan beam with -38° ~ 37° 3 dB beamwidth in E-plane at the center frequency of 35 GHz. The cross polarization is lower than -41.7 dB at the beam direction. Experimental results agree well with simulations, thus validating our design. This SIW scheme is able to solve the difficulty of integration between conformal array elements and a feed network in millimeter-wave frequency band, while avoid radiation leakage and element-to-element parasitic cross-coupling from the feed network.", "title": "" }, { "docid": "d6bcf73a0237416318896154dfb0a764", "text": "Singular Value Decomposition (SVD) is a popular approach in various network applications, such as link prediction and network parameter characterization. Incremental SVD approaches are proposed to process newly changed nodes and edges in dynamic networks. However, incremental SVD approaches suffer from serious error accumulation inevitably due to approximation on incremental updates. SVD restart is an effective approach to reset the aggregated error, but when to restart SVD for dynamic networks is not addressed in literature. In this paper, we propose TIMERS, Theoretically Instructed Maximum-Error-bounded Restart of SVD, a novel approach which optimally sets the restart time in order to reduce error accumulation in time. Specifically, we monitor the margin between reconstruction loss of incremental updates and the minimum loss in SVD model. To reduce the complexity of monitoring, we theoretically develop a lower bound of SVD minimum loss for dynamic networks and use the bound to replace the minimum loss in monitoring. By setting a maximum tolerated error as a threshold, we can trigger SVD restart automatically when the margin exceeds this threshold. We prove that the time complexity of our method is linear with respect to the number of local dynamic changes, and our method is general across different types of dynamic networks. We conduct extensive experiments on several synthetic and real dynamic networks. The experimental results demonstrate that our proposed method significantly outperforms the existing methods by reducing 27% to 42% in terms of the maximum error for dynamic network reconstruction when fixing the number of restarts. Our method reduces the number of restarts by 25% to 50% when fixing the maximum error tolerated.", "title": "" }, { "docid": "5214faa5f3906819ad56394cf45adc55", "text": "For most applications, the pulse width modulation (PWM) of the primary side switch varies with input line. The switch on-time regulates the output. For a constant output voltage, the volt-seconds applied to the primary will be constant but reset time varies, being relatively long at high line and short at low line. The switch voltage is minimized when the switch off-time is long and fully used for reset", "title": "" }, { "docid": "995fca88b7813c5cfed1c92522cc8d29", "text": "Diode rectifiers with large dc-bus capacitors, used in the front ends of variable-frequency drives (VFDs) and other ac-to-dc converters, draw discontinuous current from the power system, resulting in current distortion and, hence, voltage distortion. Typically, the power system can handle current distortion without showing signs of voltage distortion. However, when the majority of the load on a distribution feeder is made up of VFDs, current distortion becomes an important issue since it can cause voltage distortion. Multipulse techniques to reduce input current harmonics are popular because they do not interfere with the existing power system either from higher conducted electromagnetic interference, when active techniques are used, or from possible resonance, when capacitor-based filters are employed. In this paper, a new 18-pulse topology is proposed that has two six-pulse rectifiers powered via a phase-shifting isolation transformer, while the third six-pulse rectifier is fed directly from the ac source via a matching inductor. This idea relies on harmonic current cancellation strategy rather than flux cancellation method and results in lower overall harmonics. It is also seen to be smaller in size and weight and lower in cost compared to an isolation transformer. Experimental results are given to validate the concept.", "title": "" }, { "docid": "5cc458548f26619b4cc632f25ea2e9f8", "text": "As a consequence of the popularity of big data, many users with a variety of backgrounds seek to extract high level information from datasets collected from various sources and combined using data integration techniques. A major challenge for research in data management is to develop tools to assist users in explaining observed query outputs. In this paper we introduce a principled approach to provide explanations for answers to SQL queries based on intervention: removal of tuples from the database that significantly affect the query answers. We provide a formal definition of intervention in the presence of multiple relations which can interact with each other through foreign keys. First we give a set of recursive rules to compute the intervention for any given explanation in polynomial time (data complexity). Then we give simple and efficient algorithms based on SQL queries that can compute the top-K explanations by using standard database management systems under certain conditions. We evaluate the quality and performance of our approach by experiments on real datasets.", "title": "" }, { "docid": "5325778a57d0807e9b149108ea9e57d8", "text": "This paper presents a comparison study between 10 automatic and six interactive methods for liver segmentation from contrast-enhanced CT images. It is based on results from the \"MICCAI 2007 Grand Challenge\" workshop, where 16 teams evaluated their algorithms on a common database. A collection of 20 clinical images with reference segmentations was provided to train and tune algorithms in advance. Participants were also allowed to use additional proprietary training data for that purpose. All teams then had to apply their methods to 10 test datasets and submit the obtained results. Employed algorithms include statistical shape models, atlas registration, level-sets, graph-cuts and rule-based systems. All results were compared to reference segmentations five error measures that highlight different aspects of segmentation accuracy. All measures were combined according to a specific scoring system relating the obtained values to human expert variability. In general, interactive methods reached higher average scores than automatic approaches and featured a better consistency of segmentation quality. However, the best automatic methods (mainly based on statistical shape models with some additional free deformation) could compete well on the majority of test images. The study provides an insight in performance of different segmentation approaches under real-world conditions and highlights achievements and limitations of current image analysis techniques.", "title": "" }, { "docid": "5da9811fb60b5f6334e05ba71902ddfd", "text": "In this paper, a numerical TRL calibration technique is used to accurately extract the equivalent circuit parameters of post-wall iris and input/output coupling structure which are used for the design of directly-coupled substrate integrated waveguide (SIW) filter with the first/last SIW cavities directly excited by 50 Ω microstrip line. On the basis of this dimensional design process, the entire procedure of filter design can meet all of the design specifications without resort to any time-consuming tuning and optimization. A K-band 5th-degree SIW filter with relative bandwidth of 6% was designed and fabricated by low-cost PCB process on Rogers RT/duroid 5880. Measured results which agree well with simulated results validate the accurate dimensional synthesis procedure.", "title": "" }, { "docid": "5706b4955db81d04398fd6a64eb70c7c", "text": "The number of applications (or apps) in the Android Market exceeded 450,000 in 2012 with more than 11 billion total downloads. The necessity to fix bugs and add new features leads to frequent app updates. For each update, a full new version of the app is downloaded to the user's smart phone; this generates significant traffic in the network. We propose to use delta encoding algorithms and to download only the difference between two versions of an app. We implement delta encoding for Android using the bsdiff and bspatch tools and evaluate its performance. We show that app update traffic can be reduced by about 50%, this can lead to significant cost and energy savings.", "title": "" }, { "docid": "1ff97f1fc404ae8a8882687b5d507857", "text": "Music listening has changed greatly with the emergence of music streaming services, such as Spotify and YouTube. In this paper, we discuss an artistic practice that organizes streaming videos to perform a real-time improvisation via live coding. A live coder uses any available video from YouTube, a video streaming service, as source material to perform an improvised audiovisual piece. The challenge is to manipulate the emerging media that are streamed from a cloud server. The musical gesture can be limited due to the constrained functionalities of the YouTube API. However, the potential sonic and visual space that a musician can explore is practically infinite. The practice embraces the juxtaposition of manipulating emerging media in old-fashioned ways similar to experimental musicians in the 60’s physically manipulating tape loops or scratching vinyl records on a phonograph while exploring the expressiveness enabled by the gigantic repository of all kinds of videos. In this paper, we discuss the challenges of using streaming videos from the platform as musical materials in live music performance and introduce a live coding environment that we developed for real-time improvisation.", "title": "" }, { "docid": "4a0756bffc50e11a0bcc2ab88502e1a2", "text": "The interest in attribute weighting for soft subspace clustering have been increasing in the last years. However, most of the proposed approaches are designed for dealing only with numeric data. In this paper, our focus is on soft subspace clustering for categorical data. In soft subspace clustering, the attribute weighting approach plays a crucial role. Due to this, we propose an entropy-based approach for measuring the relevance of each categorical attribute in each cluster. Besides that, we propose the EBK-modes (entropy-based k-modes), an extension of the basic k-modes that uses our approach for attribute weighting. We performed experiments on five real-world datasets, comparing the performance of our algorithms with four state-of-the-art algorithms, using three well-known evaluation metrics: accuracy, f-measure and adjusted Rand index. According to the experiments, the EBK-modes outperforms the algorithms that were considered in the evaluation, regarding the considered metrics.", "title": "" }, { "docid": "f65c027ab5baa981667955cc300d2f34", "text": "In-band full-duplex (FD) wireless communication, i.e. simultaneous transmission and reception at the same frequency, in the same channel, promises up to 2x spectral efficiency, along with advantages in higher network layers [1]. the main challenge is dealing with strong in-band leakage from the transmitter to the receiver (i.e. self-interference (SI)), as TX powers are typically >100dB stronger than the weakest signal to be received, necessitating TX-RX isolation and SI cancellation. Performing this SI-cancellation solely in the digital domain, if at all possible, would require extremely clean (low-EVM) transmission and a huge dynamic range in the RX and ADC, which is currently not feasible [2]. Cancelling SI entirely in analog is not feasible either, since the SI contains delayed TX components reflected by the environment. Cancelling these requires impractically large amounts of tunable analog delay. Hence, FD-solutions proposed thus far combine SI-rejection at RF, analog BB, digital BB and cross-domain.", "title": "" }, { "docid": "fa50a600b1c7e8eb87c4751ce704e19f", "text": "Underwater soundscapes have probably played an important role in the adaptation of ears and auditory systems of fishes throughout evolutionary time, and for all species. These sounds probably contain important information about the environment and about most objects and events that confront the receiving fish so that appropriate behavior is possible. For example, the sounds from reefs appear to be used by at least some fishes for their orientation and migration. These sorts of environmental sounds should be considered much like \"acoustic daylight,\" that continuously bathes all environments and contain information that all organisms can potentially use to form a sort of image of the environment. At present, however, we are generally ignorant of the nature of ambient sound fields impinging on fishes, and the adaptive value of processing these fields to resolve the multiple sources of sound. Our field has focused almost exclusively on the adaptive value of processing species-specific communication sounds, and has not considered the informational value of ambient \"noise.\" Since all fishes can detect and process acoustic particle motion, including the directional characteristics of this motion, underwater sound fields are potentially more complex and information-rich than terrestrial acoustic environments. The capacities of one fish species (goldfish) to receive and make use of such sound source information have been demonstrated (sound source segregation and auditory scene analysis), and it is suggested that all vertebrate species have this capacity. A call is made to better understand underwater soundscapes, and the associated behaviors they determine in fishes.", "title": "" }, { "docid": "32faa5a14922d44101281c783cf6defb", "text": "A novel multifocus color image fusion algorithm based on the quaternion wavelet transform (QWT) is proposed in this paper, aiming at solving the image blur problem. The proposed method uses a multiresolution analysis procedure based on the quaternion wavelet transform. The performance of the proposed fusion scheme is assessed by some experiments, and the experimental results show that the proposed method is effective and performs better than the existing fusion methods.", "title": "" }, { "docid": "8a1ba6ce6500f96afdb2c2294bf28a44", "text": "This paper identifies the relative importance of key enabling factors for implementing industry 4.0 from a technological readiness perspective. The research involves the identification of enabling factors, their categorization into technological readiness dimensions, followed by the determination of the relative importance of both technological readiness dimensions and key objective measures. The results show a strong relationship between technological readiness and design principles of Industry 4.0. The findings suggest that process-related objectives are more important than economic-related and environmental-related objectives when implementing industry 4.0. The results also show that “the knowledge of humans in technology and how to leverage it” and “improving the ability of machines and devices in connecting to the internet” are the most important factors for achieving all objective measures. Practitioners can use the apparent relationship between process related objectives and key technological dimensions for setting appropriate strategies and policies when moving towards Industry 4.0.", "title": "" }, { "docid": "03eabf03f8ac967c728ff35b77f3dd84", "text": "In this paper, we tackle the problem of associating combinations of colors to abstract categories (e.g. capricious, classic, cool, delicate, etc.). It is evident that such concepts would be difficult to distinguish using single colors, therefore we consider combinations of colors or color palettes. We leverage two novel databases for color palettes and we learn categorization models using low and high level descriptors. Preliminary results show that Fisher representation based on GMMs is the most rewarding strategy in terms of classification performance over a baseline model. We also suggest a process for cleaning weakly annotated data, whilst preserving the visual coherence of categories. Finally, we demonstrate how learning abstract categories on color palettes can be used in the application of color transfer, personalization and image re-ranking.", "title": "" } ]
scidocsrr
7d5a7a32bc43397f786ee4c6b04a4f5f
Vehicle detection for traffic flow analysis
[ { "docid": "27f3060ef96f1656148acd36d50f02ce", "text": "Video sensors become particularly important in traffic applications mainly due to their fast response, easy installation, operation and maintenance, and their ability to monitor wide areas. Research in several fields of traffic applications has resulted in a wealth of video processing and analysis methods. Two of the most demanding and widely studied applications relate to traffic monitoring and automatic vehicle guidance. In general, systems developed for these areas must integrate, amongst their other tasks, the analysis of their static environment (automatic lane finding) and the detection of static or moving obstacles (object detection) within their space of interest. In this paper we present an overview of image processing and analysis tools used in these applications and we relate these tools with complete systems developed for specific traffic applications. More specifically, we categorize processing methods based on the intrinsic organization of their input data (feature-driven, area-driven, or model-based) and the domain of processing (spatial/frame or temporal/video). Furthermore, we discriminate between the cases of static and mobile camera. Based on this categorization of processing tools, we present representative systems that have been deployed for operation. Thus, the purpose of the paper is threefold. First, to classify image-processing methods used in traffic applications. Second, to provide the advantages and disadvantages of these algorithms. Third, from this integrated consideration, to attempt an evaluation of shortcomings and general needs in this field of active research. q 2003 Elsevier Science B.V. All rights reserved.", "title": "" } ]
[ { "docid": "c708834dc328b9ab60471535bdd37cf0", "text": "Trajectory optimizers are a powerful class of methods for generating goal-directed robot motion. Differential Dynamic Programming (DDP) is an indirect method which optimizes only over the unconstrained control-space and is therefore fast enough to allow real-time control of a full humanoid robot on modern computers. Although indirect methods automatically take into account state constraints, control limits pose a difficulty. This is particularly problematic when an expensive robot is strong enough to break itself. In this paper, we demonstrate that simple heuristics used to enforce limits (clamping and penalizing) are not efficient in general. We then propose a generalization of DDP which accommodates box inequality constraints on the controls, without significantly sacrificing convergence quality or computational effort. We apply our algorithm to three simulated problems, including the 36-DoF HRP-2 robot. A movie of our results can be found here goo.gl/eeiMnn.", "title": "" }, { "docid": "58c488555240ded980033111a9657be4", "text": "BACKGROUND\nThe management of opioid-induced constipation (OIC) is often complicated by the fact that clinical measures of constipation do not always correlate with patient perception. As the discomfort associated with OIC can lead to poor compliance with the opioid treatment, a shift in focus towards patient assessment is often advocated.\n\n\nSCOPE\nThe Bowel Function Index * (BFI) is a new patient-assessment scale that has been developed and validated specifically for OIC. It is a physician-administered, easy-to-use scale made up of three items (ease of defecation, feeling of incomplete bowel evacuation, and personal judgement of constipation). An extensive analysis has been performed in order to validate the BFI as reliable, stable, clinically valid, and responsive to change in patients with OIC, with a 12-point change in score constituting a clinically relevant change in constipation.\n\n\nFINDINGS\nThe results of the validation analysis were based on major clinical trials and have been further supported by data from a large open-label study and a pharmaco-epidemiological study, in which the BFI was used effectively to assess OIC in a large population of patients treated with opioids. Although other patient self-report scales exist, the BFI offers several unique advantages. First, by being physician-administered, the BFI minimizes reading and comprehension difficulties; second, by offering general and open-ended questions which capture patient perspective, the BFI is likely to detect most patients suffering from OIC; third, by being short and easy-to-use, it places little burden on the patient, thereby increasing the likelihood of gathering accurate information.\n\n\nCONCLUSION\nAltogether, the available data suggest that the BFI will be useful in clinical trials and in daily practice.", "title": "" }, { "docid": "6cce055b947b1d222bfdee01507416a1", "text": "An automatic road sign recognition system first locates road signs within images captured by an imaging sensor on-board of a vehicle, and then identifies road signs assisting the driver of the vehicle to properly operate the vehicle. This paper presents an automatic road sign recognition system capable of analysing live images, detecting multiple road signs within images, and classifying the type of the detected road signs. The system consists of two modules: detection and classification. The detection module segments the input image in the hue-saturation-intensity colour space and locates road signs. The classification module determines the type of detected road signs using a series of one to one architectural Multi Layer Perceptron neural networks. The performances of the classifiers that are trained using Resillient Backpropagation and Scaled Conjugate Gradient algorithms are compared. The experimental results demonstrate that the system is capable of achieving an average recognition hit-rate of 96% using Scaled Conjugate Gradient trained classifiers.", "title": "" }, { "docid": "2c328d1dd45733ad8063ea89a6b6df43", "text": "We present Residual Policy Learning (RPL): a simple method for improving nondifferentiable policies using model-free deep reinforcement learning. RPL thrives in complex robotic manipulation tasks where good but imperfect controllers are available. In these tasks, reinforcement learning from scratch remains data-inefficient or intractable, but learning a residual on top of the initial controller can yield substantial improvement. We study RPL in five challenging MuJoCo tasks involving partial observability, sensor noise, model misspecification, and controller miscalibration. By combining learning with control algorithms, RPL can perform long-horizon, sparse-reward tasks for which reinforcement learning alone fails. Moreover, we find that RPL consistently and substantially improves on the initial controllers. We argue that RPL is a promising approach for combining the complementary strengths of deep reinforcement learning and robotic control, pushing the boundaries of what either can achieve independently.", "title": "" }, { "docid": "902c6c4cc66b827f901648fd3ac2f6a9", "text": "In recent years, multiple neuromorphic architectures have been designed to execute cognitive applications that deal with image and speech analysis. These architectures have followed one of two approaches. One class of architectures is based on machine learning with artificial neural networks. A second class is focused on emulating biology with spiking neuron models, in an attempt to eventually approach the brain's accuracy and energy efficiency. A prominent example of the second class is IBM's TrueNorth processor that can execute large spiking networks on a low-power tiled architecture, and achieve high accuracy on a variety of tasks. However, as we show in this work, there are many inefficiencies in the TrueNorth design. We propose a new architecture, INXS, for spiking neural networks that improves upon the computational efficiency and energy efficiency of the TrueNorth design by 3,129× and 10× respectively. The architecture uses memristor crossbars to compute the effects of input spikes on several neurons in parallel. Digital units are then used to update neuron state. We show that the parallelism offered by crossbars is critical in achieving high throughput and energy efficiency.", "title": "" }, { "docid": "9847518e92a8f1b6cef2365452b01008", "text": "This paper presents a Planar Inverted F Antenna (PIFA) tuned with a fixed capacitor to the low frequency bands supported by the Long Term Evolution (LTE) technology. The tuning range is investigated and optimized with respect to the bandwidth and the efficiency of the resulting antenna. Simulations and mock-ups are presented.", "title": "" }, { "docid": "d8a0fec69df5f8eeb2bb8e82484b8ac7", "text": "Traditionally, Information and Communication Technology (ICT) “has been segregated from the normal teaching classroom” [12], e.g. in computer labs. This has been changed with the advent of smaller devices like iPads. There is a shift from separating ICT and education to co-located settings in which digital technology becomes part of the classroom. This paper presents the results from a study about exploring digital didactical designs using iPads applied by teachers in schools. Classroom observations and interviews in iPad-classrooms in Danish schools have been done with the aim to provide empirical evidence on the co-evolutionary design of both, didactical designs and iPads. The Danish community Odder has 7 schools where around 200 teachers and 2,000 students aged 6-16 use iPads in a 1:1 iPad-program. Three key aspects could be explored: The teachers’ digital didactical designs embrace a) new learning goals where more than one correct answer exists, b) focus on producing knowledge in informal-in-formal learning spaces, c) making learning visible in different products (text, comics, podcasts etc.). The results show the necessity of rethinking traditional Didaktik towards Digital Didactics.", "title": "" }, { "docid": "fbce6308301306e0ef5877b192281a95", "text": "AIM\nThe aim of this paper is to distinguish the integrative review method from other review methods and to propose methodological strategies specific to the integrative review method to enhance the rigour of the process.\n\n\nBACKGROUND\nRecent evidence-based practice initiatives have increased the need for and the production of all types of reviews of the literature (integrative reviews, systematic reviews, meta-analyses, and qualitative reviews). The integrative review method is the only approach that allows for the combination of diverse methodologies (for example, experimental and non-experimental research), and has the potential to play a greater role in evidence-based practice for nursing. With respect to the integrative review method, strategies to enhance data collection and extraction have been developed; however, methods of analysis, synthesis, and conclusion drawing remain poorly formulated.\n\n\nDISCUSSION\nA modified framework for research reviews is presented to address issues specific to the integrative review method. Issues related to specifying the review purpose, searching the literature, evaluating data from primary sources, analysing data, and presenting the results are discussed. Data analysis methods of qualitative research are proposed as strategies that enhance the rigour of combining diverse methodologies as well as empirical and theoretical sources in an integrative review.\n\n\nCONCLUSION\nAn updated integrative review method has the potential to allow for diverse primary research methods to become a greater part of evidence-based practice initiatives.", "title": "" }, { "docid": "69198cc56f9c4f7f1f235ae7d7c34479", "text": "This paper presents fine-tuned CNN features for person re-identification. Recently, features extracted from top layers of pre-trained Convolutional Neural Network (CNN) on a large annotated dataset, e.g., ImageNet, have been proven to be strong off-the-shelf descriptors for various recognition tasks. However, large disparity among the pre-trained task, i.e., ImageNet classification, and the target task, i.e., person image matching, limits performances of the CNN features for person re-identification. In this paper, we improve the CNN features by conducting a fine-tuning on a pedestrian attribute dataset. In addition to the classification loss for multiple pedestrian attribute labels, we propose new labels by combining different attribute labels and use them for an additional classification loss function. The combination attribute loss forces CNN to distinguish more person specific information, yielding more discriminative features. After extracting features from the learned CNN, we apply conventional metric learning on a target re-identification dataset for further increasing discriminative power. Experimental results on four challenging person re-identification datasets (VIPeR, CUHK, PRID450S and GRID) demonstrate the effectiveness of the proposed features.", "title": "" }, { "docid": "b3c779728e4f669784c31a89ed7790f9", "text": "Head pose estimation is essential for several applications and is particularly required for head pose-free eye-gaze tracking where estimation of head rotation permits free head movement during tracking. While the literature is broad, the accuracy of recent vision-based head pose estimation methods is contingent upon the availability of training data or accurate initialisation and tracking of specific facial landmarks. In this paper, we propose a method to estimate the head pose in realtime from the trajectories of a set of feature points spread randomly over the face region, without requiring a training phase or model-fitting of specific facial features. Conversely, without seeking specific facial landmarks, our method exploits the sparse 3-dimensional shape of the surface of interest, recovered via shape and motion factorisation, in combination with particle filtering to correct mistracked feature points and improve upon an initial estimation of the 3-dimensional shape during tracking. In comparison with two additional methods, quantitative results obtained through our modeland landmark-free method yield a reduction in the head pose estimation error for a wide range of head rotation angles.", "title": "" }, { "docid": "fdebcc3ec36a61186b893773eedbd529", "text": "OBJECTIVE\nClinical observations of the flexion synergy in individuals with chronic hemiparetic stroke describe coupling of shoulder, elbow, wrist, and finger joints. Yet, experimental quantification of the synergy within a shoulder abduction (SABD) loading paradigm has focused only on shoulder and elbow joints. The paretic wrist and fingers have typically been studied in isolation. Therefore, this study quantified involuntary behavior of paretic wrist and fingers during concurrent activation of shoulder and elbow.\n\n\nMETHODS\nEight individuals with chronic moderate-to-severe hemiparesis and four controls participated. Isometric wrist/finger and thumb flexion forces and wrist/finger flexor and extensor electromyograms (EMG) were measured at two positions when lifting the arm: in front of the torso and at maximal reaching distance. The task was completed in the ACT(3D) robotic device with six SABD loads by paretic, non-paretic, and control limbs.\n\n\nRESULTS\nConsiderable forces and EMG were generated during lifting of the paretic arm only, and they progressively increased with SABD load. Additionally, the forces were greater at the maximal reach position than at the position front of the torso.\n\n\nCONCLUSIONS\nFlexion of paretic wrist and fingers is involuntarily coupled with certain shoulder and elbow movements.\n\n\nSIGNIFICANCE\nActivation of the proximal upper limb must be considered when seeking to understand, rehabilitate, or develop devices to assist the paretic hand.", "title": "" }, { "docid": "5bfedcfae127e808974ceaf0dca7970c", "text": "A new information-theoretic approach is presented for finding the registration of volumetric medical images of differing modalities. Registration is achieved by adjustment of the relative position and orientation until the mutual information between the images is maximized. In our derivation of the registration procedure, few assumptions are made about the nature of the imaging process. As a result the algorithms are quite general and can foreseeably be used with a wide variety of imaging devices. This approach works directly with image data; no pre-processing or segmentation is required. This technique is, however, more flexible and robust than other intensity-based techniques like correlation. Additionally, it has an efficient implementation that is based on stochastic approximation. Experiments are presented that demonstrate the approach registering magnetic resonance (MR) images with computed tomography (CT) images, and with positron-emission tomography (PET) images. Surgical applications of the registration method are described.", "title": "" }, { "docid": "fd14b9e25affb05fd9b05036f3ce350b", "text": "Recent advances in pedestrian detection are attained by transferring the learned features of Convolutional Neural Network (ConvNet) to pedestrians. This ConvNet is typically pre-trained with massive general object categories (e.g. ImageNet). Although these features are able to handle variations such as poses, viewpoints, and lightings, they may fail when pedestrian images with complex occlusions are present. Occlusion handling is one of the most important problem in pedestrian detection. Unlike previous deep models that directly learned a single detector for pedestrian detection, we propose DeepParts, which consists of extensive part detectors. DeepParts has several appealing properties. First, DeepParts can be trained on weakly labeled data, i.e. only pedestrian bounding boxes without part annotations are provided. Second, DeepParts is able to handle low IoU positive proposals that shift away from ground truth. Third, each part detector in DeepParts is a strong detector that can detect pedestrian by observing only a part of a proposal. Extensive experiments in Caltech dataset demonstrate the effectiveness of DeepParts, which yields a new state-of-the-art miss rate of 11:89%, outperforming the second best method by 10%.", "title": "" }, { "docid": "246a4ed0d3a94fead44c1e48cc235a63", "text": "With the introduction of fully convolutional neural networks, deep learning has raised the benchmark for medical image segmentation on both speed and accuracy, and different networks have been proposed for 2D and 3D segmentation with promising results. Nevertheless, most networks only handle relatively small numbers of labels (<10), and there are very limited works on handling highly unbalanced object sizes especially in 3D segmentation. In this paper, we propose a network architecture and the corresponding loss function which improve segmentation of very small structures. By combining skip connections and deep supervision with respect to the computational feasibility of 3D segmentation, we propose a fast converging and computationally efficient network architecture for accurate segmentation. Furthermore, inspired by the concept of focal loss, we propose an exponential logarithmic loss which balances the labels not only by their relative sizes but also by their segmentation difficulties. We achieve an average Dice coefficient of 82% on brain segmentation with 20 labels, with the ratio of the smallest to largest object sizes as 0.14%. Less than 100 epochs are required to reach such accuracy, and segmenting a 128×128×128 volume only takes around 0.4 s.", "title": "" }, { "docid": "6c149f1f6e9dc859bf823679df175afb", "text": "Neurofeedback is attracting renewed interest as a method to self-regulate one's own brain activity to directly alter the underlying neural mechanisms of cognition and behavior. It not only promises new avenues as a method for cognitive enhancement in healthy subjects, but also as a therapeutic tool. In the current article, we present a review tutorial discussing key aspects relevant to the development of electroencephalography (EEG) neurofeedback studies. In addition, the putative mechanisms underlying neurofeedback learning are considered. We highlight both aspects relevant for the practical application of neurofeedback as well as rather theoretical considerations related to the development of new generation protocols. Important characteristics regarding the set-up of a neurofeedback protocol are outlined in a step-by-step way. All these practical and theoretical considerations are illustrated based on a protocol and results of a frontal-midline theta up-regulation training for the improvement of executive functions. Not least, assessment criteria for the validation of neurofeedback studies as well as general guidelines for the evaluation of training efficacy are discussed.", "title": "" }, { "docid": "de638a90e5a6ef3bf030d998b0e921a3", "text": "The quantization techniques have shown competitive performance in approximate nearest neighbor search. The state-of-the-art algorithm, composite quantization, takes advantage of the compositionabity, i.e., the vector approximation accuracy, as opposed to product quantization and Cartesian k-means. However, we have observed that the runtime cost of computing the distance table in composite quantization, which is used as a lookup table for fast distance computation, becomes nonnegligible in real applications, e.g., reordering the candidates retrieved from the inverted index when handling very large scale databases. To address this problem, we develop a novel approach, called sparse composite quantization, which constructs sparse dictionaries. The benefit is that the distance evaluation between the query and the dictionary element (a sparse vector) is accelerated using the efficient sparse vector operation, and thus the cost of distance table computation is reduced a lot. Experiment results on large scale ANN retrieval tasks (1M SIFTs and 1B SIFTs) and applications to object retrieval show that the proposed approach yields competitive performance: superior search accuracy to product quantization and Cartesian k-means with almost the same computing cost, and much faster ANN search than composite quantization with the same level of accuracy.", "title": "" }, { "docid": "8be957572c846ddda107d8343094401b", "text": "Corporate accounting statements provide financial markets, and tax services with valuable data on the economic health of companies, although financial indices are only focused on a very limited part of the activity within the company. Useful tools in the field of processing extended financial and accounting data are the methods of Artificial Intelligence, aiming the efficient delivery of financial information to tax services, investors, and financial markets where lucrative portfolios can be created. Key-words: Financial Indices, Artificial Intelligence, Data Mining, Neural Networks, Genetic Algorithms", "title": "" }, { "docid": "23d560ca3bb6f2d7d9b615b5ad3224d2", "text": "The Pebbles project is creating applications to connmt multiple Personal DigiM Assistants &DAs) to a main computer such as a PC We are cmenfly using 3Com Pd@Ilots b-use they are popdar and widespread. We created the ‘Remote Comrnandefl application to dow users to take turns sending input from their PahnPiiots to the PC as if they were using the PCS mouse and keyboard. ‘.PebblesDraw” is a shared whiteboard application we btit that allows dl of tie users to send input simtdtaneously while sharing the same PC display. We are investigating the use of these applications in various contexts, such as colocated mmtings. Keywor& Personal Digiti Assistants @DAs), PH11oc Single Display Groupware, Pebbles, AmuleL", "title": "" }, { "docid": "92d5ebd49670681a5d43ba90731ae013", "text": "Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software defense that stops shellcode, by reusing instructions from large libraries such as libc. Modern operating systems have since enabled address randomization (ASLR), which randomizes the location of libc, making these techniques unusable in practice. However, modern ASLR implementations leave smaller amounts of executable code unrandomized and it has been unclear whether an attacker can use these small code fragments to construct payloads in the general case. In this paper, we show defenses as currently deployed can be bypassed with new techniques for automatically creating ROP payloads from small amounts of unrandomized code. We propose using semantic program verification techniques for identifying the functionality of gadgets, and design a ROP compiler that is resistant to missing gadget types. To demonstrate our techniques, we build Q, an end-to-end system that automatically generates ROP payloads for a given binary. Q can produce payloads for 80% of Linux /usr/bin programs larger than 20KB. We also show that Q can automatically perform exploit hardening: given an exploit that crashes with defenses on, Q outputs an exploit that bypasses both W⊕X and ASLR. We show that Q can harden nine realworld Linux and Windows exploits, enabling an attacker to automatically bypass defenses as deployed by industry for those programs.", "title": "" } ]
scidocsrr
4dd5d528207ab806e9a7776a4678cbd3
A Proposed Lexicon-Based Sentiment Analysis Approach for the Vernacular Algerian Arabic
[ { "docid": "f31b5a573eb69afebd86a35e9fd64162", "text": "With the rapid increase in the volume of Arabic opinionated posts on different microblogging mediums comes an increasing demand for Arabic sentiment analysis tools. Yet, research in the area of Arabic sentiment analysis is progressing at a very slow pace compared to that being carried out in English and other languages. This paper highlights the major problems and open research issues that face sentiment analysis of Arabic social media. The paper also presents a case study the goal of which is to investigate the possibility of determining the semantic orientation of Arabic Egyptian tweets and comments given limited Arabic resources. One of the outcomes of the presented study, is an Egyptian dialect sentiment lexicon.", "title": "" }, { "docid": "fb2287cb1c41441049288335f10fd473", "text": "One of the important types of information on the Web is the opinions expressed in the user generated content, e.g., customer reviews of products, forum posts, and blogs. In this paper, we focus on customer reviews of products. In particular, we study the problem of determining the semantic orientations (positive, negative or neutral) of opinions expressed on product features in reviews. This problem has many applications, e.g., opinion mining, summarization and search. Most existing techniques utilize a list of opinion (bearing) words (also called opinion lexicon) for the purpose. Opinion words are words that express desirable (e.g., great, amazing, etc.) or undesirable (e.g., bad, poor, etc) states. These approaches, however, all have some major shortcomings. In this paper, we propose a holistic lexicon-based approach to solving the problem by exploiting external evidences and linguistic conventions of natural language expressions. This approach allows the system to handle opinion words that are context dependent, which cause major difficulties for existing algorithms. It also deals with many special words, phrases and language constructs which have impacts on opinions based on their linguistic patterns. It also has an effective function for aggregating multiple conflicting opinion words in a sentence. A system, called Opinion Observer, based on the proposed technique has been implemented. Experimental results using a benchmark product review data set and some additional reviews show that the proposed technique is highly effective. It outperforms existing methods significantly", "title": "" } ]
[ { "docid": "891d4b804e5b2c78ab2f00dbe7adf1e2", "text": "We show how the Langlands-Kottwitz method can be used to determine the semisimple local factors of the Hasse-Weil zeta-function of certain Shimura varieties. On the way, we prove a conjecture of Haines and Kottwitz in this special case.", "title": "" }, { "docid": "6bbc6a3f4f8d6f050f4317837cf30144", "text": "Characterizing driving styles of human drivers using vehicle sensor data, e.g., GPS, is an interesting research problem and an important real-world requirement from automotive industries. A good representation of driving features can be highly valuable for autonomous driving, auto insurance, and many other application scenarios. However, traditional methods mainly rely on handcrafted features, which limit machine learning algorithms to achieve a better performance. In this paper, we propose a novel deep learning solution to this problem, which could be the first attempt of studying deep learning for driving behavior analysis. The proposed approach can effectively extract high level and interpretable features describing complex driving patterns from GPS data. It also requires significantly less human experience and work. The power of the learned driving style representations are validated through the driver identification problem using a large real dataset.", "title": "" }, { "docid": "d4931c6b69d0c34476d3419da94b486b", "text": "Microsurgery courses, taught external to surgical training programs, are essential for acquiring the high level of technical skill required for clinical proficiency. The Frankfurt microsurgery course is a 5-day, intensive course that teaches arterial and venous anastomosis using end-to-end, end-to-side, one-way-up, continuous-suture, and vessel graft techniques. During the course, the instructor records the level of skill (in-course data) achieved by each trainee by assessing anastomosis completion and patency. Demographic information is also collected. Post-course trainees are invited to complete an online survey (post-course data) to get their opinions of the courses’ effectiveness. The in-course “skill achievement” and post-course “course effectiveness” data are presented below. In-course data: 94.8 and 59.9% of participants completed patent end-to-end arterial and venous anastomoses, respectively, while 85.4% performed a patent end-to-side anastomosis. 96.1 and 57.1% of participants who attempted arterial and venous anastomoses using the one-way-up technique were successful, as were 90.9% of those attempting continuous-suture technique. Patent venous grafts were performed by 54.7% of participants. All respondents indicated significant improvement of their microsurgical skills after taking the course. 66.7% of respondents considered the full-time presence of the instructor to be the most valuable aspect of the course. All respondents would highly recommend the course to colleagues. The microcourse significantly increased trainees’ clinical microsurgery skills, confidence, and the number of clinical cases they perform. Of all the anastomosis techniques taught, venous anastomosis and grafting were the most difficult to learn. The presence of a full-time experienced instructor was most important.", "title": "" }, { "docid": "4dd06e2c22095a441fea5849d404e0a5", "text": "The number of available legal documents has presented an enormous growth in recent years, and the digital processing of such materials is prompting the necessity of systems that support the automatic relevant information extraction. This work presents a system for ontology-based information extraction from natural language texts, able to identify a set of legal events. The system is based on an innovative methodology based on domain ontology of legal events and a set of linguistic rules, integrated through inference mechanism, resulting in a flexible approach and scalable approach. A case study with the use of documents from the Superior Court in Brazil is related, with satisfactory results in precision and recall.", "title": "" }, { "docid": "5adb3deb8df8450a94aedd4dad2adc50", "text": "We present a two-fold fusion framework that constructs comprehensive cost volumes for stereo matching. To this end, we develop fusion schemes at two key steps, i.e., a) the raw cost computation and b) the cost aggregation. Specifically, we commence by fusing both structure- and data-oriented features as raw costs. We then incorporate the guided filtered costs into the cross-based cost aggregation and obtain the fused aggregated costs. The fusion schemes at the two steps effectively complement each other and result in an accurate disparity map. Experiments on the Middlebury benchmark v3 demonstrate the state-of-the-art performance of our framework in terms of various metrics.", "title": "" }, { "docid": "2e89fd311680473a30b4b6f6e8c9b685", "text": "Rearranging objects on a tabletop surface by means of nonprehensile manipulation is a task which requires skillful interaction with the physical world. Usually, this is achieved by precisely modeling physical properties of the objects, robot, and the environment for explicit planning. In contrast, as explicitly modeling the physical environment is not always feasible and involves various uncertainties, we learn a nonprehensile rearrangement strategy with deep reinforcement learning based on only visual feedback. For this, we model the task with rewards and train a deep Q-network. Our potential field-based heuristic exploration strategy reduces the amount of collisions which lead to suboptimal outcomes and we actively balance the training set to avoid bias towards poor examples. Our training process leads to quicker learning and better performance on the task as compared to uniform exploration and standard experience replay. We demonstrate empirical evidence from simulation that our method leads to a success rate of 85%, show that our system can cope with sudden changes of the environment, and compare our performance with human level performance.", "title": "" }, { "docid": "073f129a34957b19c6d9af96c869b9ab", "text": "The stability of dc microgrids (MGs) depends on the control strategy adopted for each mode of operation. In an islanded operation mode, droop control is the basic method for bus voltage stabilization when there is no communication among the sources. In this paper, it is shown the consequences of droop implementation on the voltage stability of dc power systems, whose loads are active and nonlinear, e.g., constant power loads. The set of parallel sources and their corresponding transmission lines are modeled by an ideal voltage source in series with an equivalent resistance and inductance. This approximate model allows performing a nonlinear stability analysis to predict the system qualitative behavior due to the reduced number of differential equations. Additionally, nonlinear analysis provides analytical stability conditions as a function of the model parameters and it leads to a design guideline to build reliable (MGs) based on safe operating regions.", "title": "" }, { "docid": "937095bf463bf757635b124d140870e3", "text": "Recommender systems have become an important personalization technique on the web and are widely used especially in e-commerce applications. However, operators of web shops and other platforms are challenged by the large variety of available algorithms and the multitude of their possible parameterizations. Since the quality of the recommendations that are given can have a significant business impact, the selection of a recommender system should be made based on well-founded evaluation data. The literature on recommender system evaluation offers a large variety of evaluation metrics but provides little guidance on how to choose among them. This paper focuses on the often neglected aspect of clearly defining the goal of an evaluation and how this goal relates to the selection of an appropriate metric. We discuss several well-known accuracy metrics and analyze how these reflect different evaluation goals. Furthermore we present some less well-known metrics as well as a variation of the area under the curve measure that are particularly suitable for the evaluation of recommender systems in e-commerce applications.", "title": "" }, { "docid": "b741698d7e4d15cb7f4e203f2ddbce1d", "text": "This study examined the process of how socioeconomic status, specifically parents' education and income, indirectly relates to children's academic achievement through parents' beliefs and behaviors. Data from a national, cross-sectional study of children were used for this study. The subjects were 868 8-12-year-olds, divided approximately equally across gender (436 females, 433 males). This sample was 49% non-Hispanic European American and 47% African American. Using structural equation modeling techniques, the author found that the socioeconomic factors were related indirectly to children's academic achievement through parents' beliefs and behaviors but that the process of these relations was different by racial group. Parents' years of schooling also was found to be an important socioeconomic factor to take into consideration in both policy and research when looking at school-age children.", "title": "" }, { "docid": "f92351eac81d6d28c3fd33ea96b75f91", "text": "There is clear evidence that investment in intelligent transportation system technologies brings major social and economic benefits. Technological advances in the area of automatic systems in particular are becoming vital for the reduction of road deaths. We here describe our approach to automation of one the riskiest autonomous manœuvres involving vehicles – overtaking. The approach is based on a stereo vision system responsible for detecting any preceding vehicle and triggering the autonomous overtaking manœuvre. To this end, a fuzzy-logic based controller was developed to emulate how humans overtake. Its input is information from the vision system and from a positioning-based system consisting of a differential global positioning system (DGPS) and an inertial measurement unit (IMU). Its output is the generation of action on the vehicle’s actuators, i.e., the steering wheel and throttle and brake pedals. The system has been incorporated into a commercial Citroën car and tested on the private driving circuit at the facilities of our research center, CAR, with different preceding vehicles – a motorbike, car, and truck – with encouraging results. 2011 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "a6cf86ffa90c74b7d7d3254c7d33685a", "text": "Graph-based methods are known to be successful in many machine learning and pattern classification tasks. These methods consider semistructured data as graphs where nodes correspond to primitives (parts, interest points, and segments) and edges characterize the relationships between these primitives. However, these nonvectorial graph data cannot be straightforwardly plugged into off-the-shelf machine learning algorithms without a preliminary step of--explicit/implicit--graph vectorization and embedding. This embedding process should be resilient to intraclass graph variations while being highly discriminant. In this paper, we propose a novel high-order stochastic graphlet embedding that maps graphs into vector spaces. Our main contribution includes a new stochastic search procedure that efficiently parses a given graph and extracts/samples unlimitedly high-order graphlets. We consider these graphlets, with increasing orders, to model local primitives as well as their increasingly complex interactions. In order to build our graph representation, we measure the distribution of these graphlets into a given graph, using particular hash functions that efficiently assign sampled graphlets into isomorphic sets with a very low probability of collision. When combined with maximum margin classifiers, these graphlet-based representations have a positive impact on the performance of pattern comparison and recognition as corroborated through extensive experiments using standard benchmark databases.", "title": "" }, { "docid": "17d7effe1c0053569fc546bb03bc728c", "text": "Based on Chartered 0.18μ 1.8V 1P5M CMOS process, a gain-boosted telescopic fully differential amplifier with CMFB circuit is designed and used in the sampling and holding circuit of a 14-bit, pipelined A/D converter which is supplied by 1.8 V power. In order to meet specifications, gain-boosting technique is used to improve the gain of OTA and common-mode feedback circuit is elaborately designed. Two-stages CMFB have a stable transient output of 710mV and 1V, respectively. At last, simulation results showed that 106dB loop gain, 1.13GHz unity-gain bandwidth and a phase margin of 71.75° have been achieved for the specifications of S/H circuit. The designed circuit has been applied to the front end of a 14-bit, 100MS/s pipelined ADC.", "title": "" }, { "docid": "bd95c693f27fc28575fee7224092582f", "text": "Corresponding author: Sarfraz Fayaz Khan Department of Management Information Systems, College of Commerce and Business Administration, Dhofar University, Salalah, Sultanate of Oman Email: 1skhan@du.edu.om 2mismail@du.edu.om Abstract: Internet of things has acquired attention all over the globe. It has transformed the agricultural field and allowed farmers to compete with massive issues they face. The aim of this paper is to review the various challenges and opportunities associated with the applications of internet of things in agricultural sector. This research makes use of secondary sources that have been gathered from existing academic literature such as journals, books, articles, magazines, internet, newsletter, company publications and whitepapers. Applications reviewed in this research are about crop sensing, mapping and monitoring the croplands pattern, managing and controlling with the help of radio frequency identification and real-time monitoring of environment. Some of the challenges that were taken into consideration for reviewing the applications of internet of things are software complexity, security, lack of supporting infrastructure and technical skill requirement. Complexity in the software has to be rectified in order to support the IoT network. Therefore software must be developed as user-friendly for improving the farming, production and quality of the crop. Security is the major threat in the IoT applications. Security has to be enhanced through proper access control, data confidentiality and user authentication. Technical skill is required for farming to enhance the organizational abilities and to perform the farming functions, solving problems and more. Proper supporting infrastructure can be developed with proper internet availability and connectivity. Some of the opportunities were taken for reviewing the applications of internet of things are low power wireless sensor, better connectivity, operational efficiency and remote management.", "title": "" }, { "docid": "6e100d0a1b213e1b04a0492f88c6d24a", "text": "Ovarian cysts over 5 and 15 cm in diameter are described as large and giant, respectively3. In addition, women having large cysts without regression in 6-8 weeks time are candidates for surgery. Although data has been published on laparoscopic or laparoscopy assisted management of large and giant cysts, midline laparotomy is still preferred by many surgeons, particularly in cases of giant cysts.", "title": "" }, { "docid": "4636d13d277b3bc33485f72375f0a30f", "text": "The human papillomavirus (HPV) has an affinity for squamous cells of stratified keratinized epithelium, thus affecting the lower genital, nasal, and oral tracts. In the oral cavity, HPV is associated with pathoses such as the verruca vulgaris (common wart), squamous cell papilloma, condyloma acuminatum (venereal wart), and focal epithelial hyperplasia (Heck disease). Among the treatments available for these lesions are cryotherapy, electrosurgery, surgical removal, laser therapy, and trichloroacetic acid (TCA). The objective of this research was to determine the behavior of HPV-associated oral pathoses treated with TCA. A prospective cohort study was performed in 20 patients who attended a dental consultation at 2 universities in Cartagena, Colombia. Among the patients, 65% were diagnosed as having focal epithelial hyperplasia, 20% as having verrucae vulgares, and 15% as having condylomata acuminata. Application of TCA to HPV-associated oral lesions proved to be a useful nonsurgical alternative treatment, as the resolution of the lesions was achieved atraumatically in a span of 45 days with 3 applications of 30-60 seconds each.", "title": "" }, { "docid": "6db749b222a44764cf07bde527c230a3", "text": "There have been many claims that the Internet represents a new “frictionless market.” Our research empirically analyzes the characteristics of the Internet as a channel for two categories of homogeneous products — books and CDs. Using a data set of over 8,500 price observations collected over a period of 15 months, we compare pricing behavior at 41 Internet and conventional retail outlets. We find that prices on the Internet are 9-16% lower than prices in conventional outlets, depending on whether taxes, shipping and shopping costs are included in the price. Additionally, we find that Internet retailers’ price adjustments over time are up to 100 times smaller than conventional retailers’ price adjustments — presumably reflecting lower menu costs in Internet channels. We also find that levels of price dispersion depend importantly on the measures employed. When we simply compare the prices posted by different Internet retailers we find substantial dispersion. Internet retailer prices differ by an average of 33% for books and 25% for CDs. However, when we weight these prices by proxies for market share, we find dispersion is lower in Internet channels than in conventional channels, reflecting the dominance of certain heavily branded retailers. We conclude that while there is lower friction in many dimensions of Internet competition, branding, awareness, and trust remain important sources of heterogeneity among Internet retailers.", "title": "" }, { "docid": "3839daa795aaf81d202141fa3249e28a", "text": "The design and implementation of software for extracting information from GIS files to a format appropriate for use in a spatial modeling software environment is described. This has resulted in publicly available c/c++ language programs for extracting polygons as well as database information from ArcView shape files into the Matlab software environment. In addition, a set of publicly available mapping functions that employ a graphical user interface (GUI) within Matlab are described. Particular attention is given to the interplay between spatial econometric/statistical modeling and the use of GIS information as well as mapping functions. In a recent survey of the interplay between GIS and regional modeling, Goodchild and Haining (2003) indicate the need for a convergence of these two dimensions of spatial modeling in regional science. Many of the design considerations discussed here would also apply to implementing similar functionality in other software environments for spatial statistical modeling such as R/Splus or Gauss. Toolboxes are the name given by the MathWorks to related sets of Matlab functions aimed at solving a particular class of problems. Toolboxes of functions useful in signal processing, optimization, statistics, finance and a host of other areas are available from the MathWorks as add-ons to the standard Matlab software distribution. We label the set of functions described here for extracting GIS file information as well as the GUI mapping functions the Arc Mat Toolbox.", "title": "" }, { "docid": "6bca70ccf17fd4380502b7b4e2e7e550", "text": "A consistent UI leaves an overall impression on user’s psychology, aesthetics and taste. Human–computer interaction (HCI) is the study of how humans interact with computer systems. Many disciplines contribute to HCI, including computer science, psychology, ergonomics, engineering, and graphic design. HCI is a broad term that covers all aspects of the way in which people interact with computers. In their daily lives, people are coming into contact with an increasing number of computer-based technologies. Some of these computer systems, such as personal computers, we use directly. We come into contact with other systems less directly — for example, we have all seen cashiers use laser scanners and digital cash registers when we shop. We have taken the same but in extensible line and made more solid justified by linking with other scientific pillars and concluded some of the best holistic base work for future innovations. It is done by inspecting various theories of Colour, Shape, Wave, Fonts, Design language and other miscellaneous theories in detail. Keywords— Karamvir Singh Rajpal, Mandeep Singh Rajpal, User Interface, User Experience, Design, Frontend, Neonex Technology,", "title": "" }, { "docid": "9b69254f90c28e0256fdfbefc608c034", "text": "Multiple-station shared-use vehicle systems allow users to travel between different activity centers and are well suited for resort communities, recreational areas, as well as university and corporate campuses. In this type of shared-use vehicle system, trips are more likely to be oneway each time, differing from other shared-use vehicle system models such as neighborhood carsharing and station cars where round-trips are more prevalent. Although convenient to users, a multiple-station system can suffer from a vehicle distribution problem. As vehicles are used throughout the day, they may become disproportionally distributed among the stations. As a result, it is necessary on occasion to relocate vehicles from one station to another. Relocations can be performed by system staff, which can be cumbersome and costly. In order to alleviate the distribution problem and reduce the number or relocations, we introduce two user-based relocation mechanisms called trip joining (or ridesharing) or trip splitting. When the system realizes that it is becoming imbalanced, it urges users that have more than one passenger to take separate vehicles when more vehicles are needed at the destination station (trip splitting). Conversely, if two users are at the origin station at the same time traveling to the same destination, the system can urge them to rideshare (trip joining). We have implemented this concept both on a real-world university campus shared vehicle system and in a high-fidelity computer simulation model. The model results show that there can be as much as a 42% reduction in the number of relocations using these techniques.", "title": "" }, { "docid": "1de2d4e5b74461c142e054ffd2e62c2d", "text": "Table : Comparisons of CNN, LSTM and SWEM architectures. Columns correspond to the number of compositional parameters, computational complexity and sequential operations, respectively. v Consider a text sequence represented as X, composed of a sequence of words. Let {v#, v$, ...., v%} denote the respective word embeddings for each token, where L is the sentence/document length; v The compositional function, X → z, aims to combine word embeddings into a fixed-length sentence/document representation z. Typically, LSTM or CNN are employed for this purpose;", "title": "" } ]
scidocsrr
599f53ac10eca1914af585c33115fe09
UJIIndoorLoc: A new multi-building and multi-floor database for WLAN fingerprint-based indoor localization problems
[ { "docid": "7f6edf82ddbe5b63ba5d36a7d8691dda", "text": "This paper identifies the possibility of using electronic compasses and accelerometers in mobile phones, as a simple and scalable method of localization without war-driving. The idea is not fundamentally different from ship or air navigation systems, known for centuries. Nonetheless, directly applying the idea to human-scale environments is non-trivial. Noisy phone sensors and complicated human movements present practical research challenges. We cope with these challenges by recording a person's walking patterns, and matching it against possible path signatures generated from a local electronic map. Electronic maps enable greater coverage, while eliminating the reliance on WiFi infrastructure and expensive war-driving. Measurements on Nokia phones and evaluation with real users confirm the anticipated benefits. Results show a location accuracy of less than 11m in regions where today's localization services are unsatisfactory or unavailable.", "title": "" }, { "docid": "7fd682de56cc80974b6d51fc86ff9dca", "text": "We present an indoor localization application leveraging the sensing capabilities of current state of the art smart phones. To the best of our knowledge, our application is the first one to be implemented in smart phones and integrating both offline and online phases of fingerprinting, delivering an accuracy of up to 1.5 meters. In particular, we have studied the possibilities offered by WiFi radio, cellular communications radio, accelerometer and magnetometer, already embedded in smart phones, with the intention to build a multimodal solution for localization. We have also implemented a new approach for the statistical processing of radio signal strengths, showing that it can outperform existing deterministic techniques.", "title": "" } ]
[ { "docid": "82e866d42fed897b66e49c92209ad805", "text": "A fingerprinting design extracts discriminating features, called fingerprints. The extracted features are unique and specific to each image/video. The visual hash is usually a global fingerprinting technique with crypto-system constraints. In this paper, we propose an innovative video content identification process which combines a visual hash function and a local fingerprinting. Thanks to a visual hash function, we observe the video content variation and we detect key frames. A local image fingerprint technique characterizes the detected key frames. The set of local fingerprints for the whole video summarizes the video or fragments of the video. The video fingerprinting algorithm identifies an unknown video or a fragment of video within a video fingerprint database. It compares the local fingerprints of the candidate video with all local fingerprints of a database even if strong distortions are applied to an original content.", "title": "" }, { "docid": "dd7115cfecdcae82b4870e4241668fe9", "text": "Graphs are commonly used to model the topological structure of internetworks, to study problems ranging from routing to resource reservation. A variety of graphs are found in the literature, including xed topologies such as rings or stars, \\well-known\" topologies such as the ARPAnet, and randomly generated topologies. While many researchers rely upon graphs for analytic and simulation studies, there has been little analysis of the implications of using a particular model, or how the graph generation method may a ect the results of such studies. Further, the selection of one generation method over another is often arbitrary, since the di erences and similarities between methods are not well", "title": "" }, { "docid": "f34e6c34a499b7b88c18049eec221d36", "text": "The double-gimbal mechanism (DGM) is a multibody mechanical device composed of three rigid bodies, namely, a base, an inner gimbal, and an outer gimbal, interconnected by two revolute joints. A typical DGM, where the cylindrical base is connected to the outer gimbal by a revolute joint, and the inner gimbal, which is the disk-shaped payload, is connected to the outer gimbal by a revolute joint. The DGM is an integral component of an inertially stabilized platform, which provides motion to maintain line of sight between a target and a platform payload sensor. Modern, commercially available gimbals use two direct-drive or gear-driven motors on orthogonal axes to actuate the joints. Many of these mechanisms are constrained to a reduced operational region, while moresophisticated models use a slip ring to allow continuous rotation about an axis. Angle measurements for each axis are obtained from either a rotary encoder or a resolver. The DGM is a fundamental component of pointing and tracking applications that include missile guidance systems, ground-based telescopes, antenna assemblies, laser communication systems, and close-in weapon systems (CIWSs) such as the Phalanx 1B.", "title": "" }, { "docid": "760edd83045a80dbb2231c0ffbef2ea7", "text": "This paper proposes a method to modify a traditional convolutional neural network (CNN) into an interpretable CNN, in order to clarify knowledge representations in high conv-layers of the CNN. In an interpretable CNN, each filter in a high conv-layer represents a specific object part. Our interpretable CNNs use the same training data as ordinary CNNs without a need for any annotations of object parts or textures for supervision. The interpretable CNN automatically assigns each filter in a high conv-layer with an object part during the learning process. We can apply our method to different types of CNNs with various structures. The explicit knowledge representation in an interpretable CNN can help people understand the logic inside a CNN, i.e. what patterns are memorized by the CNN for prediction. Experiments have shown that filters in an interpretable CNN are more semantically meaningful than those in a traditional CNN. The code is available at https://github.com/zqs1022/interpretableCNN.", "title": "" }, { "docid": "a7cb2b6f96fae3e6cd71eb8c12d546e5", "text": "Compared to other areas, artwork recommendation has received liŠle aŠention, despite the continuous growth of the artwork market. Previous research has relied on ratings and metadata to make artwork recommendations, as well as visual features extracted with deep neural networks (DNN). However, these features have no direct interpretation to explicit visual features (e.g. brightness, texture) which might hinder explainability and user-acceptance. In this work, we study the impact of artwork metadata as well as visual features (DNN-based and aŠractiveness-based) for physical artwork recommendation, using images and transaction data from the UGallery online artwork store. Our results indicate that: (i) visual features perform beŠer than manually curated data, (ii) DNN-based visual features perform beŠer than aŠractiveness-based ones, and (iii) a hybrid approach improves the performance further. Our research can inform the development of new artwork recommenders relying on diverse content data.", "title": "" }, { "docid": "cafc77957e24dd361b5020e954593a75", "text": "We introduce Ternary Weight Networks (TWNs) neural networks with weights constrained to +1, 0 and -1. The L2 distance between the full (float or double) precision weights and the ternary weights along with a scaling factor is minimized. With the optimization, the TWNs own high capacity of model expression that is good enough to approximate the Full Precision Weight Networks (FPWNs) counterpart. Besides, the TWNs achieve up to 16x or 32x model compression rate and own much fewer multiplications compared with the FPWNs. Compared with recently proposed Binary Precision Weight Networks (BPWNs), the TWNs own nearly 38x more power of expression in a 3×3 size filter, which is commonly used in most of the state-of-the-art CNN models like residual networks or VGG. Besides, the TWNs eliminate the singularity at zero and converge faster and more stablely at training time. Benchmarks on MNIST, CIFAR-10, and the large scale ImageNet dataset show that TWNs achieve state-of-the-art performance which is only slightly worse than the FPWNs counterpart but outperforms the analogous BPWNs.", "title": "" }, { "docid": "3633f55c10b3975e212e6452ad999624", "text": "We propose a method for semantic structure analysis of noun phrases using Abstract Meaning Representation (AMR). AMR is a graph representation for the meaning of a sentence, in which noun phrases (NPs) are manually annotated with internal structure and semantic relations. We extract NPs from the AMR corpus and construct a data set of NP semantic structures. We also propose a transition-based algorithm which jointly identifies both the nodes in a semantic structure tree and semantic relations between them. Compared to the baseline, our method improves the performance of NP semantic structure analysis by 2.7 points, while further incorporating external dictionary boosts the performance by 7.1 points.", "title": "" }, { "docid": "0fc9ddf3920ff193de16067e523d832c", "text": "In this paper, various existing simulation environments for general purpose and specific purpose WSNs are discussed. The features of number of different sensor network simulators and operating systems are compared. We have presented an overview of the most commonly used operating systems that can be used in different approaches to address the common problems of WSNs. For different simulation environments there are different layer, components and protocols implemented so that it is difficult to compare them. When same protocol is simulated using two different simulators still each protocol implementation differs, since their functionality is exactly not the same. Selection of simulator is purely based on the application, since each simulator has a varied range of performance depending on application.", "title": "" }, { "docid": "c61b210036484009cf8077a803824695", "text": "Synthetic Aperture Radar (SAR) image is disturbed by multiplicative noise known as speckle. In this paper, based on the power of deep fully convolutional network, an encoding-decoding framework is introduced for multisource SAR image despeckling. The network contains a series of convolution and deconvolution layers, forming an end-to-end non-linear mapping between noise and clean SAR images. With addition of skip connection, the network can keep image details and accomplish the strategy for residual learning which solves the notorious problem of vanishing gradients and accelerates convergence. The experimental results on simulated and real SAR images show that the introduced approach achieves improvements in both despeckling performance and time efficiency over the state-of-the-art despeckling methods.", "title": "" }, { "docid": "196868f85571b16815127d2bd87b98ff", "text": "Scientists have predicted that carbon’s immediate neighbors on the periodic chart, boron and nitrogen, may also form perfect nanotubes, since the advent of carbon nanotubes (CNTs) in 1991. First proposed then synthesized by researchers at UC Berkeley in the mid 1990’s, the boron nitride nanotube (BNNT) has proven very difficult to make until now. Herein we provide an update on a catalyst-free method for synthesizing highly crystalline, small diameter BNNTs with a high aspect ratio using a high power laser under a high pressure and high temperature environment first discovered jointly by NASA/NIA JSA. Progress in purification methods, dispersion studies, BNNT mat and composite formation, and modeling and diagnostics will also be presented. The white BNNTs offer extraordinary properties including neutron radiation shielding, piezoelectricity, thermal oxidative stability (> 800 ̊C in air), mechanical strength, and toughness. The characteristics of the novel BNNTs and BNNT polymer composites and their potential applications are discussed.", "title": "" }, { "docid": "d382ffcf441df13699378368a629c08c", "text": "This paper addresses the problem of retail product recognition on grocery shelf images. We present a technique for accomplishing this task with a low time complexity. We decompose the problem into detection and recognition. The former is achieved by a generic product detection module which is trained on a specific class of products (e.g. tobacco packages). Cascade object detection framework of Viola and Jones [1] is used for this purpose. We further make use of Support Vector Machines (SVMs) to recognize the brand inside each detected region. We extract both shape and color information; and apply feature-level fusion from two separate descriptors computed with the bag of words approach. Furthermore, we introduce a dataset (available on request) that we have collected for similar research purposes. Results are presented on this dataset of more than 5,000 images consisting of 10 tobacco brands. We show that satisfactory detection and classification can be achieved on devices with cheap computational power. Potential applications of the proposed approach include planogram compliance control, inventory management and assisting visually impaired people during shopping.", "title": "" }, { "docid": "7db08db3dc8ea195b2c2e3b48d358367", "text": "Relationships between authors based on characteristics of published literature have been studied for decades. Author cocitation analysis using mapping techniques has been most frequently used to study how closely two authors are thought to be in intellectual space based on how members of the research community co-cite their works. Other approaches exist to study author relatedness based more directly on the text of their published works. In this study we present static and dynamic word-based approaches using vector space modeling, as well as a topic-based approach based on Latent Dirichlet Allocation for mapping author research relatedness. Vector space modeling is used to define an author space consisting of works by a given author. Outcomes for the two word-based approaches and a topic-based approach for 50 prolific authors in library and information science are compared with more traditional author cocitation analysis using multidimensional scaling and hierarchical cluster analysis. The two word-based approaches produced similar outcomes except where two authors were frequent co-authors for the majority of their articles. The topic-based approach produced the most distinctive map.", "title": "" }, { "docid": "b94d146408340ce2a89b95f1b47e91f6", "text": "In order to improve the life quality of amputees, providing approximate manipulation ability of a human hand to that of a prosthetic hand is considered by many researchers. In this study, a biomechanical model of the index finger of the human hand is developed based on the human anatomy. Since the activation of finger bones are carried out by tendons, a tendon configuration of the index finger is introduced and used in the model to imitate the human hand characteristics and functionality. Then, fuzzy sliding mode control where the slope of the sliding surface is tuned by a fuzzy logic unit is proposed and applied to have the finger model to follow a certain trajectory. The trajectory of the finger model, which mimics the motion characteristics of the human hand, is pre-determined from the camera images of a real hand during closing and opening motion. Also, in order to check the robust behaviour of the controller, an unexpected joint friction is induced on the prosthetic finger on its way. Finally, the resultant prosthetic finger motion and the tendon forces produced are given and results are discussed.", "title": "" }, { "docid": "afa32d9f7160e8efac5bb8a976c0cfaf", "text": "Gesture recognition is mainly apprehensive on analyzing the functionality of human wits. The main goal of gesture recognition is to create a system which can recognize specific human gestures and use them to convey information or for device control. Hand gestures provide a separate complementary modality to speech for expressing ones ideas. Information associated with hand gestures in a conversation is degree, discourse structure, spatial and temporal structure. The approaches present can be mainly divided into Data-Glove Based and Vision Based approaches. An important face feature point is the nose tip. Since nose is the highest protruding point from the face. Besides that, it is not affected by facial expressions. Another important function of the nose is that it is able to indicate the head pose. Knowledge of the nose location will enable us to align an unknown 3D face with those in a face database. Eye detection is divided into eye position detection and eye contour detection. Existing works in eye detection can be classified into two major categories: traditional image-based passive approaches and the active IR based approaches. The former uses intensity and shape of eyes for detection and the latter works on the assumption that eyes have a reflection under near IR illumination and produce bright/dark pupil effect. The traditional methods can be broadly classified into three categories: template based methods, appearance based methods and feature based methods. The purpose of this paper is to compare various human Gesture recognition systems for interfacing machines directly to human wits without any corporeal media in an ambient environment.", "title": "" }, { "docid": "5cbc93a9844fcd026a1705ee031c6530", "text": "Accompanying the rapid urbanization, many developing countries are suffering from serious air pollution problem. The demand for predicting future air quality is becoming increasingly more important to government's policy-making and people's decision making. In this paper, we predict the air quality of next 48 hours for each monitoring station, considering air quality data, meteorology data, and weather forecast data. Based on the domain knowledge about air pollution, we propose a deep neural network (DNN)-based approach (entitled DeepAir), which consists of a spatial transformation component and a deep distributed fusion network. Considering air pollutants' spatial correlations, the former component converts the spatial sparse air quality data into a consistent input to simulate the pollutant sources. The latter network adopts a neural distributed architecture to fuse heterogeneous urban data for simultaneously capturing the factors affecting air quality, e.g. meteorological conditions. We deployed DeepAir in our AirPollutionPrediction system, providing fine-grained air quality forecasts for 300+ Chinese cities every hour. The experimental results on the data from three-year nine Chinese-city demonstrate the advantages of DeepAir beyond 10 baseline methods. Comparing with the previous online approach in AirPollutionPrediction system, we have 2.4%, 12.2%, 63.2% relative accuracy improvements on short-term, long-term and sudden changes prediction, respectively.", "title": "" }, { "docid": "5cfc4911a59193061ab55c2ce5013272", "text": "What can you do with a million images? In this paper, we present a new image completion algorithm powered by a huge database of photographs gathered from the Web. The algorithm patches up holes in images by finding similar image regions in the database that are not only seamless, but also semantically valid. Our chief insight is that while the space of images is effectively infinite, the space of semantically differentiable scenes is actually not that large. For many image completion tasks, we are able to find similar scenes which contain image fragments that will convincingly complete the image. Our algorithm is entirely data driven, requiring no annotations or labeling by the user. Unlike existing image completion methods, our algorithm can generate a diverse set of image completions and we allow users to select among them. We demonstrate the superiority of our algorithm over existing image completion approaches.", "title": "" }, { "docid": "19700a52f05178ea1c95d576f050f57d", "text": "With the progress of mobile devices and wireless broadband, a new eMarket platform, termed spatial crowdsourcing is emerging, which enables workers (aka crowd) to perform a set of spatial tasks (i.e., tasks related to a geographical location and time) posted by a requester. In this paper, we study a version of the spatial crowd-sourcing problem in which the workers autonomously select their tasks, called the worker selected tasks (WST) mode. Towards this end, given a worker, and a set of tasks each of which is associated with a location and an expiration time, we aim to find a schedule for the worker that maximizes the number of performed tasks. We first prove that this problem is NP-hard. Subsequently, for small number of tasks, we propose two exact algorithms based on dynamic programming and branch-and-bound strategies. Since the exact algorithms cannot scale for large number of tasks and/or limited amount of resources on mobile platforms, we also propose approximation and progressive algorithms. We conducted a thorough experimental evaluation on both real-world and synthetic data to compare the performance and accuracy of our proposed approaches.", "title": "" }, { "docid": "b1dd830adf87c283ff58630eade75b3c", "text": "Self-control is a central function of the self and an important key to success in life. The exertion of self-control appears to depend on a limited resource. Just as a muscle gets tired from exertion, acts of self-control cause short-term impairments (ego depletion) in subsequent self-control, even on unrelated tasks. Research has supported the strength model in the domains of eating, drinking, spending, sexuality, intelligent thought, making choices, and interpersonal behavior. Motivational or framing factors can temporarily block the deleterious effects of being in a state of ego depletion. Blood glucose is an important component of the energy. KEYWORDS—self-control; ego depletion; willpower; impulse; strength Every day, people resist impulses to go back to sleep, to eat fattening or forbidden foods, to say or do hurtful things to their relationship partners, to play instead of work, to engage in inappropriate sexual or violent acts, and to do countless other sorts of problematic behaviors—that is, ones that might feel good immediately or be easy but that carry long-term costs or violate the rules and guidelines of proper behavior. What enables the human animal to follow rules and norms prescribed by society and to resist doing what it selfishly wants? Self-control refers to the capacity for altering one’s own responses, especially to bring them into line with standards such as ideals, values, morals, and social expectations, and to support the pursuit of long-term goals. Many writers use the terms selfcontrol and self-regulation interchangeably, but those whomake a distinction typically consider self-control to be the deliberate, conscious, effortful subset of self-regulation. In contrast, homeostatic processes such as maintaining a constant body temperature may be called self-regulation but not self-control. Self-control enables a person to restrain or override one response, thereby making a different response possible. Self-control has attracted increasing attention from psychologists for two main reasons. At the theoretical level, self-control holds important keys to understanding the nature and functions of the self. Meanwhile, the practical applications of self-control have attracted study in many contexts. Inadequate self-control has been linked to behavioral and impulse-control problems, including overeating, alcohol and drug abuse, crime and violence, overspending, sexually impulsive behavior, unwanted pregnancy, and smoking (e.g., Baumeister, Heatherton, & Tice, 1994; Gottfredson & Hirschi, 1990; Tangney, Baumeister, & Boone, 2004; Vohs & Faber, 2007). It may also be linked to emotional problems, school underachievement, lack of persistence, various failures at task performance, relationship problems and dissolution, and more.", "title": "" }, { "docid": "cdb0e65f89f94e436e8c798cd0188d66", "text": "Visual storytelling aims to generate human-level narrative language (i.e., a natural paragraph with multiple sentences) from a photo streams. A typical photo story consists of a global timeline with multi-thread local storylines, where each storyline occurs in one different scene. Such complex structure leads to large content gaps at scene transitions between consecutive photos. Most existing image/video captioning methods can only achieve limited performance, because the units in traditional recurrent neural networks (RNN) tend to “forget” the previous state when the visual sequence is inconsistent. In this paper, we propose a novel visual storytelling approach with Bidirectional Multi-thread Recurrent Neural Network (BMRNN). First, based on the mined local storylines, a skip gated recurrent unit (sGRU) with delay control is proposed to maintain longer range visual information. Second, by using sGRU as basic units, the BMRNN is trained to align the local storylines into the global sequential timeline. Third, a new training scheme with a storyline-constrained objective function is proposed by jointly considering both global and local matches. Experiments on three standard storytelling datasets show that the BMRNN model outperforms the state-of-the-art methods.", "title": "" }, { "docid": "98be2f8b10c618f9d2fc8183f289c739", "text": "We introduce a neural network with a recurrent attention model over a possibly large external memory. The architecture is a form of Memory Network [23] but unlike the model in that work, it is trained end-to-end, and hence requires significantly less supervision during training, making it more generally applicable in realistic settings. It can also be seen as an extension of RNNsearch [2] to the case where multiple computational steps (hops) are performed per output symbol. The flexibility of the model allows us to apply it to tasks as diverse as (synthetic) question answering [22] and to language modeling. For the former our approach is competitive with Memory Networks, but with less supervision. For the latter, on the Penn TreeBank and Text8 datasets our approach demonstrates comparable performance to RNNs and LSTMs. In both cases we show that the key concept of multiple computational hops yields improved results.", "title": "" } ]
scidocsrr
8f732a61afa6e6ecf62e180852f5c111
Taylor–Fourier Analysis of Blood Pressure Oscillometric Waveforms
[ { "docid": "27c56cabe2742fbe69154e63073e193e", "text": "Developing a good model for oscillometric blood-pressure measurements is a hard task. This is mainly due to the fact that the systolic and diastolic pressures cannot be directly measured by noninvasive automatic oscillometric blood-pressure meters (NIBP) but need to be computed based on some kind of algorithm. This is in strong contrast with the classical Korotkoff method, where the diastolic and systolic blood pressures can be directly measured by a sphygmomanometer. Although an NIBP returns results similar to the Korotkoff method for patients with normal blood pressures, a big discrepancy exist between both methods for severe hyper- and hypotension. For these severe cases, a statistical model is needed to compensate or calibrate the oscillometric blood-pressure meters. Although different statistical models have been already studied, no immediate calibration method has been proposed. The reason is that the step from a model, describing the measurements, to a calibration, correcting the blood-pressure meters, is a rather large leap. In this paper, we study a “databased” Fourier series approach to model the oscillometric waveform and use the Windkessel model for the blood flow to correct the oscillometric blood-pressure meters. The method is validated on a measurement campaign consisting of healthy patients and patients suffering from either hyper- or hypotension.", "title": "" }, { "docid": "63b210cc5e1214c51b642e9a4a2a1fb0", "text": "This paper proposes a simplified method to compute the systolic and diastolic blood pressures from measured oscillometric blood-pressure waveforms. Therefore, the oscillometric waveform is analyzed in the frequency domain, which reveals that the measured blood-pressure signals are heavily disturbed by nonlinear contributions. The proposed approach will linearize the measured oscillometric waveform in order to obtain a more accurate and transparent estimation of the systolic and diastolic pressure based on a robust preprocessing technique. This new approach will be compared with the Korotkoff method and a commercially available noninvasive blood-pressure meter. This allows verification if the linearized approach contains as much information as the Korotkoff method in order to calculate a correct systolic and diastolic blood pressure.", "title": "" } ]
[ { "docid": "2b38ac7d46a1b3555fef49a4e02cac39", "text": "We study the problem of representation learning in heterogeneous networks. Its unique challenges come from the existence of multiple types of nodes and links, which limit the feasibility of the conventional network embedding techniques. We develop two scalable representation learning models, namely metapath2vec and metapath2vec++. The metapath2vec model formalizes meta-path-based random walks to construct the heterogeneous neighborhood of a node and then leverages a heterogeneous skip-gram model to perform node embeddings. The metapath2vec++ model further enables the simultaneous modeling of structural and semantic correlations in heterogeneous networks. Extensive experiments show that metapath2vec and metapath2vec++ are able to not only outperform state-of-the-art embedding models in various heterogeneous network mining tasks, such as node classification, clustering, and similarity search, but also discern the structural and semantic correlations between diverse network objects.", "title": "" }, { "docid": "5d79ed3cd52cf572ca11e40cc9c98fb1", "text": "Misinformation such as fake news is one of the big challenges of our society. Research on automated fact-checking has proposed methods based on supervised learning, but these approaches do not consider external evidence apart from labeled training instances. Recent approaches counter this deficit by considering external sources related to a claim. However, these methods require substantial feature modeling and rich lexicons. This paper overcomes these limitations of prior work with an end-toend model for evidence-aware credibility assessment of arbitrary textual claims, without any human intervention. It presents a neural network model that judiciously aggregates signals from external evidence articles, the language of these articles and the trustworthiness of their sources. It also derives informative features for generating user-comprehensible explanations that makes the neural network predictions transparent to the end-user. Experiments with four datasets and ablation studies show the strength of our method.", "title": "" }, { "docid": "cfe31ce3a6a23d9148709de6032bd90b", "text": "I argue that Non-Photorealistic Rendering (NPR) research will play a key role in the scientific understanding of visual art and illustration. NPR can contribute to scientific understanding of two kinds of problems: how do artists create imagery, and how do observers respond to artistic imagery? I sketch out some of the open problems, how NPR can help, and what some possible theories might look like. Additionally, I discuss the thorny problem of how to evaluate NPR research and theories.", "title": "" }, { "docid": "fb655a622c2e299b8d7f8b85769575b4", "text": "With the substantial development of digital technologies in multimedia, network communication and user interfaces, we are seeing an increasing number of applications of these technologies, in particular in the entertainment domain. They include computer gaming, elearning, high-definition and interactive TVs, and virtual environments. The development of these applications typically involves the integration of existing technologies as well as the development of new technologies. This Introduction summarizes latest interactive entertainment technologies and applications, and briefly highlights some potential research directions. It also introduces the seven papers that are accepted to the special issue. Hopefully, this will provide the readers some insights into future research topics in interactive entertainment technologies and applications.", "title": "" }, { "docid": "4812ae9ee481b8c4b4f74b4ab01f3e1b", "text": "Recent work has shown how to train Convolutional Neural Networks (CNNs) rapidly on large image datasets [1], then transfer the knowledge gained from these models to a variety of tasks [2]. Following [3], in this work, we demonstrate similar scalability and transfer for Recurrent Neural Networks (RNNs) for Natural Language tasks. By utilizing mixed precision arithmetic and a 32k batch size distributed across 128 NVIDIA Tesla V100 GPUs, we are able to train a character-level 4096-dimension multiplicative LSTM (mLSTM) [4] for unsupervised text reconstruction over 3 epochs of the 40 GB Amazon Reviews dataset [5] in four hours. This runtime compares favorably with previous work taking one month to train the same size and configuration for one epoch over the same dataset [3]. Converging large batch RNN models can be challenging. Recent work has suggested scaling the learning rate as a function of batch size, but we find that simply scaling the learning rate as a function of batch size leads either to significantly worse convergence or immediate divergence for this problem. We provide a learning rate schedule that allows our model to converge with a 32k batch size. Since our model converges over the Amazon Reviews dataset in hours, and our compute requirement of 128 Tesla V100 GPUs, while substantial, is commercially available, this work opens up large scale unsupervised NLP training to most commercial applications and deep learning researchers 11Our code is publicly available: https://github.com/NVIDIA/sentiment-discovery, A model can be trained over most public or private text datasets overnight.", "title": "" }, { "docid": "9304c82e4b19c2f5e23ca45e7f2c9538", "text": "Previous work has shown that using the GPU as a brute force method for SELECT statements on a SQLite database table yields significant speedups. However, this requires that the entire table be selected and transformed from the B-Tree to row-column format. This paper investigates possible speedups by traversing B+ Trees in parallel on the GPU, avoiding the overhead of selecting the entire table to transform it into row-column format and leveraging the logarithmic nature of tree searches. We experiment with different input sizes, different orders of the B+ Tree, and batch multiple queries together to find optimal speedups for SELECT statements with single search parameters as well as range searches. We additionally make a comparison to a simple GPU brute force algorithm on a row-column version of the B+ Tree.", "title": "" }, { "docid": "c2e0b234898df278ee57ae5827faadeb", "text": "In this paper, we consider the problem of single image super-resolution and propose a novel algorithm that outperforms state-of-the-art methods without the need of learning patches pairs from external data sets. We achieve this by modeling images and, more precisely, lines of images as piecewise smooth functions and propose a resolution enhancement method for this type of functions. The method makes use of the theory of sampling signals with finite rate of innovation (FRI) and combines it with traditional linear reconstruction methods. We combine the two reconstructions by leveraging from the multi-resolution analysis in wavelet theory and show how an FRI reconstruction and a linear reconstruction can be fused using filter banks. We then apply this method along vertical, horizontal, and diagonal directions in an image to obtain a single-image super-resolution algorithm. We also propose a further improvement of the method based on learning from the errors of our super-resolution result at lower resolution levels. Simulation results show that our method outperforms state-of-the-art algorithms under different blurring kernels.", "title": "" }, { "docid": "e26c8fde7d79298ea0dba161bf24f2da", "text": "We present a new exact subdivision algorithm CEVAL for isolating the complex roots of a square-free polynomial in any given box. It is a generalization of a previous real root isolation algorithm called EVAL. Under suitable conditions, our approach is applicable for general analytic functions. CEVAL is based on the simple Bolzano Principle and is easy to implement exactly. Preliminary experiments have shown its competitiveness.\n We further show that, for the \"benchmark problem\" of isolating all roots of a square-free polynomial with integer coefficients, the asymptotic complexity of both algorithms EVAL and CEVAL matches (up a logarithmic term) that of more sophisticated real root isolation methods which are based on Descartes' Rule of Signs, Continued Fraction or Sturm sequence. In particular, we show that the tree size of EVAL matches that of other algorithms. Our analysis is based on a novel technique called Δ-clusters from which we expect to see further applications.", "title": "" }, { "docid": "3ad25dabe3b740a91b939a344143ea9e", "text": "Recently, much attention in research and practice has been devoted to the topic of IT consumerization, referring to the adoption of private consumer IT in the workplace. However, research lacks an analysis of possible antecedents of the trend on an individual level. To close this gap, we derive a theoretical model for IT consumerization behavior based on the theory of planned behavior and perform a quantitative analysis. Our investigation shows that it is foremost determined by normative pressures, specifically the behavior of friends, co-workers and direct supervisors. In addition, behavioral beliefs and control beliefs were found to affect the intention to use non-corporate IT. With respect to the former, we found expected performance improvements and an increase in ease of use to be two of the key determinants. As for the latter, especially monetary costs and installation knowledge were correlated with IT consumerization intention.", "title": "" }, { "docid": "aa948c6380a54c8b5a24b062f854002c", "text": "This work focuses on the study of constant-time implementations; giving formal guarantees that such implementations are protected against cache-based timing attacks in virtualized platforms where their supporting operating system executes concurrently with other, potentially malicious, operating systems. We develop a model of virtualization that accounts for virtual addresses, physical and machine addresses, memory mappings, page tables, translation lookaside buffer, and cache; and provides an operational semantics for a representative set of actions, including reads and writes, allocation and deallocation, context switching, and hypercalls. We prove a non-interference result on the model that shows that an adversary cannot discover secret information using cache side-channels, from a constant-time victim.", "title": "" }, { "docid": "c3bfe9b5231c5f9b4499ad38b6e8eac6", "text": "As the World Wide Web has increasingly become a necessity in daily life, the acute need to safeguard user privacy and security has become manifestly apparent. After users realized that browser cookies could allow websites to track their actions without permission or notification, many have chosen to reject cookies in order to protect their privacy. However, more recently, methods of fingerprinting a web browser have become an increasingly common practice. In this paper, we classify web browser fingerprinting into four main categories: (1) Browser Specific, (2) Canvas, (3) JavaScript Engine, and (4) Cross-browser. We then summarize the privacy and security implications, discuss commercial fingerprinting techniques, and finally present some detection and prevention methods.", "title": "" }, { "docid": "f36ef9dd6b78605683f67b382b9639ac", "text": "Stable clones of neural stem cells (NSCs) have been isolated from the human fetal telencephalon. These self-renewing clones give rise to all fundamental neural lineages in vitro. Following transplantation into germinal zones of the newborn mouse brain they participate in aspects of normal development, including migration along established migratory pathways to disseminated central nervous system regions, differentiation into multiple developmentally and regionally appropriate cell types, and nondisruptive interspersion with host progenitors and their progeny. These human NSCs can be genetically engineered and are capable of expressing foreign transgenes in vivo. Supporting their gene therapy potential, secretory products from NSCs can correct a prototypical genetic metabolic defect in neurons and glia in vitro. The human NSCs can also replace specific deficient neuronal populations. Cryopreservable human NSCs may be propagated by both epigenetic and genetic means that are comparably safe and effective. By analogy to rodent NSCs, these observations may allow the development of NSC transplantation for a range of disorders.", "title": "" }, { "docid": "b4b8261b603fd153b03cca3c1d03621e", "text": "Stock market prediction is an attractive research problem to be investigated. News contents are one of the most important factors that have influence on market. Considering the news impact in analyzing the stock market behavior, leads to more precise predictions and as a result more profitable trades. So far various prototypes have been developed which consider the impact of news in stock market prediction. In this paper, the main components of such forecasting systems have been introduced. In addition, different developed prototypes have been introduced and the way whereby the main components are implemented compared. Based on studied attempts, the potential future research activities have been suggested.", "title": "" }, { "docid": "e685f07edfc9c7761c96d7926e00a64f", "text": "A middle-aged woman presented with fatigue and mild increases in hematocrit and red cell mass. Polycythemia vera was diagnosed. She underwent therapeutic phlebotomy but clinically worsened. On reevaluation, other problems were noted including episodic malaise, nausea, rash and vasomotor issues. The JAK2V617F mutation was absent; paraneoplastic erythrocytosis was investigated. Serum tryptase and urinary N-methylhistamine were normal, but urinary prostaglandin D2 was elevated. Skin and marrow biopsies showed no mast cell abnormalities. Extensive other evaluation was negative. Gastrointestinal tract biopsies were histologically normal but revealed increased, aberrant mast cells on immunohistochemistry; the KITD816V mutation was absent. Mast cell activation syndrome, recently identified as a clonal disorder involving assorted KIT mutations, was diagnosed. Imatinib 200 mg/d rapidly effected complete, sustained response. Diagnosis of mast cell activation syndrome is hindered by multiple factors, but existing therapies for mast cell disease are usually achieve significant benefit, highlighting the importance of early diagnosis. Multiple important aspects of clinical reasoning are illustrated by the case.", "title": "" }, { "docid": "e7fb4643c062e092a52ac84928ab46e9", "text": "Object detection and tracking are main tasks in video surveillance systems. Extracting the background is an intensive task with high computational cost. This work proposes a hardware computing engine to perform background subtraction on low-cost field programmable gate arrays (FPGAs), focused on resource-limited environments. Our approach is based on the codebook algorithm and offers very low accuracy degradation. We have analyzed resource consumption and performance trade-offs in Spartan-3 FPGAs by Xilinx. In addition, an accuracy evaluation with standard benchmark sequences has been performed, obtaining better results than previous hardware approaches. The implementation is able to segment objects in sequences with resolution $$768\\times 576$$ at 50 fps using a robust and accurate approach, and an estimated power consumption of 5.13 W.", "title": "" }, { "docid": "d9f442d281de14651ca17ec5d160b2d2", "text": "Query expansion of named entities can be employed in order to increase the retrieval effectiveness. A peculiarity of named entities compared to other vocabulary terms is that they are very dynamic in appearance, and synonym relationships between terms change with time. In this paper, we present an approach to extracting synonyms of named entities over time from the whole history of Wikipedia. In addition, we will use their temporal patterns as a feature in ranking and classifying them into two types, i.e., time-independent or time-dependent. Time-independent synonyms are invariant to time, while time-dependent synonyms are relevant to a particular time period, i.e., the synonym relationships change over time. Further, we describe how to make use of both types of synonyms to increase the retrieval effectiveness, i.e., query expansion with time-independent synonyms for an ordinary search, and query expansion with time-dependent synonyms for a search wrt. temporal criteria. Finally, through an evaluation based on TREC collections, we demonstrate how retrieval performance of queries consisting of named entities can be improved using our approach.", "title": "" }, { "docid": "45cc3369df084b22642cfc7288bc0abb", "text": "This paper proposes a novel unsupervised feature selection method by jointing self-representation and subspace learning. In this method, we adopt the idea of self-representation and use all the features to represent each feature. A Frobenius norm regularization is used for feature selection since it can overcome the over-fitting problem. The Locality Preserving Projection (LPP) is used as a regularization term as it can maintain the local adjacent relations between data when performing feature space transformation. Further, a low-rank constraint is also introduced to find the effective low-dimensional structures of the data, which can reduce the redundancy. Experimental results on real-world datasets verify that the proposed method can select the most discriminative features and outperform the state-of-the-art unsupervised feature selection methods in terms of classification accuracy, standard deviation, and coefficient of variation.", "title": "" }, { "docid": "101c03b85e3cc8518a158d89cc9b3b39", "text": "Machine translation has recently achieved impressive performance thanks to recent advances in deep learning and the availability of large-scale parallel corpora. There have been numerous attempts to extend these successes to low-resource language pairs, yet requiring tens of thousands of parallel sentences. In this work, we take this research direction to the extreme and investigate whether it is possible to learn to translate even without any parallel data. We propose a model that takes sentences from monolingual corpora in two different languages and maps them into the same latent space. By learning to reconstruct in both languages from this shared feature space, the model effectively learns to translate without using any labeled data. We demonstrate our model on two widely used datasets and two language pairs, reporting BLEU scores of 32.8 and 15.1 on the Multi30k and WMT English-French datasets, without using even a single parallel sentence at training time.", "title": "" }, { "docid": "fbcf0375db0e665c1028f8db77ccdc34", "text": "Design fiction is an emergent field within HCI and interaction design the understanding of which ultimately relies, so we argue, of an integrative account of poetics and design praxis. In this paper we give such an account. Initially, a precise definition of design fiction is given by drawing on the theory of possible worlds found within poetics. Further, we offer a method of practicing design fiction, which relies on the equal integration of literary practice with design practice. The use of this method is demonstrated by 4 design projects from a workshop set up in collaboration with a Danish author. All of this substantiates our notion of a poetics of practicing design fiction, and through our critical examination of related work we conclude on how our approach contribute to HCI and interaction design.", "title": "" }, { "docid": "d4406b74040e9f06b1d05cefade12c6c", "text": "Steganography is a science to hide information, it hides a message to another object, and it increases the security of data transmission and archiving it. In the process of steganography, the hidden object in which data is hidden the carrier object and the new object, is called the steganography object. The multiple carriers, such as text, audio, video, image and so can be mentioned for steganography; however, audio has been significantly considered due to the multiplicity of uses in various fields such as the internet. For steganography process, several methods have been developed; including work in the temporary and transformation, each of has its own advantages and disadvantages, and special function. In this paper we mainly review and evaluate different types of audio steganography techniques, advantages and disadvantages.", "title": "" } ]
scidocsrr
4a2ed308123c49183244387daa393c3b
A Study on Resolution Skills in Phishing Detection
[ { "docid": "7c050db718a21009908655cc99705d35", "text": "a Department of Communication, Management Science and Systems, 333 Lord Christopher Baldy Hall, State University of New York at Buffalo, Buffalo, NY 14260, United States b Department of Finance, Operations and Information Systems, Brock University, Canada c Department of Information Systems and Operations Management, Ball State University, United States d Department of Information Systems and Operations Management, University of Texas at Arlington, United States e Management Science and Systems, State University of New York at Buffalo, United States", "title": "" } ]
[ { "docid": "59eaa9f4967abdc1c863f8fb256ae966", "text": "CONTEXT\nThe projected expansion in the next several decades of the elderly population at highest risk for Parkinson disease (PD) makes identification of factors that promote or prevent the disease an important goal.\n\n\nOBJECTIVE\nTo explore the association of coffee and dietary caffeine intake with risk of PD.\n\n\nDESIGN, SETTING, AND PARTICIPANTS\nData were analyzed from 30 years of follow-up of 8004 Japanese-American men (aged 45-68 years) enrolled in the prospective longitudinal Honolulu Heart Program between 1965 and 1968.\n\n\nMAIN OUTCOME MEASURE\nIncident PD, by amount of coffee intake (measured at study enrollment and 6-year follow-up) and by total dietary caffeine intake (measured at enrollment).\n\n\nRESULTS\nDuring follow-up, 102 men were identified as having PD. Age-adjusted incidence of PD declined consistently with increased amounts of coffee intake, from 10.4 per 10,000 person-years in men who drank no coffee to 1.9 per 10,000 person-years in men who drank at least 28 oz/d (P<.001 for trend). Similar relationships were observed with total caffeine intake (P<.001 for trend) and caffeine from non-coffee sources (P=.03 for trend). Consumption of increasing amounts of coffee was also associated with lower risk of PD in men who were never, past, and current smokers at baseline (P=.049, P=.22, and P=.02, respectively, for trend). Other nutrients in coffee, including niacin, were unrelated to PD incidence. The relationship between caffeine and PD was unaltered by intake of milk and sugar.\n\n\nCONCLUSIONS\nOur findings indicate that higher coffee and caffeine intake is associated with a significantly lower incidence of PD. This effect appears to be independent of smoking. The data suggest that the mechanism is related to caffeine intake and not to other nutrients contained in coffee. JAMA. 2000;283:2674-2679.", "title": "" }, { "docid": "fd7b4fb86b650c18cbc1d720679d94d5", "text": "Thermal sensors are used in modern microprocessors to provide information for: 1) throttling at the maximum temperature of operation, and 2) fan regulation at temperatures down to 50°C. Today's microprocessors are thermally limited in many applications, so accurate temperature readings are essential in order to maximize performance. There are fairly large thermal gradients across the core, which vary for different instructions, so it is necessary to position thermal sensors near hot-spots. In addition, the locations of the hot-spots may not be predictable during the design phase. Thus it is necessary for hot-spot sensors to be small enough to be moved late in the design cycle or even after first Silicon.", "title": "" }, { "docid": "1fc965670f71d9870a4eea93d129e285", "text": "The present study investigates the impact of the experience of role playing a violent character in a video game on attitudes towards violent crimes and criminals. People who played the violent game were found to be more acceptable of crimes and criminals compared to people who did not play the violent game. More importantly, interaction effects were found such that people were more acceptable of crimes and criminals outside the game if the criminals were matched with the role they played in the game and the criminal actions were similar to the activities they perpetrated during the game. The results indicate that people’s virtual experience through role-playing games can influence their attitudes and judgments of similar real-life crimes, especially if the crimes are similar to what they conducted while playing games. Theoretical and practical implications are discussed. 2010 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "44665a3d2979031aca85010b9ad1ec90", "text": "Studies in humans and non-human primates have provided evidence for storage of working memory contents in multiple regions ranging from sensory to parietal and prefrontal cortex. We discuss potential explanations for these distributed representations: (i) features in sensory regions versus prefrontal cortex differ in the level of abstractness and generalizability; and (ii) features in prefrontal cortex reflect representations that are transformed for guidance of upcoming behavioral actions. We propose that the propensity to produce persistent activity is a general feature of cortical networks. Future studies may have to shift focus from asking where working memory can be observed in the brain to how a range of specialized brain areas together transform sensory information into a delayed behavioral response.", "title": "" }, { "docid": "cb4518f95b82e553b698ae136362bd59", "text": "Optimal control theory is a mature mathematical discipline with numerous applications in both science and engineering. It is emerging as the computational framework of choice for studying the neural control of movement, in much the same way that probabilistic inference is emerging as the computational framework of choice for studying sensory information processing. Despite the growing popularity of optimal control models, however, the elaborate mathematical machinery behind them is rarely exposed and the big picture is hard to grasp without reading a few technical books on the subject. While this chapter cannot replace such books, it aims to provide a self-contained mathematical introduction to optimal control theory that is su¢ ciently broad and yet su¢ ciently detailed when it comes to key concepts. The text is not tailored to the …eld of motor control (apart from the last section, and the overall emphasis on systems with continuous state) so it will hopefully be of interest to a wider audience. Of special interest in the context of this book is the material on the duality of optimal control and probabilistic inference; such duality suggests that neural information processing in sensory and motor areas may be more similar than currently thought. The chapter is organized in the following sections:", "title": "" }, { "docid": "4d7e876d61060061ba6419869d00675e", "text": "Context-aware recommender systems (CARS) take context into consideration when modeling user preferences. There are two general ways to integrate context with recommendation: contextual filtering and contextual modeling. Currently, the most effective context-aware recommendation algorithms are based on a contextual modeling approach that estimate deviations in ratings across different contexts. In this paper, we propose context similarity as an alternative contextual modeling approach and examine different ways to represent context similarity and incorporate it into recommendation. More specifically, we show how context similarity can be integrated into the sparse linear method and matrix factorization algorithms. Our experimental results demonstrate that learning context similarity is a more effective approach to contextaware recommendation than modeling contextual rating deviations.", "title": "" }, { "docid": "c30a60cdcdc894594692bd730cd09846", "text": "Healthcare sector is totally different from other industry. It is on high priority sector and people expect highest level of care and services regardless of cost. It did not achieve social expectation even though it consume huge percentage of budget. Mostly the interpretations of medical data is being done by medical expert. In terms of image interpretation by human expert, it is quite limited due to its subjectivity, complexity of the image, extensive variations exist across different interpreters, and fatigue. After the success of deep learning in other real world application, it is also providing exciting solutions with good accuracy for medical imaging and is seen as a key method for future applications in health secotr. In this chapter, we discussed state of the art deep learning architecture and its optimization used for medical image segmentation and classification. In the last section, we have discussed the challenges deep learning based methods for medical imaging and open research issue.", "title": "" }, { "docid": "f103277dbbcab26d8e5c176520666db9", "text": "Air pollution in urban environments has risen steadily in the last several decades. Such cities as Beijing and Delhi have experienced rises to dangerous levels for citizens. As a growing and urgent public health concern, cities and environmental agencies have been exploring methods to forecast future air pollution, hoping to enact policies and provide incentives and services to benefit their citizenry. Much research is being conducted in environmental science to generate deterministic models of air pollutant behavior; however, this is both complex, as the underlying molecular interactions in the atmosphere need to be simulated, and often inaccurate. As a result, with greater computing power in the twenty-first century, using machine learning methods for forecasting air pollution has become more popular. This paper investigates the use of the LSTM recurrent neural network (RNN) as a framework for forecasting in the future, based on time series data of pollution and meteorological information in Beijing. Due to the sequence dependencies associated with large-scale and longer time series datasets, RNNs, and in particular LSTM models, are well-suited. Our results show that the LSTM framework produces equivalent accuracy when predicting future timesteps compared to the baseline support vector regression for a single timestep. Using our LSTM framework, we can now extend the prediction from a single timestep out to 5 to 10 hours into the future. This is promising in the quest for forecasting urban air quality and leveraging that insight to enact beneficial policy.", "title": "" }, { "docid": "74ea9bde4e265dba15cf9911fce51ece", "text": "We consider a system aimed at improving the resolution of a conventional airborne radar, looking in the forward direction, by forming an end-fire synthetic array along the airplane line of flight. The system is designed to operate even in slant (non-horizontal) flight trajectories, and it allows imaging along the line of flight. By using the array theory, we analyze system geometry and ambiguity problems, and analytically evaluate the achievable resolution and the required pulse repetition frequency. Processing computational burden is also analyzed, and finally some simulation results are provided.", "title": "" }, { "docid": "f69d669235d54858eb318b53cdadcb47", "text": "We present a complete vision guided robot system for model based 3D pose estimation and picking of singulated 3D objects. Our system employs a novel vision sensor consisting of a video camera surrounded by eight flashes (light emitting diodes). By capturing images under different flashes and observing the shadows, depth edges or silhouettes in the scene are obtained. The silhouettes are segmented into different objects and each silhouette is matched across a database of object silhouettes in different poses to find the coarse 3D pose. The database is pre-computed using a Computer Aided Design (CAD) model of the object. The pose is refined using a fully projective formulation [ACB98] of Lowe’s model based pose estimation algorithm [Low91, Low87]. The estimated pose is transferred to robot coordinate system utilizing the handeye and camera calibration parameters, which allows the robot to pick the object. Our system outperforms conventional systems using 2D sensors with intensity-based features as well as 3D sensors. We handle complex ambient illumination conditions, challenging specular backgrounds, diffuse as well as specular objects, and texture-less objects, on which traditional systems usually fail. Our vision sensor is capable of computing depth edges in real time and is low cost. Our approach is simple and fast for practical implementation. We present real experimental results using our custom designed sensor mounted on a robot arm to demonstrate the effectiveness of our technique. International Journal of Robotics Research This work may not be copied or reproduced in whole or in part for any commercial purpose. Permission to copy in whole or in part without payment of fee is granted for nonprofit educational and research purposes provided that all such whole or partial copies include the following: a notice that such copying is by permission of Mitsubishi Electric Research Laboratories, Inc.; an acknowledgment of the authors and individual contributions to the work; and all applicable portions of the copyright notice. Copying, reproduction, or republishing for any other purpose shall require a license with payment of fee to Mitsubishi Electric Research Laboratories, Inc. All rights reserved. Copyright c ©Mitsubishi Electric Research Laboratories, Inc., 2009 201 Broadway, Cambridge, Massachusetts 02139", "title": "" }, { "docid": "8dcb0f20c000a30c0d3330f6ac6b373b", "text": "Although social networking sites (SNSs) have attracted increased attention and members in recent years, there has been little research on it: particularly on how a users’ extroversion or introversion can affect their intention to pay for these services and what other factors might influence them. We therefore proposed and tested a model that measured the users’ value and satisfaction perspectives by examining the influence of these factors in an empirical survey of 288 SNS members. At the same time, the differences due to their psychological state were explored. The causal model was validated using PLSGraph 3.0; six out of eight study hypotheses were supported. The results indicated that perceived value significantly influenced the intention to pay SNS subscription fees while satisfaction did not. Moreover, extroverts thought more highly of the social value of the SNS, while introverts placed more importance on its emotional and price value. The implications of these findings are discussed. Crown Copyright 2010 Published by Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "78d88298e0b0e197f44939ee96210778", "text": "Cyber-security research and development for SCADA is being inhibited by the lack of available SCADA attack datasets. This paper presents a modular dataset generation framework for SCADA cyber-attacks, to aid the development of attack datasets. The presented framework is based on requirements derived from related prior research, and is applicable to any standardised or proprietary SCADA protocol. We instantiate our framework and validate the requirements using a Python implementation. This paper provides experiments of the framework's usage on a state-of-the-art DNP3 critical infrastructure test-bed, thus proving framework's ability to generate SCADA cyber-attack datasets.", "title": "" }, { "docid": "6762134c344053fb167ea286e21995f3", "text": "Image processing techniques are widely used in the domain of medical sciences for detecting various diseases, infections, tumors, cell abnormalities and various cancers. Detecting and curing a dise ase on time is very important in the field of medicine for protecting and saving human life. Mostly in case of high severity diseases where the mortality rates are more, the waiting time of patients for their reports such as blood test, MRI is more. The time taken for generation of any of the test is from 1-10 days. In high risk diseases like Hepatitis B, it is recommended that the patient’s waiting time should be as less as possible and the treatment should be started immediately. The current system used by the pathologists for identification of blood parameters is costly and the time involved in generation of the reports is also more sometimes leading to loss of patient’s life. Also the pathological tests are expensive, which are sometimes not affordable by the patient. This paper deals with an image processing technique used for detecting the abnormalities of blood cells in less time. The proposed technique also helps in segregating the blood cells in different categories based on the form factor.", "title": "" }, { "docid": "9dc80bb779837f615a7f379ab2bbec99", "text": "Twitter, as a social media is a very popular way of expressing opinions and interacting with other people in the online world. When taken in aggregation tweets can provide a reflection of public sentiment towards events. In this paper, we provide a positive or negative sentiment on Twitter posts using a well-known machine learning method for text categorization. In addition, we use manually labeled (positive/negative) tweets to build a trained method to accomplish a task. The task is looking for a correlation between twitter sentiment and events that have occurred. The trained model is based on the Bayesian Logistic Regression (BLR) classification method. We used external lexicons to detect subjective or objective tweets, added Unigram and Bigram features and used TF-IDF (Term Frequency-Inverse Document Frequency) to filter out the features. Using the FIFA World Cup 2014 as our case study, we used Twitter Streaming API and some of the official world cup hashtags to mine, filter and process tweets, in order to analyze the reflection of public sentiment towards unexpected events. The same approach, can be used as a basis for predicting future events.", "title": "" }, { "docid": "2c832dea09e5fc622a5c1bbfdb53f8b2", "text": "A recent meta-analysis (S. Vazire & D. C. Funder, 2006) suggested that narcissism and impulsivity are related and that impulsivity partially accounts for the relation between narcissism and self-defeating behaviors (SDB). This research examines these hypotheses in two studies and tests a competing hypothesis that Extraversion and Agreeableness account for this relation. In Study 1, we examined the relations among narcissism, impulsivity, and aggression. Both narcissism and impulsivity predicted aggression, but impulsivity did not mediate the narcissism-aggression relation. In Study 2, narcissism was related to a measure of SDB and manifested divergent relations with a range of impulsivity traits from three measures. None of the impulsivity models accounted for the narcissism-SDB relation, although there were unique mediating paths for traits related to sensation and fun seeking. The domains of Extraversion and low Agreeableness successfully mediated the entire narcissism-SDB relation. We address the discrepancy between the current and meta-analytic findings.", "title": "" }, { "docid": "c0d3c14e792a02a9ad57745b31b84be6", "text": "INTRODUCTION\nCritically ill patients are characterized by increased loss of muscle mass, partially attributed to sepsis and multiple organ failure, as well as immobilization. Recent studies have shown that electrical muscle stimulation (EMS) may be an alternative to active exercise in chronic obstructive pulmonary disease (COPD) and chronic heart failure (CHF) patients with myopathy. The aim of our study was to investigate the EMS effects on muscle mass preservation of critically ill patients with the use of ultrasonography (US).\n\n\nMETHODS\nForty-nine critically ill patients (age: 59 +/- 21 years) with an APACHE II admission score >or=13 were randomly assigned after stratification upon admission to receive daily EMS sessions of both lower extremities (EMS-group) or to the control group (control group). Muscle mass was evaluated with US, by measuring the cross sectional diameter (CSD) of the vastus intermedius and the rectus femoris of the quadriceps muscle.\n\n\nRESULTS\nTwenty-six patients were finally evaluated. Right rectus femoris and right vastus intermedius CSD decreased in both groups (EMS group: from 1.42 +/- 0.48 to 1.31 +/- 0.45 cm, P = 0.001 control group: from 1.59 +/- 0.53 to 1.37 +/- 0.5 cm, P = 0.002; EMS group: from 0.91 +/- 0.39 to 0.81 +/- 0.38 cm, P = 0.001 control group: from 1.40 +/- 0.64 to 1.11 +/- 0.56 cm, P = 0.004, respectively). However, the CSD of the right rectus femoris decreased significantly less in the EMS group (-0.11 +/- 0.06 cm, -8 +/- 3.9%) as compared to the control group (-0.21 +/- 0.10 cm, -13.9 +/- 6.4%; P < 0.05) and the CSD of the right vastus intermedius decreased significantly less in the EMS group (-0.10 +/- 0.05 cm, -12.5 +/- 7.4%) as compared to the control group (-0.29 +/- 0.28 cm, -21.5 +/- 15.3%; P < 0.05).\n\n\nCONCLUSIONS\nEMS is well tolerated and seems to preserve the muscle mass of critically ill patients. The potential use of EMS as a preventive and rehabilitation tool in ICU patients with polyneuromyopathy needs to be further investigated.\n\n\nTRIAL REGISTRATION\nclinicaltrials.gov: NCT00882830.", "title": "" }, { "docid": "0b6ce2e4f3ef7f747f38068adef3da54", "text": "Network throughput can be increased by allowing multipath, adaptive routing. Adaptive routing allows more freedom in the paths taken by messages, spreading load over physical channels more evenly. The flexibility of adaptive routing introduces new possibilities of deadlock. Previous deadlock avoidance schemes in k-ary n-cubes require an exponential number of virtual channels, independent of network size and dimension. Planar adaptive routing algorithms reduce the complexity of deadlock prevention by reducing the number of choices at each routing step. In the fault-free case, planar-adaptive networks are guaranteed to be deadlock-free. In the presence of network faults, the planar-adaptive router can be extended with misrouting to produce a working network which remains provably deadlock free and is provably livelock free. In addition, planar adaptive networks can simultaneously support both in-order and adaptive, out-of-order packet delivery.\nPlanar-adaptive routing is of practical significance. It provides the simplest known support for deadlock-free adaptive routing in k-ary n-cubes of more than two dimensions (with k > 2). Restricting adaptivity reduces the hardware complexity, improving router speed or allowing additional performance-enhancing network features. The structure of planar-adaptive routers is amenable to efficient implementation.", "title": "" }, { "docid": "c6674729e565fa357f7eda74d48c71b8", "text": "Rating scales are employed as a means of extracting more information out of an item than would be obtained from a mere \"yes/no\", \"right/wrong\" or other dichotomy. But does this additional information increase measurement accuracy and precision? Eight guidelines are suggested to aid the analyst in optimizing the manner in which rating scales categories cooperate in order to improve the utility of the resultant measures. Though these guidelines are presented within the context of Rasch analysis, they reflect aspects of rating scale functioning which impact all methods of analysis. The guidelines feature rating-scale-based data such as category frequency, ordering, rating-to-measure inferential coherence, and the quality of the scale from measurement and statistical perspectives. The manner in which the guidelines prompt recategorization or reconceptualization of the rating scale is indicated. Utilization of the guidelines is illustrated through their application to two published data sets.", "title": "" }, { "docid": "60eeb0468dff5a3eeb9c9d133a81759f", "text": "To evaluate cone and cone-driven retinal function in patients with Smith-Lemli-Opitz syndrome (SLOS), a condition characterized by low cholesterol. Rod and rod-driven function in patients with SLOS are known to be abnormal. Electroretinographic (ERG) responses to full-field stimuli presented on a steady, rod suppressing background were recorded in 13 patients who had received long-term cholesterol supplementation. Cone photoresponse sensitivity (S CONE) and saturated amplitude (R CONE) parameters were estimated using a model of the activation of phototransduction, and post-receptor b-wave and 30 Hz flicker responses were analyzed. The responses of the patients were compared to those of control subjects (N = 13). Although average values of both S CONE and R CONE were lower than in controls, the differences were not statistically significant. Post-receptor b-wave amplitude and implicit time and flicker responses were normal. The normal cone function contrasts with the significant abnormalities in rod function that were found previously in these same patients. Possibly, cholesterol supplementation has a greater protective effect on cones than on rods as has been demonstrated in the rat model of SLOS.", "title": "" }, { "docid": "be0f836ec6431b74342b670921ac41f7", "text": "This paper addresses the issue of expert finding in a social network. The task of expert finding, as one of the most important research issues in social networks, is aimed at identifying persons with relevant expertise or experience for a given topic. In this paper, we propose a propagation-based approach that takes into consideration of both person local information and network information (e.g. relationships between persons). Experimental results show that our approach can outperform the baseline approach.", "title": "" } ]
scidocsrr
350989ffb1a5cb279bcdf304778ade77
Representation Properties of Networks: Kolmogorov's Theorem Is Irrelevant
[ { "docid": "fcb9614925e939898af060b9ee52f357", "text": "The authors present a method for constructing a feedforward neural net implementing an arbitrarily good approximation to any L/sub 2/ function over (-1, 1)/sup n/. The net uses n input nodes, a single hidden layer whose width is determined by the function to be implemented and the allowable mean square error, and a linear output neuron. Error bounds and an example are given for the method.<<ETX>>", "title": "" } ]
[ { "docid": "06f99b18bae3f15e77db8ff2d8c159cc", "text": "The exact nature of the relationship among species range sizes, speciation, and extinction events is not well understood. The factors that promote larger ranges, such as broad niche widths and high dispersal abilities, could increase the likelihood of encountering new habitats but also prevent local adaptation due to high gene flow. Similarly, low dispersal abilities or narrower niche widths could cause populations to be isolated, but such populations may lack advantageous mutations due to low population sizes. Here we present a large-scale, spatially explicit, individual-based model addressing the relationships between species ranges, speciation, and extinction. We followed the evolutionary dynamics of hundreds of thousands of diploid individuals for 200,000 generations. Individuals adapted to multiple resources and formed ecological species in a multidimensional trait space. These species varied in niche widths, and we observed the coexistence of generalists and specialists on a few resources. Our model shows that species ranges correlate with dispersal abilities but do not change with the strength of fitness trade-offs; however, high dispersal abilities and low resource utilization costs, which favored broad niche widths, have a strong negative effect on speciation rates. An unexpected result of our model is the strong effect of underlying resource distributions on speciation: in highly fragmented landscapes, speciation rates are reduced.", "title": "" }, { "docid": "fca5eb1b215c4912d5b439ae67269a23", "text": "We have developed a computer software package, IMOD, as a tool for analyzing and viewing three-dimensional biological image data. IMOD is useful for studying and modeling data from tomographic, serial section, and optical section reconstructions. The software allows image data to be visualized by several different methods. Models of the image data can be visualized by volume or contour surface rendering and can yield quantitative information.", "title": "" }, { "docid": "690544595e0fa2e5f1c40e3187598263", "text": "In this paper, a methodology is presented and employed for simulating the Internet of Things (IoT). The requirement for scalability, due to the possibly huge amount of involved sensors and devices, and the heterogeneous scenarios that might occur, impose resorting to sophisticated modeling and simulation techniques. In particular, multi-level simulation is regarded as a main framework that allows simulating large-scale IoT environments while keeping high levels of detail, when it is needed. We consider a use case based on the deployment of smart services in decentralized territories. A two level simulator is employed, which is based on a coarse agent-based, adaptive parallel and distributed simulation approach to model the general life of simulated entities. However, when needed a finer grained simulator (based on OMNeT++) is triggered on a restricted portion of the simulated area, which allows considering all issues concerned with wireless communications. Based on this use case, it is confirmed that the ad-hoc wireless networking technologies do represent a principle tool to deploy smart services over decentralized countrysides. Moreover, the performance evaluation confirms the viability of utilizing multi-level simulation for simulating large scale IoT environments.", "title": "" }, { "docid": "2b0cc3aa68c671c7c14726b51e1713ca", "text": "The conflux of two growing areas of technology— collaboration and visualization—into a new research direction, collaborative visualization, provides new research challenges. Technology now allows us to easily connect and collaborate with one another—in settings as diverse as over networked computers, across mobile devices, or using shared displays such as interactive walls and tabletop surfaces. Digital information is now regularly accessed by multiple people in order to share information, to view it together, to analyze it, or to form decisions. Visualizations are used to deal more effectively with large amounts of information while interactive visualizations allow users to explore the underlying data. While researchers face many challenges in collaboration and in visualization, the emergence of collaborative visualization poses additional challenges but is also an exciting opportunity to reach new audiences and applications for visualization tools and techniques. The purpose of this article is (1) to provide a definition, clear scope, and overview of the evolving field of collaborative visualization, (2) to help pinpoint the unique focus of collaborative visualization with its specific aspects, challenges, and requirements within the intersection of general computer-supported cooperative work (CSCW) and visualization research, and (3) to draw attention to important future research questions to be addressed by the community. We conclude by discussing a research agenda for future work on collaborative visualization and urge for a new generation of visualization tools that are designed with collaboration in mind from their very inception.", "title": "" }, { "docid": "feaa54ff80bac29319a33de7b252827a", "text": "Feedback is assessing an individual's action in any endeavor. The judgment helps one to grow well in any field. By the feedback a student can understand and improve upon mistakes committed, teachers come to know about the student's capability and implement new teaching methods. New Technologies also come up for the enhancement of Student's Performance. A study of the assessment of student performance through various papers using data mining and also with ontology based applications makes one decide certain factors like confidence level, stress and time management, holistic approach towards an issue which may be useful in giving a prediction about the students' work performance level in organizations. The Survey encompasses the assessment of a student's performance in academics using Data mining Techniques and also with Ontology based Applications.", "title": "" }, { "docid": "79d1d44fea2780cfbe1ae178cc456d06", "text": "PURPOSE\nTo assess rates of burnout among US radiation oncology residents and evaluate program/resident factors associated with burnout.\n\n\nMETHODS AND MATERIALS\nA nationwide survey was distributed to residents in all US radiation oncology programs. The survey included the Maslach Burnout Index-Human Services Survey (MBI-HSS) as well as demographic and program-specific questions tailored to radiation oncology residents. Primary endpoints included rates of emotional exhaustion, depersonalization, and personal accomplishment from MBI-HSS subscale scores. Binomial logistic models determined associations between various residency/resident characteristics and high burnout levels.\n\n\nRESULTS\nOverall, 232 of 733 residents (31.2%) responded, with 205 of 733 (27.9%) completing the MBI-HSS. High levels of emotional exhaustion and depersonalization were reported in 28.3% and 17.1%, respectively; 33.1% experienced a high burnout level on at least 1 of these 2 MBI-HSS subscales. Low rates of personal accomplishment occurred in 12% of residents. Twelve residents (5.9%) reported feeling \"at the end of my rope\" on a weekly basis or more. On multivariable analysis there was a statistically significant inverse association between perceived adequacy of work-life balance (odds ratio 0.37; 95% confidence interval 0.17-0.83) and burnout.\n\n\nCONCLUSIONS\nApproximately one-third of radiation oncology residents have high levels of burnout symptoms, consistent with previous oncology literature, but lower levels than those among physicians and residents of other specialties. Particularly concerning was that more than 1 in 20 felt \"at the end of my rope\" on a weekly basis or more. Targeted interventions to identify symptoms of burnout among radiation oncology residents may help to prevent the negative downstream consequences of this syndrome.", "title": "" }, { "docid": "31add593ce5597c24666d9662b3db89d", "text": "Estimating the body shape and posture of a dressed human subject in motion represented as a sequence of (possibly incomplete) 3D meshes is important for virtual change rooms and security. To solve this problem, statistical shape spaces encoding human body shape and posture variations are commonly used to constrain the search space for the shape estimate. In this work, we propose a novel method that uses a posture-invariant shape space to model body shape variation combined with a skeleton-based deformation to model posture variation. Our method can estimate the body shape and posture of both static scans and motion sequences of dressed human body scans. In case of motion sequences, our method takes advantage of motion cues to solve for a single body shape estimate along with a sequence of posture estimates. We apply our approach to both static scans and motion sequences and demonstrate that using our method, higher fitting accuracy is achieved than when using a variant of the popular SCAPE model [2, 18] as statistical model.", "title": "" }, { "docid": "dfaa6e183e70cbacc5c9de501993b7af", "text": "Traditional buildings consume more of the energy resources than necessary and generate a variety of emissions and waste. The solution to overcoming these problems will be to build them green and smart. One of the significant components in the concept of smart green buildings is using renewable energy. Solar energy and wind energy are intermittent sources of energy, so these sources have to be combined with other sources of energy or storage devices. While batteries and/or supercapacitors are an ideal choice for short-term energy storage, regenerative hydrogen-oxygen fuel cells are a promising candidate for long-term energy storage. This paper is to design and test a green building energy system that consists of renewable energy, energy storage, and energy management. The paper presents the architecture of the proposed green building energy system and a simulation model that allows for the study of advanced control strategies for the green building energy system. An example green building energy system is tested and simulation results show that the variety of energy source and storage devices can be managed very well.", "title": "" }, { "docid": "242b631b60b3abf5646c7d191477adbe", "text": "■ Abstract We highlight the complexity of land-use/cover change and propose a framework for a more general understanding of the issue, with emphasis on tropical regions. The review summarizes recent estimates on changes in cropland, agricultural intensification, tropical deforestation, pasture expansion, and urbanization and identifies the still unmeasured land-cover changes. Climate-driven land-cover modifications interact with land-use changes. Land-use change is driven by synergetic factor combinations of resource scarcity leading to an increase in the pressure of production on resources, changing opportunities created by markets, outside policy intervention, loss of adaptive capacity, and changes in social organization and attitudes. The changes in ecosystem goods and services that result from land-use change feed back on the drivers of land-use change. A restricted set of dominant pathways of land-use change is identified. Land-use change can be understood using the concepts of complex adaptive systems and transitions. Integrated, place-based research on land-use/land-cover change requires a combination of the agent-based systems and narrative perspectives of understanding. We argue in this paper that a systematic analysis of local-scale land-use change studies, conducted over a range of timescales, helps to uncover general principles that provide an explanation and prediction of new land-use changes.", "title": "" }, { "docid": "6bcedbceeda2e995044b21363bd95180", "text": "The orbitofrontal cortex represents the reward or affective value of primary reinforcers including taste, touch, texture, and face expression. It learns to associate other stimuli with these to produce representations of the expected reward value for visual, auditory, and abstract stimuli including monetary reward value. The orbitofrontal cortex thus plays a key role in emotion, by representing the reward value of the goals for action. The learning process is stimulus-reinforcer association learning. Negative reward prediction error neurons are related to this affective learning. Activations in the orbitofrontal cortex correlate with the subjective emotional experience of affective stimuli, and damage to the orbitofrontal cortex impairs emotion-related learning, emotional behaviour, and subjective affective state. Top-down attention to affect modulates orbitofrontal cortex representations, and attention to intensity modulates representations in earlier cortical areas that represent the physical properties of stimuli. Top-down word-level cognitive inputs can bias affective representations in the orbitofrontal cortex, providing a mechanism for cognition to influence emotion. Whereas the orbitofrontal cortex provides a representation of reward or affective value on a continuous scale, areas beyond the orbitofrontal cortex such as the medial prefrontal cortex area 10 are involved in binary decision-making when a choice must be made. For this decision-making, the orbitofrontal cortex provides a representation of the value of each specific reward on the same scale, with no conversion to a common currency. Increased activity in a lateral orbitofrontal cortex non-reward area provides a new attractor-related approach to understanding and treating depression. Consistent with the theory, the lateral orbitofrontal cortex has increased functional connectivity in depression, and the medial orbitofrontal cortex, involved in reward, has decreased functional connectivity in depression.", "title": "" }, { "docid": "98f75a69417bc3eb16d13e1dc39f1001", "text": "This paper provides a comprehensive overview of critical developments in the field of multiple-input multiple-output (MIMO) wireless communication systems. The state of the art in single-user MIMO (SU-MIMO) and multiuser MIMO (MU-MIMO) communications is presented, highlighting the key aspects of these technologies. Both open-loop and closed-loop SU-MIMO systems are discussed in this paper with particular emphasis on the data rate maximization aspect of MIMO. A detailed review of various MU-MIMO uplink and downlink techniques then follows, clarifying the underlying concepts and emphasizing the importance of MU-MIMO in cellular communication systems. This paper also touches upon the topic of MU-MIMO capacity as well as the promising convex optimization approaches to MIMO system design.", "title": "" }, { "docid": "d4af143e26b122f32697a4ac9973d748", "text": "The Keivitsansarvi deposit, in northern Finland, is a low-grade dissemination of Ni–Cu sulfides containing 1.3–26.6 g/t PGE. It occurs in the northeastern part of the 2.05 Ga Keivitsa intrusion and is hosted by olivine wehrlite and olivine websterite, metamorphosed at greenschist-facies conditions. The sulfide-mineralized area shows variable bulk S, Ni, Co, Cu, PGE, Au, As, Sb, Se, Te and Bi contents. S and Au tend to decrease irregularly from bottom to top of the deposit, whereas Ni, Ni/Co, PGE, As, Sb, Se, Te and Bi tend to increase. Thus, the upper section of the deposit has low S (<1.5 wt.%) and Au (160 ppb on average), but elevated levels of the PGE (2120 ppb Pt, 1855 ppb Pd on average). Sulfides consist of intergranular, highly disseminated aggregates mainly made up of pentlandite, pyrite, and chalcopyrite (all showing fine intergrowths), as well as nickeline, maucherite and gersdorffite in some samples. Most platinum-group minerals occur as single, minute grains included in silicates (57%) or attached to the grain boundaries of sulfides (36%). Only a few PGM grains (6%) are included in sulfides. Pt minerals (mainly moncheite and sperrylite) are the most abundant PGM, whereas Pd minerals (mainly merenskyite, Pd-rich melonite, kotulskite and sobolevskite) are relatively scarce, and most contain significant amounts of Pt. Whole-rock PGE analyses show a general Pd enrichment with respect to Pt. This discrepancy results from the fact that a major part of Pd is hidden in solid solution in the structure of gersdorffite, nickeline, maucherite and pentlandite. The mineral assemblages and textures of the upper section of the Keivitsansarvi deposit result from the combined effect of serpentinization, hydrothermal alteration and metamorphism of preexisting, low-grade disseminated Ni–Cu ore formed by the intercumulus crystallization of a small fraction of immiscible sulfide melt. Serpentinization caused Ni enrichment of sulfides and preserved the original PGE concentrations of the magmatic mineralization. Later, coeval with greenschist-facies metamorphism, PGE and some As (together with other semimetals) were leached out from other mineralized zones by hydrothermal fluids, probably transported in the form of chloride complexes, and precipitated in discrete Ni–Cu–PGE-rich horizons, as observed in the upper part of the deposit. Metamorphism also caused partial dissolution and redistribution of the sulfide (and arsenide) aggregates, contributing to a further Ni enrichment in the sulfide ores.", "title": "" }, { "docid": "1f43cd2c1e2befc95f0ada413bfa7d1e", "text": "Mobile robot is an autonomous agent capable of navigating intelligently anywhere using sensor-actuator control techniques. The applications of the autonomous mobile robot in many fields such as industry, space, defence and transportation, and other social sectors are growing day by day. The mobile robot performs many tasks such as rescue operation, patrolling, disaster relief, planetary exploration, and material handling, etc. Therefore, an intelligent mobile robot is required that could travel autonomously in various static and dynamic environments. Several techniques have been applied by the various researchers for mobile robot navigation and obstacle avoidance. The present article focuses on the study of the intelligent navigation techniques, which are capable of navigating a mobile robot autonomously in static as well as dynamic environments.", "title": "" }, { "docid": "f27547cfee95505fe8a2f44f845ddaed", "text": "High-performance, two-dimensional arrays of parallel-addressed InGaN blue micro-light-emitting diodes (LEDs) with individual element diameters of 8, 12, and 20 /spl mu/m, respectively, and overall dimensions 490 /spl times/490 /spl mu/m, have been fabricated. In order to overcome the difficulty of interconnecting multiple device elements with sufficient step-height coverage for contact metallization, a novel scheme involving the etching of sloped-sidewalls has been developed. The devices have current-voltage (I-V) characteristics approaching those of broad-area reference LEDs fabricated from the same wafer, and give comparable (3-mW) light output in the forward direction to the reference LEDs, despite much lower active area. The external efficiencies of the micro-LED arrays improve as the dimensions of the individual elements are scaled down. This is attributed to scattering at the etched sidewalls of in-plane propagating photons into the forward direction.", "title": "" }, { "docid": "298b65526920c7a094f009884439f3e4", "text": "Big Data concerns massive, heterogeneous, autonomous sources with distributed and decentralized control. These characteristics make it an extreme challenge for organizations using traditional data management mechanism to store and process these huge datasets. It is required to define a new paradigm and re-evaluate current system to manage and process Big Data. In this paper, the important characteristics, issues and challenges related to Big Data management has been explored. Various open source Big Data analytics frameworks that deal with Big Data analytics workloads have been discussed. Comparative study between the given frameworks and suitability of the same has been proposed.", "title": "" }, { "docid": "171b5d7c884cd934af602bf000451cb9", "text": "Can playing action video games improve visuomotor control? If so, can these games be used in training people to perform daily visuomotor-control tasks, such as driving? We found that action gamers have better lane-keeping and visuomotor-control skills than do non-action gamers. We then trained non-action gamers with action or nonaction video games. After they played a driving or first-person-shooter video game for 5 or 10 hr, their visuomotor control improved significantly. In contrast, non-action gamers showed no such improvement after they played a nonaction video game. Our model-driven analysis revealed that although different action video games have different effects on the sensorimotor system underlying visuomotor control, action gaming in general improves the responsiveness of the sensorimotor system to input error signals. The findings support a causal link between action gaming (for as little as 5 hr) and enhancement in visuomotor control, and suggest that action video games can be beneficial training tools for driving.", "title": "" }, { "docid": "649118bb3927a2b6bbb924d838fdbac8", "text": "Research has demonstrated that extensive structural and functional brain development continues throughout adolescence. A popular notion emerging from this work states that a relative immaturity in frontal cortical neural systems could explain adolescents' high rates of risk-taking, substance use and other dangerous behaviours. However, developmental neuroimaging studies do not support a simple model of frontal cortical immaturity. Rather, growing evidence points to the importance of changes in social and affective processing, which begin around the onset of puberty, as crucial to understanding these adolescent vulnerabilities. These changes in social–affective processing also may confer some adaptive advantages, such as greater flexibility in adjusting one's intrinsic motivations and goal priorities amidst changing social contexts in adolescence.", "title": "" }, { "docid": "b35d34cca3cb50247dc030ff8b9c7ac7", "text": "Article history: Available online 29 June 2015", "title": "" }, { "docid": "170e7a72a160951e880f18295d100430", "text": "In this paper, we introduce an embedding model, named CapsE, exploring a capsule network to model relationship triples (subject, relation, object). Our CapsE represents each triple as a 3-column matrix where each column vector represents the embedding of an element in the triple. This 3-column matrix is then fed to a convolution layer where multiple filters are operated to generate different feature maps. These feature maps are used to construct capsules in the first capsule layer. Capsule layers are connected via dynamic routing mechanism. The last capsule layer consists of only one capsule to produce a vector output. The length of this vector output is used to measure the plausibility of the triple. Our proposed CapsE obtains state-of-the-art link prediction results for knowledge graph completion on two benchmark datasets: WN18RR and FB15k-237, and outperforms strong search personalization baselines on SEARCH17 dataset.", "title": "" }, { "docid": "a9a65ee9ac1469b24e8900de01eb8b19", "text": "The lung has significant susceptibility to injury from a variety of chemotherapeutic agents. The clinician must be familiar with classic chemotherapeutic agents with well-described pulmonary toxicities and must also be vigilant about a host of new agents that may exert adverse effects on lung function. The diagnosis of chemotherapy-associated lung disease remains an exclusionary process, particularly with respect to considering usual and atypical infections, as well as recurrence of the underlying neoplastic process in these immune compromised patients. In many instances, chemotherapy-associated lung disease may respond to withdrawal of the offending agent and to the judicious application of corticosteroid therapy.", "title": "" } ]
scidocsrr
caa2bb5c3492d4fda706ccb1d6777b0d
Summary in context: Searching versus browsing
[ { "docid": "7c0ef25b2a4d777456facdfc526cf206", "text": "The paper presents a novel approach to unsupervised text summarization. The novelty lies in exploiting the diversity of concepts in text for summarization, which has not received much attention in the summarization literature. A diversity-based approach here is a principled generalization of Maximal Marginal Relevance criterion by Carbonell and Goldstein \\cite{carbonell-goldstein98}.\nWe propose, in addition, aninformation-centricapproach to evaluation, where the quality of summaries is judged not in terms of how well they match human-created summaries but in terms of how well they represent their source documents in IR tasks such document retrieval and text categorization.\nTo find the effectiveness of our approach under the proposed evaluation scheme, we set out to examine how a system with the diversity functionality performs against one without, using the BMIR-J2 corpus, a test data developed by a Japanese research consortium. The results demonstrate a clear superiority of a diversity based approach to a non-diversity based approach.", "title": "" } ]
[ { "docid": "b2d75c2f8ac81937557bb4de1113b90d", "text": "End-to-end learning framework is useful for building dialog systems for its simplicity in training and efficiency in model updating. However, current end-to-end approaches only consider user semantic inputs in learning and under-utilize other user information. Therefore, we propose to include user sentiment obtained through multimodal information (acoustic, dialogic and textual), in the end-to-end learning framework to make systems more user-adaptive and effective. We incorporated user sentiment information in both supervised and reinforcement learning settings. In both settings, adding sentiment information reduced the dialog length and improved the task success rate on a bus information search task. This work is the first attempt to incorporate multimodal user information in the adaptive end-toend dialog system training framework and attained state-of-the-art performance.", "title": "" }, { "docid": "e57732931a053f73280564270c764f15", "text": "Neural generative model in question answering (QA) usually employs sequence-to-sequence (Seq2Seq) learning to generate answers based on the user’s questions as opposed to the retrieval-based model selecting the best matched answer from a repository of pre-defined QA pairs. One key challenge of neural generative model in QA lies in generating high-frequency and generic answers regardless of the questions, partially due to optimizing log-likelihood objective function. In this paper, we investigate multitask learning (MTL) in neural network-based method under a QA scenario. We define our main task as agenerative QA via Seq2Seq learning. And we define our auxiliary task as a discriminative QA via binary QAclassification. Both main task and auxiliary task are learned jointly with shared representations, allowing to obtain improved generalization and transferring classification labels as extra evidences to guide the word sequence generation of the answers. Experimental results on both automatic evaluations and human annotations demonstrate the superiorities of our proposed method over baselines.", "title": "" }, { "docid": "0af9b629032ae50a2e94310abcc55aa5", "text": "We introduce novel relaxations for cardinality-constrained learning problems, including least-squares regression as a special but important case. Our approach is based on reformulating a cardinality-constrained problem exactly as a Boolean program, to which standard convex relaxations such as the Lasserre and Sherali-Adams hierarchies can be applied. We analyze the first-order relaxation in detail, deriving necessary and sufficient conditions for exactness in a unified manner. In the special case of least-squares regression, we show that these conditions are satisfied with high probability for random ensembles satisfying suitable incoherence conditions, similar to results on 1-relaxations. In contrast to known methods, our relaxations yield lower bounds on the objective, and it can be verified whether or not the relaxation is exact. If it is not, we show that randomization based on the relaxed solution offers a principled way to generate provably good feasible solutions. This property enables us to obtain high quality estimates even if incoherence conditions are not met, as might be expected in real datasets. We numerically illustrate the performance of the relaxationrandomization strategy in both synthetic and real high-dimensional datasets, revealing substantial improvements relative to 1-based methods and greedy selection heuristics. B Laurent El Ghaoui elghaoui@berkeley.edu Mert Pilanci mert@berkeley.edu Martin J. Wainwright wainwrig@berkeley.edu 1 Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, CA, USA 2 Department of Electrical Engineering and Computer Sciences and Department of Statistics, University of California, Berkeley, CA, USA", "title": "" }, { "docid": "7ca1c9096c6176cb841ae7f0e7262cb7", "text": "“Industry 4.0” is recognized as the future of industrial production in which concepts as Smart Factory and Decentralized Decision Making are fundamental. This paper proposes a novel strategy to support decentralized decision, whilst identifying opportunities and challenges of Industry 4.0 contextualizing the potential that represents industrial digitalization and how technological advances can contribute for a new perspective on manufacturing production. It is analysed a set of barriers to the full implementation of Industry 4.0 vision, identifying areas in which decision support is vital. Then, for each of the identified areas, the authors propose a strategy, characterizing it together with the level of complexity that is involved in the different processes. The strategies proposed are derived from the needs of two of Industry 4.0 main characteristics: horizontal integration and vertical integration. For each case, decision approaches are proposed concerning the type of decision required (strategic, tactical, operational and real-time). Validation results are provided together with a discussion on the main challenges that might be an obstacle for a successful decision strategy.", "title": "" }, { "docid": "c6878e9e106655f492a989be9e33176f", "text": "Employees who are engaged in their work are fully connected with their work roles. They are bursting with energy, dedicated to their work, and immersed in their work activities. This article presents an overview of the concept of work engagement. I discuss the antecedents and consequences of engagement. The review shows that job and personal resources are the main predictors of engagement. These resources gain their salience in the context of high job demands. Engaged workers are more open to new information, more productive, and more willing to go the extra mile. Moreover, engaged workers proactively change their work environment in order to stay engaged. The findings of previous studies are integrated in an overall model that can be used to develop work engagement and advance job performance in today’s workplace.", "title": "" }, { "docid": "5e53a20b6904a9b8765b0384f5d1d692", "text": "This paper provides a description of the crowdfunding sector, considering investment-based crowdfunding platforms as well as platforms in which funders do not obtain monetary payments. It lays out key features of this quickly developing sector and explores the economic forces at play that can explain the design of these platforms. In particular, it elaborates on cross-group and within-group external e¤ects and asymmetric information on crowdfunding platforms. Keywords: Crowdfunding, Platform markets, Network e¤ects, Asymmetric information, P2P lending JEL-Classi…cation: L13, D62, G24 Université catholique de Louvain, CORE and Louvain School of Management, and CESifo yRITM, University of Paris Sud and Digital Society Institute zUniversity of Mannheim, Mannheim Centre for Competition and Innovation (MaCCI), and CERRE. Email: martin.peitz@gmail.com", "title": "" }, { "docid": "39208755abbd92af643d0e30029f6cc0", "text": "The biomedical community makes extensive use of text mining technology. In the past several years, enormous progress has been made in developing tools and methods, and the community has been witness to some exciting developments. Although the state of the community is regularly reviewed, the sheer volume of work related to biomedical text mining and the rapid pace in which progress continues to be made make this a worthwhile, if not necessary, endeavor. This chapter provides a brief overview of the current state of text mining in the biomedical domain. Emphasis is placed on the resources and tools available to biomedical researchers and practitioners, as well as the major text mining tasks of interest to the community. These tasks include the recognition of explicit facts from biomedical literature, the discovery of previously unknown or implicit facts, document summarization, and question answering. For each topic, its basic challenges and methods are outlined and recent and influential work is reviewed.", "title": "" }, { "docid": "89e034a5f8472ef4426f4642d01b9802", "text": "This paper presents CORD, a reliable bulk data dissemination protocol for propagating a large data object to all the nodes in a large scale sensor network. Unlike well- known reliable data dissemination protocols such as Deluge whose primary design criterion is to reduce the latency of object propagation, CORD's primary goal is to minimize energy consumption. To achieve its goals CORD employs a two phase approach in which the object is delivered to a subset of nodes in the network that form a connected dominating set in the first phase, and to the remaining nodes in the second phase. Further, CORD installs a coordinated sleep schedule on the nodes in the network whereby nodes that are not involved in receiving or transmitting data can turn off their radios to reduce their energy consumption. We evaluated the performance of CORD experimentally on both an indoor and outdoor sensor network testbed and via extensive simulations. Our results show that in comparison to Deluge (the de facto network reprogramming protocol for TinyOS) CORD significantly reduces the energy consumption for reliable data dissemination while achieving a comparable latency.", "title": "" }, { "docid": "4aee0c91e48b9a34be4591d36103c622", "text": "We construct a polyhedron that is topologically convex (i.e., has the graph of a convex polyhedron) yet has no vertex unfolding: no matter how we cut along the edges and keep faces attached at vertices to form a connected (hinged) surface, the surface necessarily unfolds with overlap.", "title": "" }, { "docid": "24a10176ec2367a6a0b5333d57b894b8", "text": "Automated classification of biological cells according to their 3D morphology is highly desired in a flow cytometer setting. We have investigated this possibility experimentally and numerically using a diffraction imaging approach. A fast image analysis software based on the gray level co-occurrence matrix (GLCM) algorithm has been developed to extract feature parameters from measured diffraction images. The results of GLCM analysis and subsequent classification demonstrate the potential for rapid classification among six types of cultured cells. Combined with numerical results we show that the method of diffraction imaging flow cytometry has the capacity as a platform for high-throughput and label-free classification of biological cells.", "title": "" }, { "docid": "0be273eb8dfec6a6f71a44f38e8207ba", "text": "Clustering is a powerful tool which has been used in several forecasting works, such as time series forecasting, real time storm detection, flood forecasting and so on. In this paper, a generic methodology for weather forecasting is proposed by the help of incremental K-means clustering algorithm. Weather forecasting plays an important role in day to day applications.Weather forecasting of this paper is done based on the incremental air pollution database of west Bengal in the years of 2009 and 2010. This paper generally uses typical Kmeans clustering on the main air pollution database and a list of weather category will be developed based on the maximum mean values of the clusters.Now when the new data are coming, the incremental K-means is used to group those data into those clusters whose weather category has been already defined. Thus it builds up a strategy to predict the weather of the upcoming data of the upcoming days. This forecasting database is totally based on the weather of west Bengal and this forecasting methodology is developed to mitigating the impacts of air pollutions and launch focused modeling computations for prediction and forecasts of weather events. Here accuracy of this approach is also measured.", "title": "" }, { "docid": "20e10963c305ca422fb025cafc807301", "text": "The new psychological disorder of Internet addiction is fast accruing both popular and professional recognition. Past studies have indicated that some patterns of Internet use are associated with loneliness, shyness, anxiety, depression, and self-consciousness, but there appears to be little consensus about Internet addiction disorder. This exploratory study attempted to examine the potential influences of personality variables, such as shyness and locus of control, online experiences, and demographics on Internet addiction. Data were gathered from a convenient sample using a combination of online and offline methods. The respondents comprised 722 Internet users mostly from the Net-generation. Results indicated that the higher the tendency of one being addicted to the Internet, the shyer the person is, the less faith the person has, the firmer belief the person holds in the irresistible power of others, and the higher trust the person places on chance in determining his or her own course of life. People who are addicted to the Internet make intense and frequent use of it both in terms of days per week and in length of each session, especially for online communication via e-mail, ICQ, chat rooms, newsgroups, and online games. Furthermore, full-time students are more likely to be addicted to the Internet, as they are considered high-risk for problems because of free and unlimited access and flexible time schedules. Implications to help professionals and student affairs policy makers are addressed.", "title": "" }, { "docid": "c09adc1924c9c1b32c33b23d9df489b9", "text": "In recent years, “document store” NoSQL systems have exploded in popularity. A large part of this popularity has been driven by the adoption of the JSON data model in these NoSQL systems. JSON is a simple but expressive data model that is used in many Web 2.0 applications, and maps naturally to the native data types of many modern programming languages (e.g. Javascript). The advantages of these NoSQL document store systems (like MongoDB and CouchDB) are tempered by a lack of traditional RDBMS features, notably a sophisticated declarative query language, rich native query processing constructs (e.g. joins), and transaction management providing ACID safety guarantees. In this paper, we investigate whether the advantages of the JSON data model can be added to RDBMSs, gaining some of the traditional benefits of relational systems in the bargain. We present Argo, an automated mapping layer for storing and querying JSON data in a relational system, and NoBench, a benchmark suite that evaluates the performance of several classes of queries over JSON data in NoSQL and SQL databases. Our results point to directions of how one can marry the best of both worlds, namely combining the flexibility of JSON to support the popular document store model with the rich query processing and transactional properties that are offered by traditional relational DBMSs.", "title": "" }, { "docid": "ebc17ee3bfe7fb5cda23c7db07e5ae8d", "text": "This paper describes the hardware and software ecosystem encompassing the brain-inspired TrueNorth processor – a 70mW reconfigurable silicon chip with 1 million neurons, 256 million synapses, and 4096 parallel and distributed neural cores. For systems, we present a scale-out system loosely coupling 16 single-chip boards and a scale-up system tightly integrating 16 chips in a 4 × 4 configuration by exploiting TrueNorth's native tiling. For software, we present an end-to-end ecosystem consisting of a simulator, a programming language, an integrated programming environment, a library of algorithms and applications, firmware, tools for deep learning, a teaching curriculum, and cloud enablement. For the scale-up systems we summarize our approach to physical placement of neural network, to reduce intra- and inter-chip network traffic. The ecosystem is in use at over 30 universities and government/corporate labs. Our platform is a substrate for a spectrum of applications from mobile and embedded computing to cloud and supercomputers.", "title": "" }, { "docid": "a6f1480f52d142a013bb88a92e47b0d7", "text": "An isolated switched high step up boost DC-DC converter is discussed in this paper. The main objective of this paper is to step up low voltage to very high voltage. This paper mainly initiates at boosting a 30V DC into 240V DC. The discussed converter benefits from the continuous input current. Usually, step-up DC-DC converters are suitable for input whose voltage level is very low. The circuital design comprises of four main stages. Firstly, an impedance network which is used to boost the low input voltage. Secondly a switching network which is used to boost the input voltage then an isolation transformer which is used to provide higher boosting ability and finally a voltage multiplier rectifier which is used to rectify the secondary voltage of the transformer. No switching deadtime is required, which increases the reliability of the converter. Comparing with the existing step-up topologies indicates that this new design is hybrid, portable, higher power density and the size of the whole system is also reduced. The principles as well as operations were analysed and experimentally worked out, which provides a higher efficiency. KeywordImpedance Network, Switching Network, Isolation Transformer, Voltage Multiplier Rectifier, MicroController, DC-DC Boost Converter __________________________________________________________________________________________________", "title": "" }, { "docid": "5f39c5df4127824b3408e2b34f000bee", "text": "Objective To evaluate the information, its source, beliefs an d perceptions of acne patients regarding acne and their expectations about treatment. Patients and methods All acne patients visiting Dermatology outpatient c lini at WAPDA Teaching Hospital Complex, Lahore and at private practice fo r management were asked to fill a voluntary questionnaire containing information about patients ’ beliefs and perception about acne. Grading was done by a dermatologist. Result 449 patients completed the pro forma. Males were 37 % and females 63%. 54.1% of patients waited for one year to have treatment. More than 60 % thought acne as a curable disease and more than 50% expected it to clear in 2-4 weeks. Most of them decided themselves to visit the doctor or were influenced by their parents. Most of them gath ered information regarding acne from close relatives and friends. Infection and poor hygiene ( less washing of face with soap) was thought to be the most important cause. Facial masks and lotions were most commonly tried non-prescription acne products. 45% thought that acne had a severe i mpact on their self-image. Topical treatment was the most desired one. More than 40% of patients had grade IV acne and there was no significant difference between males and females re garding grade wise presentation. Conclusion Community-based health education program is require d to increase the awareness about acne and to resolve the misconceptions.", "title": "" }, { "docid": "02b4c741b4a68e1b437674d874f10253", "text": "Traffic sign recognition is an important step for integrating smart vehicles into existing road transportation systems. In this paper, an NVIDIA Jetson TX1-based traffic sign recognition system is introduced for driver assistance applications. The system incorporates two major operations, traffic sign detection and recognition. Image color and shape based detection is used to locate potential signs in each frame. A pre-trained convolutional neural network performs classification on these potential sign candidates. The proposed system is implemented on NVIDIA Jetson TX1 board with web-camera. Based on a well-known benchmark suite, 96% detection accuracy is achieved while executing at 1.6 frames per seconds.", "title": "" }, { "docid": "8a363d7fa2bbf4b30312ca9efc2b3fa5", "text": "The objective of the present study was to investigate whether transpedicular bone grafting as a supplement to posterior pedicle screw fixation in thoracolumbar fractures results in a stable reconstruction of the anterior column, that allows healing of the fracture without loss of correction. Posterior instrumentation using an internal fixator is a standard procedure for stabilizing the injured thoracolumbar spine. Transpedicular bone grafting was first described by Daniaux in 1986 to achieve intrabody fusion. Pedicle screw fixation with additional transpedicular fusion has remained controversial because of inconsistent reports. A retrospective single surgeon cohort study was performed. Between October 2001 and May 2007, 30 consecutive patients with 31 acute traumatic burst fractures of the thoracolumbar spine (D12-L5) were treated operatively. The mean age of the patients was 45.7 years (range: 19-78). There were 23 men and 7 women. Nineteen thoracolumbar fractures were sustained in falls from a height; the other fractures were the result of motor vehicle accidents. The vertebrae most often involved were L1 in 13 patients and L2 in 8 patients. According to the Magerl classification, 25 patients sustained Type A1, 4 Type A2 and 2 Type A3 fractures. The mean time from injury to surgery was 6 days (range 2-14 days). Two postoperative complications were observed: one superficial and one deep infection. Mean Cobb's angle improved from +7.16 degrees (SD 12.44) preoperatively to -5.48 degrees (SD 11.44) immediately after operation, with a mean loss of correction of 1.00 degrees (SD 3.04) at two years. Reconstruction of the anterior column is important to prevent loss of correction. In our experience, the use of transpedicular bone grafting has efficiently restored the anterior column and has preserved the post-operative correction of kyphosis until healing of the fracture.", "title": "" }, { "docid": "636ace52ca3377809326735810a08310", "text": "BACKGROUND\nAlthough many patients with venous thromboembolism require extended treatment, it is uncertain whether it is better to use full- or lower-intensity anticoagulation therapy or aspirin.\n\n\nMETHODS\nIn this randomized, double-blind, phase 3 study, we assigned 3396 patients with venous thromboembolism to receive either once-daily rivaroxaban (at doses of 20 mg or 10 mg) or 100 mg of aspirin. All the study patients had completed 6 to 12 months of anticoagulation therapy and were in equipoise regarding the need for continued anticoagulation. Study drugs were administered for up to 12 months. The primary efficacy outcome was symptomatic recurrent fatal or nonfatal venous thromboembolism, and the principal safety outcome was major bleeding.\n\n\nRESULTS\nA total of 3365 patients were included in the intention-to-treat analyses (median treatment duration, 351 days). The primary efficacy outcome occurred in 17 of 1107 patients (1.5%) receiving 20 mg of rivaroxaban and in 13 of 1127 patients (1.2%) receiving 10 mg of rivaroxaban, as compared with 50 of 1131 patients (4.4%) receiving aspirin (hazard ratio for 20 mg of rivaroxaban vs. aspirin, 0.34; 95% confidence interval [CI], 0.20 to 0.59; hazard ratio for 10 mg of rivaroxaban vs. aspirin, 0.26; 95% CI, 0.14 to 0.47; P<0.001 for both comparisons). Rates of major bleeding were 0.5% in the group receiving 20 mg of rivaroxaban, 0.4% in the group receiving 10 mg of rivaroxaban, and 0.3% in the aspirin group; the rates of clinically relevant nonmajor bleeding were 2.7%, 2.0%, and 1.8%, respectively. The incidence of adverse events was similar in all three groups.\n\n\nCONCLUSIONS\nAmong patients with venous thromboembolism in equipoise for continued anticoagulation, the risk of a recurrent event was significantly lower with rivaroxaban at either a treatment dose (20 mg) or a prophylactic dose (10 mg) than with aspirin, without a significant increase in bleeding rates. (Funded by Bayer Pharmaceuticals; EINSTEIN CHOICE ClinicalTrials.gov number, NCT02064439 .).", "title": "" }, { "docid": "12a89641dd93939be587b2bcf1b26939", "text": "Drug-drug interaction (DDI) is a vital information when physicians and pharmacists prepare for the combined use of two or more drugs. Thus, several DDI databases are constructed to avoid mistakenly medicine administering. In recent years, automatically extracting DDIs from biomedical text has drawn researchers’ attention. However, the existing work need either complex feature engineering or NLP tools, both of which are insufficient for sentence comprehension. Inspired by the deep learning approaches in natural language processing, we propose a recurrent neural network model with multiple attention layers for DDI classification. We evaluate our model on 2013 SemEval DDIExtraction dataset. The experiments show that our model classifies most of the drug pairs into correct DDI categories, which outperforms the existing NLP or deep learning method.", "title": "" } ]
scidocsrr
3ef7fdae6bdc40c4bb94653bb106c297
Order-Embeddings of Images and Language
[ { "docid": "1157ced7937578d8a54bc9bb462b5706", "text": "In recent years, the problem of associating a sentence with an image has gained a lot of attention. This work continues to push the envelope and makes further progress in the performance of image annotation and image search by a sentence tasks. In this work, we are using the Fisher Vector as a sentence representation by pooling the word2vec embedding of each word in the sentence. The Fisher Vector is typically taken as the gradients of the log-likelihood of descriptors, with respect to the parameters of a Gaussian Mixture Model (GMM). In this work we present two other Mixture Models and derive their Expectation-Maximization and Fisher Vector expressions. The first is a Laplacian Mixture Model (LMM), which is based on the Laplacian distribution. The second Mixture Model presented is a Hybrid Gaussian-Laplacian Mixture Model (HGLMM) which is based on a weighted geometric mean of the Gaussian and Laplacian distribution. Finally, by using the new Fisher Vectors derived from HGLMMs to represent sentences, we achieve state-of-the-art results for both the image annotation and the image search by a sentence tasks on four benchmarks: Pascal1K, Flickr8K, Flickr30K, and COCO.", "title": "" } ]
[ { "docid": "02bb6968d974bc2f3b5a56d75b2f1d7b", "text": "We propose a spiking network model capable of performing both approximate inference and learning for any hidden Markov model. The lower layer sensory neurons detect noisy measurements of hidden world states. The higher layer neurons with recurrent connections infer a posterior distribution over world states from spike trains generated by sensory neurons. We show how such a neuronal network with synaptic plasticity can implement a form of Bayesian inference similar to Monte Carlo methods such as particle filtering. Each spike in the population of inference neurons represents a sample of a particular hidden world state. The spiking activity across the neural population approximates the posterior distribution of hidden state. The model provides a functional explanation for the Poissonlike noise commonly observed in cortical responses. Uncertainties in spike times provide the necessary variability for sampling during inference. Unlike previous models, the hidden world state is not observed by the sensory neurons, and the temporal dynamics of the hidden state is unknown. We demonstrate how such networks can sequentially learn hidden Markov models using a spike-timing dependent Hebbian learning rule and achieve power-law convergence rates.", "title": "" }, { "docid": "323dc0695ea4f5d2e848cb8e33037686", "text": "A new measure of hypersensitive narcissism was derived by correlating the items of H. A. Murray’s (1938) Narcism Scale with an MMPI-based composite measure of covert narcissism. In three samples of college students (total N 5 403), 10 items formed a reliable measure: the Hypersensitive Narcissism Scale (HSNS). The new HSNS and the MMPI-based composite showed similar patterns of correlations with the Big Five Inventory, and both measures correlated near zero with the Narcissistic Personality Inventory, which assesses overt narcissism. Results support P. Wink’s (1991) distinction between covert and overt narcissistic tendencies in the normal range of individual differences and suggest that it would be beneficial for personality researchers to measure both types of narcissism in future studies.  1997 Academic", "title": "" }, { "docid": "857132b27d87727454ec3019e52039ba", "text": "In this paper we will introduce an ensemble of codes called irregular repeat-accumulate (IRA) codes. IRA codes are a generalization of the repeat-accumluate codes introduced in [1], and as such have a natural linear-time encoding algorithm. We shall prove that on the binary erasure channel, IRA codes can be decoded reliably in linear time, using iterative sum-product decoding, at rates arbitrarily close to channel capacity. A similar result appears to be true on the AWGN channel, although we have no proof of this. We illustrate our results with numerical and experimental examples.", "title": "" }, { "docid": "8231458a76b5dc99b60d6a5b6ddaf5c8", "text": "In this research, we develop a fuzzy multi-objective mathematical model to identify and rank the candidate suppliers and find the optimal number of new and refurbished parts and final products in a reverse logistics network configuration. This modeling approach captures the inherent uncertainty in customers’ demand, suppliers’ capacity, and percentage of returned products as well as existence of conflicting objectives in reverse logistics systems. The objective functions in this study are defined as total profit, total defective parts, total late delivered parts, and economic risk factors associated with the candidate suppliers whereas the uncertainties are treated in a fuzzy environment. In order to avoid the subjective weighting from decision makers when solving the multi-objective model, a Monte Carlo simulation integrated with fuzzy goal programming is developed to determine the entire set of Paretooptimal solutions of the proposed model. The effectiveness of the mathematical model and the proposed solution method in obtaining Pareto-optimal solutions is demonstrated in a numerical example from a real case study. 2015 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "14d8bf0bdf519cf0197098d56e6a0c49", "text": "Overlapped subarray networks produce flat-topped sector patterns with low sidelobes that suppress grating lobes outside of the main beam of the subarray pattern. They are typically used in limited scan applications, where it is desired to minimize the number of controls required to steer the beam. However, the architecture of an overlapped subarray antenna includes many signal crossovers and a wide variation in splitting/combining ratios, which make it difficult to maintain required error tolerances. This paper presents the design considerations and results for an overlapped subarray radar antenna, including a custom subarray weighting function and the corresponding circuit design and fabrication. Measured pattern results will be shown for a prototype design compared with desired patterns.", "title": "" }, { "docid": "c05f2a6df3d58c5a18e0087556c8067e", "text": "Child maltreatment is a major social problem. This paper focuses on measuring the relationship between child maltreatment and crime using data from the National Longitudinal Study of Adolescent Health (Add Health). We focus on crime because it is one of the most costly potential outcomes of maltreatment. Our work addresses two main limitations of the existing literature on child maltreatment. First, we use a large national sample, and investigate different types of maltreatment in a unified framework. Second, we pay careful attention to controlling for possible confounders using a variety of statistical methods that make differing assumptions. The results suggest that maltreatment greatly increases the probability of engaging in crime and that the probability increases with the experience of multiple forms of maltreatment.", "title": "" }, { "docid": "b181559966c55d90741f62e645b7d2f7", "text": "BACKGROUND AND AIMS\nPsychological stress is associated with inflammatory bowel disease [IBD], but the nature of this relationship is complex. At present, there is no simple tool to screen for stress in IBD clinical practice or assess stress repeatedly in longitudinal studies. Our aim was to design a single-question 'stressometer' to rapidly measure stress and validate this in IBD patients.\n\n\nMETHODS\nIn all, 304 IBD patients completed a single-question 'stressometer'. This was correlated with stress as measured by the Depression Anxiety Stress Scales [DASS-21], quality of life, and disease activity. Test-retest reliability was assessed in 31 patients who completed the stressometer and the DASS-21 on two occasions 4 weeks apart.\n\n\nRESULTS\nStressometer levels correlated with the DASS-21 stress dimension in both Crohn's disease [CD] (Spearman's rank correlation coefficient [rs] 0.54; p < 0.001) and ulcerative colitis [UC] [rs 0.59; p < 0.001]. Stressometer levels were less closely associated with depression and anxiety [rs range 0.36 to 0.49; all p-values < 0.001]. Stressometer scores correlated with all four Short Health Scale quality of life dimensions in both CD and UC [rs range 0.35 to 0.48; all p-values < 0.001] and with disease activity in Crohn's disease [rs 0.46; p < 0.001] and ulcerative colitis [rs 0.20; p = 0.02]. Responsiveness was confirmed with a test-retest correlation of 0.43 [p = 0.02].\n\n\nCONCLUSIONS\nThe stressometer is a simple, valid, and responsive measure of psychological stress in IBD patients and may be a useful patient-reported outcome measure in future IBD clinical and research assessments.", "title": "" }, { "docid": "46e0cfd4cb292331cb1f6a746a3ed3b7", "text": "Indoor human tracking is fundamental to many real-world applications such as security surveillance, behavioral analysis, and elderly care. Previous solutions usually require dedicated device being carried by the human target, which is inconvenient or even infeasible in scenarios such as elderly care and break-ins. However, compared with device-based tracking, device-free tracking is particularly challenging because the much weaker reflection signals are employed for tracking. The problem becomes even more difficult with commodity Wi-Fi devices, which have limited number of antennas, small bandwidth size, and severe hardware noise.\n In this work, we propose IndoTrack, a device-free indoor human tracking system that utilizes only commodity Wi-Fi devices. IndoTrack is composed of two innovative methods: (1) Doppler-MUSIC is able to extract accurate Doppler velocity information from noisy Wi-Fi Channel State Information (CSI) samples; and (2) Doppler-AoA is able to determine the absolute trajectory of the target by jointly estimating target velocity and location via probabilistic co-modeling of spatial-temporal Doppler and AoA information. Extensive experiments demonstrate that IndoTrack can achieve a 35cm median error in human trajectory estimation, outperforming the state-of-the-art systems and provide accurate location and velocity information for indoor human mobility and behavioral analysis.", "title": "" }, { "docid": "c79eeddb287d3ba032ad9fc402fff566", "text": "We present an assessment of the state and historic development of evaluation practices as reported in papers published at the IEEE Visualization conference. Our goal is to reflect on a meta-level about evaluation in our community through a systematic understanding of the characteristics and goals of presented evaluations. For this purpose we conducted a systematic review of ten years of evaluations in the published papers using and extending a coding scheme previously established by Lam et al. [2012]. The results of our review include an overview of the most common evaluation goals in the community, how they evolved over time, and how they contrast or align to those of the IEEE Information Visualization conference. In particular, we found that evaluations specific to assessing resulting images and algorithm performance are the most prevalent (with consistently 80-90% of all papers since 1997). However, especially over the last six years there is a steady increase in evaluation methods that include participants, either by evaluating their performances and subjective feedback or by evaluating their work practices and their improved analysis and reasoning capabilities using visual tools. Up to 2010, this trend in the IEEE Visualization conference was much more pronounced than in the IEEE Information Visualization conference which only showed an increasing percentage of evaluation through user performance and experience testing. Since 2011, however, also papers in IEEE Information Visualization show such an increase of evaluations of work practices and analysis as well as reasoning using visual tools. Further, we found that generally the studies reporting requirements analyses and domain-specific work practices are too informally reported which hinders cross-comparison and lowers external validity.", "title": "" }, { "docid": "cd383fcc1baa0fedbcc25b38609f40f3", "text": "Motion perception and interpretation plays an important role in the human visual system. It helps us recognize diierent objects and their motion in a scene, infer their relative depth, their rigidity, etc. In psychology, this process has been studied extensively by Johansson using moving light displays (MLDs). MLDs consist of bright spots attached to the joints of an actor dressed in black, and moving in front of a dark background. The collection of spots carry only 2D information and no structural information, since they are not connected. A set of static spots remained meaningless to observers, while their relative movement created a vivid impression of a person walking, running, dancing, etc. The gender of a person, and even the gait of a friend can be recognized based solely on the motion of those spots. There are two theories about the interpretation of MLD type stimuli, from a psychology point of view. In the rst, people use motion information in the MLD to recover the 3D structure and subsequently use the structure for recognition (structure from motion problem). The second theory of motion analysis deals with the direct use of motion information for recognition. In motion-based recognition approach, the emphasis is not on the static structure, and motion information is not extracted one frame at a time. Instead, a sequence containing a large number of frames is used to extract motion information in its continuum. The advantage here is that a longer sequence leads to recognition of higher level movements, like walking or running. This paper provides a review of recent developments in the computer vision aspect of motion-based recognition. We will identify two main steps in motion-based recognition. The rst step is the extraction of motion information and its organization into motion models. The second step consists of the matching of some unknown input with a model. Several methods for the recognition of objects and motions will then be reported. They include methods such as cyclic motion detection and recognition, lipreading, hand gestures interpretation, motion verb recognition and temporal textures classiication. Tracking and recognition of human motion, like walking, skipping, and running, will also be discussed. Finally, we will conclude the paper with some thoughts about future directions for motion-based recognition.", "title": "" }, { "docid": "73c7c4ddfa01fb2b14c6a180c3357a55", "text": "Neurodevelopmental treatment according to Dr. K. and B. Bobath can be supplemented by hippotherapy. At proper control and guidance, an improvement in posture tone, inhibition of pathological movement patterns, facilitation of normal automatical reactions and the promotion of sensorimotor perceptions is achieved. By adjustment to the swaying movements of the horse, the child feels how to retain straightening alignment, symmetry and balance. By pleasure in this therapy, the child can be motivated to satisfactory cooperation and accepts the therapy horse as its friend. The results of hippotherapy for 27 children afflicted with cerebral palsy permit a conclusion as to the value of this treatment for movement and behaviour disturbance to the drawn.", "title": "" }, { "docid": "a48dc6a2e9baf084e548bf4066075b64", "text": "In the implementation of high-performance CMOS over-sampling A/D converters, high-speed comparators are indispensable. This paper discusses the design and analysis of a low-power regenerative latched CMOS comparator, based on an analytical approach which gives a deeper insight into the associated trade-offs. Calculation details and simulation results for a 20 MHz clocked comparator in a 0.5/spl mu/m technology are presented.", "title": "" }, { "docid": "81459e136452983861ac154f2013dc70", "text": "Semantic segmentation has been widely investigated for its important role in computer vision. However, some challenges still exist. The first challenge is how to perceive semantic regions with various attributes, which can result in unbalanced distribution of training samples. Another challenge is accurate semantic boundary determination. In this paper, a contour-aware network for semantic segmentation via adaptive depth is proposed which particularly exploits the power of adaptive-depth neural network and contouraware neural network on pixel-level semantic segmentation. Specifically, an adaptive-depth model, which can adaptively determine the feedback and forward procedure of neural network, is constructed. Moreover, a contour-aware neural network is respectively built to enhance the coherence and the localization accuracy of semantic regions. By formulating the contour information and coarse semantic segmentation results in a unified manner, global inference is proposed to obtain the final segmentation results. Three contributions are claimed: (1) semantic segmentation via adaptive depth neural network; (2) contouraware neural network for semantic segmentation; and (3) global inference for final decision. Experiments on three popular datasets are conducted and experimental results have verified the superiority of the proposed method compared with the state-of-the-art methods. © 2018 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "16851eb1d58b5ddd8287eaf06f453209", "text": "This paper shows a quick review of cloud computing technology along with its deployment and service models. We have focused in the security issues of cloud computing and we have listed most of the solutions which are available to solve these issues. Moreover, we have listed the most popular threats which been recognized by cloud security alliance (CSA). Also there are some other threats has been mentioned in this paper. Finally the privacy issues has been explained.", "title": "" }, { "docid": "088078841a9bf35bcfb38c1d85573860", "text": "Multilingual Word Embeddings (MWEs) represent words from multiple languages in a single distributional vector space. Unsupervised MWE (UMWE) methods acquire multilingual embeddings without cross-lingual supervision, which is a significant advantage over traditional supervised approaches and opens many new possibilities for low-resource languages. Prior art for learning UMWEs, however, merely relies on a number of independently trained Unsupervised Bilingual Word Embeddings (UBWEs) to obtain multilingual embeddings. These methods fail to leverage the interdependencies that exist among many languages. To address this shortcoming, we propose a fully unsupervised framework for learning MWEs1 that directly exploits the relations between all language pairs. Our model substantially outperforms previous approaches in the experiments on multilingual word translation and cross-lingual word similarity. In addition, our model even beats supervised approaches trained with cross-lingual resources.", "title": "" }, { "docid": "d45d3f20cc8452ad7b2a33ce55e39beb", "text": "Big Data Solutions (BDS) refers to innovative solutions designed to perform searching, mining and analysis of high volume of data. While BDS is being actively adopted by pioneering and leading organizations due to its prospective benefits, many organizations are still divided on the need to adopt it. Security issues related to big data’s characteristics are among the hindering factors cited by non-adopters. Thus, it creates opportunities to study on the security related issues pertinent to BDS adoption. In this preliminary study, Technology-Organizational-Environmental (TOE) framework was adopted and adapted to fit the security factors being studied. Data were collected from 25 respondents through an anonymous online questionnaire and descriptive analysis was performed. The results reveal that an organization’s intention to adopt BDS can be positively influenced by perceived compatibility, top management support, information security culture and organizational learning culture. Whilst, the non-adopters are negatively influenced by perceived complexity and risks in outsourcing. One factor was found to have inconclusive outcome to both adopters and non-adopters (security and privacy regulatory concern), suggesting that it may not have any significant effects in organizational intention to adopt BDS.", "title": "" }, { "docid": "6259b792713367345374d437f37abdb0", "text": "SWOT analysis (Strength, Weakness, Opportunity, and Threat) has been in use since the 1960s as a tool to assist strategic planning in various types of enterprises including those in the construction industry. Whilst still widely used, the approach has called for improvements to make it more helpful in strategic management. The project described in this paper aimed to study whether the process to convert a SWOT analysis into a strategic plan could be assisted with some simple rationally quantitative model, as an augmented SWOT analysis. By utilizing the mathematical approaches including the quantifying techniques, the “Maximum Subarray” method, and fuzzy mathematics, one or more Heuristic Rules are derived from a SWOT analysis. These Heuristic Rules bring into focus the most influential factors concerning a strategic planning situation, and thus inform strategic analysts where particular consideration should be given. A case study conducted in collaboration with a Chinese international construction company showed that the new SWOT approach is more helpful to strategic planners. The paper provides an augmented SWOT analysis approach for strategists to conduct strategic planning in the construction industry. It also contributes fresh insights into strategic planning by introducing rationally analytic processes to improve the SWOT analysis.", "title": "" }, { "docid": "ab97caed9c596430c3d76ebda55d5e6e", "text": "A 1.5 GHz low noise amplifier for a Global Positioning System (GPS) receiver has been implemented in a 0.6 /spl mu/m CMOS process. This amplifier provides a forward gain of 22 dB with a noise figure of only 3.5 dB while drawing 30 mW from a 1.5 V supply. To the authors' knowledge, this represents the lowest noise figure reported to date for a CMOS amplifier operating above 1 GHz.", "title": "" }, { "docid": "34f8765ca28666cfeb94e324882a71d6", "text": "We are living in the era of the fourth industrial revolution, namely Industry 4.0. This paper presents the main aspects related to Industry 4.0, the technologies that will enable this revolution, and the main application domains that will be affected by it. The effects that the introduction of Internet of Things (IoT), Cyber-Physical Systems (CPS), crowdsensing, crowdsourcing, cloud computing and big data will have on industrial processes will be discussed. The main objectives will be represented by improvements in: production efficiency, quality and cost-effectiveness; workplace health and safety, as well as quality of working conditions; products’ quality and availability, according to mass customisation requirements. The paper will further discuss the common denominator of these enhancements, i.e., data collection and analysis. As data and information will be crucial for Industry 4.0, crowdsensing and crowdsourcing will introduce new advantages and challenges, which will make most of the industrial processes easier with respect to traditional technologies.", "title": "" }, { "docid": "8c0e08fb51f70b2dc424788ff2ec4c61", "text": "SPICE simulation is universally recognized as a powerful tool in the field of electronic engineering. These simulations are, particularly useful for dealing with a strong nonlinear behavior that cannot be easily handled analytically. Magnetic hysteresis is one example of a non-linearity that underpins many practical applications, especially in the field of magnetometers and magnetic sensors. The aim of this paper is to present a behavioral model of magnetic hysteresis applied to the numerical simulation of coupled core fluxgate magnetometers", "title": "" } ]
scidocsrr
2a09dc621edbba94f97580e33efd53e9
Safety climate in OHSAS 18001-certified organisations: antecedents and consequences of safety behaviour.
[ { "docid": "d9de6a277eec1156e680ee6f656cea10", "text": "Research in the areas of organizational climate and work performance was used to develop a framework for measuring perceptions of safety at work. The framework distinguished perceptions of the work environment from perceptions of performance related to safety. Two studies supported application of the framework to employee perceptions of safety in the workplace. Safety compliance and safety participation were distinguished as separate components of safety-related performance. Perceptions of knowledge about safety and motivation to perform safely influenced individual reports of safety performance and also mediated the link between safety climate and safety performance. Specific dimensions of safety climate were identified and constituted a higher order safety climate factor. The results support conceptualizing safety climate as an antecedent to safety performance in organizations.", "title": "" }, { "docid": "bf1a2bf0efb47627f07288251f5baf5b", "text": "Industrial safety is an important issue for operations managers — it has implications for cost, delivery, quality, and social responsibility. Minor accidents can interfere with production in a variety of ways, and a serious accident can shut down an entire operation. In this context, questions about the causes of workplace accidents are highly relevant. There is a popular notion that employees’ unsafe acts are the primary causes of workplace accidents, but a number of authors suggest a perspective that highlights influences from operating and social systems. The study described herein addresses this subject by assessing steelworkers’ responses to a survey about social, technical, and personal factors related to safe work behaviors. Results provide evidence that a chain reaction of technical and social constructs operate through employees to influence safe behaviors. These results demonstrate that safety hazards, safety culture, and production pressures can influence safety efficacy and cavalier attitudes, on a path leading to safe or unsafe work behaviors. Based on these results, we conclude with prescriptions for operations managers and others who play roles in the causal sequence. q 2000 Elsevier Science B.V. All", "title": "" } ]
[ { "docid": "17b2adeaa934fe769ae3f3460e87b5cc", "text": "We aim to improve on the design of procedurally generated game levels. We propose a method which empowers game designers to author and control level generators, by expressing gameplay-related design constraints. Following a survey conducted on recent procedural level generation methods, we argue that gameplay-based control is currently the most natural control mechanism available for generative methods. Our method uses graph grammars, the result of the designer-expressed constraints, to generate sequences of desired player actions. These action graphs are used as the basis for the spatial structure and content of game levels; they guide the layout process and indicate the required content related to such actions. We showcase our approach with a case study on a 3D dungeon crawler game. Results allow us to conclude that our control mechanisms are both expressive and powerful, effectively supporting designers to procedurally generate game", "title": "" }, { "docid": "43f200b97e2b6cb9c62bbbe71bed72e3", "text": "We compare nonreturn-to-zero (NRZ) with return-to-zero (RZ) modulation format for wavelength-division-multiplexed systems operating at data rates up to 40 Gb/s. We find that in 10-40-Gb/s dispersion-managed systems (single-mode fiber alternating with dispersion compensating fiber), NRZ is more adversely affected by nonlinearities, whereas RZ is more affected by dispersion. In this dispersion map, 10- and 20-Gb/s systems operate better using RZ modulation format because nonlinearity dominates. However, 40-Gb/s systems favor the usage of NRZ because dispersion becomes the key limiting factor at 40 Gb/s.", "title": "" }, { "docid": "be8b89fc46c919ab53abf86642bb8f8a", "text": "us to rethink our whole value frame concerning means and ends, and the place of technology within this frame. The ambit of HCI has expanded enormously since the field’s emergence in the early 1980s. Computing has changed significantly; mobile and ubiquitous communication networks span the globe, and technology has been integrated into all aspects of our daily lives. Computing is not simply for calculating, but rather is a medium through which we collaborate and interact with other people. The focus of HCI is not so much on human-computer interaction as it is on human activities mediated by computing [1]. Just as the original meaning of ACM (Association for Computing Machinery) has become dated, perhaps so too has the original meaning of HCI (humancomputer interaction). It is time for us to rethink how we approach issues of people and technology. In this article I explore how we might develop a more humancentered approach to computing. for the 21st century, centered on the exploration of new forms of living with and through technologies that give primacy to human actors, their values, and their activities. The area of concern is much broader than the simple “fit” between people and technology to improve productivity (as in the classic human factors mold); it encompasses a much more challenging territory that includes the goals and activities of people, their values, and the tools and environments that help shape their everyday lives. We have evermore sophisticated and complex technologies available to us in the home, at work, and on the go, yet in many cases, rather than augmenting our choices and capabilities, this plethora of new widgets and systems seems to confuse us—or even worse, disable us. (Surely there is something out of control when a term such as “IT disability” can be taken seriously in national research programs.) Solutions do not reside simply in ergonomic corrections to the interface, but instead require Some years ago, HCI researcher Panu Korhonen of Nokia outlined to me how HCI is changing, as follows: In the early days the Nokia HCI people were told “Please evaluate our user interface, and make it easy to use.” That gave way to “Please help us design this user interface so that it is easy to use.” That, in turn, led to a request: “Please help us find what the users really need so that we know how to design this user interface.” And now, the engineers are pleading with us: “Look at this area of", "title": "" }, { "docid": "d0205fc884821d10d6939748012bcfcb", "text": "We establish a data-dependent notion of algorithmic stability for Stochastic Gradient Descent (SGD), and employ it to develop novel generalization bounds. This is in contrast to previous distribution-free algorithmic stability results for SGD which depend on the worst-case constants. By virtue of the data-dependent argument, our bounds provide new insights into learning with SGD on convex and non-convex problems. In the convex case, we show that the bound on the generalization error depends on the risk at the initialization point. In the non-convex case, we prove that the expected curvature of the objective function around the initialization point has crucial influence on the generalization error. In both cases, our results suggest a simple data-driven strategy to stabilize SGD by pre-screening its initialization. As a corollary, our results allow us to show optimistic generalization bounds that exhibit fast convergence rates for SGD subject to a vanishing empirical risk and low noise of stochastic gradient.", "title": "" }, { "docid": "4d9ad24707702e70747143ad477ed831", "text": "The paper presents a high-speed (500 f/s) large-format 1 K/spl times/1 K 8 bit 3.3 V CMOS active pixel sensor (APS) with 1024 ADCs integrated on chip. The sensor achieves an extremely high output data rate of over 500 Mbytes per second and a low power dissipation of 350 mW at the 66 MHz master clock rate. Principal architecture and circuit solutions allowing such a high throughput are discussed along with preliminary results of the chip characterization.", "title": "" }, { "docid": "87eab42827061426dfc9b335530e7037", "text": "OBJECTIVES\nHealth behavior theories focus on the role of conscious, reflective factors (e.g., behavioral intentions, risk perceptions) in predicting and changing behavior. Dual-process models, on the other hand, propose that health actions are guided not only by a conscious, reflective, rule-based system but also by a nonconscious, impulsive, associative system. This article argues that research on health decisions, actions, and outcomes will be enriched by greater consideration of nonconscious processes.\n\n\nMETHODS\nA narrative review is presented that delineates research on implicit cognition, implicit affect, and implicit motivation. In each case, we describe the key ideas, how they have been taken up in health psychology, and the possibilities for behavior change interventions, before outlining directions that might profitably be taken in future research.\n\n\nRESULTS\nCorrelational research on implicit cognitive and affective processes (attentional bias and implicit attitudes) has recently been supplemented by intervention studies using implementation intentions and practice-based training that show promising effects. Studies of implicit motivation (health goal priming) have also observed encouraging findings. There is considerable scope for further investigations of implicit affect control, unconscious thought, and the automatization of striving for health goals.\n\n\nCONCLUSION\nResearch on nonconscious processes holds significant potential that can and should be developed by health psychologists. Consideration of impulsive as well as reflective processes will engender new targets for intervention and should ultimately enhance the effectiveness of behavior change efforts.", "title": "" }, { "docid": "68f3b26e27184a10a085aa1762c984ed", "text": "Automation has gained importance in every field of human life. But there are still some fields where more traditional methods are being employed. One such field is the ordering system in restaurants. Generally, in restaurants menu ordering system will be available in paper format from that the customer has to select the menu items and then the order is handed over to waiter who takes the corresponding order, which is a very time consuming process. In this paper we propose a fully automated ordering system in which the conventional paper based menu is replaced by a more user friendly touchscreen based menu card. The system consists of microcontroller which is interfaced with the input and output modules. The input module is the touchscreen sensor which is placed on GLCD to have graphical image display, which takes the input from the user and provides the same to the microcontroller. The output module is a RF module which is used for communication between system at table and system at ordering department. Microcontroller also displays the menu items on the GLCD. At the receiving end the selected items will be displayed on the LCD and the ordering department will note down the order received.", "title": "" }, { "docid": "749785a3973c6d2d760cbfbe6f1dbdac", "text": "Research on spreadsheet errors is substantial, compelling, and unanimous. It has three simple conclusions. The first is that spreadsheet errors are rare on a per-cell basis, but in large programs, at least one incorrect bottom-line value is very likely to be present. The second is that errors are extremely difficult to detect and correct. The third is that spreadsheet developers and corporations are highly overconfident in the accuracy of their spreadsheets. The disconnect between the first two conclusions and the third appears to be due to the way human cognition works. Most importantly, we are aware of very few of the errors we make. In addition, while we are proudly aware of errors that we fix, we have no idea of how many remain, but like Little Jack Horner we are impressed with our ability to ferret out errors. This paper reviews human cognition processes and shows first that humans cannot be error free no matter how hard they try, and second that our intuition about errors and how we can reduce them is based on appallingly bad knowledge. This paper argues that we should reject any prescription for reducing errors that has not been rigorously proven safe and effective. This paper also argues that our biggest need, based on empirical data, is to do massively more testing than we do now. It suggests that the code inspection methodology developed in software development is likely to apply very well to spreadsheet inspection.", "title": "" }, { "docid": "eff17ece2368b925f0db8e18ea0fc897", "text": "Blockchain, as the backbone technology of the current popular Bitcoin digital currency, has become a promising decentralized data management framework. Although blockchain has been widely adopted in many applications (e.g., finance, healthcare, and logistics), its application in mobile services is still limited. This is due to the fact that blockchain users need to solve preset proof-of-work puzzles to add new data (i.e., a block) to the blockchain. Solving the proof of work, however, consumes substantial resources in terms of CPU time and energy, which is not suitable for resource-limited mobile devices. To facilitate blockchain applications in future mobile Internet of Things systems, multiple access mobile edge computing appears to be an auspicious solution to solve the proof-of-work puzzles for mobile users. We first introduce a novel concept of edge computing for mobile blockchain. Then we introduce an economic approach for edge computing resource management. Moreover, a prototype of mobile edge computing enabled blockchain systems is presented with experimental results to justify the proposed concept.", "title": "" }, { "docid": "233cb91d9d3b6aefbeb065f6ad6d8e80", "text": "This thesis addresses the problem of verifying the geographic locations of Internet clients. First, we demonstrate how current state-of-the-art delay-based geolocation techniques are susceptible to evasion through delay manipulations, which involve both increasing and decreasing the Internet delays that are observed between a client and a remote measuring party. We find that delay-based techniques generally lack appropriate mechanisms to measure delays in an integrity-preserving manner. We then discuss different strategies enabling an adversary to benefit from being able to manipulate the delays. Upon analyzing the effect of these strategies on three representative delay-based techniques, we found that the strategies combined with the ability of full delay manipulation can allow an adversary to (fraudulently) control the location returned by those geolocation techniques accurately. We then propose Client Presence Verification (CPV) as a delay-based technique to verify an assertion about a client’s physical presence in a prescribed geographic region. Three verifiers geographically encapsulating a client’s asserted location are used to corroborate that assertion by measuring the delays between themselves and the client. CPV infers geographic distances from these delays and thus, using the smaller of the forward and reverse one-way delay between each verifier and the client is expected to result in a more accurate distance inference than using the conventional round-trip times. Accordingly, we devise a novel protocol for accurate one-way delay measurements between the client and the three verifiers to be used by CPV, taking into account that the client could manipulate the measurements to defeat the verification process. We evaluate CPV through extensive real-world experiments with legitimate clients (those truly present at where they asserted to be) modeled to use both wired and wireless access networks. Wired evaluation is done using the PlanetLab testbed, during which we examine various factors affecting CPV’s efficacy, such as the client’s geographical nearness to the verifiers. For wireless evaluation, we leverage the Internet delay information collected for wired clients from PlanetLab, and model additional delays representing the last-mile wireless link. The additional delays were generated following wireless delay distribution models studied in the literature. Again, we examine various factors that affect CPV’s efficacy, including the number of devices actively competing for the wireless media in the vicinity of a wireless legitimate CPV client. Finally, we reinforce CPV against a (hypothetical) middlebox that an adversary specifically customizes to defeat CPV (i.e., assuming an adversary that is aware of how CPV operates). We postulate that public middlebox service providers (e.g., in the form of Virtual Private Networks) would be motivated to defeat CPV if it is to be widely adopted in practice. To that end, we propose to use a Proof-ofWork mechanism that allows CPV to impose constraints, which effectively limit the number of clients (now adversaries) simultaneously colluding with that middlebox; beyond that number, CPV detects the middlebox.", "title": "" }, { "docid": "2643c7960df0aed773aeca6e04fde67e", "text": "Many studies utilizing dogs, cats, birds, fish, and robotic simulations of animals have tried to ascertain the health benefits of pet ownership or animal-assisted therapy in the elderly. Several small unblinded investigations outlined improvements in behavior in demented persons given treatment in the presence of animals. Studies piloting the use of animals in the treatment of depression and schizophrenia have yielded mixed results. Animals may provide intangible benefits to the mental health of older persons, such as relief social isolation and boredom, but these have not been formally studied. Several investigations of the effect of pets on physical health suggest animals can lower blood pressure, and dog walkers partake in more physical activity. Dog walking, in epidemiological studies and few preliminary trials, is associated with lower complication risk among patients with cardiovascular disease. Pets may also have harms: they may be expensive to care for, and their owners are more likely to fall. Theoretically, zoonotic infections and bites can occur, but how often this occurs in the context of pet ownership or animal-assisted therapy is unknown. Despite the poor methodological quality of pet research after decades of study, pet ownership and animal-assisted therapy are likely to continue due to positive subjective feelings many people have toward animals.", "title": "" }, { "docid": "a0e66a56d9fd7c5591487a3aaa5d0851", "text": "Link prediction on knowledge graphs is useful in numerous application areas such as semantic search, question answering, entity disambiguation, enterprise decision support, recommender systems and so on. While many of these applications require a reasonably quick response and may operate on data that is constantly changing, existing methods often lack speed and adaptability to cope with these requirements. This is aggravated by the fact that knowledge graphs are often extremely large and may easily contain millions of entities rendering many of these methods impractical. In this paper, we address the weaknesses of current methods by proposing Random Semantic Tensor Ensemble (RSTE), a scalable ensemble-enabled framework based on tensor factorization. Our proposed approach samples a knowledge graph tensor in its graph representation and performs link prediction via ensembles of tensor factorization. Our experiments on both publicly available datasets and real world enterprise/sales knowledge bases have shown that our approach is not only highly scalable, parallelizable and memory efficient, but also able to increase the prediction accuracy significantly across all datasets.", "title": "" }, { "docid": "247534c6b5416e4330a84e10daf2bc0c", "text": "The aim of the present study was to determine metabolic responses, movement patterns and distance covered at running speeds corresponding to fixed blood lactate concentrations (FBLs) in young soccer players during a match play. A further aim of the study was to evaluate the relationships between FBLs, maximal oxygen consumption (VO2max) and distance covered during a game. A multistage field test was administered to 32 players to determine FBLs and VO2max. Blood lactate (LA), heart rate (HR) and rate of perceived exertion (RPE) responses were obtained from 36 players during tournament matches filmed using six fixed cameras. Images were transferred to a computer, for calibration and synchronization. In all players, values for LA and HR were higher and RPE lower during the 1(st) half compared to the 2(nd) half of the matches (p < 0.01). Players in forward positions had higher LA levels than defenders, but HR and RPE values were similar between playing positions. Total distance and distance covered in jogging, low-moderate-high intensity running and low intensity sprint were higher during the 1(st) half (p < 0.01). In the 1(st) half, players also ran longer distances at FBLs [p<0.01; average running speed at 2mmol·L(-1) (FBL2): 3.32 ± 0.31m·s(-1) and average running speed at 4mmol·L(-1) (FBL4): 3.91 ± 0.25m·s(-1)]. There was a significant difference between playing positions in distance covered at different running speeds (p < 0.05). However, when distance covered was expressed as FBLs, the players ran similar distances. In addition, relationships between FBLs and total distance covered were significant (r = 0.482 to 0.570; p < 0.01). In conclusion, these findings demonstrated that young soccer players experienced higher internal load during the 1(st) half of a game compared to the 2(nd) half. Furthermore, although movement patterns of players differed between playing positions, all players experienced a similar physiological stress throughout the game. Finally, total distance covered was associated to fixed blood lactate concentrations during play. Key pointsBased on LA, HR and RPE responses, young top soccer players experienced a higher physiological stress during the 1(st) half of the matches compared to the 2(nd) half.Movement patterns differed in accordance with the players' positions but that all players experienced a similar physiological stress during match play.Approximately one quarter of total distance was covered at speeds that exceeded the 4 mmol·L(-1) fixed LA threshold.Total distance covered was influenced by running speeds at fixed lactate concentrations in young soccer players during match play.", "title": "" }, { "docid": "6ec3f783ec49c0b3e51a704bc3bd03ec", "text": "Abstract: It has been suggested by many supply chain practitioners that in certain cases inventory can have a stimulating effect on the demand. In mathematical terms this amounts to the demand being a function of the inventory level alone. In this work we propose a logistic growth model for the inventory dependent demand rate and solve first the continuous time deterministic optimal control problem of maximising the present value of the total net profit over an infinite horizon. It is shown that under a strict condition there is a unique optimal stock level which the inventory planner should maintain in order to satisfy demand. The stochastic version of the optimal control problem is considered next. A bang-bang type of optimal control problem is formulated and the associated Hamilton-Jacobi-Bellman equation is solved. The inventory level that signifies a switch in the ordering strategy is worked out in the stochastic case.", "title": "" }, { "docid": "a8920f6ba4500587cf2a160b8d91331a", "text": "In this paper, we present an approach that can handle Z-numbers in the context of multi-criteria decision-making problems. The concept of Z-number as an ordered pair Z=(A, B) of fuzzy numbers A and B is used, where A is a linguistic value of a variable of interest and B is a linguistic value of the probability measure of A. As human beings, we communicate with each other by means of natural language using sentences like “the journey from home to university most likely takes about half an hour.” The Z-numbers are converted to fuzzy numbers. Then the Z-TODIM and Z-TOPSIS are presented as a direct extension of the fuzzy TODIM and fuzzy TOPSIS, respectively. The proposed methods are applied to two case studies and compared with the standard approach using crisp values. The results obtained show the feasibility of the approach.", "title": "" }, { "docid": "5f4235a8f9095afe6697c9fdb00e0a43", "text": "Typically, firms decide whether or not to develop a new product based on their resources, capabilities and the return on investment that the product is estimated to generate. We propose that firms adopt a broader heuristic for making new product development choices. Our heuristic approach requires moving beyond traditional finance-based thinking, and suggests that firms concentrate on technological trajectories by combining technology roadmapping, information technology (IT) and supply chain management to make more sustainable new product development decisions. Using the proposed holistic heuristic methods, versus relying on traditional finance-based decision-making tools (e.g., emphasizing net present value or internal rate of return projections), enables firms to plan beyond the short-term and immediate set of technologies at hand. Our proposed heuristic approach enables firms to forecast technologies and markets, and hence, new product priorities in the longer term. Investments in new products should, as a result, generate returns over a longer period than traditionally expected, giving firms more sustainable investments. New products are costly and need to have a 0040-1625/$ – see front matter D 2003 Elsevier Inc. All rights reserved. doi:10.1016/S0040-1625(03)00064-7 * Corresponding author. Tel.: +1-814-863-7133. E-mail addresses: ijpetrick@psu.edu (I.J. Petrick), aie1@psu.edu (A.E. Echols). 1 Tel.: +1-814-863-0642. I.J. Petrick, A.E. Echols / Technological Forecasting & Social Change 71 (2004) 81–100 82 durable presence in the market. Transaction costs and resources will be saved, as firms make new product development decisions less frequently. D 2003 Elsevier Inc. All rights reserved.", "title": "" }, { "docid": "1f247e127866e62029310218c380bc31", "text": "Human Resource is the most important asset for any organization and it is the resource of achieving competitive advantage. Managing human resources is very challenging as compared to managing technology or capital and for its effective management, organization requires effective HRM system. HRM system should be backed up by strong HRM practices. HRM practices refer to organizational activities directed at managing the group of human resources and ensuring that the resources are employed towards the fulfillment of organizational goals. The purpose of this study is to explore contribution of Human Resource Management (HRM) practices including selection, training, career planning, compensation, performance appraisal, job definition and employee participation on perceived employee performance. This research describe why human resource management (HRM) decisions are likely to have an important and unique influence on organizational performance. This research forum will help advance research on the link between HRM and organizational performance. Unresolved questions is trying to identify in need of future study and make several suggestions intended to help researchers studying these questions build a more cumulative body of knowledge that will have key implications for body theory and practice. This study comprehensively evaluated the links between systems of High Performance Work Practices and firm performance. Results based on a national sample of firms indicate that these practices have an economically and statistically significant impact on employee performance. Support for predictions that the impact of High Performance Work Practices on firm performance is in part contingent on their interrelationships and links with competitive strategy was limited.", "title": "" }, { "docid": "97691304930a85066a15086877473857", "text": "In the context of modern cryptosystems, a common theme is the creation of distributed trust networks. In most of these designs, permanent storage of a contract is required. However, permanent storage can become a major performance and cost bottleneck. As a result, good code compression schemes are a key factor in scaling these contract based cryptosystems. For this project, we formalize and implement a data structure called the Merkelized Abstract Syntax Tree (MAST) to address both data integrity and compression. MASTs can be used to compactly represent contractual programs that will be executed remotely, and by using some of the properties of Merkle trees, they can also be used to verify the integrity of the code being executed. A concept by the same name has been discussed in the Bitcoin community for a while, the terminology originates from the work of Russel O’Connor and Pieter Wuille, however this discussion was limited to private correspondences. We present a formalization of it and provide an implementation.The project idea was developed with Bitcoin applications in mind, and the experiment we set up uses MASTs in a crypto currency network simulator. Using MASTs in the Bitcoin protocol [2] would increase the complexity (length) of contracts permitted on the network, while simultaneously maintaining the security of broadcasted data. Additionally, contracts may contain privileged, secret branches of execution.", "title": "" }, { "docid": "524ed6f753bb059130a6076323e8aa63", "text": "Deep generative models provide a powerful and flexible means to learn complex distributions over data by incorporating neural networks into latent-variable models. Variational approaches to training such models introduce a probabilistic encoder that casts data, typically unsupervised, into an entangled representation space. While unsupervised learning is often desirable, sometimes even necessary, when we lack prior knowledge about what to represent, being able to incorporate domain knowledge in characterising certain aspects of variation in the data can often help learn better disentangled representations. Here, we introduce a new formulation of semi-supervised learning in variational autoencoders that allows precisely this. It permits flexible specification of probabilistic encoders as directed graphical models via a stochastic computation graph, containing both continuous and discrete latent variables, with conditional distributions parametrised by neural networks. We demonstrate how the provision of dependency structures, along with a few labelled examples indicating plausible values for some components of the latent space, can help quickly learn disentangled representations. We then evaluate its ability to do so, both qualitatively by exploring its generative capacity, and quantitatively by using the disentangled representation to perform classification, on a variety of models and datasets.", "title": "" } ]
scidocsrr
6edcaefcf4167d4824ef701952916eff
Work environment stressors, social support, anxiety, and depression among secondary school teachers.
[ { "docid": "779d75beb7ea4967f9503d6c4d087a5d", "text": "BACKGROUND\nTeaching is considered a highly stressful occupation. Burnout is a negative affective response occurring as a result of chronic work stress. While the early theories of burnout focused exclusively on work-related stressors, recent research adopts a more integrative approach where both environmental and individual factors are studied. Nevertheless, such studies are scarce with teacher samples.\n\n\nAIMS\nThe present cross-sectional study sought to investigate the association between burnout, personality characteristics and job stressors in primary school teachers from Cyprus. The study also investigates the relative contribution of these variables on the three facets of burnout - emotional exhaustion, depersonalization and reduced personal accomplishment.\n\n\nSAMPLE\nA representative sample of 447 primary school teachers participated in the study.\n\n\nMETHOD\nTeachers completed measures of burnout, personality and job stressors along with demographic and professional data. Surveys were delivered by courier to schools, and were distributed at faculty meetings.\n\n\nRESULTS\nResults showed that both personality and work-related stressors were associated with burnout dimensions. Neuroticism was a common predictor of all dimensions of burnout although in personal accomplishment had a different direction. Managing student misbehaviour and time constraints were found to systematically predict dimensions of burnout.\n\n\nCONCLUSIONS\nTeachers' individual characteristics as well as job related stressors should be taken into consideration when studying the burnout phenomenon. The fact that each dimension of the syndrome is predicted by different variables should not remain unnoticed especially when designing and implementing intervention programmes to reduce burnout in teachers.", "title": "" } ]
[ { "docid": "f313aeee26751cc81701eb0bd4f986b6", "text": "We have applied a little-known data transformation to subsets of the Surveillance, Epidemiology, and End Results (SEER) publically available data of the National Cancer Institute (NCI) to make it suitable input to standard machine learning classifiers. This transformation properly treats the right-censored data in the SEER data and the resulting Random Forest and Multi-Layer Perceptron models predict full survival curves. Treating the 6, 12, and 60 months points of the resulting survival curves as 3 binary classifiers, the 18 resulting classifiers have AUC values ranging from .765 to .885. Further evidence that the models have generalized well from the training data is provided by the extremely high levels of agreement between the random forest and neural network models predictions on the 6, 12, and 60 month binary classifiers.", "title": "" }, { "docid": "a84143b7aa2d42f3297d81a036dc0f5e", "text": "Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency and other added services. However, VANETs are themselves vulnerable against attacks that can directly lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as well as updating new attacks and categorizing them into different classes.", "title": "" }, { "docid": "645c0e5b4946217bb6ccaf7f03454cc2", "text": "Nowadays, huge sheet music collections exist on the Web, allowing people to access public domain scores for free. However, beginners may be lost in finding a score appropriate to their instrument level, and should often rely on themselves to start out on the chosen piece. In this instrumental e-Learning context, we propose a Score Analyzer prototype in order to automatically extract the difficulty level of a MusicXML piece and suggest advice thanks to a Musical Sign Base (MSB). To do so, we first review methods related to score performance information retrieval. We then identify seven criteria to characterize technical instrumental difficulties and propose methods to extract them from a MusicXML score. The relevance of these criteria is then evaluated through a Principal Components Analysis and compared to human estimations. Lastly we discuss the integration of this work to @MUSE, a collaborative score annotation platform based on multimedia contents indexation.", "title": "" }, { "docid": "687caec27d44691a6aac75577b32eb81", "text": "We present unsupervised approaches to the problem of modeling dialog acts in asynchronous conversations; i.e., conversations where participants collaborate with each other at different times. In particular, we investigate a graph-theoretic deterministic framework and two probabilistic conversation models (i.e., HMM and HMM+Mix) for modeling dialog acts in emails and forums. We train and test our conversation models on (a) temporal order and (b) graph-structural order of the datasets. Empirical evaluation suggests (i) the graph-theoretic framework that relies on lexical and structural similarity metrics is not the right model for this task, (ii) conversation models perform better on the graphstructural order than the temporal order of the datasets and (iii) HMM+Mix is a better conversation model than the simple HMM model.", "title": "" }, { "docid": "21c4cd3a91a659fcd3800967943a2ffd", "text": "Ground reaction force (GRF) measurement is important in the analysis of human body movements. The main drawback of the existing measurement systems is the restriction to a laboratory environment. This study proposes an ambulatory system for assessing the dynamics of ankle and foot, which integrates the measurement of the GRF with the measurement of human body movement. The GRF and the center of pressure (CoP) are measured using two 6D force/moment sensors mounted beneath the shoe. The movement of the foot and the lower leg is measured using three miniature inertial sensors, two rigidly attached to the shoe and one to the lower leg. The proposed system is validated using a force plate and an optical position measurement system as a reference. The results show good correspondence between both measurement systems, except for the ankle power. The root mean square (rms) difference of the magnitude of the GRF over 10 evaluated trials was 0.012 ± 0.001 N/N (mean ± standard deviation), being 1.1 ± 0.1 % of the maximal GRF magnitude. It should be noted that the forces, moments, and powers are normalized with respect to body weight. The CoP estimation using both methods shows good correspondence, as indicated by the rms difference of 5.1± 0.7 mm, corresponding to 1.7 ± 0.3 % of the length of the shoe. The rms difference between the magnitudes of the heel position estimates was calculated as 18 ± 6 mm, being 1.4 ± 0.5 % of the maximal magnitude. The ankle moment rms difference was 0.004 ± 0.001 Nm/N, being 2.3 ± 0.5 % of the maximal magnitude. Finally, the rms difference of the estimated power at the ankle was 0.02 ± 0.005 W/N, being 14 ± 5 % of the maximal power. This power difference is caused by an inaccurate estimation of the angular velocities using the optical reference measurement system, which is due to considering the foot as a single segment. The ambulatory system considers separate heel and forefoot segments, thus allowing an additional foot moment and power to be estimated. Based on the results of this research, it is concluded that the combination of the instrumented shoe and inertial sensing is a promising tool for the assessment of the dynamics of foot and ankle in an ambulatory setting.", "title": "" }, { "docid": "72226ba8d801a3db776cf40d5243c521", "text": "Hyperspectral image (HSI) classification is one of the most widely used methods for scene analysis from hyperspectral imagery. In the past, many different engineered features have been proposed for the HSI classification problem. In this paper, however, we propose a feature learning approach for hyperspectral image classification based on convolutional neural networks (CNNs). The proposed CNN model is able to learn structured features, roughly resembling different spectral band-pass filters, directly from the hyperspectral input data. Our experimental results, conducted on a commonly-used remote sensing hyperspectral dataset, show that the proposed method provides classification results that are among the state-of-the-art, without using any prior knowledge or engineered features.", "title": "" }, { "docid": "63815cfef828fffddd589f2f1c34299a", "text": "In this paper, we propose a Recurrent Highway Network with Language CNN for image caption generation. Our network consists of three sub-networks: the deep Convolutional Neural Network for image representation, the Convolutional Neural Network for language modeling, and the Multimodal Recurrent Highway Network for sequence prediction. Our proposed model can naturally exploit the hierarchical and temporal structure of history words, which are critical for image caption generation. The effectiveness of our model is validated on two datasets MS COCO and Flickr30K. Our extensive experiment results show that our method is competitive with the state-of-the-art methods.", "title": "" }, { "docid": "f4cbdcdb55e2bf49bcc62a79293f19b7", "text": "Network slicing for 5G provides Network-as-a-Service (NaaS) for different use cases, allowing network operators to build multiple virtual networks on a shared infrastructure. With network slicing, service providers can deploy their applications and services flexibly and quickly to accommodate diverse services’ specific requirements. As an emerging technology with a number of advantages, network slicing has raised many issues for the industry and academia alike. Here, the authors discuss this technology’s background and propose a framework. They also discuss remaining challenges and future research directions.", "title": "" }, { "docid": "74e0fb4cb7b57d8b84eed3f895a39ef3", "text": "High-throughput data production has revolutionized molecular biology. However, massive increases in data generation capacity require analysis approaches that are more sophisticated, and often very computationally intensive. Thus, making sense of high-throughput data requires informatics support. Galaxy (http://galaxyproject.org) is a software system that provides this support through a framework that gives experimentalists simple interfaces to powerful tools, while automatically managing the computational details. Galaxy is distributed both as a publicly available Web service, which provides tools for the analysis of genomic, comparative genomic, and functional genomic data, or a downloadable package that can be deployed in individual laboratories. Either way, it allows experimentalists without informatics or programming expertise to perform complex large-scale analysis with just a Web browser.", "title": "" }, { "docid": "ad5b787fd972c202a69edc98a8fbc7ba", "text": "BACKGROUND\nIntimate partner violence (IPV) is a major public health problem with serious consequences for women's physical, mental, sexual and reproductive health. Reproductive health outcomes such as unwanted and terminated pregnancies, fetal loss or child loss during infancy, non-use of family planning methods, and high fertility are increasingly recognized. However, little is known about the role of community influences on women's experience of IPV and its effect on terminated pregnancy, given the increased awareness of IPV being a product of social context. This study sought to examine the role of community-level norms and characteristics in the association between IPV and terminated pregnancy in Nigeria.\n\n\nMETHODS\nMultilevel logistic regression analyses were performed on nationally-representative cross-sectional data including 19,226 women aged 15-49 years in Nigeria. Data were collected by a stratified two-stage sampling technique, with 888 primary sampling units (PSUs) selected in the first sampling stage, and 7,864 households selected through probability sampling in the second sampling stage.\n\n\nRESULTS\nWomen who had experienced physical IPV, sexual IPV, and any IPV were more likely to have terminated a pregnancy compared to women who had not experienced these IPV types.IPV types were significantly associated with factors reflecting relationship control, relationship inequalities, and socio-demographic characteristics. Characteristics of the women aggregated at the community level (mean education, justifying wife beating, mean age at first marriage, and contraceptive use) were significantly associated with IPV types and terminated pregnancy.\n\n\nCONCLUSION\nFindings indicate the role of community influence in the association between IPV-exposure and terminated pregnancy, and stress the need for screening women seeking abortions for a history of abuse.", "title": "" }, { "docid": "be7f7d9c6a28b7d15ec381570752de95", "text": "Neural network are most popular in the research community due to its generalization abilities. Additionally, it has been successfully implemented in biometrics, features selection, object tracking, document image preprocessing and classification. This paper specifically, clusters, summarize, interpret and evaluate neural networks in document Image preprocessing. The importance of the learning algorithms in neural networks training and testing for preprocessing is also highlighted. Finally, a critical analysis on the reviewed approaches and the future research guidelines in the field are suggested.", "title": "" }, { "docid": "211cf327b65cbd89cf635bbeb5fa9552", "text": "BACKGROUND\nAdvanced mobile communications and portable computation are now combined in handheld devices called \"smartphones\", which are also capable of running third-party software. The number of smartphone users is growing rapidly, including among healthcare professionals. The purpose of this study was to classify smartphone-based healthcare technologies as discussed in academic literature according to their functionalities, and summarize articles in each category.\n\n\nMETHODS\nIn April 2011, MEDLINE was searched to identify articles that discussed the design, development, evaluation, or use of smartphone-based software for healthcare professionals, medical or nursing students, or patients. A total of 55 articles discussing 83 applications were selected for this study from 2,894 articles initially obtained from the MEDLINE searches.\n\n\nRESULTS\nA total of 83 applications were documented: 57 applications for healthcare professionals focusing on disease diagnosis (21), drug reference (6), medical calculators (8), literature search (6), clinical communication (3), Hospital Information System (HIS) client applications (4), medical training (2) and general healthcare applications (7); 11 applications for medical or nursing students focusing on medical education; and 15 applications for patients focusing on disease management with chronic illness (6), ENT-related (4), fall-related (3), and two other conditions (2). The disease diagnosis, drug reference, and medical calculator applications were reported as most useful by healthcare professionals and medical or nursing students.\n\n\nCONCLUSIONS\nMany medical applications for smartphones have been developed and widely used by health professionals and patients. The use of smartphones is getting more attention in healthcare day by day. Medical applications make smartphones useful tools in the practice of evidence-based medicine at the point of care, in addition to their use in mobile clinical communication. Also, smartphones can play a very important role in patient education, disease self-management, and remote monitoring of patients.", "title": "" }, { "docid": "25ae604f6e56aae8baf92693fa4df3d4", "text": "Many automatic image annotation methods are based on the learning by example paradigm. Image tagging, through manual image inspection, is the first step towards this end. However, manual image annotation, even for creating the training sets, is time-consuming, complicated and contains human subjectivity errors. Thus, alternative ways for automatically creating training examples, i.e., pairs of images and tags, are crucial. As we showed in one of our previous studies, tags accompanying photos in social media and especially the Instagram hashtags can be used for image annotation. However, it turned out that only a 20% of the Instagram hashtags are actually relevant to the content of the image they accompany. Identifying those hashtags through crowdsourcing is a plausible solution. In this work, we investigate the effectiveness of the HITS algorithm for identifying the right tags in a crowdsourced image tagging scenario. For this purpose, we create a bipartite graph in which the first type of nodes corresponds to the annotators and the second type to the tags they select, among the hashtags, to annotate a particular Instagram image. From the results, we conclude that the authority value of the HITS algorithm provides an accurate estimation of the appropriateness of each Instagram hashtag to be used as a tag for the image it accompanies while the hub value can be used to filter out the dishonest annotators.", "title": "" }, { "docid": "bad3eec42d75357aca75fa993ab49e52", "text": "By robust image hashing (RIH), a digital image is transformed into a short binary string, of fixed length, called hash value, hash code or simply hash. Other terms used occasionally for the hash are digital signature, fingerprint, message digest or label. The hash is attached to the image, inserted by watermarking or transmitted by side channels. The hash is robust to image low distortion, fragile to image tempering and have low collision probability. The main applications of RIH are in image copyright protection, content authentication and database indexing. The goal of copyright protections is to prevent possible illegal usage of digital images by identifying the image even when its pixels are distorted by small tempering or by common manipulation (transmission, lossy compression etc.). In such cases, the image is still identifiable by the hash, which is robust to low distortions (Khelifi & Jiang, 2010). The content authentication is today, one of the main issues in digital image security. The image content can be easily modified by using commercial image software. A common example is the object insertion or removal. Although visually undetectable, such modifications are put into evidence by the hash, which is fragile to image tempering (Zhao & al., 2013). Finally, in large databases management, the RIH can be an effective solution for image efficient retrieval, by replacing the manual annotation with the hash, which is automated extracted (Lin & al., 2001). The properties that recommend the hash for indexing are the low collision probability and the content-based features. The origins of the hash lay in computer science, where one of the earliest applications was the efficient search of large tables. Here, the hash – calculated by a hash function – serves as index for the data recorded in the table. Since, in general, such functions map more data strings to the same hash, the hash designates in fact a bucket of records, helping to narrow the search. Although very efficient in table searching, these hashes are not appropriate for file authentication, where the low collision probability is of high concern. The use in authentication applications has led to the development of the cryptographic hashing, a branch including hash functions with the following special properties: preimage resistance (by knowing the hash it is very difficult to find out the file that generated it), second image resistance (given a file, it is very difficult to find another with the same hash) and collision resistance (it is very difficult to find two files with the same hash). They allow the hash to withstand the cryptanalytic attacks. The development of multimedia applications in the last two decades has brought central stage the digital images. The indexing or authentication of these data has been a new challenge for hashing because of a property that might be called perceptible identity. It could be defined as follows: although the image pixels undergo slight modification during ordinary operations, the image is perceived as being the same. The perceptual similar images must have similar hashes. The hashing complying with this demand is called robust or perceptual. Specific methods have had to be developed in order to obtain hashes tolerant to distortions, inherent to image conventional handling like archiving, scaling, rotation, cropping, noise filtering, print-and-scan etc., called in one word non malicious attacks. These methods are grouped under the generic name of RIH. In this article, we define the main terms used in RIH and discuss the solutions commonly used for designing a RIH scheme. The presentation will be done in the light of robust hash inherent properties: randomness, independence and robustness.", "title": "" }, { "docid": "6ec3f783ec49c0b3e51a704bc3bd03ec", "text": "Abstract: It has been suggested by many supply chain practitioners that in certain cases inventory can have a stimulating effect on the demand. In mathematical terms this amounts to the demand being a function of the inventory level alone. In this work we propose a logistic growth model for the inventory dependent demand rate and solve first the continuous time deterministic optimal control problem of maximising the present value of the total net profit over an infinite horizon. It is shown that under a strict condition there is a unique optimal stock level which the inventory planner should maintain in order to satisfy demand. The stochastic version of the optimal control problem is considered next. A bang-bang type of optimal control problem is formulated and the associated Hamilton-Jacobi-Bellman equation is solved. The inventory level that signifies a switch in the ordering strategy is worked out in the stochastic case.", "title": "" }, { "docid": "9b848e6e472d875db48fab62d8dd31a4", "text": "We present a semantics-driven approach for stroke-based painterly rendering, based on recent image parsing techniques [Tu et al. 2005; Tu and Zhu 2006] in computer vision. Image parsing integrates segmentation for regions, sketching for curves, and recognition for object categories. In an interactive manner, we decompose an input image into a hierarchy of its constituent components in a parse tree representation with occlusion relations among the nodes in the tree. To paint the image, we build a brush dictionary containing a large set (760) of brush examples of four shape/appearance categories, which are collected from professional artists, then we select appropriate brushes from the dictionary and place them on the canvas guided by the image semantics included in the parse tree, with each image component and layer painted in various styles. During this process, the scene and object categories also determine the color blending and shading strategies for inhomogeneous synthesis of image details. Compared with previous methods, this approach benefits from richer meaningful image semantic information, which leads to better simulation of painting techniques of artists using the high-quality brush dictionary. We have tested our approach on a large number (hundreds) of images and it produced satisfactory painterly effects.", "title": "" }, { "docid": "b30b588142b60b105a39a79166ba2a36", "text": "JavaScript is used everywhere from the browser to the server, including desktops and mobile devices. However, the current state of the art in JavaScript static analysis lags far behind that of other languages such as C and Java. Our goal is to help remedy this lack. We describe JSAI, a formally specified, robust abstract interpreter for JavaScript. JSAI uses novel abstract domains to compute a reduced product of type inference, pointer analysis, control-flow analysis, string analysis, and integer and boolean constant propagation. Part of JSAI's novelty is user-configurable analysis sensitivity, i.e., context-, path-, and heap-sensitivity. JSAI is designed to be provably sound with respect to a specific concrete semantics for JavaScript, which has been extensively tested against a commercial JavaScript implementation. We provide a comprehensive evaluation of JSAI's performance and precision using an extensive benchmark suite, including real-world JavaScript applications, machine generated JavaScript code via Emscripten, and browser addons. We use JSAI's configurability to evaluate a large number of analysis sensitivities (some well-known, some novel) and observe some surprising results that go against common wisdom. These results highlight the usefulness of a configurable analysis platform such as JSAI.", "title": "" }, { "docid": "beb9fe0cb07e8531f01744bd8800d67b", "text": "Networked embedded systems have become quite important nowadays, especially for monitoring and controlling the devices. Advances in embedded system technologies have led to the development of residential gateway and automation systems. Apart from frequent power cuts, residential areas suffer from a serious problem that people are not aware about the power cuts due to power disconnections in the transformers, also power theft issues and power wastage in the street lamps during day time exists. So this paper presents a lifestyle system using GSM which transmits the status of the transformer.", "title": "" }, { "docid": "8c1445126369faaf6e2785769a33ba0b", "text": "Recommender systems objectives can be broadly characterized as modeling user preferences over shortor long-term time horizon. A large body of previous research studied long-term recommendation through dimensionality reduction techniques applied to the historical user-item interactions. A recently introduced session-based recommendation setting highlighted the importance of modeling short-term user preferences. In this task, Recurrent Neural Networks (RNN) have shown to be successful at capturing the nuances of user’s interactions within a short time window. In this paper, we evaluate RNN-based models on both short-term and long-term recommendation tasks. Our experimental results suggest that RNNs are capable of predicting immediate as well as distant user interactions. We also find the best performing configuration to be a stacked RNN with layer normalization and tied item embeddings.", "title": "" }, { "docid": "8c4b1b74d21dcf6d10852deecccece36", "text": "Trolley problems have been used in the development of moral theory and the psychological study of moral judgments and behavior. Most of this research has focused on people from the West, with implicit assumptions that moral intuitions should generalize and that moral psychology is universal. However, cultural differences may be associated with differences in moral judgments and behavior. We operationalized a trolley problem in the laboratory, with economic incentives and real-life consequences, and compared British and Chinese samples on moral behavior and judgment. We found that Chinese participants were less willing to sacrifice one person to save five others, and less likely to consider such an action to be right. In a second study using three scenarios, including the standard scenario where lives are threatened by an on-coming train, fewer Chinese than British participants were willing to take action and sacrifice one to save five, and this cultural difference was more pronounced when the consequences were less severe than death.", "title": "" } ]
scidocsrr
d1a7a06b4bb406fbc85882382610e767
Tactical cooperative planning for autonomous highway driving using Monte-Carlo Tree Search
[ { "docid": "6b878f3084bd74d963f25b3fd87d0a34", "text": "Cooperative behavior planning for automated vehicles is getting more and more attention in the research community. This paper introduces two dimensions to structure cooperative driving tasks. The authors suggest to distinguish driving tasks by the used communication channels and by the hierarchical level of cooperative skills and abilities. In this manner, this paper presents the cooperative behavior skills of \"Jack\", our automated vehicle driving from Stanford to Las Vegas in January 2015.", "title": "" } ]
[ { "docid": "d49d099d3f560584f2d080e7a1e2711f", "text": "Dark Web forums are heavily used by extremist and terrorist groups for communication, recruiting, ideology sharing, and radicalization. These forums often have relevance to the Iraqi insurgency or Al-Qaeda and are of interest to security and intelligence organizations. This paper presents an automated approach to sentiment and affect analysis of selected radical international Ahadist Dark Web forums. The approach incorporates a rich textual feature representation and machine learning techniques to identify and measure the sentiment polarities and affect intensities expressed in forum communications. The results of sentiment and affect analysis performed on two large-scale Dark Web forums are presented, offering insight into the communities and participants.", "title": "" }, { "docid": "d763198d3bfb1d30b153e13245c90c08", "text": "Inspired by the aerial maneuvering ability of lizards, we present the design and control of MSU (Michigan State University) tailbot - a miniature-tailed jumping robot. The robot can not only wheel on the ground, but also jump up to overcome obstacles. Moreover, once leaping into the air, it can control its body angle using an active tail to dynamically maneuver in midair for safe landings. We derive the midair dynamics equation and design controllers, such as a sliding mode controller, to stabilize the body at desired angles. To the best of our knowledge, this is the first miniature (maximum size 7.5 cm) and lightweight (26.5 g) robot that can wheel on the ground, jump to overcome obstacles, and maneuver in midair. Furthermore, tailbot is equipped with on-board energy, sensing, control, and wireless communication capabilities, enabling tetherless or autonomous operations. The robot in this paper exemplifies the integration of mechanical design, embedded system, and advanced control methods that will inspire the next-generation agile robots mimicking their biological counterparts. Moreover, it can serve as mobile sensor platforms for wireless sensor networks with many field applications.", "title": "" }, { "docid": "a26dd0133a66a8868d84ef418bcaf9f5", "text": "In performance display advertising a key metric of a campaign effectiveness is its conversion rate -- the proportion of users who take a predefined action on the advertiser website, such as a purchase. Predicting this conversion rate is thus essential for estimating the value of an impression and can be achieved via machine learning. One difficulty however is that the conversions can take place long after the impression -- up to a month -- and this delayed feedback hinders the conversion modeling. We tackle this issue by introducing an additional model that captures the conversion delay. Intuitively, this probabilistic model helps determining whether a user that has not converted should be treated as a negative sample -- when the elapsed time is larger than the predicted delay -- or should be discarded from the training set -- when it is too early to tell. We provide experimental results on real traffic logs that demonstrate the effectiveness of the proposed model.", "title": "" }, { "docid": "238215c552415dd21bed4a12fdc0cc4c", "text": "A method for real-time estimation of parameters in a linear dynamic state space model was developed and studied. The application is aircraft dynamic model parameter estimation from measured data in flight for indirect adaptive or reconfigurable control. Equation error in the frequency domain was used with a recursive Fourier transform for the real-time data analysis. Linear and nonlinear simulation examples and flight test data from the F-18 High Alpha Research Vehicle (HARV) were used to demonstrate that the technique produces accurate model parameter estimates with appropriate error bounds. Parameter estimates converged in less than 1 cycle of the dominant dynamic mode natural frequencies, using control surface inputs measured in flight during ordinary piloted maneuvers. The real-time parameter estimation method has low computational requirements, and could be implemented aboard an aircraft in real time. Nomenclature A,B,C,D system matrices E ; @ expectation operator g acceleration due to gravity, ft/sec h altitude, ft j imaginary number = -1 M Mach number N total number of samples Re real part R measurement noise covariance matrix t time Copyright © 1999 by the American Institute of Aeronautics and Astronautics, Inc. No copyright is asserted in the United States under Title 17, U.S. Code. The U.S. Government has a royaltyfree license to exercise all rights under the copyright claimed herein for Governmental purposes. All other rights are reserved by the copyright owner. Vt true airspeed, ft/sec x, u, y state, input, and output vectors zi measured output vector at time i t D α angle of attack, rad β sideslip angle, rad δ δ a r , aileron, rudder deflections, rad δ δ e s , elevator, stabilator deflections, rad δ ij Kronecker delta ν i discrete measurement noise vector σ 2 variance ω angular frequency, rad/sec θ p-dimensional parameter vector superscripts T transpose † complex conjugate transpose ~ discrete Fourier transform $ estimate –1 matrix inverse subscripts i value at time i t D o trim or initial value Introduction Real-time identification of dynamic models is a requirement for indirect adaptive or reconfigurable control. One approach for satisfying this requirement is to assume the dynamic model has a linear structure with time-varying parameters to account for changes in the flight condition, stores, configuration, remaining fuel, or from various types of failures, wear, or damage. The task is then to identify accurate linear model parameter estimates from measured data in real time, so that the adaptive control logic can make the necessary https://ntrs.nasa.gov/search.jsp?R=20040087105 2017-09-13T22:15:14+00:00Z", "title": "" }, { "docid": "85678fca24cfa94efcc36570b3f1ef62", "text": "Content-based recommender systems use preference ratings and features that characterize media to model users' interests or information needs for making future recommendations. While previously developed in the music and text domains, we present an initial exploration of content-based recommendation for spoken documents using a corpus of public domain internet audio. Unlike familiar speech technologies of topic identification and spoken document retrieval, our recommendation task requires a more comprehensive notion of document relevance than bags-of-words would supply. Inspired by music recommender systems, we automatically extract a wide variety of content-based features to characterize non-linguistic aspects of the audio such as speaker, language, gender, and environment. To combine these heterogeneous information sources into a single relevance judgement, we evaluate feature, score, and hybrid fusion techniques. Our study provides an essential first exploration of the task and clearly demonstrates the value of a multisource approach over a bag-of-words baseline.", "title": "" }, { "docid": "4e071e10b9263d98061b87a7c7ceee02", "text": "Seeking more common ground between data scientists and their critics.", "title": "" }, { "docid": "9b430645f7b0da19b2c55d43985259d8", "text": "Research on human spatial memory and navigational ability has recently shown the strong influence of reference systems in spatial memory on the ways spatial information is accessed in navigation and other spatially oriented tasks. One of the main findings can be characterized as a large cognitive cost, both in terms of speed and accuracy that occurs whenever the reference system used to encode spatial information in memory is not aligned with the reference system required by a particular task. In this paper, the role of aligned and misaligned reference systems is discussed in the context of the built environment and modern architecture. The role of architectural design on the perception and mental representation of space by humans is investigated. The navigability and usability of built space is systematically analysed in the light of cognitive theories of spatial and navigational abilities of humans. It is concluded that a building’s navigability and related wayfinding issues can benefit from architectural design that takes into account basic results of spatial cognition research. 1 Wayfinding and Architecture Life takes place in space and humans, like other organisms, have developed adaptive strategies to find their way around their environment. Tasks such as identifying a place or direction, retracing one’s path, or navigating a large-scale space, are essential elements to mobile organisms. Most of these spatial abilities have evolved in natural environments over a very long time, using properties present in nature as cues for spatial orientation and wayfinding. With the rise of complex social structure and culture, humans began to modify their natural environment to better fit their needs. The emergence of primitive dwellings mainly provided shelter, but at the same time allowed builders to create environments whose spatial structure “regulated” the chaotic natural environment. They did this by using basic measurements and geometric relations, such as straight lines, right angles, etc., as the basic elements of design (Le Corbusier, 1931, p. 69ff.) In modern society, most of our lives take place in similar regulated, human-made spatial environments, with paths, tracks, streets, and hallways as the main arteries of human locomotion. Architecture and landscape architecture embody the human effort to structure space in meaningful and useful ways. Architectural design of space has multiple functions. Architecture is designed to satisfy the different representational, functional, aesthetic, and emotional needs of organizations and the people who live or work in these structures. In this chapter, emphasis lies on a specific functional aspect of architectural design: human wayfinding. Many approaches to improving architecture focus on functional issues, like improved ecological design, the creation of improved workplaces, better climate control, lighting conditions, or social meeting areas. Similarly, when focusing on the mobility of humans, the ease of wayfinding within a building can be seen as an essential function of a building’s design (Arthur & Passini, 1992; Passini, 1984). When focusing on wayfinding issues in buildings, cities, and landscapes, the designed spatial environment can be seen as an important tool in achieving a particular goal, e.g., reaching a destination or finding an exit in case of emergency. This view, if taken to a literal extreme, is summarized by Le Corbusier’s (1931) notion of the building as a “machine,” mirroring in architecture the engineering ideals of efficiency and functionality found in airplanes and cars. In the narrow sense of wayfinding, a building thus can be considered of good design if it allows easy and error-free navigation. This view is also adopted by Passini (1984), who states that “although the architecture and the spatial configuration of a building generate the wayfinding problems people have to solve, they are also a wayfinding support system in that they contain the information necessary to solve the problem” (p. 110). Like other problems of engineering, the wayfinding problem in architecture should have one or more solutions that can be evaluated. This view of architecture can be contrasted with the alternative view of architecture as “built philosophy”. According to this latter view, architecture, like art, expresses ideas and cultural progress by shaping the spatial structure of the world – a view which gives consideration to the users as part of the philosophical approach but not necessarily from a usability perspective. Viewing wayfinding within the built environment as a “man-machine-interaction” problem makes clear that good architectural design with respect to navigability needs to take two factors into account. First, the human user comes equipped with particular sensory, perceptual, motoric, and cognitive abilities. Knowledge of these abilities and the limitations of an average user or special user populations thus is a prerequisite for good design. Second, structural, functional, financial, and other design considerations restrict the degrees of freedom architects have in designing usable spaces. In the following sections, we first focus on basic research on human spatial cognition. Even though not all of it is directly applicable to architectural design and wayfinding, it lays the foundation for more specific analyses in part 3 and 4. In part 3, the emphasis is on a specific research question that recently has attracted some attention: the role of environmental structure (e.g., building and street layout) for the selection of a spatial reference frame. In part 4, implications for architectural design are discussed by means of two real-world examples. 2 The human user in wayfinding 2.1 Navigational strategies Finding one’s way in the environment, reaching a destination, or remembering the location of relevant objects are some of the elementary tasks of human activity. Fortunately, human navigators are well equipped with an array of flexible navigational strategies, which usually enable them to master their spatial environment (Allen, 1999). In addition, human navigation can rely on tools that extend human sensory and mnemonic abilities. Most spatial or navigational strategies are so common that they do not occur to us when we perform them. Walking down a hallway we hardly realize that the optical and acoustical flows give us rich information about where we are headed and whether we will collide with other objects (Gibson, 1979). Our perception of other objects already includes physical and social models on how they will move and where they will be once we reach the point where paths might cross. Following a path can consist of following a particular visual texture (e.g., asphalt) or feeling a handrail in the dark by touch. At places where multiple continuing paths are possible, we might have learned to associate the scene with a particular action (e.g., turn left; Schölkopf & Mallot, 1995), or we might try to approximate a heading direction by choosing the path that most closely resembles this direction. When in doubt about our path we might ask another person or consult a map. As is evident from this brief (and not exhaustive) description, navigational strategies and activities are rich in diversity and adaptability (for an overview see Golledge, 1999; Werner, Krieg-Brückner, & Herrmann, 2000), some of which are aided by architectural design and signage (see Arthur & Passini, 1992; Passini, 1984). Despite the large number of different navigational strategies, people still experience problems finding their way or even feel lost momentarily. This feeling of being lost might reflect the lack of a key component of human wayfinding: knowledge about where one is located in an environment – with respect to one’s goal, one’s starting location, or with respect to the global environment one is in. As Lynch put it, “the terror of being lost comes from the necessity that a mobile organism be oriented in its surroundings” (1960, p. 125.) Some wayfinding strategies, like vector navigation, rely heavily on this information. Other strategies, e.g. piloting or path-following, which are based on purely local information can benefit from even vague locational knowledge as a redundant source of information to validate or question navigational decisions (see Werner et al., 2000, for examples.) Proficient signage in buildings, on the other hand, relies on a different strategy. It relieves a user from keeping track of his or her position in space by indicating the correct navigational choice whenever the choice becomes relevant. Keeping track of one’s position during navigation can be done quite easily if access to global landmarks, reference directions, or coordinates is possible. Unfortunately, the built environment often does not allow for simple navigational strategies based on these types of information. Instead, spatial information has to be integrated across multiple places, paths, turns, and extended periods of time (see Poucet, 1993, for an interesting model of how this can be achieved). In the next section we will describe an essential ingredient of this integration – the mental representation of spatial information in memory. 2.2 Alignment effects in spatial memory When observing tourists in an unfamiliar environment, one often notices people frantically turning maps to align the noticeable landmarks depicted in the map with the visible landmarks as seen from the viewpoint of the tourist. This type of behavior indicates a well-established cognitive principle (Levine, Jankovic, & Palij, 1982). Observers more easily comprehend and use information depicted in “You-are-here” (YAH) maps if the up-down direction of the map coincides with the front-back direction of the observer. In this situation, the natural preference of directional mapping of top to front and bottom to back is used, and left and right in the map stay left and right in the depicted world. While th", "title": "" }, { "docid": "30f48021bca12899d6f2e012e93ba12d", "text": "There are several locomotion mechanisms in Nature. The study of mechanics of any locomotion is very useful for scientists and researchers. Many locomotion principles from Nature have been adapted in robotics. There are several species which are capable of multimode locomotion such as walking and swimming, and flying etc. Frogs are such species, capable of jumping, walking, and swimming. Multimode locomotion is important for robots to work in unknown environment. Frogs are widely known as good multimode locomotors. Webbed feet help them to swim efficiently in water. This paper presents the study of frog's swimming locomotion and adapting the webbed feet for swimming locomotion of the robots. A simple mechanical model of robotic leg with webbed foot, which can be used for multi-mode locomotion and robotic frog, is put forward. All the joints of the legs are designed to be driven by tendon-pulley arrangement with the actuators mounted on the body, which allows the legs to be lighter and compact.", "title": "" }, { "docid": "be2137514d2c1431d82c28a4ae2719ad", "text": "The Exact Set Similarity Join problem aims to find all similar sets between two collections of sets, with respect to a threshold and a similarity function such as overlap, Jaccard, dice or cosine. The näıve approach verifies all pairs of sets and it is often considered impractical due the high number of combinations. So, Exact Set Similarity Join algorithms are usually based on the Filter-Verification Framework, that applies a series of filters to reduce the number of verified pairs. This paper presents a new filtering technique called Bitmap Filter, which is able to accelerate state-of-the-art algorithms for the exact Set Similarity Join problem. The Bitmap Filter uses hash functions to create bitmaps of fixed b bits, representing characteristics of the sets. Then, it applies bitwise operations (such as xor and population count) on the bitmaps in order to infer a similarity upper bound for each pair of sets. If the upper bound is below a given similarity threshold, the pair of sets is pruned. The Bitmap Filter benefits from the fact that bitwise operations are efficiently implemented by many modern general-purpose processors and it was easily applied to four state-of-the-art algorithms implemented in CPU: AllPairs, PPJoin, AdaptJoin and GroupJoin. Furthermore, we propose a Graphic Processor Unit (GPU) algorithm based on the näıve approach but using the Bitmap Filter to speedup the computation. The experiments considered 9 collections containing from 100 thousands up to 10 million sets and the joins were made using Jaccard thresholds from 0.50 to 0.95. The Bitmap Filter was able to improve 90% of the experiments in CPU, with speedups of up to 4.50× and 1.43× on average. Using the GPU algorithm, the experiments were able to speedup the original CPU algorithms by up to 577× using an Nvidia Geforce GTX 980 Ti.", "title": "" }, { "docid": "bdae3fb85df9de789a9faa2c08a5c0fb", "text": "The rapid, exponential growth of modern electronics has brought about profound changes to our daily lives. However, maintaining the growth trend now faces significant challenges at both the fundamental and practical levels [1]. Possible solutions include More Moore?developing new, alternative device structures and materials while maintaining the same basic computer architecture, and More Than Moore?enabling alternative computing architectures and hybrid integration to achieve increased system functionality without trying to push the devices beyond limits. In particular, an increasing number of computing tasks today are related to handling large amounts of data, e.g. image processing as an example. Conventional von Neumann digital computers, with separate memory and processer units, become less and less efficient when large amount of data have to be moved around and processed quickly. Alternative approaches such as bio-inspired neuromorphic circuits, with distributed computing and localized storage in networks, become attractive options [2]?[6].", "title": "" }, { "docid": "2272fb00555b1aef0f1861fe83111b5d", "text": "JavaScript is a dynamic programming language adopted in a variety of applications, including web pages, PDF Readers, widget engines, network platforms, office suites. Given its widespread presence throughout different software platforms, JavaScript is a primary tool for the development of novel -rapidly evolving- malicious exploits. If the classical signature- and heuristic-based detection approaches are clearly inadequate to cope with this kind of threat, machine learning solutions proposed so far suffer from high false-alarm rates or require special instrumentation that make them not suitable for protecting end-user systems.\n In this paper we present Lux0R \"Lux 0n discriminant References\", a novel, lightweight approach to the detection of malicious JavaScript code. Our method is based on the characterization of JavaScript code through its API references, i.e., functions, constants, objects, methods, keywords as well as attributes natively recognized by a JavaScript Application Programming Interface (API). We exploit machine learning techniques to select a subset of API references that characterize malicious code, and then use them to detect JavaScript malware. The selection algorithm has been thought to be \"secure by design\" against evasion by mimicry attacks. In this investigation, we focus on a relevant application domain, i.e., the detection of malicious JavaScript code within PDF documents. We show that our technique is able to achieve excellent malware detection accuracy, even on samples exploiting never-before-seen vulnerabilities, i.e., for which there are no examples in training data. Finally, we experimentally assess the robustness of Lux0R against mimicry attacks based on feature addition.", "title": "" }, { "docid": "f4438c21802e244d4021ef3390aecf89", "text": "Ship detection has been playing a significant role in the field of remote sensing for a long time but it is still full of challenges. The main limitations of traditional ship detection methods usually lie in the complexity of application scenarios, the difficulty of intensive object detection and the redundancy of detection region. In order to solve such problems above, we propose a framework called Rotation Dense Feature Pyramid Networks (R-DFPN) which can effectively detect ship in different scenes including ocean and port. Specifically, we put forward the Dense Feature Pyramid Network (DFPN), which is aimed at solving the problem resulted from the narrow width of the ship. Compared with previous multi-scale detectors such as Feature Pyramid Network (FPN), DFPN builds the high-level semantic feature-maps for all scales by means of dense connections, through which enhances the feature propagation and encourages the feature reuse. Additionally, in the case of ship rotation and dense arrangement, we design a rotation anchor strategy to predict the minimum circumscribed rectangle of the object so as to reduce the redundant detection region and improve the recall. Furthermore, we also propose multi-scale ROI Align for the purpose of maintaining the completeness of semantic and spatial information. Experiments based on remote sensing images from Google Earth for ship detection show that our detection method based on RDFPN representation has a state-of-the-art performance.", "title": "" }, { "docid": "e9c52fb24425bff6ed514de6b92e8ba2", "text": "This paper proposes a ultra compact Wilkinson power combiner (WPC) incorporating synthetic transmission lines at K-band in CMOS technology. The 50 % improvement on the size reduction can be achieved by increasing the slow-wave factor of synthetic transmission line. The presented Wilkinson power combiner design is analyzed and fabricated by using standard 0.18 µm 1P6M CMOS technology. The prototype has only a chip size of 480 µm × 90 µm, corresponding to 0.0002λ02 at 21.5 GHz. The measured insertion losses and return losses are less and higher than 4 dB and 17.5 dB from 16 GHz to 27 GHz, respectively. Furthermore, the proposed WPC is also integrated into the phase shifter to confirm its feasibility. The prototype of phase shifter shows 15 % size reduction and on-wafer measurements show good linearity of full 360-degree phase shifting from 21 GHz to 27 GHz.", "title": "" }, { "docid": "4a227bddcaed44777eb7a29dcf940c6c", "text": "Deep neural networks have achieved great success on a variety of machine learning tasks. There are many fundamental and open questions yet to be answered, however. We introduce the Extended Data Jacobian Matrix (EDJM) as an architecture-independent tool to analyze neural networks at the manifold of interest. The spectrum of the EDJM is found to be highly correlated with the complexity of the learned functions. After studying the effect of dropout, ensembles, and model distillation using EDJM, we propose a novel spectral regularization method, which improves network performance.", "title": "" }, { "docid": "3830c568e6b9b56bab1c971d2a99757c", "text": "Lagrangian theory provides a diverse set of tools for continuous motion analysis. Existing work shows the applicability of Lagrangian method for video analysis in several aspects. In this paper we want to utilize the concept of Lagrangian measures to detect violent scenes. Therefore we propose a local feature based on the SIFT algorithm that incooperates appearance and Lagrangian based motion models. We will show that the temporal interval of the used motion information is a crucial aspect and study its influence on the classification performance. The proposed LaSIFT feature outperforms other state-of-the-art local features, in particular in uncontrolled realistic video data. We evaluate our algorithm with a bag-of-word approach. The experimental results show a significant improvement over the state-of-the-art on current violent detection datasets, i.e. Crowd Violence, Hockey Fight.", "title": "" }, { "docid": "f0d5a4bb917a8dd40f0f38fcc9460d3b", "text": "Simple decisions arise from the evaluation of sensory evidence. But decisions are determined by more than just evidence. Individuals establish internal decision criteria that influence how they respond. Where or how decision criteria are established in the brain remains poorly understood. Here, we show that neuronal activity in the superior colliculus (SC) predicts changes in decision criteria. Using a novel \"Yes-No\" task that isolates changes in decision criterion from changes in decision sensitivity, and computing neuronal measures of sensitivity and criterion, we find that SC neuronal activity correlates with the decision criterion regardless of the location of the choice report. We also show that electrical manipulation of activity within the SC produces changes in decisions consistent with changes in decision criteria and are largely independent of the choice report location. Our correlational and causal results together provide strong evidence that SC activity signals the position of a decision criterion. VIDEO ABSTRACT.", "title": "" }, { "docid": "925709dfe0d0946ca06d05b290f2b9bd", "text": "Mentalization, operationalized as reflective functioning (RF), can play a crucial role in the psychological mechanisms underlying personality functioning. This study aimed to: (a) study the association between RF, personality disorders (cluster level) and functioning; (b) investigate whether RF and personality functioning are influenced by (secure vs. insecure) attachment; and (c) explore the potential mediating effect of RF on the relationship between attachment and personality functioning. The Shedler-Westen Assessment Procedure (SWAP-200) was used to assess personality disorders and levels of psychological functioning in a clinical sample (N = 88). Attachment and RF were evaluated with the Adult Attachment Interview (AAI) and Reflective Functioning Scale (RFS). Findings showed that RF had significant negative associations with cluster A and B personality disorders, and a significant positive association with psychological functioning. Moreover, levels of RF and personality functioning were influenced by attachment patterns. Finally, RF completely mediated the relationship between (secure/insecure) attachment and adaptive psychological features, and thus accounted for differences in overall personality functioning. Lack of mentalization seemed strongly associated with vulnerabilities in personality functioning, especially in patients with cluster A and B personality disorders. These findings provide support for the development of therapeutic interventions to improve patients' RF.", "title": "" }, { "docid": "c6035abd67504564fbf4b8c6015beb2e", "text": "Intermediaries can choose between functioning as a marketplace (on which suppliers sell their products directly to buyers) or as a reseller (purchasing products from suppliers and selling them to buyers). We model this as a decision between whether control rights over a non-contractible decision variable (the choice of some marketing activity) are better held by suppliers (the marketplacemode) or by the intermediary (the reseller-mode). Whether the marketplace or the reseller mode is preferred depends on whether independent suppliers or the intermediary have more important information relevant to the optimal tailoring of marketing activities for each specific product. We show that this tradeoff is shifted towards the reseller-mode when marketing activities create spillovers across products and when network effects lead to unfavorable expectations about supplier participation. If the reseller has a variable cost advantage (respectively, disadvantage) relative to the marketplace then the tradeoff is shifted towards the marketplace for long-tail (respectively, shorttail) products. We thus provide a theory of which products an intermediary should offer in each mode. We also provide some empirical evidence that supports our main results. JEL classification: D4, L1, L5", "title": "" }, { "docid": "8756441420669a6845254242030e0a79", "text": "We propose a recurrent neural network (RNN) based model for image multi-label classification. Our model uniquely integrates and learning of visual attention and Long Short Term Memory (LSTM) layers, which jointly learns the labels of interest and their co-occurrences, while the associated image regions are visually attended. Different from existing approaches utilize either model in their network architectures, training of our model does not require pre-defined label orders. Moreover, a robust inference process is introduced so that prediction errors would not propagate and thus affect the performance. Our experiments on NUS-WISE and MS-COCO datasets confirm the design of our network and its effectiveness in solving multi-label classification problems.", "title": "" }, { "docid": "3473e7d5f49374339d12120d1644ec3d", "text": "Patients with chronic conditions make day-to-day decisions about--self-manage--their illnesses. This reality introduces a new chronic disease paradigm: the patient-professional partnership, involving collaborative care and self-management education. Self-management education complements traditional patient education in supporting patients to live the best possible quality of life with their chronic condition. Whereas traditional patient education offers information and technical skills, self-management education teaches problem-solving skills. A central concept in self-management is self-efficacy--confidence to carry out a behavior necessary to reach a desired goal. Self-efficacy is enhanced when patients succeed in solving patient-identified problems. Evidence from controlled clinical trials suggests that (1) programs teaching self-management skills are more effective than information-only patient education in improving clinical outcomes; (2) in some circumstances, self-management education improves outcomes and can reduce costs for arthritis and probably for adult asthma patients; and (3) in initial studies, a self-management education program bringing together patients with a variety of chronic conditions may improve outcomes and reduce costs. Self-management education for chronic illness may soon become an integral part of high-quality primary care.", "title": "" } ]
scidocsrr
e6f732eabe13c497a9c199fed841adc6
Incorporating Expert Knowledge into Keyphrase Extraction
[ { "docid": "fb2028ca0e836452862a2cb1fa707d28", "text": "State-of-the-art approaches for unsupervised keyphrase extraction are typically evaluated on a single dataset with a single parameter setting. Consequently, it is unclear how effective these approaches are on a new dataset from a different domain, and how sensitive they are to changes in parameter settings. To gain a better understanding of state-of-the-art unsupervised keyphrase extraction algorithms, we conduct a systematic evaluation and analysis of these algorithms on a variety of standard evaluation datasets.", "title": "" } ]
[ { "docid": "e8ba260c18576f7f8b9f90afed0348e5", "text": "This paper is aimed at recognition of offline handwritten characters in a given scanned text document with the help of neural networks. Image preprocessing, segmentation and feature extraction are various phases involved in character recognition. The first step is image acquisition followed by noise filtering, smoothing and image normalization of scanned image. Segmentation decomposes image into sub images and feature extraction extracts features from input image. Neural Network is created and trained to classify and recognize handwritten characters.", "title": "" }, { "docid": "8442bf64a1c89bbddb6ffb8001b1381e", "text": "In this paper we present a scalable hardware architecture to implement large-scale convolutional neural networks and state-of-the-art multi-layered artificial vision systems. This system is fully digital and is a modular vision engine with the goal of performing real-time detection, recognition and segmentation of mega-pixel images. We present a performance comparison between a software, FPGA and ASIC implementation that shows a speed up in custom hardware implementations.", "title": "" }, { "docid": "edbad8d3889a431c16e4a51d0c1cc19c", "text": "We propose to automatically create capsule wardrobes. Given an inventory of candidate garments and accessories, the algorithm must assemble a minimal set of items that provides maximal mix-and-match outfits. We pose the task as a subset selection problem. To permit efficient subset selection over the space of all outfit combinations, we develop submodular objective functions capturing the key ingredients of visual compatibility, versatility, and user-specific preference. Since adding garments to a capsule only expands its possible outfits, we devise an iterative approach to allow near-optimal submodular function maximization. Finally, we present an unsupervised approach to learn visual compatibility from \"in the wild\" full body outfit photos; the compatibility metric translates well to cleaner catalog photos and improves over existing methods. Our results on thousands of pieces from popular fashion websites show that automatic capsule creation has potential to mimic skilled fashionistas in assembling flexible wardrobes, while being significantly more scalable.", "title": "" }, { "docid": "21511302800cd18d21dbc410bec3cbb2", "text": "We investigate theoretical and practical aspects of the design of far-field RF power extraction systems consisting of antennas, impedance matching networks and rectifiers. Fundamental physical relationships that link the operating bandwidth and range are related to technology dependent quantities like threshold voltage and parasitic capacitances. This allows us to design efficient planar antennas, coupled resonator impedance matching networks and low-power rectifiers in standard CMOS technologies (0.5-mum and 0.18-mum) and accurately predict their performance. Experimental results from a prototype power extraction system that operates around 950 MHz and integrates these components together are presented. Our measured RF power-up threshold (in 0.18-mum, at 1 muW load) was 6 muWplusmn10%, closely matching the predicted value of 5.2 muW.", "title": "" }, { "docid": "dc119b4f06012c82c31fe2a30d0ccb2d", "text": "Multipliers are the most commonly used elements in today's digital devices. In order to achieve high data throughput in digital signal processing systems, hardware multiplication is the important factor. Depending on the applications which are emerging with the electronics devices, various types of multipliers are emerged. Among all the multipliers, the basic multiplier is Array Multiplier. This paper aims at design of an optimized, low power and high speed 4- bit array multiplier by proposing Modified Gate Diffusion Input (MOD-GDI) technique. With this technique the total propagation delay, power dissipation, and no. of transistors required to design are much more decreased than compared to the Gate Diffusion Input (GDI) and CMOS techniques. Simulations are carried out on mentor graphics tools with 90nm Process technology.", "title": "" }, { "docid": "537793712e4e62d66e35b3c9114706f2", "text": "Database indices provide a non-discriminative navigational infrastructure to localize tuples of interest. Their maintenance cost is taken during database updates. In this work we study the complementary approach, addressing index maintenance as part of query processing using continuous physical reorganization, i.e., cracking the database into manageable pieces. Each query is interpreted not only as a request for a particular result set, but also as an advice to crack the physical database store into smaller pieces. Each piece is described by a query, all of which are assembled in a cracker index to speedup future search. The cracker index replaces the non-discriminative indices (e.g., B-trees and hash tables) with a discriminative index. Only database portions of past interest are easily localized. The remainder is unexplored territory and remains non-indexed until a query becomes interested. The cracker index is fully self-organized and adapts to changing query workloads. With cracking, the way data is physically stored self-organizes according to query workload. Even with a huge data set, only tuples of interest are touched, leading to significant gains in query performance. In case the focus shifts to a different part of the data, the cracker index will automatically adjust to that. We report on our design and implementation of cracking in the context of a full fledged relational system. It led to a limited enhancement to its relational algebra kernel, such that cracking could be piggy-backed without incurring too much processing overhead. Furthermore, we illustrate the ripple effect of dynamic reorganization on the query plans derived by the SQL optimizer. The experiences and results obtained are indicative of a significant reduction in system complexity with clear performance benefits. ∗Stratos Idreos is the contact author (Stratos.Idreos@cwi.nl) and a Ph.D student at CWI", "title": "" }, { "docid": "fb8e10632b8b9ad2cf772d20dbc95bda", "text": "Event cameras are bio-inspired vision sensors which mimic retinas to measure per-pixel intensity change rather than outputting an actual intensity image. This proposed paradigm shift away from traditional frame cameras offers significant potential advantages: namely avoiding high data rates, dynamic range limitations and motion blur. Unfortunately, however, established computer vision algorithms may not at all be applied directly to event cameras. Methods proposed so far to reconstruct images, estimate optical flow, track a camera and reconstruct a scene come with severe restrictions on the environment or on the motion of the camera, e.g. allowing only rotation. Here, we propose, to the best of our knowledge, the first algorithm to simultaneously recover the motion field and brightness image, while the camera undergoes a generic motion through any scene. Our approach employs minimisation of a cost function that contains the asynchronous event data as well as spatial and temporal regularisation within a sliding window time interval. Our implementation relies on GPU optimisation and runs in near real-time. In a series of examples, we demonstrate the successful operation of our framework, including in situations where conventional cameras suffer from dynamic range limitations and motion blur.", "title": "" }, { "docid": "ada320bb2747d539ff6322bbd46bd9f0", "text": "Real job applicants completed a 5-factor model personality measure as part of the job application process. They were rejected; 6 months later they (n = 5,266) reapplied for the same job and completed the same personality measure. Results indicated that 5.2% or fewer improved their scores on any scale on the 2nd occasion; moreover, scale scores were as likely to change in the negative direction as the positive. Only 3 applicants changed scores on all 5 scales beyond a 95% confidence threshold. Construct validity of the personality scales remained intact across the 2 administrations, and the same structural model provided an acceptable fit to the scale score matrix on both occasions. For the small number of applicants whose scores changed beyond the standard error of measurement, the authors found the changes were systematic and predictable using measures of social skill, social desirability, and integrity. Results suggest that faking on personality measures is not a significant problem in real-world selection settings.", "title": "" }, { "docid": "f9824ae0b73ebecf4b3a893392e77d67", "text": "This paper proposes genetic algorithms (GAs) approach to feature discretization and the determination of connection weights for artificial neural networks (ANNs) to predict the stock price index. Previous research proposed many hybrid models of ANN and GA for the method of training the network, feature subset selection, and topology optimization. In most of these studies, however, GA is only used to improve the learning algorithm itself. In this study, GA is employed not only to improve the learning algorithm, but also to reduce the complexity in feature space. GA optimizes simultaneously the connection weights between layers and the thresholds for feature discretization. The genetically evolved weights mitigate the well-known limitations of the gradient descent algorithm. In addition, globally searched feature discretization reduces the dimensionality of the feature space and eliminates irrelevant factors. Experimental results show that GA approach to the feature discretization model outperforms the other two conventional models. q 2000 Published by Elsevier Science Ltd.", "title": "" }, { "docid": "0bd91a36d282a08759d5e7ad0b2aee97", "text": "We carry out a systematic study of existing visual CAPTCHAs based on distorted characters that are augmented with anti-segmentation techniques. Applying a systematic evaluation methodology to 15 current CAPTCHA schemes from popular web sites, we find that 13 are vulnerable to automated attacks. Based on this evaluation, we identify a series of recommendations for CAPTCHA designers and attackers, and possible future directions for producing more reliable human/computer distinguishers.", "title": "" }, { "docid": "20d00f63848b70f3a5688b68181088f2", "text": "This paper presents a method for modeling player decision making through the use of agents as AI-driven personas. The paper argues that artificial agents, as generative player models, have properties that allow them to be used as psychometrically valid, abstract simulations of a human player’s internal decision making processes. Such agents can then be used to interpret human decision making, as personas and playtesting tools in the game design process, as baselines for adapting agents to mimic classes of human players, or as believable, human-like opponents. This argument is explored in a crowdsourced decision making experiment, in which the decisions of human players are recorded in a small-scale dungeon themed puzzle game. Human decisions are compared to the decisions of a number of a priori defined“archetypical” agent-personas, and the humans are characterized by their likeness to or divergence from these. Essentially, at each step the action of the human is compared to what actions a number of reinforcement-learned agents would have taken in the same situation, where each agent is trained using a different reward scheme. Finally, extensions are outlined for adapting the agents to represent sub-classes found in the human decision making traces.", "title": "" }, { "docid": "c9b4366d56a889b5f25c92fe45898c08", "text": "Studies of the clinical correlates of the subtypes of Attention-Deficit/Hyperactivity Disorder (ADHD) have identified differences in the representation of age, gender, prevalence, comorbidity, and treatment. We report retrospective chart review data detailing the clinical characteristics of the Inattentive (IA) and Combined (C) subtypes of ADHD in 143 cases of ADHD-IA and 133 cases of ADHD-C. The children with ADHD-IA were older, more likely to be female, and had more comorbid internalizing disorders and learning disabilities. Individuals in the ADHD-IA group were two to five times as likely to have a referral for speech and language problems. The children with ADHD-IA were rated as having less overall functional impairment, but did have difficulty with academic achievement. Children with ADHD-IA were less likely to be treated with stimulants. One eighth of the children with ADHD-IA still had significant symptoms of hyperactivity/impulsivity, but did not meet the DSM-IV threshold for diagnosis of ADHD-Combined Type. The ADHD-IA subtype includes children with no hyperactivity and children who still manifest clinically significant hyperactive symptomatology but do not meet DSM-IV criteria for Combined Type. ADHD-IA children are often seen as having speech and language problems, and are less likely to receive medication treatment, but respond to medical treatment with improvement both in attention and residual hyperactive/impulsive symptoms.", "title": "" }, { "docid": "1a6e9229f6bc8f6dc0b9a027e1d26607", "text": "− This work illustrates an analysis of Rogowski coils for power applications, when operating under non ideal measurement conditions. The developed numerical model, validated by comparison with other methods and experiments, enables to investigate the effects of the geometrical and constructive parameters on the measurement behavior of the coil.", "title": "" }, { "docid": "7cfd90a3c9091c296e621ff34fc471e6", "text": "The study aimed to develop machine learning models that have strong prediction power and interpretability for diagnosis of glaucoma based on retinal nerve fiber layer (RNFL) thickness and visual field (VF). We collected various candidate features from the examination of retinal nerve fiber layer (RNFL) thickness and visual field (VF). We also developed synthesized features from original features. We then selected the best features proper for classification (diagnosis) through feature evaluation. We used 100 cases of data as a test dataset and 399 cases of data as a training and validation dataset. To develop the glaucoma prediction model, we considered four machine learning algorithms: C5.0, random forest (RF), support vector machine (SVM), and k-nearest neighbor (KNN). We repeatedly composed a learning model using the training dataset and evaluated it by using the validation dataset. Finally, we got the best learning model that produces the highest validation accuracy. We analyzed quality of the models using several measures. The random forest model shows best performance and C5.0, SVM, and KNN models show similar accuracy. In the random forest model, the classification accuracy is 0.98, sensitivity is 0.983, specificity is 0.975, and AUC is 0.979. The developed prediction models show high accuracy, sensitivity, specificity, and AUC in classifying among glaucoma and healthy eyes. It will be used for predicting glaucoma against unknown examination records. Clinicians may reference the prediction results and be able to make better decisions. We may combine multiple learning models to increase prediction accuracy. The C5.0 model includes decision rules for prediction. It can be used to explain the reasons for specific predictions.", "title": "" }, { "docid": "fb4fcc4d5380c4123b24467c1ca2a8e3", "text": "Deep neural networks are traditionally trained using humandesigned stochastic optimization algorithms, such as SGD and Adam. Recently, the approach of learning to optimize network parameters has emerged as a promising research topic. However, these learned black-box optimizers sometimes do not fully utilize the experience in human-designed optimizers, therefore have limitation in generalization ability. In this paper, a new optimizer, dubbed as HyperAdam, is proposed that combines the idea of “learning to optimize” and traditional Adam optimizer. Given a network for training, its parameter update in each iteration generated by HyperAdam is an adaptive combination of multiple updates generated by Adam with varying decay rates. The combination weights and decay rates in HyperAdam are adaptively learned depending on the task. HyperAdam is modeled as a recurrent neural network with AdamCell, WeightCell and StateCell. It is justified to be state-of-the-art for various network training, such as multilayer perceptron, CNN and LSTM.", "title": "" }, { "docid": "5ca36b7877ebd3d05e48d3230f2dceb0", "text": "BACKGROUND\nThe frontal branch has a defined course along the Pitanguy line from tragus to lateral brow, although its depth along this line is controversial. The high-superficial musculoaponeurotic system (SMAS) face-lift technique divides the SMAS above the arch, which conflicts with previous descriptions of the frontal nerve depth. This anatomical study defines the depth and fascial boundaries of the frontal branch of the facial nerve over the zygomatic arch.\n\n\nMETHODS\nEight fresh cadaver heads were included in the study, with bilateral facial nerves studied (n = 16). The proximal frontal branches were isolated and then sectioned in full-thickness tissue blocks over a 5-cm distance over the zygomatic arch. The tissue blocks were evaluated histologically for the depth and fascial planes surrounding the frontal nerve. A dissection video accompanies this article.\n\n\nRESULTS\nThe frontal branch of the facial nerve was identified in each tissue section and its fascial boundaries were easily identified using epidermis and periosteum as reference points. The frontal branch coursed under a separate fascial plane, the parotid-temporal fascia, which was deep to the SMAS as it coursed to the zygomatic arch and remained within this deep fascia over the arch. The frontal branch was intact and protected by the parotid-temporal fascia after a high-SMAS face lift.\n\n\nCONCLUSIONS\nThe frontal branch of the facial nerve is protected by a deep layer of fascia, termed the parotid-temporal fascia, which is separate from the SMAS as it travels over the zygomatic arch. Division of the SMAS above the arch in a high-SMAS face lift is safe using the technique described in this study.", "title": "" }, { "docid": "7e5d59b658893a36903ae4e65d9c1c4e", "text": "The paper proposes Metropolis adjusted Langevin and Hamiltonian Monte Carlo sampling methods defined on the Riemann manifold to resolve the shortcomings of existing Monte Carlo algorithms when sampling from target densities that may be high dimensional and exhibit strong correlations. The methods provide fully automated adaptation mechanisms that circumvent the costly pilot runs that are required to tune proposal densities for Metropolis– Hastings or indeed Hamiltonian Monte Carlo and Metropolis adjusted Langevin algorithms.This allows for highly efficient sampling even in very high dimensions where different scalings may be required for the transient and stationary phases of the Markov chain.The methodology proposed exploits the Riemann geometry of the parameter space of statistical models and thus automatically adapts to the local structure when simulating paths across this manifold, providing highly efficient convergence and exploration of the target density. The performance of these Riemann manifold Monte Carlo methods is rigorously assessed by performing inference on logistic regression models, log-Gaussian Cox point processes, stochastic volatility models and Bayesian estimation of dynamic systems described by non-linear differential equations. Substantial improvements in the time-normalized effective sample size are reported when compared with alternative sampling approaches. MATLAB code that is available from the authors allows replication of all the results reported.", "title": "" }, { "docid": "a01abbced99f14ae198c6abef6454126", "text": "Coreference Resolution September 2014 Present Kevin Clark, Christopher Manning Stanford University Developed coreference systems that build up coreference chains with agglomerative clustering. These models are more accurate than the mention-pair systems commonly used in prior work. Developed neural coreference systems that do not require the large number of complex hand-engineered features commonly found in statistical coreference systems. Applied imitation and reinforcement learning to directly optimize coreference systems for evaluation metrics instead of relying on hand-tuned heuristic loss functions. Made substantial advancements to the current state-of-the-art for English and Chinese coreference. Publicly released all models through Stanford’s CoreNLP.", "title": "" }, { "docid": "67622b8dfa339b63a37439b07ec9b3f7", "text": "⁎ Corresponding author. E-mail addresses: mkunda@vanderbilt.edu (M. Kunda (I. Soulières), agata@gatech.edu (A. Rozga), ashok.goel@c 1 Present Address: Department of Electrical Engine Vanderbilt University, PMB 351679, 2301 Vanderbilt Pla USA. 2 Terminology: Raven's Progressive Matrices (RPM) refe Specific test versions include: Standard ProgressiveMatric and adults in average ability ranges; Colored ProgressiveM with children, the elderly, or other individuals falling Advanced Progressive Matrices (APM), intended for highe", "title": "" } ]
scidocsrr
59f8ad6c9ba12b08572d4fc9bf0fe2ed
NEUTROSOPHIC INDEX NUMBERS . Neutrosophic logic applied in the statistical indicators theory
[ { "docid": "d80ca368563546b1c2a7aa99d97e39d2", "text": "In this paper we present a short history of logics: from parti cular cases of 2-symbol or numerical valued logic to the general case of n-symbol or num erical valued logic. We show generalizations of 2-valued Boolean logic to fuzzy log ic, also from the Kleene’s and Lukasiewicz’ 3-symbol valued logics or Belnap’s 4ymbol valued logic to the most generaln-symbol or numerical valued refined neutrosophic logic . Two classes of neutrosophic norm ( n-norm) and neutrosophic conorm ( n-conorm) are defined. Examples of applications of neutrosophic logic to physics are listed in the last section. Similar generalizations can be done for n-Valued Refined Neutrosophic Set , and respectively n-Valued Refined Neutrosopjhic Probability .", "title": "" } ]
[ { "docid": "8cd99d9b59e6f1b631767b57fb506619", "text": "We describe origami programming methodology based on constraint functional logic programming. The basic operations of origami are reduced to solving systems of equations which describe the geometric properties of paper folds. We developed two software components: one that provides primitives to construct, manipulate and visualize paper folds and the other that solves the systems of equations. Using these components, we illustrate computer-supported origami construction and show the significance of the constraint functional logic programming paradigm in the program development.", "title": "" }, { "docid": "6e051906ec3deac14acb249ea4982d2e", "text": "Recent attempts to fabricate surfaces with custom reflectance functions boast impressive angular resolution, yet their spatial resolution is limited. In this paper we present a method to construct spatially varying reflectance at a high resolution of up to 220dpi, orders of magnitude greater than previous attempts, albeit with a lower angular resolution. The resolution of previous approaches is limited by the machining, but more fundamentally, by the geometric optics model on which they are built. Beyond a certain scale geometric optics models break down and wave effects must be taken into account. We present an analysis of incoherent reflectance based on wave optics and gain important insights into reflectance design. We further suggest and demonstrate a practical method, which takes into account the limitations of existing micro-fabrication techniques such as photolithography to design and fabricate a range of reflection effects, based on wave interference.", "title": "" }, { "docid": "1ecf01e0c9aec4159312406368ceeff0", "text": "Image phylogeny is the problem of reconstructing the structure that represents the history of generation of semantically similar images (e.g., near-duplicate images). Typical image phylogeny approaches break the problem into two steps: (1) estimating the dissimilarity between each pair of images and (2) reconstructing the phylogeny structure. Given that the dissimilarity calculation directly impacts the phylogeny reconstruction, in this paper, we propose new approaches to the standard formulation of the dissimilarity measure employed in image phylogeny, aiming at improving the reconstruction of the tree structure that represents the generational relationships between semantically similar images. These new formulations exploit a different method of color adjustment, local gradients to estimate pixel differences and mutual information as a similarity measure. The results obtained with the proposed formulation remarkably outperform the existing counterparts in the literature, allowing a much better analysis of the kinship relationships in a set of images, allowing for more accurate deployment of phylogeny solutions to tackle traitor tracing, copyright enforcement and digital forensics problems.", "title": "" }, { "docid": "65ffbc6ee36ae242c697bb81ff3be23a", "text": "Full-duplex hands-free telecommunication systems employ an acoustic echo canceler (AEC) to remove the undesired echoes that result from the coupling between a loudspeaker and a microphone. Traditionally, the removal is achieved by modeling the echo path impulse response with an adaptive finite impulse response (FIR) filter and subtracting an echo estimate from the microphone signal. It is not uncommon that an adaptive filter with a length of 50-300 ms needs to be considered, which makes an AEC highly computationally expensive. In this paper, we propose an echo suppression algorithm to eliminate the echo effect. Instead of identifying the echo path impulse response, the proposed method estimates the spectral envelope of the echo signal. The suppression is done by spectral modification-a technique originally proposed for noise reduction. It is shown that this new approach has several advantages over the traditional AEC. Properties of human auditory perception are considered, by estimating spectral envelopes according to the frequency selectivity of the auditory system, resulting in improved perceptual quality. A conventional AEC is often combined with a post-processor to reduce the residual echoes due to minor echo path changes. It is shown that the proposed algorithm is insensitive to such changes. Therefore, no post-processor is necessary. Furthermore, the new scheme is computationally much more efficient than a conventional AEC.", "title": "" }, { "docid": "95a102f45ff856d2064d8042b0b1a0ad", "text": "Diagnosis and monitoring of health is a very important task in health care industry. Due to time constraint people are not visiting hospitals, which could lead to lot of health issues in one instant of time. Priorly most of the health care systems have been developed to predict and diagnose the health of the patients by which people who are busy in their schedule can also monitor their health at regular intervals. Many studies have shown that early prediction is the best way to cure health because early diagnosis will help and alert the patients to know the health status. In this paper, we review the various Internet of Things (IoT) enable devices and its actual implementation in the area of health care children’s, monitoring of the patients etc. Further, this paper addresses how different innovations as server, ambient intelligence and sensors can be leveraged in health care context; determines how they can facilitate economies and societies in terms of suitable development. KeywordsInternet of Things (IoT);ambient intelligence; monitoring; innovations; leveraged. __________________________________________________*****_________________________________________________", "title": "" }, { "docid": "b9d8ea80169ac5a5c48fd631c9d5625a", "text": "Deep convolutional networks have achieved great success for image recognition. However, for action recognition in videos, their advantage over traditional methods is not so evident. We present a general and flexible video-level framework for learning action models in videos. This method, called temporal segment network (TSN), aims to model long-range temporal structures with a new segment-based sampling and aggregation module. This unique design enables our TSN to efficiently learn action models by using the whole action videos. The learned models could be easily adapted for action recognition in both trimmed and untrimmed videos with simple average pooling and multi-scale temporal window integration, respectively. We also study a series of good practices for the instantiation of TSN framework given limited training samples. Our approach obtains the state-the-of-art performance on four challenging action recognition benchmarks: HMDB51 (71.0%), UCF101 (94.9%), THUMOS14 (80.1%), and ActivityNet v1.2 (89.6%). Using the proposed RGB difference for motion models, our method can still achieve competitive accuracy on UCF101 (91.0 %) while running at 340 FPS. Furthermore, based on the temporal segment networks, we won the video classification track at the ActivityNet challenge 2016 among 24 teams, which demonstrates the effectiveness of TSN and the proposed good practices.", "title": "" }, { "docid": "3100f5d0ed870be38770caf729798624", "text": "Our research objective is to facilitate the identification of true input manipulation vulnerabilities via the combination of static analysis, runtime detection, and automatic testing. We propose an approach for SQL injection vulnerability detection, automated by a prototype tool SQLInjectionGen. We performed case studies on two small web applications for the evaluation of our approach compared to static analysis for identifying true SQL injection vulnerabilities. In our case study, SQLInjectionGen had no false positives, but had a small number of false negatives while the static analysis tool had a false positive for every vulnerability that was actually protected by a white or black list.", "title": "" }, { "docid": "7ae137752af46ecd4bf8957691069779", "text": "We measured contrast detection thresholds for a foveal Gabor signal flanked by two high contrast Gabor signals. The spatially localized target and masks enabled investigation of space dependent lateral interactions between foveal and neighboring spatial channels. Our data show a suppressive region extending to a radius of two wavelengths, in which the presence of the masking signals have the effect of increasing target threshold. Beyond this range a much larger facilitatory region (up to a distance of ten wavelengths) is indicated, in which contrast thresholds were found to decrease by up to a factor of two. The interactions between the foveal target and the flanking Gabor signals are spatial-frequency and orientation specific in both regions, but less specific in the suppression region.", "title": "" }, { "docid": "945cb86f3eec8305ead0fd72162e8240", "text": "In this paper, the design of an integrated portable device that can monitor heart rate (HR) continuously and send notifications through short message service (SMS) over the cellular network using Android application is presented. The primary goal of our device is to ensure medical attention within the first few critical hours of an ailment of the patient with poor heart condition, hence boost chances of his or her survival. In situations where there is an absence of doctor or clinic nearby (e.g., rural area) and where the patient cannot realize their actual poor heart condition, is where our implemented system is of paramount importance. The designed system shows the real time HR on the mobile screen through Android application continuously and if any abnormal HR of the patient is detected, the system will immediately send a message to the concerned doctors and relatives whose numbers were previously saved in the Android application. This device ensures nonstop monitoring for cardiac events along with notifying immediately when an emergency strikes.", "title": "" }, { "docid": "66f6ca5a7ed26e43a5e06fb2c218aa94", "text": "We design two compressed data structures for the full-text indexing problem that support efficient substring searches using roughly the space required for storing the text in compressed form.Our first compressed data structure retrieves the <i>occ</i> occurrences of a pattern <i>P</i>[1,<i>p</i>] within a text <i>T</i>[1,<i>n</i>] in <i>O</i>(<i>p</i> + <i>occ</i> log<sup>1+ε</sup> <i>n</i>) time for any chosen ε, 0<ε<1. This data structure uses at most 5<i>n</i><i>H</i><inf><i>k</i></inf>(<i>T</i>) + <i>o</i>(<i>n</i>) bits of storage, where <i>H</i><inf><i>k</i></inf>(<i>T</i>) is the <i>k</i>th order empirical entropy of <i>T</i>. The space usage is Θ(<i>n</i>) bits in the worst case and <i>o</i>(<i>n</i>) bits for compressible texts. This data structure exploits the relationship between suffix arrays and the Burrows--Wheeler Transform, and can be regarded as a <i>compressed suffix array</i>.Our second compressed data structure achieves <i>O</i>(<i>p</i>+<i>occ</i>) query time using <i>O</i>(<i>n</i><i>H</i><inf><i>k</i></inf>(<i>T</i>)log<sup>ε</sup> <i>n</i>) + <i>o</i>(<i>n</i>) bits of storage for any chosen ε, 0<ε<1. Therefore, it provides optimal <i>output-sensitive</i> query time using <i>o</i>(<i>n</i>log <i>n</i>) bits in the worst case. This second data structure builds upon the first one and exploits the interplay between two compressors: the Burrows--Wheeler Transform and the <i>LZ78</i> algorithm.", "title": "" }, { "docid": "f733125d8cd3d90ac7bf463ae93ca24a", "text": "Various online, networked systems offer a lightweight process for obtaining identities (e.g., confirming a valid e-mail address), so that users can easily join them. Such convenience comes with a price, however: with minimum effort, an attacker can subvert the identity management scheme in place, obtain a multitude of fake accounts, and use them for malicious purposes. In this work, we approach the issue of fake accounts in large-scale, distributed systems, by proposing a framework for adaptive identity management. Instead of relying on users' personal information as a requirement for granting identities (unlike existing proposals), our key idea is to estimate a trust score for identity requests, and price them accordingly using a proof of work strategy. The research agenda that guided the development of this framework comprised three main items: (i) investigation of a candidate trust score function, based on an analysis of users' identity request patterns, (ii) combination of trust scores and proof of work strategies (e.g. cryptograhic puzzles) for adaptively pricing identity requests, and (iii) reshaping of traditional proof of work strategies, in order to make them more resource-efficient, without compromising their effectiveness (in stopping attackers).", "title": "" }, { "docid": "3ed5ec863971e04523a7ede434eaa80d", "text": "This article reports on the design, implementation, and usage of the CourseMarker (formerly known as CourseMaster) courseware Computer Based Assessment (CBA) system at the University of Nottingham. Students use CourseMarker to solve (programming) exercises and to submit their solutions. CourseMarker returns immediate results and feedback to the students. Educators author a variety of exercises that benefit the students while offering practical benefits. To date, both educators and students have been hampered by CBA software that has been constructed to assess text-based or multiple-choice answers only. Although there exist a few CBA systems with some capability to automatically assess programming coursework, none assess Java programs and none are as flexible, architecture-neutral, robust, or secure as the CourseMarker CBA system.", "title": "" }, { "docid": "da1f4117851762bfb5ef80c0893248c3", "text": "The recently-developed WaveNet architecture (van den Oord et al., 2016a) is the current state of the art in realistic speech synthesis, consistently rated as more natural sounding for many different languages than any previous system. However, because WaveNet relies on sequential generation of one audio sample at a time, it is poorly suited to today’s massively parallel computers, and therefore hard to deploy in a real-time production setting. This paper introduces Probability Density Distillation, a new method for training a parallel feed-forward network from a trained WaveNet with no significant difference in quality. The resulting system is capable of generating high-fidelity speech samples at more than 20 times faster than real-time, a 1000x speed up relative to the original WaveNet, and capable of serving multiple English and Japanese voices in a production setting.", "title": "" }, { "docid": "b8e705c7dd974ee43b315d3146a0b149", "text": "The use of repeated measures, where the same subjects are tested under a number of conditions, has numerous practical and statistical benefits. For one thing it reduces the error variance caused by between-group individual differences, however, this reduction of error comes at a price because repeated measures designs potentially introduce covariation between experimental conditions (this is because the same people are used in each condition and so there is likely to be some consistency in their behaviour across conditions). In between-group ANOVA we have to assume that the groups we test are independent for the test to be accurate (Scariano & Davenport, 1987, have documented some of the consequences of violating this assumption). As such, the relationship between treatments in a repeated measures design creates problems with the accuracy of the test statistic. The purpose of this article is to explain, as simply as possible, the issues that arise in analysing repeated measures data with ANOVA: specifically, what is sphericity and why is it important? What is Sphericity?", "title": "" }, { "docid": "13173c37670511963b23a42a3cc7e36b", "text": "In patients having a short nose with a short septal length and/or severe columellar retraction, a septal extension graft is a good solution, as it allows the dome to move caudally and pushes down the columellar base. Fixing the medial crura of the alar cartilages to a septal extension graft leads to an uncomfortably rigid nasal tip and columella, and results in unnatural facial animation. Further, because of the relatively small and weak septal cartilage in the East Asian population, undercorrection of a short nose is not uncommon. To overcome these shortcomings, we have used the septal extension graft combined with a derotation graft. Among 113 patients who underwent the combined procedure, 82 patients had a short nose deformity alone; the remaining 31 patients had a short nose with columellar retraction. Thirty-two patients complained of nasal tip stiffness caused by a septal extension graft from previous operations. In addition to the septal extension graft, a derotation graft was used for bridging the gap between the alar cartilages and the septal extension graft for tip lengthening. Satisfactory results were obtained in 102 (90%) patients. Eleven (10%) patients required revision surgery. This combination method is a good surgical option for patients who have a short nose with small septal cartilages and do not have sufficient cartilage for tip lengthening by using a septal extension graft alone. It can also overcome the postoperative nasal tip rigidity of a septal extension graft.", "title": "" }, { "docid": "09e07f66760c1216e6e01841af2e48b7", "text": "Traditional approaches to rule-based information extraction (IE) have primarily been based on regular expression grammars. However, these grammar-based systems have difficulty scaling to large data sets and large numbers of rules. Inspired by traditional database research, we propose an algebraic approach to rule-based IE that addresses these scalability issues through query optimization. The operators of our algebra are motivated by our experience in building several rule-based extraction programs over diverse data sets. We present the operators of our algebra and propose several optimization strategies motivated by the text-specific characteristics of our operators. Finally we validate the potential benefits of our approach by extensive experiments over real-world blog data.", "title": "" }, { "docid": "f070e150ca71ac43d191ca1c3e2f2333", "text": "Weblog, one of the fastest growing user generated contents, often contains key learnings gleaned from people's past experiences which are really worthy to be well presented to other people. One of the key learnings contained in weblogs is often vented in the form of advice. In this paper, we aim to provide a methodology to extract sentences that reveal advices on weblogs. We observed our data to discover the characteristics of advices contained in weblogs. Based on this observation, we define our task as a classification problem using various linguistic features. We show that our proposed method significantly outperforms the baseline. The presence or absence of imperative mood expression appears to be the most important feature in this task. It is also worth noting that the work presented in this paper is the first attempt on mining advices from English data.", "title": "" }, { "docid": "9869f2a28b11a5f0a83127937408b0ac", "text": "With the advent of the Semantic Web, the field of domain ontology engineering has gained more and more importance. This innovative field may have a big impact on computer-based education and will certainly contribute to its development. This paper presents a survey on domain ontology engineering and especially domain ontology learning. The paper focuses particularly on automatic methods for ontology learning from texts. It summarizes the state of the art in natural language processing techniques and statistical and machine learning techniques for ontology extraction. It also explains how intelligent tutoring systems may benefit from this engineering and talks about the challenges that face the field.", "title": "" }, { "docid": "e5fc30045f458f84435363349d22204d", "text": "Today, root cause analysis of failures in data centers is mostly done through manual inspection. More often than not, cus- tomers blame the network as the culprit. However, other components of the system might have caused these failures. To troubleshoot, huge volumes of data are collected over the entire data center. Correlating such large volumes of diverse data collected from different vantage points is a daunting task even for the most skilled technicians. In this paper, we revisit the question: how much can you infer about a failure in the data center using TCP statistics collected at one of the endpoints? Using an agent that cap- tures TCP statistics we devised a classification algorithm that identifies the root cause of failure using this information at a single endpoint. Using insights derived from this classi- fication algorithm we identify dominant TCP metrics that indicate where/why problems occur in the network. We val- idate and test these methods using data that we collect over a period of six months in a production data center.", "title": "" }, { "docid": "8baa6af3ee08029f0a555e4f4db4e218", "text": "We introduce several probabilistic models for learning the lexicon of a semantic parser. Lexicon learning is the first step of training a semantic parser for a new application domain and the quality of the learned lexicon significantly affects both the accuracy and efficiency of the final semantic parser. Existing work on lexicon learning has focused on heuristic methods that lack convergence guarantees and require significant human input in the form of lexicon templates or annotated logical forms. In contrast, our probabilistic models are trained directly from question/answer pairs using EM and our simplest model has a concave objective that guarantees convergence to a global optimum. An experimental evaluation on a set of 4th grade science questions demonstrates that our models improve semantic parser accuracy (35-70% error reduction) and efficiency (4-25x more sentences per second) relative to prior work despite using less human input. Our models also obtain competitive results on GEO880 without any datasetspecific engineering.", "title": "" } ]
scidocsrr
7e45f0f26f2bdce07b23ce2c2383ec40
Does sexual selection explain human sex differences in aggression?
[ { "docid": "0688abcb05069aa8a0956a0bd1d9bf54", "text": "Sex differences in mortality rates stem from genetic, physiological, behavioral, and social causes that are best understood when integrated in an evolutionary life history framework. This paper investigates the Male-to-Female Mortality Ratio (M:F MR) from external and internal causes and across contexts to illustrate how sex differences shaped by sexual selection interact with the environment to yield a pattern with some consistency, but also with expected variations due to socioeconomic and other factors.", "title": "" } ]
[ { "docid": "ba8cddc6ed18f941ed7409524137c28c", "text": "This paper proposes Self-Imitation Learning (SIL), a simple off-policy actor-critic algorithm that learns to reproduce the agent’s past good decisions. This algorithm is designed to verify our hypothesis that exploiting past good experiences can indirectly drive deep exploration. Our empirical results show that SIL significantly improves advantage actor-critic (A2C) on several hard exploration Atari games and is competitive to the state-of-the-art count-based exploration methods. We also show that SIL improves proximal policy optimization (PPO) on MuJoCo tasks.", "title": "" }, { "docid": "88530d3d70df372b915556eab919a3fe", "text": "The airway mucosa is lined by a continuous epithelium comprised of multiple cell phenotypes, several of which are secretory. Secretions produced by these cells mix with a variety of macromolecules, ions and water to form a respiratory tract fluid that protects the more distal airways and alveoli from injury and infection. The present article highlights the structure of the mucosa, particularly its secretory cells, gives a synopsis of the structure of mucus, and provides new information on the localization of mucin (MUC) genes that determine the peptide sequence of the protein backbone of the glycoproteins, which are a major component of mucus. Airway secretory cells comprise the mucous, serous, Clara and dense-core granulated cells of the surface epithelium, and the mucous and serous acinar cells of the submucosal glands. Several transitional phenotypes may be found, especially during irritation or disease. Respiratory tract mucins constitute a heterogeneous group of high molecular weight, polydisperse richly glycosylated molecules: both secreted and membrane-associated forms of mucin are found. Several mucin (MUC) genes encoding the protein core of mucin have been identified. We demonstrate the localization of MUC gene expression to a number of distinct cell types and their upregulation both in response to experimentally administered lipopolysaccharide and cystic fibrosis.", "title": "" }, { "docid": "46f3f27a88b4184a15eeb98366e599ec", "text": "Radiomics is an emerging field in quantitative imaging that uses advanced imaging features to objectively and quantitatively describe tumour phenotypes. Radiomic features have recently drawn considerable interest due to its potential predictive power for treatment outcomes and cancer genetics, which may have important applications in personalized medicine. In this technical review, we describe applications and challenges of the radiomic field. We will review radiomic application areas and technical issues, as well as proper practices for the designs of radiomic studies.", "title": "" }, { "docid": "0d2f933b139f50ff9195118d9d1466aa", "text": "Ambient Intelligence (AmI) and Smart Environments (SmE) are based on three foundations: ubiquitous computing, ubiquitous communication and intelligent adaptive interfaces [41]. This type of systems consists of a series of interconnected computing and sensing devices which surround the user pervasively in his environment and are invisible to him, providing a service that is dynamically adapted to the interaction context, so that users can naturally interact with the system and thus perceive it as intelligent. To ensure such a natural and intelligent interaction, it is necessary to provide an effective, easy, safe and transparent interaction between the user and the system. With this objective, as an attempt to enhance and ease human-to-computer interaction, in the last years there has been an increasing interest in simulating human-tohuman communication, employing the so-called multimodal dialogue systems [46]. These systems go beyond both the desktop metaphor and the traditional speech-only interfaces by incorporating several communication modalities, such as speech, gaze, gestures or facial expressions. Multimodal dialogue systems offer several advantages. Firstly, they can make use of automatic recognition techniques to sense the environment allowing the user to employ different input modalities, some of these technologies are automatic speech recognition [62], natural language processing [12], face location and tracking [77], gaze tracking [58], lipreading recognition [13], gesture recognition [39], and handwriting recognition [78].", "title": "" }, { "docid": "f0f16472cdb6b52b05d1d324e55da081", "text": "We propose a new distributed algorithm for empirical risk minimization in machine learning. The algorithm is based on an inexact damped Newton method, where the inexact Newton steps are computed by a distributed preconditioned conjugate gradient method. We analyze its iteration complexity and communication efficiency for minimizing self-concordant empirical loss functions, and discuss the results for distributed ridge regression, logistic regression and binary classification with a smoothed hinge loss. In a standard setting for supervised learning, where the n data points are i.i.d. sampled and when the regularization parameter scales as 1/ √ n, we show that the proposed algorithm is communication efficient: the required round of communication does not increase with the sample size n, and only grows slowly with the number of machines.", "title": "" }, { "docid": "e32e17bb36f39d6020bced297b3989fe", "text": "Memory networks are a recently introduced model that combines reasoning, attention and memory for solving tasks in the areas of language understanding and dialogue -- where one exciting direction is the use of these models for dialogue-based recommendation. In this talk we describe these models and how they can learn to discuss, answer questions about, and recommend sets of items to a user. The ultimate goal of this research is to produce a full dialogue-based recommendation assistant. We will discuss recent datasets and evaluation tasks that have been built to assess these models abilities to see how far we have come.", "title": "" }, { "docid": "2f48ab4d20f0928837bf10d2f638fed3", "text": "Duchenne muscular dystrophy (DMD), a recessive sex-linked hereditary disorder, is characterized by degeneration, atrophy, and weakness of skeletal and cardiac muscle. The purpose of this study was to document the prevalence of abnormally low resting BP recordings in patients with DMD in our outpatient clinic. The charts of 31 patients with DMD attending the cardiology clinic at Rush University Medical Center were retrospectively reviewed. Demographic data, systolic, diastolic, and mean blood pressures along with current medications, echocardiograms, and documented clinical appreciation and management of low blood pressure were recorded in the form of 104 outpatient clinical visits. Blood pressure (BP) was classified as low if the systolic and/or mean BP was less than the fifth percentile for height for patients aged ≤17 years (n = 23). For patients ≥18 years (n = 8), systolic blood pressure (SBP) <90 mmHg or a mean arterial pressure (MAP) <60 mmHg was recorded as a low reading. Patients with other forms of myopathy or unclear diagnosis were excluded. Statistical analysis was done using PASW version 18. BP was documented at 103 (99.01 %) outpatient encounters. Low systolic and mean BP were recorded in 35 (33.7 %) encounters. This represented low recordings for 19 (61.3 %) out of a total 31 patients with two or more successive low recordings for 12 (38.7 %) patients. Thirty-one low BP encounters were in patients <18 years old. Hispanic patients accounted for 74 (71.2 %) visits and had low BP recorded in 32 (43.2 %) instances. The patients were non-ambulant in 71 (68.3 %) encounters. Out of 35 encounters with low BP, 17 patients (48.6 %) were taking heart failure medication. In instances when patients had low BP, 22 (66.7 %) out of 33 echocardiography encounters had normal left ventricular ejection fraction. Clinician comments on low BP reading were present in 11 (10.6 %) encounters, and treatment modification occurred in only 1 (1 %) patient. Age in years (p = .031) and ethnicity (p = .035) were independent predictors of low BP using stepwise multiple regression analysis. Low BP was recorded in a significant number of patient encounters in patients with DMD. Age 17 years or less and Hispanic ethnicity were significant predictors associated with low BP readings in our DMD cohort. Concomitant heart failure therapy was not a statistically significant association. There is a need for enhanced awareness of low BP in DMD patients among primary care and specialty physicians. The etiology and clinical impact of these findings are unclear but may impact escalation of heart failure therapy.", "title": "" }, { "docid": "3c1cc57db29b8c86de4f314163ccaca0", "text": "We are motivated by the need for a generic object proposal generation algorithm which achieves good balance between object detection recall, proposal localization quality and computational efficiency. We propose a novel object proposal algorithm, BING++, which inherits the virtue of good computational efficiency of BING [1] but significantly improves its proposal localization quality. At high level we formulate the problem of object proposal generation from a novel probabilistic perspective, based on which our BING++ manages to improve the localization quality by employing edges and segments to estimate object boundaries and update the proposals sequentially. We propose learning the parameters efficiently by searching for approximate solutions in a quantized parameter space for complexity reduction. We demonstrate the generalization of BING++ with the same fixed parameters across different object classes and datasets. Empirically our BING++ can run at half speed of BING on CPU, but significantly improve the localization quality by 18.5 and 16.7 percent on both VOC2007 and Microhsoft COCO datasets, respectively. Compared with other state-of-the-art approaches, BING++ can achieve comparable performance, but run significantly faster.", "title": "" }, { "docid": "7b463b290988262db44984a89846129c", "text": "We describe an integrated strategy for planning, perception, state-estimation and action in complex mobile manipulation domains based on planning in the belief space of probability distributions over states using hierarchical goal regression (pre-image back-chaining). We develop a vocabulary of logical expressions that describe sets of belief states, which are goals and subgoals in the planning process. We show that a relatively small set of symbolic operators can give rise to task-oriented perception in support of the manipulation goals. An implementation of this method is demonstrated in simulation and on a real PR2 robot, showing robust, flexible solution of mobile manipulation problems with multiple objects and substantial uncertainty.", "title": "" }, { "docid": "a1018c89d326274e4b71ffc42f4ebba2", "text": "We describe a method for improving the classification of short text strings using a combination of labeled training data plus a secondary corpus of unlabeled but related longer documents. We show that such unlabeled background knowledge can greatly decrease error rates, particularly if the number of examples or the size of the strings in the training set is small. This is particularly useful when labeling text is a labor-intensive job and when there is a large amount of information available about a particular problem on the World Wide Web. Our approach views the task as one of information integration using WHIRL, a tool that combines database functionalities with techniques from the information-retrieval literature.", "title": "" }, { "docid": "d2b545b4f9c0e7323760632c65206480", "text": "This brief presents a quantitative analysis of the operating characteristics of three-phase diode bridge rectifiers with ac-side reactance and constant-voltage loads. We focus on the case where the ac-side currents vary continuously (continuous ac-side conduction mode). This operating mode is of particular importance in alternators and generators, for example. Simple approximate expressions are derived for the line and output current characteristics as well as the input power factor. Expressions describing the necessary operating conditions for continuous ac-side conduction are also developed. The derived analytical expressions are applied to practical examples and both simulations and experimental results are utilized to validate the analytical results. It is shown that the derived expressions are far more accurate than calculations based on traditional constant-current models.", "title": "" }, { "docid": "afae709279cd8adeda2888089872d70e", "text": "One-class classification problemhas been investigated thoroughly for past decades. Among one of themost effective neural network approaches for one-class classification, autoencoder has been successfully applied for many applications. However, this classifier relies on traditional learning algorithms such as backpropagation to train the network, which is quite time-consuming. To tackle the slow learning speed in autoencoder neural network, we propose a simple and efficient one-class classifier based on extreme learning machine (ELM).The essence of ELM is that the hidden layer need not be tuned and the output weights can be analytically determined, which leads to much faster learning speed.The experimental evaluation conducted on several real-world benchmarks shows that the ELM based one-class classifier can learn hundreds of times faster than autoencoder and it is competitive over a variety of one-class classification methods.", "title": "" }, { "docid": "1c80fdc30b2b37443367dae187fbb376", "text": "The web is a catalyst for drawing people together around shared goals, but many groups never reach critical mass. It can thus be risky to commit time or effort to a goal: participants show up only to discover that nobody else did, and organizers devote significant effort to causes that never get off the ground. Crowdfunding has lessened some of this risk by only calling in donations when an effort reaches a collective monetary goal. However, it leaves unsolved the harder problem of mobilizing effort, time and participation. We generalize the concept into activation thresholds, commitments that are conditioned on others' participation. With activation thresholds, supporters only need to show up for an event if enough other people commit as well. Catalyst is a platform that introduces activation thresholds for on-demand events. For more complex coordination needs, Catalyst also provides thresholds based on time or role (e.g., a bake sale requiring commitments for bakers, decorators, and sellers). In a multi-month field deployment, Catalyst helped users organize events including food bank volunteering, on-demand study groups, and mass participation events like a human chess game. Our results suggest that activation thresholds can indeed catalyze a large class of new collective efforts.", "title": "" }, { "docid": "d013bf1a031dd8a4e546c963cd8bde84", "text": "Parallel text is the fuel that drives modern machine translation systems. The Web is a comprehensive source of preexisting parallel text, but crawling the entire web is impossible for all but the largest companies. We bring web-scale parallel text to the masses by mining the Common Crawl, a public Web crawl hosted on Amazon’s Elastic Cloud. Starting from nothing more than a set of common two-letter language codes, our open-source extension of the STRAND algorithm mined 32 terabytes of the crawl in just under a day, at a cost of about $500. Our large-scale experiment uncovers large amounts of parallel text in dozens of language pairs across a variety of domains and genres, some previously unavailable in curated datasets. Even with minimal cleaning and filtering, the resulting data boosts translation performance across the board for five different language pairs in the news domain, and on open domain test sets we see improvements of up to 5 BLEU. We make our code and data available for other researchers seeking to mine this rich new data resource.1", "title": "" }, { "docid": "f676c503bcf59a8916995a6db3908792", "text": "Bone tissue engineering has been increasingly studied as an alternative approach to bone defect reconstruction. In this approach, new bone cells are stimulated to grow and heal the defect with the aid of a scaffold that serves as a medium for bone cell formation and growth. Scaffolds made of metallic materials have preferably been chosen for bone tissue engineering applications where load-bearing capacities are required, considering the superior mechanical properties possessed by this type of materials to those of polymeric and ceramic materials. The space holder method has been recognized as one of the viable methods for the fabrication of metallic biomedical scaffolds. In this method, temporary powder particles, namely space holder, are devised as a pore former for scaffolds. In general, the whole scaffold fabrication process with the space holder method can be divided into four main steps: (i) mixing of metal matrix powder and space-holding particles; (ii) compaction of granular materials; (iii) removal of space-holding particles; (iv) sintering of porous scaffold preform. In this review, detailed procedures in each of these steps are presented. Technical challenges encountered during scaffold fabrication with this specific method are addressed. In conclusion, strategies are yet to be developed to address problematic issues raised, such as powder segregation, pore inhomogeneity, distortion of pore sizes and shape, uncontrolled shrinkage and contamination.", "title": "" }, { "docid": "3194a0dd979b668bb25afb10260c30d2", "text": "An octa-band antenna for 5.7-in mobile phones with the size of 80 mm <inline-formula> <tex-math notation=\"LaTeX\">$\\times6$ </tex-math></inline-formula> mm <inline-formula> <tex-math notation=\"LaTeX\">$\\times5.8$ </tex-math></inline-formula> mm is proposed and studied. The proposed antenna is composed of a coupled line, a monopole branch, and a ground branch. By using the 0.25-, 0.5-, and 0.75-wavelength modes, the lower band (704–960 MHz) and the higher band (1710–2690 MHz) are covered. The working mechanism is analyzed based on the S-parameters and the surface current distributions. The attractive merits of the proposed antenna are that the nonground portion height is only 6 mm and any lumped element is not used. A prototype of the proposed antenna is fabricated and measured. The measured −6 dB impedance bandwidths are 350 MHz (0.67–1.02 GHz) and 1.27 GHz (1.65–2.92 GHz) at the lower and higher bands, respectively, which can cover the LTE700, GSM850, GSM900, GSM1800, GSM1900, UMTS, LTE2300, and LTE2500 bands. The measured patterns, gains, and efficiencies are presented.", "title": "" }, { "docid": "8bf7524cf8f4696833cfc3d7b5d57349", "text": "This article is concerned with the design, implementation and control of a redundant robotic tool for Minimal Invasive Surgical (MIS) operations. The robotic tool is modular, comprised of identical stages of dual rotational Degrees of Freedom (DoF). An antagonistic tendon-driven mechanism using two DC-motors in a puller-follower configuration is used for each DoF. The inherent Coulomb friction is compensated using an adaptive scheme while varying the follower's reaction. Preliminary experimental results are provided to investigate the efficiency of the robot in typical surgical manoeuvres.", "title": "" }, { "docid": "408696a41684af20733b25833e741259", "text": "We propose a method for accurate 3D shape reconstruction using uncalibrated multiview photometric stereo. A coarse mesh reconstructed using multiview stereo is first parameterized using a planar mesh parameterization technique. Subsequently, multiview photometric stereo is performed in the 2D parameter domain of the mesh, where all geometric and photometric cues from multiple images can be treated uniformly. Unlike traditional methods, there is no need for merging view-dependent surface normal maps. Our key contribution is a new photometric stereo based mesh refinement technique that can efficiently reconstruct meshes with extremely fine geometric details by directly estimating a displacement texture map in the 2D parameter domain. We demonstrate that intricate surface geometry can be reconstructed using several challenging datasets containing surfaces with specular reflections, multiple albedos and complex topologies.", "title": "" }, { "docid": "413b9fe872843974cc4c1fcb9839ce0e", "text": "1. I N T R O D U C T I O N Despite the long history of machine translation projects, and the well-known effects that evaluations such as the ALPAC Report (Pierce et al., 1966) have had on that history, optimal MT evaluation methodologies remain elusive. This is perhaps due in part to the subjectivity inherent in judging the quality of any translation output (human or machine). The difficulty also lies in the heterogeneity of MT language pairs, computational approaches, and intended end-use. The DARPA machine translation initiative is faced with all of these issues in evaluation, and so requires a suite of evaluation methodologies which minimize subjectivity and transcend the heterogeneity problems. At the same time, the initiative seeks to formulate this suite in such a way that it is economical to administer and portable to other MT development initiatives. This paper describes an evaluation of three research MT systems along with benchmark haman and external MT outputs. Two sets of evaluations were performed, one using a relatively complex suite of methodologies, and the other using a simpler set on the same data. The test procedure is described, along The authors would like to express their gratitude to Michael Naber for his assistance in compiling, expressing and interpreting data. with a comparison of the results of the different methodologies.", "title": "" }, { "docid": "8e03f4410676fb4285596960880263e9", "text": "Fuzzy computing (FC) has made a great impact in capturing human domain knowledge and modeling non-linear mapping of input-output space. In this paper, we describe the design and implementation of FC systems for detection of money laundering behaviors in financial transactions and monitoring of distributed storage system load. Our objective is to demonstrate the power of FC for real-world applications which are characterized by imprecise, uncertain data, and incomplete domain knowledge. For both applications, we designed fuzzy rules based on experts’ domain knowledge, depending on money laundering scenarios in transactions or the “health” of a distributed storage system. In addition, we developped a generic fuzzy inference engine and contributed to the open source community.", "title": "" } ]
scidocsrr
e7978930a05651b4d3283f336be1a327
TabMCQ: A Dataset of General Knowledge Tables and Multiple-choice Questions
[ { "docid": "ed0b19511e0c8fa14a9a089a72bb5145", "text": "We leverage crowd wisdom for multiple-choice question answering, and employ lightweight machine learning techniques to improve the aggregation accuracy of crowdsourced answers to these questions. In order to develop more effective aggregation methods and evaluate them empirically, we developed and deployed a crowdsourced system for playing the “Who wants to be a millionaire?” quiz show. Analyzing our data (which consist of more than 200,000 answers), we find that by just going with the most selected answer in the aggregation, we can answer over 90% of the questions correctly, but the success rate of this technique plunges to 60% for the later/harder questions in the quiz show. To improve the success rates of these later/harder questions, we investigate novel weighted aggregation schemes for aggregating the answers obtained from the crowd. By using weights optimized for reliability of participants (derived from the participants’ confidence), we show that we can pull up the accuracy rate for the harder questions by 15%, and to overall 95% average accuracy. Our results provide a good case for the benefits of applying machine learning techniques for building more accurate crowdsourced question answering systems.", "title": "" }, { "docid": "718a1eb80fc3f44523ebbe797a90ade3", "text": "We present the design of a structured search engine which returns a multi-column table in response to a query consisting of keywords describing each of its columns. We answer such queries by exploiting the millions of tables on the Web because these are much richer sources of structured knowledge than free-format text. However, a corpus of tables harvested from arbitrary HTML web pages presents huge challenges of diversity and redundancy not seen in centrally edited knowledge bases. We concentrate on one concrete task in this paper. Given a set of Web tables T1, . . . , Tn, and a query Q with q sets of keywords Q1, . . . , Qq, decide for each Ti if it is relevant to Q and if so, identify the mapping between the columns of Ti and query columns. We represent this task as a graphical model that jointly maps all tables by incorporating diverse sources of clues spanning matches in different parts of the table, corpus-wide co-occurrence statistics, and content overlap across table columns. We define a novel query segmentation model for matching keywords to table columns, and a robust mechanism of exploiting content overlap across table columns. We design efficient inference algorithms based on bipartite matching and constrained graph cuts to solve the joint labeling task. Experiments on a workload of 59 queries over a 25 million web table corpus shows significant boost in accuracy over baseline IR methods.", "title": "" } ]
[ { "docid": "4bb55e3a43edc926836d49a0028201dc", "text": "In order to develop robot systems that can interact with untrained, naïve human users, it is important to understand how people – from different age groups – perceive a given robot system and which features might be relevant for this. While existing studies generally use questionnaires/interviews and/or coding schemes rendering either abstract categories or single features of individual behaviour towards a robot, we suggest to use a different methodological approach: to use the concepts and methodological tools from Ethnomethodological Conversation Analysis (EM/CA). Investigating video data from a study in which users – here: infants 3 to 8 years old – play with the toy robot Pleo, we show that and how (1) a user’s perception, categorization and re-interpretation of a robot system emerges step by step during and from the interaction with the system, and (2) how the user’s attempts to establish coordinated ‘sequences of action’ play a central role in this. The results of our initial exploratory case analysis are discussed in the light of studies which suggest that, in infants, robotic pets seem to blur foundational ontological categories, such as animate vs. inanimate. 12", "title": "" }, { "docid": "8a9dcb0e5f159c9373645fe85546ef99", "text": "BACKGROUND AND OBJECTIVES\nLaparoscopic inguinal hernia repair has become increasingly popular as an alternative to open surgery. The purpose of this study was to evaluate the safety and effectiveness of the laparoscopic total extraperitoneal procedure with the use of staple fixation and polypropylene mesh.\n\n\nMETHODS\nA retrospective chart review examined outcomes of 1240 laparoscopic hernia operations in 783 patients, focusing on intraoperative and early postoperative complications, pain, and time until return to work and normal physical activities.\n\n\nRESULTS\nThere were no intraoperative complications in this series; 106 patients experienced early postoperative complications across 8 evaluated categories: urinary retention (4.1%), seroma (3.0%), testicular/hemiscrotal swelling (1.9%), testicular atrophy (0%), hydrocele (0.6%), mesh infection (0.1%), and neurological symptoms (transient, 1.0%; persistent, 0.2%). Patients used an average of 5.6 Percocet pills after the procedure, and mean times until return to work and normal activities, including their routine exercise regimen, were 3.0 and 3.8 days, respectively.\n\n\nCONCLUSION\nComplication rates and convalescence times were considered equivalent or superior to those found in other studies assessing both laparoscopic and open techniques. The usage of multiple Endostaples did not result in increased neurologic complications in the early postoperative period when compared with findings in the literature. In the hands of an experienced surgeon, total extraperitoneal repair is a safe, effective alternative to open inguinal hernia repair.", "title": "" }, { "docid": "a81dd6b039197a6657e566d137808c69", "text": "We introduce a new form of low-cost 3D printer to print interactive electromechanical objects with wound in place coils. At the heart of this printer is a mechanism for depositing wire within a five degree of freedom (5DOF) fused deposition modeling (FDM) 3D printer. Copper wire can be used with this mechanism to form coils which induce magnetic fields as a current is passed through them. Soft iron wire can additionally be used to form components with high magnetic permeability which are thus able to shape and direct these magnetic fields to where they are needed. When fabricated with structural plastic elements, this allows simple but complete custom electromagnetic devices to be 3D printed. As examples, we demonstrate the fabrication of a solenoid actuator for the arm of a Lucky Cat figurine, a 6-pole motor stepper stator, a reluctance motor rotor and a Ferrofluid display. In addition, we show how printed coils which generate small currents in response to user actions can be used as input sensors in interactive devices.", "title": "" }, { "docid": "5bce1b4fb024307bdad27d79f6e26b45", "text": "SMS-based One-Time Passwords (SMS OTP) were introduced to counter phishing and other attacks against Internet services such as online banking. Today, SMS OTPs are commonly used for authentication and authorization for many different applications. Recently, SMS OTPs have come under heavy attack, especially by smartphone trojans. In this paper, we analyze the security architecture of SMS OTP systems and study attacks that pose a threat to Internet-based authentication and authorization services. We determined that the two foundations SMS OTP is built on, cellular networks and mobile handsets, were completely different at the time when SMS OTP was designed and introduced. Throughout this work, we show why SMS OTP systems cannot be considered secure anymore. Based on our findings, we propose mechanisms to secure SMS OTPs against common attacks and specifically against smartphone trojans.", "title": "" }, { "docid": "f27b71ef83348db73b47c3d333fdbb78", "text": "OBJECTIVE: To generate normative data on the Symbol Digit Modalities Test (SDMT) across 11 countries in Latin America, with country-specific adjustments for gender, age, and education, where appropriate. METHOD: The sample consisted of 3,977 healthy adults who were recruited from Argentina, Bolivia, Chile, Cuba, El Salvador, Guatemala, Honduras, Mexico, Paraguay, Peru, and, Puerto Rico. Each subject was administered the SDMT as part of a larger neuropsychological battery. A standardized five-step statistical procedure was used to generate the norms. RESULTS: The final multiple linear regression models explained 29–56% of the variance in SDMT scores. Although there were gender differences on the SDMT in Mexico, Honduras, Paraguay, and Guatemala, none of the four countries had an effect size greater than 0.3. As a result, gender-adjusted norms were not generated. CONCLUSIONS: This is the first normative multicenter study conducted in Latin America to create norms for the SDMT; this study will have an impact on the future practice of neuropsychology throughout the global region.", "title": "" }, { "docid": "987f221f99b1638bb5bf0542dbc98c3f", "text": "Pain, whether caused by physical injury or social rejection, is an inevitable part of life. These two types of pain-physical and social-may rely on some of the same behavioral and neural mechanisms that register pain-related affect. To the extent that these pain processes overlap, acetaminophen, a physical pain suppressant that acts through central (rather than peripheral) neural mechanisms, may also reduce behavioral and neural responses to social rejection. In two experiments, participants took acetaminophen or placebo daily for 3 weeks. Doses of acetaminophen reduced reports of social pain on a daily basis (Experiment 1). We used functional magnetic resonance imaging to measure participants' brain activity (Experiment 2), and found that acetaminophen reduced neural responses to social rejection in brain regions previously associated with distress caused by social pain and the affective component of physical pain (dorsal anterior cingulate cortex, anterior insula). Thus, acetaminophen reduces behavioral and neural responses associated with the pain of social rejection, demonstrating substantial overlap between social and physical pain.", "title": "" }, { "docid": "777243cb514414dd225a9d5f41dc49b7", "text": "We have built and tested a decision tool which will help organisations properly select one business process maturity model (BPMM) over another. This prototype consists of a novel questionnaire with decision criteria for BPMM selection, linked to a unique data set of 69 BPMMs. Fourteen criteria (questions) were elicited from an international Delphi study, and weighed by the analytical hierarchy process. Case studies have shown (non-)profit and academic applications. Our purpose was to describe criteria that enable an informed BPMM choice (conform to decision-making theories, rather than ad hoc). Moreover, we propose a design process for building BPMM decision tools. 2013 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "d58624091f0b7bdc307de1e7003cb82b", "text": "Rotor eddy current losses are one of the main reasons of permanent magnet demagnetization in high-speed permanent magnet machines. In this paper the rotor eddy current losses of high-speed permanent magnet machines with different slotless windings have been analysed. The analysis of the losses was performed using 2D and 3D analytical models. In the study, test machines with different windings and the same torque production capability have been analysed. Presented paper shows the dependency of rotor eddy current losses on sine- and square-wave PWM supply voltages and rotor sleeve properties. Several recommendations for reduction of rotor eddy current losses in high-speed permanent magnet machines are given.", "title": "" }, { "docid": "7c950863f51cbce128a37e50d78ec25f", "text": "We explore efficient neural architecture search methods and show that a simple yet powerful evolutionary algorithm can discover new architectures with excellent performance. Our approach combines a novel hierarchical genetic representation scheme that imitates the modularized design pattern commonly adopted by human experts, and an expressive search space that supports complex topologies. Our algorithm efficiently discovers architectures that outperform a large number of manually designed models for image classification, obtaining top-1 error of 3.6% on CIFAR-10 and 20.3% when transferred to ImageNet, which is competitive with the best existing neural architecture search approaches. We also present results using random search, achieving 0.3% less top-1 accuracy on CIFAR-10 and 0.1% less on ImageNet whilst reducing the search time from 36 hours down to 1 hour.", "title": "" }, { "docid": "065c452e602749a27f96941f961239a3", "text": "Electroencephalographic (EEG) data were collected from a sample of institutionalized infants and young children in Bucharest, Romania, and were compared with EEG data from age-matched children from the local community who had never been institutionalized and who were living with their families in the Bucharest area. Compared with the never-institutionalized group, the institutionalized group showed a pattern of increased low-frequency (theta) power in posterior scalp regions and decreased high-frequency (alpha and beta) power, particularly at frontal and temporal electrode sites. This finding is consistent with EEG studies of children facing environmental adversity and children with learning disorders. The institutionalized group also showed less marked hemispheric EEG asymmetries than the never-institutionalized group, particularly in the temporal region. The results are discussed in the context of two models: that the pattern of EEG in the institutionalized children reflects a maturational lag in nervous system development, or that it reflects tonic cortical hypoactivation.", "title": "" }, { "docid": "9a7a6ba930e12010ed0398fd687e821c", "text": "With the recent renaissance of deep convolutional neural networks (CNNs), encouraging breakthroughs have been achieved on the supervised recognition tasks, where each class has sufficient and fully annotated training data. However, to scale the recognition to a large number of classes with few or no training samples for each class remains an unsolved problem. One approach is to develop models capable of recognizing unseen categories without any training instances, or zero-shot recognition/learning. This article provides a comprehensive review of existing zero-shot recognition techniques covering various aspects ranging from representations of models, data sets, and evaluation settings. We also overview related recognition tasks including one-shot and open-set recognition, which can be used as natural extensions of zero-shot recognition when a limited number of class samples become available or when zero-shot recognition is implemented in a real-world setting. We highlight the limitations of existing approaches and point out future research directions in this existing new research area.", "title": "" }, { "docid": "b1c0fb9a020d8bc85b23f696586dd9d3", "text": "Most instances of real-life language use involve discourses in which several sentences or utterances are coherently linked through the use of repeated references. Repeated reference can take many forms, and the choice of referential form has been the focus of much research in several related fields. In this article we distinguish between three main approaches: one that addresses the ‘why’ question – why are certain forms used in certain contexts; one that addresses the ‘how’ question – how are different forms processed; and one that aims to answer both questions by seriously considering both the discourse function of referential expressions, and the cognitive mechanisms that underlie their processing cost. We argue that only the latter approach is capable of providing a complete view of referential processing, and that in so doing it may also answer a more profound ‘why’ question – why does language offer multiple referential forms. Coherent discourse typically involves repeated references to previously mentioned referents, and these references can be made with different forms. For example, a person mentioned in discourse can be referred to by a proper name (e.g., Bill), a definite description (e.g., the waiter), or a pronoun (e.g., he). When repeated reference is made to a referent that was mentioned in the same sentence, the choice and processing of referential form may be governed by syntactic constraints such as binding principles (Chomsky 1981). However, in many cases of repeated reference to a referent that was mentioned in the same sentence, and in all cases of repeated reference across sentences, the choice and processing of referential form reflects regular patterns and preferences rather than strong syntactic constraints. The present article focuses on the factors that underlie these patterns. Considerable research in several disciplines has aimed to explain how speakers and writers choose which form they should use to refer to objects and events in discourse, and how listeners and readers process different referential forms (e.g., Chafe 1976; Clark & Wilkes 1986; Kintsch 1988; Gernsbacher 1989; Ariel 1990; Gordon, Grosz & Gilliom 1993; Gundel, Hedberg & Zacharski 1993; Garrod & Sanford 1994; Gordon & Hendrick 1998; Almor 1999; Cowles & Garnham 2005). One of the central observations in this research is that there exists an inverse relation between the specificity of the referential", "title": "" }, { "docid": "f6806ee7aa124c6395f3c7e320229afd", "text": "A high switching frequency multi-phase buck converter architecture using a time-based compensator is presented. Efficiency degradation due to mismatch between the phases is mitigated by generating precisely matched duty-cycles by combining a time-based multi-phase generator (MPG) with a time-based PID compensator (T-PID). The proposed approach obviates the need for a complex current sensing and calibration circuitry needed to implement active current sharing in an analog controller. It also eliminates the need for a high resolution analog-to-digital converter and digital pulse width modulator needed for implementing passive current sharing in a digital controller. Fabricated in a 65 nm CMOS process, the prototype multi-phase buck converter occupies an active area of 0.32 mm2, of which the controller occupies only 0.04 mm2. The converter operates over a wide range of switching frequencies (30-70 MHz) and regulates output to any desired voltage in the range of 0.6 V to 1.5 V from 1.8 V input voltage. With a 400 mA step in the load current, the settling time is less than 0.6 μs and the measured duty-cycle mismatch is less than 0.48%. Better than 87% peak efficiency is achieved while consuming a quiescent current of only 3 μA/MHz.", "title": "" }, { "docid": "9cedc3f1a04fa51fb8ce1cf0cf01fbc3", "text": "OBJECTIVES:The objective of this study was to provide updated explicit and relevant consensus statements for clinicians to refer to when managing hospitalized adult patients with acute severe ulcerative colitis (UC).METHODS:The Canadian Association of Gastroenterology consensus group of 23 voting participants developed a series of recommendation statements that addressed pertinent clinical questions. An iterative voting and feedback process was used to do this in conjunction with systematic literature reviews. These statements were brought to a formal consensus meeting held in Toronto, Ontario (March 2010), when each statement was discussed, reformulated, voted upon, and subsequently revised until group consensus (at least 80% agreement) was obtained. The modified GRADE (Grading of Recommendations Assessment, Development, and Evaluation) criteria were used to rate the strength of recommendations and the quality of evidence.RESULTS:As a result of the iterative process, consensus was reached on 21 statements addressing four themes (General considerations and nutritional issues, Steroid use and predictors of steroid failure, Cyclosporine and infliximab, and Surgical issues).CONCLUSIONS:Key recommendations for the treatment of hospitalized patients with severe UC include early escalation to second-line medical therapy with either infliximab or cyclosporine in individuals in whom parenteral steroids have failed after 72 h. These agents should be used in experienced centers where appropriate support is available. Sequential therapy with cyclosporine and infliximab is not recommended. Surgery is an option when first-line steroid therapy fails, and is indicated when second-line medical therapy fails and/or when complications arise during the hospitalization.", "title": "" }, { "docid": "4e2dba807f4650b520b0337e74eae0e3", "text": "Gliomas are primary brain tumors arising from glial cells. Gliomas can be classified into different histopathologic grades according to World Health Oraganization (WHO) grading system which represents malignancy. In this paper, we present a method to predict the grades of Gliomas using Radiomics imaging features. MICCAI Brain Tumor Segmentation Challenge (BRATs 2015) training data, its segmentation ground truth and the ground truth labels were used for this work. 45 radiomics features based on histogram, shape and gray-level co-occurrence matrix (GLCM) were extracted from each FLAIR, T1, T1-Contrast, T2 image to quantify the property of Gliomas. Significant features among 180 features were selected through L1-norm regularization (LASSO). Based on LASSO coefficient and selected feature values, we computed a LASSO score and gliomas were classified into low-grade glimoa (LGG) or high-grade glimoa (HGG) through logistic regression. Classification result was validated by a 10-fold cross validation. Our method achieved accuracy of 0.8981, sensitivity of 0.8889, specificity of 0.9074, and area under the curve (AUC) = 0.8870.", "title": "" }, { "docid": "9a91945c24923d571f99998aaa9a9305", "text": "Automatic text summarization is widely regarded as the highly difficult problem, partially because of the lack of large text summarization data set. Due to the great challenge of constructing the large scale summaries for full text, in this paper, we introduce a large corpus of Chinese short text summarization dataset constructed from the Chinese microblogging website Sina Weibo, which is released to the public1. This corpus consists of over 2 million real Chinese short texts with short summaries given by the author of each text. We also manually tagged the relevance of 10,666 short summaries with their corresponding short texts. Based on the corpus, we introduce recurrent neural network for the summary generation and achieve promising results, which not only shows the usefulness of the proposed corpus for short text summarization research, but also provides a baseline for further research on this topic.", "title": "" }, { "docid": "7ac42bef7a9e0c8bd33f359a157f24e0", "text": "Monte Carlo tree search (MCTS) is a heuristic search method that is used to efficiently search decision trees. The method is particularly efficient in searching trees with a high branching factor. MCTS has a number of advantages over traditional tree search algorithms like simplicity, adaptability etc. This paper is a study of existing literature on different types of MCTS, specifically on using Genetic Algorithms with MCTS. It studies the advantages and disadvantages of this approach, and applies an enhanced variant to Gomoku, a board game with a high branching factor.", "title": "" }, { "docid": "5da1f0692a71e4dde4e96009b99e0c13", "text": "The McKibben artificial muscle is a pneumatic actuator whose properties include a very high force to weight ratio. This characteristic makes it very attractive for a wide range of applications such as mobile robots and prosthetic appliances for the disabled. Typical applications often require a significant number of repeated contractions and extensions or cycles of the actuator. This repeated action leads to fatigue and failure of the actuator, yielding a life span that is often shorter than its more common robotic counterparts such as electric motors or pneumatic cylinders. In this paper, we develop a model that predicts the maximum number of life cycles of the actuator based on available uniaxial tensile properties of the actuator’s inner bladder. Experimental results, which validate the model, reveal McKibben actuators fabricated with natural latex rubber bladders have a fatigue limit 24 times greater than actuators fabricated with synthetic silicone rubber at large contraction ratios.", "title": "" }, { "docid": "47c6de1c81b484204abfbd1f070ad03f", "text": "Ti-based metal-organic frameworks (MOFs) are demonstrated as promising photosensitizers for photoelectrochemical (PEC) water splitting. Photocurrents of TiO2 nano wire photoelectrodes can be improved under visible light through sensitization with aminated Ti-based MOFs. As a host, other sensitizers or catalysts such as Au nanoparticles can be incorporated into the MOF layer thus further improving the PEC water splitting efficiency.", "title": "" }, { "docid": "346349308d49ac2d3bb1cfa5cc1b429c", "text": "The prevalent approach to sequence to sequence learning maps an input sequence to a variable length output sequence via recurrent neural networks. We introduce an architecture based entirely on convolutional neural networks.1 Compared to recurrent models, computations over all elements can be fully parallelized during training and optimization is easier since the number of non-linearities is fixed and independent of the input length. Our use of gated linear units eases gradient propagation and we equip each decoder layer with a separate attention module. We outperform the accuracy of the deep LSTM setup of Wu et al. (2016) on both WMT’14 EnglishGerman and WMT’14 English-French translation at an order of magnitude faster speed, both on GPU and CPU.", "title": "" } ]
scidocsrr
19f8b598960e1c072f368b92b18620c8
Analyzing Opinion Spammers’ Network Behavior in Online Review Systems
[ { "docid": "02edc26b93581e84de950fe11e04d5fc", "text": "Opinionated social media such as product reviews are now widely used by individuals and organizations for their decision making. However, due to the reason of profit or fame, people try to game the system by opinion spamming (e.g., writing fake reviews) to promote or demote some target products. For reviews to reflect genuine user experiences and opinions, such spam reviews should be detected. Prior works on opinion spam focused on detecting fake reviews and individual fake reviewers. However, a fake reviewer group (a group of reviewers who work collaboratively to write fake reviews) is even more damaging as they can take total control of the sentiment on the target product due to its size. This paper studies spam detection in the collaborative setting, i.e., to discover fake reviewer groups. The proposed method first uses a frequent itemset mining method to find a set of candidate groups. It then uses several behavioral models derived from the collusion phenomenon among fake reviewers and relation models based on the relationships among groups, individual reviewers, and products they reviewed to detect fake reviewer groups. Additionally, we also built a labeled dataset of fake reviewer groups. Although labeling individual fake reviews and reviewers is very hard, to our surprise labeling fake reviewer groups is much easier. We also note that the proposed technique departs from the traditional supervised learning approach for spam detection because of the inherent nature of our problem which makes the classic supervised learning approach less effective. Experimental results show that the proposed method outperforms multiple strong baselines including the state-of-the-art supervised classification, regression, and learning to rank algorithms.", "title": "" }, { "docid": "646097feed29f603724f7ec6b8bbeb8b", "text": "Online reviews provide valuable information about products and services to consumers. However, spammers are joining the community trying to mislead readers by writing fake reviews. Previous attempts for spammer detection used reviewers' behaviors, text similarity, linguistics features and rating patterns. Those studies are able to identify certain types of spammers, e.g., those who post many similar reviews about one target entity. However, in reality, there are other kinds of spammers who can manipulate their behaviors to act just like genuine reviewers, and thus cannot be detected by the available techniques. In this paper, we propose a novel concept of a heterogeneous review graph to capture the relationships among reviewers, reviews and stores that the reviewers have reviewed. We explore how interactions between nodes in this graph can reveal the cause of spam and propose an iterative model to identify suspicious reviewers. This is the first time such intricate relationships have been identified for review spam detection. We also develop an effective computation method to quantify the trustiness of reviewers, the honesty of reviews, and the reliability of stores. Different from existing approaches, we don't use review text information. Our model is thus complementary to existing approaches and able to find more difficult and subtle spamming activities, which are agreed upon by human judges after they evaluate our results.", "title": "" }, { "docid": "2b1f85f35d6609b2538d920bdffc46c6", "text": "Different real-world applications have varying definitions of suspicious behaviors. Detection methods often look for the most suspicious parts of the data by optimizing scores, but quantifying the suspiciousness of a behavioral pattern is still an open issue.", "title": "" } ]
[ { "docid": "e74298e5bfd1cde8aaed2465cfb6ed33", "text": "We introduce a new low-distortion embedding of l<sub>2</sub><sup>d</sup> into l<sub>p</sub><sup>O(log n)</sup> (p=1,2), called the <i>Fast-Johnson-Linden-strauss-Transform</i>. The FJLT is faster than standard random projections and just as easy to implement. It is based upon the preconditioning of a sparse projection matrix with a randomized Fourier transform. Sparse random projections are unsuitable for low-distortion embeddings. We overcome this handicap by exploiting the \"Heisenberg principle\" of the Fourier transform, ie, its local-global duality. The FJLT can be used to speed up search algorithms based on low-distortion embeddings in l<sub>1</sub> and l<sub>2</sub>. We consider the case of approximate nearest neighbors in l<sub>2</sub><sup>d</sup>. We provide a faster algorithm using classical projections, which we then further speed up by plugging in the FJLT. We also give a faster algorithm for searching over the hypercube.", "title": "" }, { "docid": "a5879d5e7934380913cd2683ba2525b9", "text": "This paper deals with the design & development of a theft control system for an automobile, which is being used to prevent/control the theft of a vehicle. The developed system makes use of an embedded system based on GSM technology. The designed & developed system is installed in the vehicle. An interfacing mobile is also connected to the microcontroller, which is in turn, connected to the engine. Once, the vehicle is being stolen, the information is being used by the vehicle owner for further processing. The information is passed onto the central processing insurance system, where by sitting at a remote place, a particular number is dialed by them to the interfacing mobile that is with the hardware kit which is installed in the vehicle. By reading the signals received by the mobile, one can control the ignition of the engine; say to lock it or to stop the engine immediately. Again it will come to the normal condition only after entering a secured password. The owner of the vehicle & the central processing system will know this secured password. The main concept in this design is introducing the mobile communications into the embedded system. The designed unit is very simple & low cost. The entire designed unit is on a single chip. When the vehicle is stolen, owner of vehicle may inform to the central processing system, then they will stop the vehicle by just giving a ring to that secret number and with the help of SIM tracking knows the location of vehicle and informs to the local police or stops it from further movement.", "title": "" }, { "docid": "a14b09005a7c7ccd5c6cb49b39c83a91", "text": "We report the case of a 53-years-old patient, known to have coronary artery disease, presenting with typical angina at rest with normal ECG and laboratory findings. His angina is relieved by sublingual nitroglycerin. He had undergone a cardiac catheterisation two weeks prior to his presentation for the same complaints. It showed nonsignificant coronary lesions. Another catheterisation was performed during his current admission. He developed coronary spasm during the procedure, still with no ECG changes. The spasm was reversed by administration of 2 mg of intracoronary isosorbide dinitrate. Variant (Prinzmetal's) angina was diagnosed in the absence of electrical ECG changes during pain episodes.", "title": "" }, { "docid": "126b52ab2e2585eabf3345ef7fb39c51", "text": "We propose a method to build in real-time animated 3D head models using a consumer-grade RGB-D camera. Our framework is the first one to provide simultaneously comprehensive facial motion tracking and a detailed 3D model of the user's head. Anyone's head can be instantly reconstructed and his facial motion captured without requiring any training or pre-scanning. The user starts facing the camera with a neutral expression in the first frame, but is free to move, talk and change his face expression as he wills otherwise. The facial motion is tracked using a blendshape representation while the fine geometric details are captured using a Bump image mapped over the template mesh. We propose an efficient algorithm to grow and refine the 3D model of the head on-the-fly and in real-time. We demonstrate robust and high-fidelity simultaneous facial motion tracking and 3D head modeling results on a wide range of subjects with various head poses and facial expressions. Our proposed method offers interesting possibilities for animation production and 3D video telecommunications.", "title": "" }, { "docid": "d8bdaaceba4fa1422244e043d2b6c78e", "text": "We consider the problem of clustering observations using a potentially large set of features. One might expect that the true underlying clusters present in the data differ only with respect to a small fraction of the features, and will be missed if one clusters the observations using the full set of features. We propose a novel framework for sparse clustering, in which one clusters the observations using an adaptively chosen subset of the features. The method uses a lasso-type penalty to select the features. We use this framework to develop simple methods for sparse K-means and sparse hierarchical clustering. A single criterion governs both the selection of the features and the resulting clusters. These approaches are demonstrated on simulated data and on genomic data sets.", "title": "" }, { "docid": "9badb6e864118f1782d86486f6df9ff3", "text": "The genera Opechona Looss and Prodistomum Linton are redefined: the latter is re-established, its diagnostic character being the lack of a uroproct. Pharyngora Lebour and Neopechona Stunkard are considered synonyms of Opechona, and Acanthocolpoides Travassos, Freitas & Bührnheim is considered a synonym of Prodistomum. Opechona bacillaris (Molin) and Prodistomum [originally Distomum] polonii (Molin) n. comb. are described from the NE Atlantic Ocean. Separate revisions with keys to Opechona, Prodistomum and ‘Opechona-like’ species incertae sedis are presented. Opechona is considered to contain: O. bacillaris (type-species), O. alaskensis Ward & Fillingham, O. [originally Neopechona] cablei (Stunkard) n. comb., O. chloroscombri Nahhas & Cable, O. occidentalis Montgomery, O. parvasoma Ching sp. inq., O. pharyngodactyla Manter, O. [originally Distomum] pyriforme (Linton) n. comb. and O. sebastodis (Yamaguti). Prodistomum includes: P. gracile Linton (type-species), P. [originally Opechona] girellae (Yamaguti) n. comb., P. [originally Opechona] hynnodi (Yamaguti) n. comb., P. [originally Opechona] menidiae (Manter) n. comb., P. [originally Pharyngora] orientalis (Layman) n. comb., P. polonii and P. [originally Opechona] waltairensis (Madhavi) n. comb. Some species are considered ‘Opechona-like’ species incertae sedis: O. formiae Oshmarin, O. siddiqii Ahmad, 1986 nec 1984, O. mohsini Ahmad, O. magnatestis Gaevskaya & Kovaleva, O. vinodae Ahmad, O. travassosi Ahmad, ‘Lepidapedon’ nelsoni Gupta & Mehrotra and O. siddiqi Ahmad, 1984 nec 1986. The related genera Cephalolepidapedon Yamaguti and Clavogalea Bray and the synonymies of their constituent species are discussed, and further comments are made on related genera and misplaced species. The new combination Clavogalea [originally Stephanostomum] trachinoti (Fischthal & Thomas) is made. The taxonomy, life-history, host-specificity and zoogeography of the genera are briefly discussed.", "title": "" }, { "docid": "40b4a9b3a594e2a9cb7d489a3f44c328", "text": "The present article integrates findings from diverse studies on the generalized role of perceived coping self-efficacy in recovery from different types of traumatic experiences. They include natural disasters, technological catastrophes, terrorist attacks, military combat, and sexual and criminal assaults. The various studies apply multiple controls for diverse sets of potential contributors to posttraumatic recovery. In these different multivariate analyses, perceived coping self-efficacy emerges as a focal mediator of posttraumatic recovery. Verification of its independent contribution to posttraumatic recovery across a wide range of traumas lends support to the centrality of the enabling and protective function of belief in one's capability to exercise some measure of control over traumatic adversity.", "title": "" }, { "docid": "957170b015e5acd4ab7ce076f5a4c900", "text": "On many social networking web sites such as Facebook and Twitter, resharing or reposting functionality allows users to share others' content with their own friends or followers. As content is reshared from user to user, large cascades of reshares can form. While a growing body of research has focused on analyzing and characterizing such cascades, a recent, parallel line of work has argued that the future trajectory of a cascade may be inherently unpredictable. In this work, we develop a framework for addressing cascade prediction problems. On a large sample of photo reshare cascades on Facebook, we find strong performance in predicting whether a cascade will continue to grow in the future. We find that the relative growth of a cascade becomes more predictable as we observe more of its reshares, that temporal and structural features are key predictors of cascade size, and that initially, breadth, rather than depth in a cascade is a better indicator of larger cascades. This prediction performance is robust in the sense that multiple distinct classes of features all achieve similar performance. We also discover that temporal features are predictive of a cascade's eventual shape. Observing independent cascades of the same content, we find that while these cascades differ greatly in size, we are still able to predict which ends up the largest.", "title": "" }, { "docid": "e8bbbc1864090b0246735868faa0e11f", "text": "A pre-trained deep convolutional neural network (DCNN) is the feed-forward computation perspective which is widely used for the embedded vision systems. In the DCNN, the 2D convolutional operation occupies more than 90% of the computation time. Since the 2D convolutional operation performs massive multiply-accumulation (MAC) operations, conventional realizations could not implement a fully parallel DCNN. The RNS decomposes an integer into a tuple of L integers by residues of moduli set. Since no pair of modulus have a common factor with any other, the conventional RNS decomposes the MAC unit into circuits with different sizes. It means that the RNS could not utilize resources of an FPGA with uniform size. In this paper, we propose the nested RNS (NRNS), which recursively decompose the RNS. It can decompose the MAC unit into circuits with small sizes. In the DCNN using the NRNS, a 48-bit MAC unit is decomposed into 4-bit ones realized by look-up tables of the FPGA. In the system, we also use binary to NRNS converters and NRNS to binary converters. The binary to NRNS converter is realized by on-chip BRAMs, while the NRNS to binary one is realized by DSP blocks and BRAMs. Thus, a balanced usage of FPGA resources leads to a high clock frequency with less hardware. The ImageNet DCNN using the NRNS is implemented on a Xilinx Virtex VC707 evaluation board. As for the performance per area GOPS (Giga operations per second) per a slice, the proposed one is 5.86 times better than the existing best realization.", "title": "" }, { "docid": "0b1a8b80b4414fa34d6cbb5ad1342ad7", "text": "OBJECTIVE\nThe aim of the study was to evaluate the efficacy of topical 2% lidocaine gel in reducing pain and discomfort associated with nasogastric tube insertion (NGTI) and compare lidocaine to ordinary lubricant gel in the ease in carrying out the procedure.\n\n\nMETHODS\nThis prospective, randomized, double-blind, placebo-controlled, convenience sample trial was conducted in the emergency department of our tertiary care university-affiliated hospital. Five milliliters of 2% lidocaine gel or placebo lubricant gel were administered nasally to alert hemodynamically stable adult patients 5 minutes before undergoing a required NGTI. The main outcome measures were overall pain, nasal pain, discomfort (eg, choking, gagging, nausea, vomiting), and difficulty in performing the procedure. Standard comparative statistical analyses were used.\n\n\nRESULTS\nThe study cohort included 62 patients (65% males). Thirty-one patients were randomized to either lidocaine or placebo groups. Patients who received lidocaine reported significantly less intense overall pain associated with NGTI compared to those who received placebo (37 ± 28 mm vs 51 ± 26 mm on 100-mm visual analog scale; P < .05). The patients receiving lidocaine also had significantly reduced nasal pain (33 ± 29 mm vs 48 ± 27 mm; P < .05) and significantly reduced sensation of gagging (25 ± 30 mm vs 39 ± 24 mm; P < .05). However, conducting the procedure was significantly more difficult in the lidocaine group (2.1 ± 0.9 vs 1.4 ± 0.7 on 5-point Likert scale; P < .05).\n\n\nCONCLUSION\nLidocaine gel administered nasally 5 minutes before NGTI significantly reduces pain and gagging sensations associated with the procedure but is associated with more difficult tube insertion compared to the use of lubricant gel.", "title": "" }, { "docid": "81a45cb4ca02c38839a81ad567eb1491", "text": "Big data is often mined using clustering algorithms. Density-Based Spatial Clustering of Applications with Noise (DBSCAN) is a popular spatial clustering algorithm. However, it is computationally expensive and thus for clustering big data, parallel processing is required. The two prevalent paradigms for parallel processing are High-Performance Computing (HPC) based on Message Passing Interface (MPI) or Open Multi-Processing (OpenMP) and the newer big data frameworks such as Apache Spark or Hadoop. This report surveys for these two different paradigms publicly available implementations that aim at parallelizing DBSCAN and compares their performance. As a result, it is found that the big data implementations are not yet mature and in particular for skewed data, the implementation’s decomposition of the input data into parallel tasks has a huge influence on the performance in terms of running time.", "title": "" }, { "docid": "62425652b113c72c668cf9c73b7c8480", "text": "Knowledge graph (KG) completion aims to fill the missing facts in a KG, where a fact is represented as a triple in the form of (subject, relation, object). Current KG completion models compel twothirds of a triple provided (e.g., subject and relation) to predict the remaining one. In this paper, we propose a new model, which uses a KGspecific multi-layer recurrent neutral network (RNN) to model triples in a KG as sequences. It outperformed several state-of-the-art KG completion models on the conventional entity prediction task for many evaluation metrics, based on two benchmark datasets and a more difficult dataset. Furthermore, our model is enabled by the sequential characteristic and thus capable of predicting the whole triples only given one entity. Our experiments demonstrated that our model achieved promising performance on this new triple prediction task.", "title": "" }, { "docid": "d5771929cdaf41ce059e00b35825adf2", "text": "We develop a new collaborative filtering (CF) method that combines both previously known users’ preferences, i.e. standard CF, as well as product/user attributes, i.e. classical function approximation, to predict a given user’s interest in a particular product. Our method is a generalized low rank matrix completion problem, where we learn a function whose inputs are pairs of vectors – the standard low rank matrix completion problem being a special case where the inputs to the function are the row and column indices of the matrix. We solve this generalized matrix completion problem using tensor product kernels for which we also formally generalize standard kernel properties. Benchmark experiments on movie ratings show the advantages of our generalized matrix completion method over the standard matrix completion one with no information about movies or people, as well as over standard multi-task or single task learning methods.", "title": "" }, { "docid": "6bae81e837f4a498ae4c814608aac313", "text": "person’s ability to focus on his or her primary task. Distractions occur especially in mobile environments, because walking, driving, or other real-world interactions often preoccupy the user. A pervasivecomputing environment that minimizes distraction must be context aware, and a pervasive-computing system must know the user’s state to accommodate his or her needs. Context-aware applications provide at least two fundamental services: spatial awareness and temporal awareness. Spatially aware applications consider a user’s relative and absolute position and orientation. Temporally aware applications consider the time schedules of public and private events. With an interdisciplinary class of Carnegie Mellon University (CMU) students, we developed and implemented a context-aware, pervasive-computing environment that minimizes distraction and facilitates collaborative design.", "title": "" }, { "docid": "68e646d8aa50b331b1218a6b049d401f", "text": "In this paper we address the problem of clustering trajectories, namely sets of short sequences of data measured as a function of a dependent variable such as time. Examples include storm path trajectories, longitudinal data such as drug therapy response, functional expression data in computational biology, and movements of objects or individuals in video sequences. Our clustering algorithm is based on a principled method for probabilistic modelling of a set of trajectories as individual sequences of points generated from a nite mixture model consisting of regression model components. Unsupervised learning is carried out using maximum likelihood principles. Speci cally, the EM algorithm is used to cope with the hidden data problem (i.e., the cluster memberships). We also develop generalizations of the method to handle non-parametric (kernel) regression components as well as multi-dimensional outputs. Simulation results comparing our method with other clustering methods such as K-means and Gaussian mixtures are presented as well as experimental results on real data sets. 0 5 10 15 20 25 30 35 200 220 240 260 280 300 320 340 Frame Number (in video sequence) V er tic al p ix el c oo rd in at e of e st im at ed c en tr oi d of h an d Figure 1: Trajectories of the estimated vertical position of a moving hand as a function of time, estimated from 6 di erent video sequences.", "title": "" }, { "docid": "87d15c47894210ad306948f32122a2c4", "text": "We design and implement MobileInsight, a software tool that collects, analyzes and exploits runtime network information from operational cellular networks. MobileInsight runs on commercial off-the-shelf phones without extra hardware or additional support from operators. It exposes protocol messages on both control plane and (below IP) data plane from the 3G/4G chipset. It provides in-device protocol analysis and operation logic inference. It further offers a simple API, through which developers and researchers obtain access to low-level network information for their mobile applications. We have built three showcases to illustrate how MobileInsight is applied to cellular network research.", "title": "" }, { "docid": "2e8a8ced91b9033a17abe4e54223fc19", "text": "Multimedia data secmity is important for multimedia commerce. Previous cryptography studies have focused on text data. The encryption algorithms devdoped to secure text data may not be suitable to multimedia applications becattse of large data sizes and real time constraint. For multimedia applications, light weight encryption algorithms are attractive. We present a novel MPEG Video Encryption Algorithm, called VEA The basic idea of VEA is to use a secret key randomly changing the sign bits of all of the DCT coefficients of MPEG video. VEA’S encryption effects are achieved by the IDCT during MPEG video decompression processing. VEA adds minimum overhead to MPEG codecj one Mm&e XOR operation to each none zero DCT coefficient. A software implementation of VEA is fast enough to meet the real time requirement of MPEG video applications. Our experimental results show that VEA achieves satisfying results. We believe that it can be used to secure video-on-demand, tideo conferencing and video email applications.", "title": "" }, { "docid": "866e60129032c4e41761b7b19483c74a", "text": "The technology to immerse people in computer generated worlds was proposed by Sutherland in 1965, and realised in 1968 with a head-mounted display that could present a user with a stereoscopic 3-dimensional view slaved to a sensing device tracking the user's head movements (Sutherland 1965; 1968). The views presented at that time were simple wire frame models. The advance of computer graphics knowledge and technology, itself tied to the enormous increase in processing power and decrease in cost, together with the development of relatively efficient and unobtrusive sensing devices, has led to the emergence of participatory immersive virtual environments, commonly referred to as \"virtual reality\" (VR) (Fisher 1982; Fisher et. al. 1986; Teitel 1990; see also SIGGRAPH Panel Proceedings 1989,1990). Ellis defines virtualisation as \"the process by which a human viewer interprets a patterned sensory impression to be an extended object in an environment other than that in which it physically exists\" (Ellis, 1991). In this definition the idea is taken from geometric optics, where the concept of a \"virtual image\" is precisely defined, and is well understood. In the context of virtual reality the \"patterned sensory impressions\" are generated to the human senses through visual, auditory, tactile and kinesthetic displays, though systems that effectively present information in all such sensory modalities do not exist at present. Ellis further distinguishes between a virtual space, image and environment. An example of the first is a flat surface on which an image is rendered. Perspective depth cues, texture gradients, occlusion, and other similar aspects of the image lead to an observer perceiving", "title": "" }, { "docid": "c757e54a14beec3b4930ad050a16d311", "text": "The University Class Scheduling Problem (UCSP) is concerned with assigning a number of courses to classrooms taking into consideration constraints like classroom capacities and university regulations. The problem also attempts to optimize the performance criteria and distribute the courses fairly to classrooms depending on the ratio of classroom capacities to course enrollments. The problem is a classical scheduling problem and considered to be NP-complete. It has received some research during the past few years given its wide use in colleges and universities. Several formulations and algorithms have been proposed to solve scheduling problems, most of which are based on local search techniques. In this paper, we propose a complete approach using integer linear programming (ILP) to solve the problem. The ILP model of interest is developed and solved using the three advanced ILP solvers based on generic algorithms and Boolean Satisfiability (SAT) techniques. SAT has been heavily researched in the past few years and has lead to the development of powerful 0-1 ILP solvers that can compete with the best available generic ILP solvers. Experimental results indicate that the proposed model is tractable for reasonable-sized UCSP problems. Index Terms — University Class Scheduling, Optimization, Integer Linear Programming (ILP), Boolean Satisfiability.", "title": "" }, { "docid": "217dfc849cea5e0d80555790362af2e7", "text": "Research examining online political forums has until now been overwhelmingly guided by two broad perspectives: (1) a deliberative conception of democratic communication and (2) a diverse collection of incommensurable multi-sphere approaches. While these literatures have contributed many insightful observations, their disadvantages have left many interesting communicative dynamics largely unexplored. This article seeks to introduce a new framework for evaluating online political forums (based on the work of Jürgen Habermas and Lincoln Dahlberg) that addresses the shortcomings of prior approaches by identifying three distinct, overlapping models of democracy that forums may manifest: the liberal, the communitarian and the deliberative democratic. For each model, a set of definitional variables drawn from the broader online forum literature is documented and discussed.", "title": "" } ]
scidocsrr
98de30f23bd2738d54409dcfc1b4af0e
Processing billions of RDF triples on a single machine using streaming and sorting
[ { "docid": "4507ae69ed021941ff7b0e39d8d50d22", "text": "In the last few years a new research area, called stream reasoning, emerged to bridge the gap between reasoning and stream processing. While current reasoning approaches are designed to work on mainly static data, the Web is, on the other hand, extremely dynamic: information is frequently changed and updated, and new data is continuously generated from a huge number of sources, often at high rate. In other words, fresh information is constantly made available in the form of streams of new data and updates. Despite some promising investigations in the area, stream reasoning is still in its infancy, both from the perspective of models and theories development, and from the perspective of systems and tools design and implementation. The aim of this paper is threefold: (i) we identify the requirements coming from different application scenarios, and we isolate the problems they pose; (ii) we survey existing approaches and proposals in the area of stream reasoning, highlighting their strengths and limitations; (iii) we draw a research agenda to guide the future research and development of stream reasoning. In doing so, we also analyze related research fields to extract algorithms, models, techniques, and solutions that could be useful in the area of stream reasoning.", "title": "" }, { "docid": "487bc1ac0404aec2c1ca1151d87e0e50", "text": "The Web of Data is built upon two simple ideas: Employ the RDF data model to publish structured data on the Web and to set explicit RDF links between entities within different data sources. This paper presents the Silk – Link Discovery Framework, a tool for finding relationships between entities within different data sources. Data publishers can use Silk to set RDF links from their data sources to other data sources on the Web. Silk features a declarative language for specifying which types of RDF links should be discovered between data sources as well as which conditions entities must fulfill in order to be interlinked. Link conditions may be based on various similarity metrics and can take the graph around entities into account, which is addressed using a path-based selector language. Silk accesses data sources over the SPARQL protocol and can thus be used without having to replicate datasets locally.", "title": "" } ]
[ { "docid": "5efebde0526dbb7015ecef066b76d1a9", "text": "Recent advances in mixed-reality technologies have renewed interest in alternative modes of communication for human-robot interaction. However, most of the work in this direction has been confined to tasks such as teleoperation, simulation or explication of individual actions of a robot. In this paper, we will discuss how the capability to project intentions affect the task planning capabilities of a robot. Specifically, we will start with a discussion on how projection actions can be used to reveal information regarding the future intentions of the robot at the time of task execution. We will then pose a new planning paradigm - projection-aware planning - whereby a robot can trade off its plan cost with its ability to reveal its intentions using its projection actions. We will demonstrate each of these scenarios with the help of a joint human-robot activity using the HoloLens.", "title": "" }, { "docid": "80c21770ada160225e17cb9673fff3b3", "text": "This paper describes a model to address the task of named-entity recognition on Indonesian microblog messages due to its usefulness for higher-level tasks or text mining applications on Indonesian microblogs. We view our task as a sequence labeling problem using machine learning approach. We also propose various word-level and orthographic features, including the ones that are specific to the Indonesian language. Finally, in our experiment, we compared our model with a baseline model previously proposed for Indonesian formal documents, instead of microblog messages. Our contribution is two-fold: (1) we developed NER tool for Indonesian microblog messages, which was never addressed before, (2) we developed NER corpus containing around 600 Indonesian microblog messages available for future development.", "title": "" }, { "docid": "7ad0c164ece34159f9051c1510761aa8", "text": "Collaborative filtering (CF) is a major technique in recommender systems to help users find their potentially desired items. Since the data sparsity problem is quite commonly encountered in real-world scenarios, Cross-Domain Collaborative Filtering (CDCF) hence is becoming an emerging research topic in recent years. However, due to the lack of sufficient dense explicit feedbacks and even no feedback available in users' uninvolved domains, current CDCF approaches may not perform satisfactorily in user preference prediction. In this paper, we propose a generalized Cross Domain Triadic Factorization (CDTF) model over the triadic relation user-item-domain, which can better capture the interactions between domain-specific user factors and item factors. In particular, we devise two CDTF algorithms to leverage user explicit and implicit feedbacks respectively, along with a genetic algorithm based weight parameters tuning algorithm to trade off influence among domains optimally. Finally, we conduct experiments to evaluate our models and compare with other state-of-the-art models by using two real world datasets. The results show the superiority of our models against other comparative models.", "title": "" }, { "docid": "f95e19e9fc88df498361c3cb12ae56b0", "text": "Wearable health monitoring is an emerging technology for continuous monitoring of vital signs including the electrocardiogram (ECG). This signal is widely adopted to diagnose and assess major health risks and chronic cardiac diseases. This paper focuses on reviewing wearable ECG monitoring systems in the form of wireless, mobile and remote technologies related to older adults. Furthermore, the efficiency, user acceptability, strategies and recommendations on improving current ECG monitoring systems with an overview of the design and modelling are presented. In this paper, over 120 ECG monitoring systems were reviewed and classified into smart wearable, wireless, mobile ECG monitoring systems with related signal processing algorithms. The results of the review suggest that most research in wearable ECG monitoring systems focus on the older adults and this technology has been adopted in aged care facilitates. Moreover, it is shown that how mobile telemedicine systems have evolved and how advances in wearable wireless textile-based systems could ensure better quality of healthcare delivery. The main drawbacks of deployed ECG monitoring systems including imposed limitations on patients, short battery life, lack of user acceptability and medical professional’s feedback, and lack of security and privacy of essential data have been also discussed.", "title": "" }, { "docid": "3284431912c05706fe61dfc56e2a38a5", "text": "In recent years social media have become indispensable tools for information dissemination, operating in tandem with traditional media outlets such as newspapers, and it has become critical to understand the interaction between the new and old sources of news. Although social media as well as traditional media have attracted attention from several research communities, most of the prior work has been limited to a single medium. In addition temporal analysis of these sources can provide an understanding of how information spreads and evolves. Modeling temporal dynamics while considering multiple sources is a challenging research problem. In this paper we address the problem of modeling text streams from two news sources - Twitter and Yahoo! News. Our analysis addresses both their individual properties (including temporal dynamics) and their inter-relationships. This work extends standard topic models by allowing each text stream to have both local topics and shared topics. For temporal modeling we associate each topic with a time-dependent function that characterizes its popularity over time. By integrating the two models, we effectively model the temporal dynamics of multiple correlated text streams in a unified framework. We evaluate our model on a large-scale dataset, consisting of text streams from both Twitter and news feeds from Yahoo! News. Besides overcoming the limitations of existing models, we show that our work achieves better perplexity on unseen data and identifies more coherent topics. We also provide analysis of finding real-world events from the topics obtained by our model.", "title": "" }, { "docid": "14c81d88a2b903c27f3043dec20f74a1", "text": "The well-known “fat finger” issue limits the interaction performance of trajectory-based finger gestures. To alleviate this issue, this work focuses on the possibility of using additional continuous auditory feedback to assist trajectory-based finger gestures. First, the experiment validated that, with the visual feedback only, the bare fingertip led to more errors in drawing of intersectional points, endpoints of closed gestures, and gestural length and shape variability compared to when the finger-attached pen was used. Then, we designed different types of auditory feedback (discrete beep, static, gradual) to provide additional information on the spatial relationship between finger-contact point and the endpoints or intersections of predefined gestures. An experiment that evaluates the effects of individual or combination of designed auditory feedback on trajectory-based finger gestures was conducted. These results show a few differences between them. However, a combination of gradual (amplitude and frequency) continuous sound and beep reached the highest drawing accuracy for trajectory-based finger gestures, which is similar to that of a finger-attached pen. This research offers insights and implications for the future design of continuous auditory feedback on small touchscreens.", "title": "" }, { "docid": "c79a3f831a7bcbcd164397a499cece29", "text": "A new MOS-C bandpass-low-pass filter using the current feedback operational amplifier (CFOA) is presented. The filter employs two CFOA’s, eight MOS transistors operating in the nonsaturation region, and two grounded capacitors. The proposed MOS-C filter has the advantage of independent control ofQ and !o. PSpice simulation results for the proposed filter are given.", "title": "" }, { "docid": "122e3e4c10e4e5f2779773bde106d068", "text": "In recent years, research on image generation methods has been developing fast. The auto-encoding variational Bayes method (VAEs) was proposed in 2013, which uses variational inference to learn a latent space from the image database and then generates images using the decoder. The generative adversarial networks (GANs) came out as a promising framework, which uses adversarial training to improve the generative ability of the generator. However, the generated pictures by GANs are generally blurry. The deep convolutional generative adversarial networks (DCGANs) were then proposed to leverage the quality of generated images. Since the input noise vectors are randomly sampled from a Gaussian distribution, the generator has to map from a whole normal distribution to the images. This makes DCGANs unable to reflect the inherent structure of the training data. In this paper, we propose a novel deep model, called generative adversarial networks with decoder-encoder output noise (DE-GANs), which takes advantage of both the adversarial training and the variational Bayesain inference to improve the performance of image generation. DE-GANs use a pre-trained decoder-encoder architecture to map the random Gaussian noise vectors to informative ones and pass them to the generator of the adversarial networks. Since the decoder-encoder architecture is trained by the same images as the generators, the output vectors could carry the intrinsic distribution information of the original images. Moreover, the loss function of DE-GANs is different from GANs and DCGANs. A hidden-space loss function is added to the adversarial loss function to enhance the robustness of the model. Extensive empirical results show that DE-GANs can accelerate the convergence of the adversarial training process and improve the quality of the generated images.", "title": "" }, { "docid": "49ba31f0452a57e29f7bbf15de477f2b", "text": "In recent years, the IoT(Internet of Things)has been wide spreadly concerned as a new technology architecture integrated by many information technologies. However, IoT is a complex system. If there is no intensive study from the system point of view, it will be very hard to understand the key technologies of IoT. in order to better study IoT and its technologies this paper proposes an extent six-layer architecture of IoT based on network hierarchical structure firstly. then it discusses the key technologies involved in every layer of IoT, such as RFID, WSN, Internet, SOA, cloud computing and Web Service etc. According to this, an automatic recognition system is designed via integrating both RFID and WSN and a strategy is also brought forward to via integrating both RFID and Web Sevice. This result offers the feasibility of technology integration of IoT.", "title": "" }, { "docid": "459532e59eba5231d95cf74754b9d8ff", "text": "Major policies, regulations, and practice patterns related to interventional pain management are dependent on Medicare policies which include national coverage policies - national coverage determinations (NCDs), and local coverage policies - local coverage determinations (LCDs). The NCDs are Medicare coverage policies issued by the Centers for Medicare and Medicaid Services (CMS). The process used by the CMS in deciding what is and what is not medically necessary is lengthy, involving a review of evidence-based literature on the subject, expert opinion, and public comments. In contrast, LCDs are rules and Medicare coverage that are issued by regional contractors and fiscal intermediaries when an NCD has not addressed the policy at issue. The evidence utilized in preparing LCDs includes the highest level of evidence which is based on published authoritative evidence derived from definitive randomized clinical trials or other definitive studies, and general acceptance by the medical community (standard of practice), as supported by sound medical evidence. In addition, the intervention must be safe and effective and appropriate including duration and frequency that is considered appropriate for the item or service in terms of whether it is furnished in accordance with accepted standards of medical practice for the diagnosis or treatment of the patient's condition or to improve the function. In addition, the safe and effective provision includes that service must be furnished in a setting appropriate to the patient's medical needs and condition, ordered and furnished by qualified personnel, the service must meet, but does not exceed, the patient's medical need, and be at least as beneficial as an existing and available medically appropriate alternative. The LCDs are prepared with literature review, state medical societies, and carrier advisory committees (CACs) of which interventional pain management is a member. The LCDs may be appealed by beneficiaries. The NCDs are prepared by the CMS following a request for a national coverage decision after an appropriate national coverage request along with a draft decision memorandum, and public comments. After the request, the staff review, external technology assessment, Medicare Evidence Development and Coverage Advisory Committee (MedCAC) assessment, public comments, a draft decision memorandum may be posted which will be followed by a final decision and implementation instructions. This decision may be appealed to the department appeals board, but may be difficult to reverse. This manuscript describes NCDs and LCDs and the process of development, their development, issues related to the development, and finally their relation to interventional pain management.", "title": "" }, { "docid": "b9ad079a04028adb9df3891ce763797b", "text": "A n estimated 45 million people around the world are blind. 1 Most of them have lost their sight to diseases that are treatable or preventable. Eighty percent of them live in the lesser-developed world in countries where chronic economic deprivation is exacerbated by the added challenge of failing vision. Without intervention, the number of individuals with blindness might reach 76 million by 2020 because of a number of factors, primarily the rapid aging of populations in most countries. Since eye disease is seen largely in older people, the projected doubling of the world’s population older than 50 years to 2 billion by 2020 has profound effects on the number of those with blindness and low vision.", "title": "" }, { "docid": "ca52ed08e302b843ca4bc0a0e8d2fd5c", "text": "We report a case of surgical treatment for Hallermann-Streiff syndrome in a patient with ocular manifestations of esotropia, entropion, and blepharoptosis. A 54-year-old man visited Yeouido St. Mary's Hospital complaining of ocular discomfort due to cilia touching the corneas of both eyes for several years. He had a bird-like face, pinched nose, hypotrichosis of the scalp, mandibular hypoplasia with forward displacement of the temporomandibular joints, a small mouth, and proportional short stature. His ophthalmic features included sparse eyelashes and eyebrows, microphthalmia, nystagmus, lower lid entropion in the right eye, and upper lid entropion with blepharoptosis in both eyes. There was esodeviation of the eyeball of more than 100 prism diopters at near and distance, and there were limitations in ocular movement on lateral gaze. The capsulopalpebral fascia was repaired to treat the right lower lid entropion, but an additional Quickert suture was required to prevent recurrence. Blepharoplasty and levator palpebrae repair were performed for blepharoptosis and dermatochalasis. Three months after lid surgery, the right medial rectus muscle was recessed 7.5 mm, the left medial rectus was recessed 7.25 mm, and the left lateral rectus muscle was resected 8.0 mm.", "title": "" }, { "docid": "13a456e5d21fcf5e90949c89fb6c6c33", "text": "In This paper, we presents a full on-chip and area efficient low-dropout voltage regulator (LDO) which, exploiting the technique nested miller compensation with active capacitor (NMCAC) to eliminate the external capacitor without compromising the stability of the system in the full output current range. The external capacitor is removed allowing for greater power system integration for system on-chip applications. The proposed LDO is that provides a fast transient response, a low quiescent current 51 μA with a dropout voltage of 192 mV and output variation 69 mV when a full load step 0-50 mA is applied. It designed in 0.18 μm CMOS process.", "title": "" }, { "docid": "445a49977b5d36f9da462e07faf79548", "text": "In this paper, we consider the use of deep neural networks in the context of Multiple-Input-Multiple-Output (MIMO) detection. We give a brief introduction to deep learning and propose a modern neural network architecture suitable for this detection task. First, we consider the case in which the MIMO channel is constant, and we learn a detector for a specific system. Next, we consider the harder case in which the parameters are known yet changing and a single detector must be learned for all multiple varying channels. We demonstrate the performance of our deep MIMO detector using numerical simulations in comparison to competing methods including approximate message passing and semidefinite relaxation. The results show that deep networks can achieve state of the art accuracy with significantly lower complexity while providing robustness against ill conditioned channels and mis-specified noise variance.", "title": "" }, { "docid": "b66e878b1d907c684637bf308ee9fd3f", "text": "The search for free parking places is a promising application for vehicular ad hoc networks (VANETs). In order to guide drivers to a free parking place at their destination, it is necessary to estimate the occupancy state of the parking lots within the destination area at time of arrival. In this paper, we present a model to predict parking lot occupancy based on information exchanged among vehicles. In particular, our model takes the age of received parking lot information and the time needed to arrive at a certain parking lot into account and estimates the future parking situation at time of arrival. It is based on queueing theory and uses a continuous-time homogeneous Markov model. We have evaluated the model in a simulation study based on a detailed model of the city of Brunswick, Germany.", "title": "" }, { "docid": "b588d2eea79668ef678ad87121be1c15", "text": "Discrete Exterior Calculus (DEC) is a discrete version of the smooth exterior calculus. Exterior calculus is calculus on smooth manifolds, and DEC is a calculus for discrete manifolds. It has applications in computational mechanics, computer graphics and other fields. This project has two parts. In the first part, we build a C++ class library to implement some of the objects and operators of DEC. The objects implemented are discrete forms, and the operators implemented are the exterior derivative, Hodge star and wedge product. These objects and operators are implemented for 2D meshes embedded in R. The second part of this project is to extend DEC to include general discrete tensors. As a very preliminary first step, we do this in the context of an application, by proposing the definition of a discrete stress tensor for elasticity. We show how to compute the discrete stress tensor in planar elasticity and propose a discretization for Cauchy’s equation of motion based on that.", "title": "" }, { "docid": "91617f4ed1fbd5d37368caa326a91154", "text": "Different evaluation measures assess different character istics of machine learning algorithms. The empirical evaluation of alg orithms and classifiers is a matter of on-going debate among researchers. Most measu res in use today focus on a classifier’s ability to identify classes correctl y. We note other useful properties, such as failure avoidance or class discrimi nation, and we suggest measures to evaluate such properties. These measures – Youd en’s index, likelihood, Discriminant power – are used in medical diagnosis. We show that they are interrelated, and we apply them to a case study from the fie ld of electronic negotiations. We also list other learning problems which ma y benefit from the application of these measures.", "title": "" }, { "docid": "260e574e9108e05b98df7e4ed489e5fc", "text": "Why are we not living yet with robots? If robots are not common everyday objects, it is maybe because we have looked for robotic applications without considering with sufficient attention what could be the experience of interacting with a robot. This article introduces the idea of a value profile, a notion intended to capture the general evolution of our experience with different kinds of objects. After discussing value profiles of commonly used objects, it offers a rapid outline of the challenging issues that must be investigated concerning immediate, short-term and long-term experience with robots. Beyond science-fiction classical archetypes, the picture emerging from this analysis is the one of versatile everyday robots, autonomously developing in interaction with humans, communicating with one another, changing shape and body in order to be adapted to their various context of use. To become everyday objects, robots will not necessary have to be useful, but they will have to be at the origins of radically new forms of experiences.", "title": "" }, { "docid": "ed1a3ca3e558eeb33e2841fa4b9c28d2", "text": "© 2010 ETRI Journal, Volume 32, Number 4, August 2010 In this paper, we present a low-voltage low-dropout voltage regulator (LDO) for a system-on-chip (SoC) application which, exploiting the multiplication of the Miller effect through the use of a current amplifier, is frequency compensated up to 1-nF capacitive load. The topology and the strategy adopted to design the LDO and the related compensation frequency network are described in detail. The LDO works with a supply voltage as low as 1.2 V and provides a maximum load current of 50 mA with a drop-out voltage of 200 mV: the total integrated compensation capacitance is about 40 pF. Measurement results as well as comparison with other SoC LDOs demonstrate the advantage of the proposed topology.", "title": "" } ]
scidocsrr
f540688e3c641a75d96cdcefea16bc97
Differential privacy in data publication and analysis
[ { "docid": "7c449b9714d937dc6a3367a851130c4a", "text": "We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic agents, which must encourage players to honestly report information. Specifically, we show that the recent notion of differential privacv, in addition to its own intrinsic virtue, can ensure that participants have limited effect on the outcome of the mechanism, and as a consequence have limited incentive to lie. More precisely, mechanisms with differential privacy are approximate dominant strategy under arbitrary player utility functions, are automatically resilient to coalitions, and easily allow repeatability. We study several special cases of the unlimited supply auction problem, providing new results for digital goods auctions, attribute auctions, and auctions with arbitrary structural constraints on the prices. As an important prelude to developing a privacy-preserving auction mechanism, we introduce and study a generalization of previous privacy work that accommodates the high sensitivity of the auction setting, where a single participant may dramatically alter the optimal fixed price, and a slight change in the offered price may take the revenue from optimal to zero.", "title": "" } ]
[ { "docid": "897434ecb3fbf9ea6aae02aeca9cc267", "text": "The three stage design of a microstrip slotted holy shaped patch structure intended to serve high frequency applications in the frequency range between 19.52 GHz to 31.5 GHz is proposed in this paper. The geometrical stages use FR4 epoxy substrate with small dimensions of 10 mm × 8.7 mm × 1.6 mm and employ coaxial feeding technique. An analysis of the three design stages has been done over HFSS-15to obtain the corresponding reflection coefficient, bandwidth, radiation pattern, gain and VSWR. The graphical as well as tabulated comparison of the standard parameters has been included in the results section.", "title": "" }, { "docid": "bcce4f80c84a22722481e55eefb4830f", "text": "State machine replication, or “consensus”, is a central abstraction for distributed systems where a set of nodes seek to agree on an ever-growing, linearly-ordered log. In this paper, we propose a practical new paradigm called Thunderella for achieving state machine replication by combining a fast, asynchronous path with a (slow) synchronous “fall-back” path (which only gets executed if something goes wrong); as a consequence, we get simple state machine replications that essentially are as robust as the best synchronous protocols, yet “optimistically” (if a super majority of the players are honest), the protocol “instantly” confirms transactions. We provide instantiations of this paradigm in both permissionless (using proof-of-work) and permissioned settings. Most notably, this yields a new blockchain protocol (for the permissionless setting) that remains resilient assuming only that a majority of the computing power is controlled by honest players, yet optimistically—if 3/4 of the computing power is controlled by honest players, and a special player called the “accelerator”, is honest—transactions are confirmed as fast as the actual message delay in the network. We additionally show the 3/4 optimistic bound is tight for protocols that are resilient assuming only an honest majority.", "title": "" }, { "docid": "48631b74c184f554f9c5692ed703d398", "text": "Simultaneously and accurately forecasting the behavior of many interacting agents is imperative for computer vision applications to be widely deployed (e.g., autonomous vehicles, security, surveillance, sports). In this paper, we present a technique using conditional variational autoencoder which learns a model that “personalizes” prediction to individual agent behavior within a group representation. Given the volume of data available and its adversarial nature, we focus on the sport of basketball and show that our approach efficiently predicts context-specific agent motions. We find that our model generates results that are three times as accurate as previous state of the art approaches (5.74 ft vs. 17.95 ft).", "title": "" }, { "docid": "9b57784b60ce53e323432cee5efbf321", "text": "PURPOSE\nOver the last 10-15 years, there has been a substantive increase in compassion-based interventions aiming to improve psychological functioning and well-being.\n\n\nMETHODS\nThis study provides an overview and synthesis of the currently available compassion-based interventions. What do these programmes looks like, what are their aims, and what is the state of evidence underpinning each of them?\n\n\nRESULTS\nThis overview has found at least eight different compassion-based interventions (e.g., Compassion-Focused Therapy, Mindful Self-Compassion, Cultivating Compassion Training, Cognitively Based Compassion Training), with six having been evaluated in randomized controlled trials, and with a recent meta-analysis finding that compassion-based interventions produce moderate effect sizes for suffering and improved life satisfaction.\n\n\nCONCLUSIONS\nAlthough further research is warranted, the current state of evidence highlights the potential benefits of compassion-based interventions on a range of outcomes that clinicians can use in clinical practice with clients.\n\n\nPRACTITIONER POINTS\nThere are eight established compassion intervention programmes with six having RCT evidence. The most evaluated intervention to date is compassion-focused therapy. Further RCTs are needed in clinical populations for all compassion interventions. Ten recommendations are provided to improve the evidence-base of compassion interventions.", "title": "" }, { "docid": "f35e9fb9fbcc0e610d681ac326899a90", "text": "In this paper we present a progressive compression method for point sampled models that is specifically apt at dealing with densely sampled surface geometry. The compression is lossless and therefore is also suitable for storing the unfiltered, raw scan data. Our method is based on an octree decomposition of space. The point-cloud is encoded in terms of occupied octree-cells. To compress the octree we employ novel prediction techniques that were specifically designed for point sampled geometry and are based on local surface approximations to achieve high compression rates that outperform previous progressive coders for point-sampled geometry. Moreover we demonstrate that additional point attributes, such as color, which are of great importance for point-sampled geometry, can be well integrated and efficiently encoded in this framework.", "title": "" }, { "docid": "59d7685a127b1fd98f2506c993d5ec6e", "text": "Software defect prediction helps to optimize testing resources allocation by identifying defect-prone modules prior to testing. Most existing models build their prediction capability based on a set of historical data, presumably from the same or similar project settings as those under prediction. However, such historical data is not always available in practice. One potential way of predicting defects in projects without historical data is to learn predictors from data of other projects. This paper investigates defect predictions in the cross-project context focusing on the selection of training data. We conduct three large-scale experiments on 34 data sets obtained from 10 open source projects. Major conclusions from our experiments include: (1) in the best cases, training data from other projects can provide better prediction results than training data from the same project; (2) the prediction results obtained using training data from other projects meet our criteria for acceptance on the average level, defects in 18 out of 34 cases were predicted at a Recall greater than 70% and a Precision greater than 50%; (3) results of cross-project defect predictions are related with the distributional characteristics of data sets which are valuable for training data selection. We further propose an approach to automatically select suitable training data for projects without historical data. Prediction results provided by the training data selected by using our approach are comparable with those provided by training data from the same project.", "title": "" }, { "docid": "5fd8847ed6ee214702daae3dca6718aa", "text": "Affective states play a crucial role in learning. Existing Intelligent Tutoring Systems (ITSs) fail to track affective states of learners accurately. Without an accurate detection of such states, ITSs are limited in providing truly personalized learning experience. In our longitudinal research, we have been working towards developing an empathic autonomous 'tutor' closely monitoring students in real-time using multiple sources of data to understand their affective states corresponding to emotional engagement. We focus on detecting learning related states (i.e., 'Satisfied', 'Bored', and 'Confused'). We have collected 210 hours of data through authentic classroom pilots of 17 sessions. We collected information from two modalities: (1) appearance, which is collected from the camera, and (2) context-performance, that is derived from the content platform. The learning content of the content platform consists of two section types: (1) instructional where students watch instructional videos and (2) assessment where students solve exercise questions. Since there are individual differences in expressing affective states, the detection of emotional engagement needs to be customized for each individual. In this paper, we propose a hierarchical semi-supervised model adaptation method to achieve highly accurate emotional engagement detectors. In the initial calibration phase, a personalized context-performance classifier is obtained. In the online usage phase, the appearance classifier is automatically personalized using the labels generated by the context-performance model. The experimental results show that personalization enables performance improvement of our generic emotional engagement detectors. The proposed semi-supervised hierarchical personalization method result in 89.23% and 75.20% F1 measures for the instructional and assessment sections respectively.", "title": "" }, { "docid": "2d73a7ab1e5a784d4755ed2fe44078db", "text": "Over the last years, many papers have been published about how to use machine learning for classifying postings on microblogging platforms like Twitter, e.g., in order to assist users to reach tweets that interest them. Typically, the automatic classification results are then evaluated against a gold standard classification which consists of either (i) the hashtags of the tweets' authors, or (ii) manual annotations of independent human annotators. In this paper, we show that there are fundamental differences between these two kinds of gold standard classifications, i.e., human annotators are more likely to classify tweets like other human annotators than like the tweets' authors. Furthermore, we discuss how these differences may influence the evaluation of automatic classifications, like they may be achieved by Latent Dirichlet Allocation (LDA). We argue that researchers who conduct machine learning experiments for tweet classification should pay particular attention to the kind of gold standard they use. One may even argue that hashtags are not appropriate as a gold standard for tweet classification.", "title": "" }, { "docid": "58d8e3bd39fa470d1dfa321aeba53106", "text": "There are over 1.2 million Australians registered as having vision impairment. In most cases, vision impairment severely affects the mobility and orientation of the person, resulting in loss of independence and feelings of isolation. GPS technology and its applications have now become omnipresent and are used daily to improve and facilitate the lives of many. Although a number of products specifically designed for the Blind and Vision Impaired (BVI) and relying on GPS technology have been launched, this domain is still a niche and ongoing R&D is needed to bring all the benefits of GPS in terms of information and mobility to the BVI. The limitations of GPS indoors and in urban canyons have led to the development of new systems and signals that bridge the gap and provide positioning in those environments. Although still in their infancy, there is no doubt indoor positioning technologies will one day become as pervasive as GPS. It is therefore important to design those technologies with the BVI in mind, to make them accessible from scratch. This paper will present an indoor positioning system that has been designed in that way, examining the requirements of the BVI in terms of accuracy, reliability and interface design. The system runs locally on a mid-range smartphone and relies at its core on a Kalman filter that fuses the information of all the sensors available on the phone (Wi-Fi chipset, accelerometers and magnetic field sensor). Each part of the system is tested separately as well as the final solution quality.", "title": "" }, { "docid": "0827a91d97ed83bada2e73c0b4bbe308", "text": "Several studies investigated different interaction techniques and input devices for older adults using touchscreen. This literature review analyses the population involved, the kind of tasks that were executed, the apparatus, the input techniques, the provided feedback, the collected data and author's findings and their recommendations. As conclusion, this review shows that age-related changes, previous experience with technologies, characteristics of handheld devices and use situations need to be studied.", "title": "" }, { "docid": "023d0d2f03f6f6019dacd1bc7bd23297", "text": "Temporal logic comes in two varieties: linear-time temporal logic assumes implicit universal quantification over all paths that are generated by system moves; branching-time temporal logic allows explicit existential and universal quantification over all paths. We introduce a third, more general variety of temporal logic: alternating-time temporal logic offers selective quantification over those paths that are possible outcomes of games, such as the game in which the system and the environment alternate moves. While linear-time and branching-time logics are natural specification languages for closed systems, alternative-time logics are natural specification languages for open systems. For example, by preceding the temporal operator \"eventually\" with a selective path quantifier, we can specify that in the game between the system and the environment, the system has a strategy to reach a certain state. Also, the problems of receptiveness, realizability, and controllability can be formulated as model-checking problems for alternating-time formulas. Depending on whether we admit arbitrary nesting of selective path quantifiers and temporal operators, we obtain the two alternating-time temporal logics ATL and ATL*. We interpret the formulas of ATL and ATL* over alternating transition systems. While in ordinary transitory systems, each transition corresponds to a possible step of the system, in alternating transition systems, each transition corresponds to a possible move in the game between the system and the environment. Fair alternating transition systems can capture both synchronous and asynchronous compositions f open systems. For synchronous systems, the expressive power of ATL beyond CTL comes at no cost: the model-checking complexity of synchronous ATL is linear in the size of the system and the length of the formula. The symbolic model-checking algorithm for CTL extends with few modifications to synchronous ATL, and with some work, also to asynchronous to ATL, whose model-checking complexity is quadratic. This makes ATL an obvious candidate for the automatic verification of open systems. In the case of ATL*, the model-checking problem is closely related to the synthesis problem for linear-time formulas, and requires doubly exponential time for both synchronous and asynchronous", "title": "" }, { "docid": "f527fbc9d4fc128f8c5ec77fe64f38c9", "text": "A compact wearable antenna with a novel miniaturized electromagnetic bandgap (EBG) structure at 2.4 GHz for medical application is presented in this letter. The design demonstrates a robust, compact, and low-profile solution to meet the requirements of wearable applications. The EBG structure reduces the back radiation and the impact of frequency detuning due to the high losses of human body. In addition, the structure improves the front-to-back ratio (FBR) by 15.5 dB. The proposed compact antenna with dimensions of ${\\text{46}}\\,\\times \\,{\\text{46}}\\,\\times \\,{\\text{2.4 mm}}^{3}$ yields an impedance bandwidth of 27% (2.17–2.83 GHz), with a gain enhancement of 7.8 dBi and more than 95% reduction in the specific absorption rate. Therefore, the antenna is a promising candidate for integration into wearable devices applied in various domains, specifically biomedical technology.", "title": "" }, { "docid": "9223d7f1f5434b6b66306da868ac063a", "text": "This article proposes a queueing and patient pooling approach for radiotherapy capacity allocation with heterogeneous treatment machines called linear accelerators (LINACs), different waiting time targets (WTTs), and treatment protocols. We first propose a novel queueing framework with LINAC time slots as servers. This framework leads to simple single-class queues for the evaluation of WTT satisfaction that would, otherwise, require an analysis of complicated multiclass queues with reentrance. Mixed-integer programming models are proposed for capacity allocation and case-mix optimization under WTT constraints. We then extend the queueing framework by pooling the basic patient types into groups sharing the same slot servers. A mathematical programming model and a pairwise merging heuristic are proposed for patient pooling optimization to minimize the overall LINAC capacity needed to meet all WTT requirements. Extended numerical experiments are conducted to assess the efficiency of our approach and to show the properties of optimal capacity allocation and patient pooling.", "title": "" }, { "docid": "52de47c3253e1235a0609e207d252445", "text": "Label propagation is a popular graph-based semisupervised learning framework. So as to obtain the optimal labeling scores, the label propagation algorithm requires an inverse matrix which incurs the high computational cost of O(n+cn), where n and c are the numbers of data points and labels, respectively. This paper proposes an efficient label propagation algorithm that guarantees exactly the same labeling results as those yielded by optimal labeling scores. The key to our approach is to iteratively compute lower and upper bounds of labeling scores to prune unnecessary score computations. This idea significantly reduces the computational cost to O(cnt) where t is the average number of iterations for each label and t ≪ n in practice. Experiments demonstrate the significant superiority of our algorithm over existing label propagation methods.", "title": "" }, { "docid": "54c6e02234ce1c0f188dcd0d5ee4f04c", "text": "The World Wide Web is a vast resource for information. At the same time it is extremely distributed. A particular type of data such as restaurant lists may be scattered across thousands of independent information sources in many di erent formats. In this paper, we consider the problem of extracting a relation for such a data type from all of these sources automatically. We present a technique which exploits the duality between sets of patterns and relations to grow the target relation starting from a small sample. To test our technique we use it to extract a relation of (author,title) pairs from the World Wide Web.", "title": "" }, { "docid": "73aa720bebc5f2fa1930930fb4185490", "text": "A CMOS OTA-C notch filter for 50Hz interference was presented in this paper. The OTAs were working in weak inversion region in order to achieve ultra low transconductance and power consumptions. The circuits were designed using SMIC mixed-signal 0.18nm 1P6M process. The post-annotated simulation indicated that an attenuation of 47.2dB for power line interference and a 120pW consumption. The design achieved a dynamic range of 75.8dB and a THD of 0.1%, whilst the input signal was a 1 Hz 20mVpp sine wave.", "title": "" }, { "docid": "1512f35cd69a456a72f981577cfb068b", "text": "Recurrence and progression to higher grade lesions are key biological events and characteristic behaviors in the evolution process of glioma. Malignant astrocytic tumors such as glioblastoma (GBM) are the most lethal intracranial tumors. However, the clinical practicability and significance of molecular parameters for the diagnostic and prognostic prediction of astrocytic tumors is still limited. In this study, we detected ATRX, IDH1-R132H and Ki-67 by immunohistochemistry and observed the association of IDH1-R132H with ATRX and Ki-67 expression. There was a strong association between ATRX loss and IDH1-R132H (p<0.0001). However, Ki-67 high expression restricted in the tumors with IDH1-R132H negative (p=0.0129). Patients with IDH1-R132H positive or ATRX loss astrocytic tumors had a longer progressive- free survival (p<0.0001, p=0.0044, respectively). High Ki-67 expression was associated with shorter PFS in patients with astrocytic tumors (p=0.002). Then we characterized three prognostic subgroups of astrocytic tumors (referred to as A1, A2 and A3). The new model demonstrated a remarkable separation of the progression interval in the three molecular subgroups and the distribution of patients' age in the A1-A2-A3 model was also significant different. This model will aid predicting the overall survival and progressive time of astrocytic tumors' patients.", "title": "" }, { "docid": "2595c67531f0da4449f5914cac3488a7", "text": "In this paper we present a novel interaction metaphor for handheld projectors we label MotionBeam. We detail a number of interaction techniques that utilize the physical movement of a handheld projector to better express the motion and physicality of projected objects. Finally we present the first iteration of a projected character design that uses the MotionBeam metaphor for user interaction.", "title": "" }, { "docid": "de4107fcc45e8cea2f007107e73f8ce2", "text": "The recent addition of force and touch feedback to Virtual Reality simulations has enhanced their realism. Research on haptics interfaces is now extended to physical modeling of contact surfaces, object hardness, surface deformation, etc.. This is especially needed when dextrous manipulation of virtual objects is concerned. This paper describes a VR system using a haptic glove (Rutgers Master II) connected to a PC workstation, and a new method for modeling virtual hand haptic interactions. An application example presented here is an orthopedic rehabilitation library. The exercises in this library involve interactions with dynamic objects and physical modeling of plasticity.", "title": "" }, { "docid": "ff59576df2fdf89cad2cde9414231e6a", "text": "Current cellular spectrum at below 3 GHz bands is experiencing severe shortage and cannot keep up with the dramatic proliferation of mobile traffic in the near future, requiring the search for innovative solutions to enable the 5G era. mmWave communications, with a possible gigabit-per-second data rate, have attracted great attention as a candidate for 5G broadband cellular communication networks. However, a complete characterization of mmWave links for 5G wireless networks still remains elusive and there are many challenges and research areas that need to be addressed. In this work we discuss several key elements to enable mmWave communications in 5G: · Channel characteristics regarding mmWave signal attenuation due to free space propagation, atmospheric gaseous and rain are explained. · The hybrid (digital plus analog) beamforming architecture in mmWave system is discussed. · The blockage effect in mmWave communications due to penetration loss and possible approaches are presented. · The application of mmWave transmission with narrow beams in non-orthogonal device-todevice communication is proposed. · mmWave transmission in the booster cell of heterogeneous anchor-booster networks. · mmWave transmission for small cell backhaul is further discussed.", "title": "" } ]
scidocsrr
95006eeb2a4eb63e5e3007fa6348b76e
Facebook and privacy: it's complicated
[ { "docid": "e4aecd0346609d2c372c8d354704358d", "text": "The sharing of personal data has emerged as a popular activity over online social networking sites like Facebook. As a result, the issue of online social network privacy has received significant attention in both the research literature and the mainstream media. Our overarching goal is to improve defaults and provide better tools for managing privacy, but we are limited by the fact that the full extent of the privacy problem remains unknown; there is little quantification of the incidence of incorrect privacy settings or the difficulty users face when managing their privacy.\n In this paper, we focus on measuring the disparity between the desired and actual privacy settings, quantifying the magnitude of the problem of managing privacy. We deploy a survey, implemented as a Facebook application, to 200 Facebook users recruited via Amazon Mechanical Turk. We find that 36% of content remains shared with the default privacy settings. We also find that, overall, privacy settings match users' expectations only 37% of the time, and when incorrect, almost always expose content to more users than expected. Finally, we explore how our results have potential to assist users in selecting appropriate privacy settings by examining the user-created friend lists. We find that these have significant correlation with the social network, suggesting that information from the social network may be helpful in implementing new tools for managing privacy.", "title": "" } ]
[ { "docid": "1f7e17d46250205565223d0838a1940e", "text": "Augmenting a processor with special hardware that is able to apply a Single Instruction to Multiple Data(SIMD) at the same time is a cost effective way of improving processor performance. It also offers a means of improving the ratio of processor performance to power usage due to reduced and more effective data movement and intrinsically lower instruction counts. This paper considers and compares the NEON SIMD instruction set used on the ARM Cortex-A series of RISC processors with the SSE2 SIMD instruction set found on Intel platforms within the context of the Open Computer Vision (OpenCV) library. The performance obtained using compiler auto-vectorization is compared with that achieved using hand-tuning across a range of five different benchmarks and ten different hardware platforms. On the ARM platforms the hand-tuned NEON benchmarks were between 1.05× and 13.88× faster than the auto-vectorized code, while for the Intel platforms the hand-tuned SSE benchmarks were between 1.34× and 5.54× faster.", "title": "" }, { "docid": "a3bff96ab2a6379d21abaea00bc54391", "text": "In view of the advantages of deep networks in producing useful representation, the generated features of different modality data (such as image, audio) can be jointly learned using Multimodal Restricted Boltzmann Machines (MRB-M). Recently, audiovisual speech recognition based the M-RBM has attracted much attention, and the MRBM shows its effectiveness in learning the joint representation across audiovisual modalities. However, the built networks have weakness in modeling the multimodal sequence which is the natural property of speech signal. In this paper, we will introduce a novel temporal multimodal deep learning architecture, named as Recurrent Temporal Multimodal RB-M (RTMRBM), that models multimodal sequences by transforming the sequence of connected MRBMs into a probabilistic series model. Compared with existing multimodal networks, it's simple and efficient in learning temporal joint representation. We evaluate our model on audiovisual speech datasets, two public (AVLetters and AVLetters2) and one self-build. The experimental results demonstrate that our approach can obviously improve the accuracy of recognition compared with standard MRBM and the temporal model based on conditional RBM. In addition, RTMRBM still outperforms non-temporal multimodal deep networks in the presence of the weakness of long-term dependencies.", "title": "" }, { "docid": "67e7b542e876c213540c747934fd3557", "text": "This paper presents preliminary work on musical instruments ontology design, and investigates heterogeneity and limitations in existing instrument classification schemes. Numerous research to date aims at representing information about musical instruments. The works we examined are based on the well known Hornbostel and Sach’s classification scheme. We developed representations using the Ontology Web Language (OWL), and compared terminological and conceptual heterogeneity using SPARQL queries. We found evidence to support that traditional designs based on taxonomy trees lead to ill-defined knowledge representation, especially in the context of an ontology for the Semantic Web. In order to overcome this issue, it is desirable to have an instrument ontology that exhibits a semantically rich structure.", "title": "" }, { "docid": "02e9379c0661c22188e9dbd64728035d", "text": "PURPOSE\nThe objective of this study is to examine the effects of acute ingestion of dietary nitrate on endurance running performance in highly trained cross-country skiers. Dietary nitrate has been shown to reduce the oxygen cost of submaximal exercise and improve tolerance of high-intensity exercise, but it is not known if this holds true for highly trained endurance athletes.\n\n\nMETHODS\nTen male junior cross-country skiers (V˙O(2max)) ≈ 70 mL·kg·min) each completed two trials in a randomized, double-blind design. Participants ingested potassium nitrate (614-mg nitrate) or a nitrate-free placebo 2.5 h before two 5-min submaximal tests on a treadmill at 10 km·h (≈55% of V˙O(2max)) and 14 km·h (≈75% of V˙O(2max)), followed by a 5-km running time trial on an indoor track.\n\n\nRESULTS\nPlasma nitrite concentrations were higher after nitrate supplementation (325 ± 95 nmol·L) compared with placebo (143 ± 59 nmol·L, P < 0.001). There was no significant difference in 5-km time-trial performance between nitrate (1005 ± 53 s) and placebo treatments (996 ± 49 s, P = 0.12). The oxygen cost of submaximal running was not significantly different between placebo and nitrate trials at 10 km·h (both 2.84 ± 0.34 L·min) and 14 km·h (3.89 ± 0.39 vs. 3.77 ± 0.62 L·min).\n\n\nCONCLUSIONS\nAcute ingestion of dietary nitrate may not represent an effective strategy for reducing the oxygen cost of submaximal exercise or for enhancing endurance exercise performance in highly trained cross-country skiers.", "title": "" }, { "docid": "3204def0de796db05e4fcc2a86743bb6", "text": "This keynote paper: (1) presents the 21st century vision of computing and identifies various IT paradigms promising to deliver computing as a utility; (2) defines the architecture for creating market-oriented Clouds and computing atmosphere by leveraging technologies such as virtual machines; (3) provides thoughts on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain SLA-oriented resource allocation; (4) presents the work carried out as part of our new Cloud Computing initiative, called Cloudbus: (i) Aneka, a Platform as a Service software system containing SDK (Software Development Kit) for construction of Cloud applications and deployment on private or public Clouds, in addition to supporting market-oriented resource management; (ii) internetworking of Clouds for dynamic creation of federated computing environments for scaling of elastic applications; (iii) creation of 3 party Cloud brokering services for building content delivery networks and e-Science applications and their deployment on capabilities of IaaS providers such as Amazon along with Grid mashups; (iv) CloudSim supporting modelling and simulation of Clouds for performance studies; (v) Energy Efficient Resource Allocation Mechanisms and Techniques for creation and management of Green Clouds; and (vi) pathways for future research.", "title": "" }, { "docid": "bf7d502a818ac159cf402067b4416858", "text": "We present algorithms for evaluating and performing modeling operatyons on NURBS surfaces using the programmable fragment processor on the Graphics Processing Unit (GPU). We extend our GPU-based NURBS evaluator that evaluates NURBS surfaces to compute exact normals for either standard or rational B-spline surfaces for use in rendering and geometric modeling. We build on these calculations in our new GPU algorithms to perform standard modeling operations such as inverse evaluations, ray intersections, and surface-surface intersections on the GPU. Our modeling algorithms run in real time, enabling the user to sketch on the actual surface to create new features. In addition, the designer can edit the surface by interactively trimming it without the need for re-tessellation. We also present a GPU-accelerated algorithm to perform surface-surface intersection operations with NURBS surfaces that can output intersection curves in the model space as well as in the parametric spaces of both the intersecting surfaces at interactive rates.", "title": "" }, { "docid": "83f8b57090e5290acbf8fd7586232891", "text": "In this paper, we propose a new clustering model, called DEeP Embedded Regularized ClusTering (DEPICT), which efficiently maps data into a discriminative embedding subspace and precisely predicts cluster assignments. DEPICT generally consists of a multinomial logistic regression function stacked on top of a multi-layer convolutional autoencoder. We define a clustering objective function using relative entropy (KL divergence) minimization, regularized by a prior for the frequency of cluster assignments. An alternating strategy is then derived to optimize the objective by updating parameters and estimating cluster assignments. Furthermore, we employ the reconstruction loss functions in our autoencoder, as a data-dependent regularization term, to prevent the deep embedding function from overfitting. In order to benefit from end-to-end optimization and eliminate the necessity for layer-wise pre-training, we introduce a joint learning framework to minimize the unified clustering and reconstruction loss functions together and train all network layers simultaneously. Experimental results indicate the superiority and faster running time of DEPICT in real-world clustering tasks, where no labeled data is available for hyper-parameter tuning.", "title": "" }, { "docid": "5da804fa4c1474e27a1c91fcf5682e20", "text": "We present an overview of Candide, a system for automatic translat ion of French text to English text. Candide uses methods of information theory and statistics to develop a probabili ty model of the translation process. This model, which is made to accord as closely as possible with a large body of French and English sentence pairs, is then used to generate English translations of previously unseen French sentences. This paper provides a tutorial in these methods, discussions of the training and operation of the system, and a summary of test results. 1. I n t r o d u c t i o n Candide is an experimental computer program, now in its fifth year of development at IBM, for translation of French text to Enghsh text. Our goal is to perform fuRy-automatic, high-quality text totext translation. However, because we are still far from achieving this goal, the program can be used in both fully-automatic and translator 's-assistant modes. Our approach is founded upon the statistical analysis of language. Our chief tools axe the source-channel model of communication, parametric probabili ty models of language and translation, and an assortment of numerical algorithms for training such models from examples. This paper presents elementary expositions of each of these ideas, and explains how they have been assembled to produce Caadide. In Section 2 we introduce the necessary ideas from information theory and statistics. The reader is assumed to know elementary probabili ty theory at the level of [1]. In Sections 3 and 4 we discuss our language and translation models. In Section 5 we describe the operation of Candide as it translates a French document. In Section 6 we present results of our internal evaluations and the AB.PA Machine Translation Project evaluations. Section 7 is a summary and conclusion. 2 . Stat is t ical Trans la t ion Consider the problem of translating French text to English text. Given a French sentence f , we imagine that it was originally rendered as an equivalent Enghsh sentence e. To obtain the French, the Enghsh was t ransmit ted over a noisy communication channel, which has the curious property that English sentences sent into it emerge as their French translations. The central assumption of Candide's design is that the characteristics of this channel can be determined experimentally, and expressed mathematically. *Current address: Renaissance Technologies, Stony Brook, NY ~ English-to-French I f e Channel \" _[ French-to-English -] Decoder 6 Figure 1: The Source-Channel Formalism of Translation. Here f is the French text to be translated, e is the putat ive original English rendering, and 6 is the English translation. This formalism can be exploited to yield French-to-English translations as follows. Let us write P r (e I f ) for the probability that e was the original English rendering of the French f. Given a French sentence f, the problem of automatic translation reduces to finding the English sentence tha t maximizes P.r(e I f) . That is, we seek 6 = argmsx e Pr (e I f) . By virtue of Bayes' Theorem, we have = argmax Pr(e If ) = argmax Pr(f I e)Pr(e) (1) e e The term P r ( f l e ) models the probabili ty that f emerges from the channel when e is its input. We call this function the translation model; its domain is all pairs (f, e) of French and English word-strings. The term Pr (e ) models the a priori probability that e was supp led as the channel input. We call this function the language model. Each of these fac tors the translation model and the language model independent ly produces a score for a candidate English translat ion e. The translation model ensures that the words of e express the ideas of f, and the language model ensures that e is a grammatical sentence. Candide sehcts as its translat ion the e that maximizes their product. This discussion begs two impor tant questions. First , where do the models P r ( f [ e) and Pr (e ) come from? Second, even if we can get our hands on them, how can we search the set of all English strings to find 6? These questions are addressed in the next two sections. 2.1. P robab i l i ty Models We begin with a brief detour into probabili ty theory. A probability model is a mathematical formula that purports to express the chance of some observation. A parametric model is a probability model with adjustable parameters, which can be changed to make the model bet ter match some body of data. Let us write c for a body of da ta to be modeled, and 0 for a vector of parameters. The quanti ty Prs (c ) , computed according to some formula involving c and 0, is called the hkelihood 157 [Human Language Technology, Plainsboro, 1994]", "title": "" }, { "docid": "7654ff9f2e55d3831baa82700471c2ef", "text": "Satellite imaging is well known as a useful tool in many scientific disciplines and various applications. Google Earth, with its free access, is now - thanks to increasing resolution and precision - such a tool. It improves the visualization and dissemination of scientific data, and opens doors to new discoveries. For example, many Nasca geoglyphs are now visible to Google Earth and so are the orientations of Chinese pyramids, which appear to be laid out with the aid of a magnetic compass. Google Earth can also \"see\" a previously unknown \"Monte Alban II\" close to the well known \"Monte Alban\" in the Valley of Oaxaca (Mexico), as well as prehistoric causeways in Mesoamerica (namely, in north Yucatan) and in the Chaco valley, New Mexico. We find that Google Earth can save time and resources significantly: before, during and after field measurements.", "title": "" }, { "docid": "4eeef9a48f282bc6214c39d4c40303e7", "text": "Failure management is a particular challenge problem in the automotive domain. Today's cars host a network of 30 to 80 electronic control units (ECUs), distributed over up to five interconnected in-car networks supporting hundreds to thousands of softwaredefined functions. This high degree of distribution of hard- and software components is a key contributor to the difficulty of failure management in vehicle. This paper addresses comprehensive failure management, starting from domain models for logical and deployment models of automotive software. These models capture interaction patterns as a critical part of both logical and deployment architectures, introducing failure detection and mitigation as \"wrapper\" services to \"unmanaged services\", i.e. services without failure management. We show how these models can be embedded into an interaction-centric development process, which captures failure management information across development phases. Finally, we exploit the failure management models to verify that a particular architecture meets its requirements under the stated failure hypothesis.", "title": "" }, { "docid": "1e139fa9673f83ac619a5da53391b1ef", "text": "In this paper we propose a new no-reference (NR) image quality assessment (IQA) metric using the recently revealed free-energy-based brain theory and classical human visual system (HVS)-inspired features. The features used can be divided into three groups. The first involves the features inspired by the free energy principle and the structural degradation model. Furthermore, the free energy theory also reveals that the HVS always tries to infer the meaningful part from the visual stimuli. In terms of this finding, we first predict an image that the HVS perceives from a distorted image based on the free energy theory, then the second group of features is composed of some HVS-inspired features (such as structural information and gradient magnitude) computed using the distorted and predicted images. The third group of features quantifies the possible losses of “naturalness” in the distorted image by fitting the generalized Gaussian distribution to mean subtracted contrast normalized coefficients. After feature extraction, our algorithm utilizes the support vector machine based regression module to derive the overall quality score. Experiments on LIVE, TID2008, CSIQ, IVC, and Toyama databases confirm the effectiveness of our introduced NR IQA metric compared to the state-of-the-art.", "title": "" }, { "docid": "ef99799bf977ba69a63c9f030fc65c7f", "text": "In this paper, we propose a novel transductive learning framework named manifold-ranking based image retrieval (MRBIR). Given a query image, MRBIR first makes use of a manifold ranking algorithm to explore the relationship among all the data points in the feature space, and then measures relevance between the query and all the images in the database accordingly, which is different from traditional similarity metrics based on pair-wise distance. In relevance feedback, if only positive examples are available, they are added to the query set to improve the retrieval result; if examples of both labels can be obtained, MRBIR discriminately spreads the ranking scores of positive and negative examples, considering the asymmetry between these two types of images. Furthermore, three active learning methods are incorporated into MRBIR, which select images in each round of relevance feedback according to different principles, aiming to maximally improve the ranking result. Experimental results on a general-purpose image database show that MRBIR attains a significant improvement over existing systems from all aspects.", "title": "" }, { "docid": "43ccb8a421fbcdd9a45e00782d0eaf5a", "text": "Research in open office design has shown that it is negatively related to workers’ satisfaction with their physical environment and perceived productivity. A longitudinal study was conducted within a large private organization to investigate the effects of relocating employees from traditional offices to open offices. A measure was constructed that assessed employees’satisfaction with the physical environment, physical stress, coworker relations, perceived job performance, and the use of open office protocols. The sample consisted of 21 employees who completed the surveys at all three measurement intervals: prior to the move, 4 weeks after the move, and 6 279 ENVIRONMENT AND BEHAVIOR, Vol. 34 No. 3, May 2002 279-299 © 2002 Sage Publications at UCSF LIBRARY & CKM on November 26, 2013 eab.sagepub.com Downloaded from months after the move. Results indicated decreased employee satisfaction with all of the dependent measures following the relocation. Moreover, the employees’ dissatisfaction did not abate, even after an adjustment period. Reasons for these findings are discussed and recommendations are presented. Thepurpose of this studywas to determine the effects of relocating employees from traditional to open offices. The organization in which this study was conducted requested a longitudinal study to assess the long-term impact of office redesign on their employees’ satisfaction with the physical environment and productivity. Employees’ satisfaction with their work environment is important to organizations, as it has been shown to be directly related to employees’ job satisfaction and indirectly related to commitment and turnover intentions (Carlopio, 1996). There are many different types of office designs, ranging from traditional, private offices to open offices. Open offices also range in their design complexity from the “bull pen” in which the desks are arranged in neat rows to “landscaped”—or Bürolandschaft—offices that include “systems furniture” and panels of varying heights. In open offices, people who work together are physically located together with the geometry of the layout reflecting the pattern of the work groups. The various areas can be separated by plants, low movable screens, cabinets, shelving, or other furniture (Sanders & McCormick, 1993). Thus, within the broad category of open office, fine-grained differences can be rendered. For example, the number of partitions surrounding employees’ workspaces, spatial density (the amount of usable space per employee), openness (the overall openness of the office or the ratio of total square footage of the office to the total length of its interior walls and partitions), and architectural accessibility (the extent to which an employee’s individual workspace is accessible to the external intrusions of others) (Oldham, 1988; Oldham & Rotchford, 1983) can all vary. For example, Marans and Yan (1989) divided their national sample of offices into six different design categories based on the number of walls and partitions surrounding the employees’ workspace. For purposes of this study, offices were classified into one of the following five categories: (a) private closed, (b) private shared, (c) individual open, (d) shared open, or (e) bull pen. Open offices were designed in the 1950s and reached their height of popularity in the early 1970s, when many companies converted to these types of designs. Original claims by the designers of open offices were that they created flexible space, allowing layout to be more sensitive to changes in organizational size and structure. Workstations can be easily reconfigured at minimal cost to meet changing needs. It was also believed that the absence of internal physical barriers would facilitate communication between 280 ENVIRONMENT AND BEHAVIOR / May 2002 at UCSF LIBRARY & CKM on November 26, 2013 eab.sagepub.com Downloaded from individuals, groups, and even whole departments, which consequently, would improve morale and productivity. In addition, there was an estimated 20% savings in costs associated with creating and maintaining this type of office space (Hedge, 1982). Although many claims have been made regarding improvements in communication and productivity with open office designs, research findings have been mixed, with some studies reporting positive outcomes such as increased communication among coworkers (Allen & Gerstberger, 1973; Hundert & Greenfield, 1969; Ives & Ferdinands, 1974; Zahn, 1991) and supervisors (Sundstrom, Burt, & Kamp, 1980), higher judgments of aesthetic value (Brookes & Kaplan, 1972; Riland, 1970), and more group sociability (Brookes & Kaplan, 1972), whereas other studies have reported negative findings such as decreased performance (Becker, Gield, Gaylin, & Sayer, 1983; Oldham & Brass, 1979), lower judgments of functional efficiency (Brookes & Kaplan, 1972), lower levels of psychological privacy (Brookes & Kaplan, 1972; Hedge, 1982; Sundstrom, Town, Brown, Forman, & McGee, 1982; Sundstrom et al., 1980), environmental dissatisfaction (Marans & Yan, 1989; Oldham & Brass, 1979; Spreckelmeyer, 1993), fewer friendship opportunities (Oldham & Brass, 1979), supervisor feedback (Oldham & Brass, 1979), privacy (Brookes & Kaplan, 1972; Hundert & Greenfield, 1969), increased noise (Brookes & Kaplan, 1972; Sundstrom, et al., 1980), increased disturbances and distractions (Brookes & Kaplan, 1972; Hedge, 1982; Hundert & Greenfield, 1969; Ives & Ferdinands, 1974; Mercer, 1979; Nemecek & Grandjean, 1973; Oldham & Brass, 1979; Sundstrom, et al., 1980), and increased feelings of crowding (Sundstrom, et al., 1980). In a study by Zalesny and Farace (1987), employees relocated from traditional to open offices. Managers reported that their new work areas were less adequate than before the office change, that they had less privacy, and that they were less satisfied with the physical environment. Given these reported increases in disturbances and distractions, one would expect productivity to be negatively affected, especially in light of the findings from the Steelcase (Louis Harris & Associates, Inc., 1978) study in which 41% of a sample of office workers indicated that the most important office characteristic in getting their work done well was the ability to concentrate without noise or other distractions. However, these respondents rated the level of noise and other distractions in their work environments as the third worst characteristic of their workplace. In a follow-up study 2 years later, more than half of another sample of office workers reported that quiet was important to completing their work, yet only 48% reported that they actually experienced quiet offices. Recent statistics suggest that disturbances from office noise has reached epidemic proportions, with 54% of a sample of more than 2,000 U.S. and Canadian office workers in various office plans from 58 different sites Brennan et al. / OFFICE DESIGN 281 at UCSF LIBRARY & CKM on November 26, 2013 eab.sagepub.com Downloaded from reporting that they are bothered often by one or more sources of noise, such as telephones, people talking, ventilation systems, piped-in music, and office equipment (Sundstrom, Town, Rice, Osborn, & Brill, 1994). Furthermore, reported disturbances from combined sources of noise were found to be negatively related to environmental satisfaction and job satisfaction. Contrary to expectations, however, Sundstrom et al. (1994) found no relationship between disturbances and self or supervisor ratings of performance. Many companies continue to adopt open office designs primarily because of the reduced costs in construction and maintenance. However, another reason why open plan offices are so popular is the belief that they facilitate greater communication, which in turn, facilitates greater productivity (Boje, 1971; Pile, 1978). This belief is based on the social facilitation hypothesis, which states that performance of routine tasks will improve in nonprivate areas (Geen & Gange, 1977). The theory suggests that employees who find their jobs boring may find that contact with other people provides a source of stimulation. However, Sundstrom (1978) found that social contact can exceed an optimum level, causing a worker to feel crowded, especially in areas with minimal privacy. As a result of crowding, discomfort may occur, which then causes decreased job performance. Research findings have shown a high correlation between architectural privacy (the visual and acoustic isolation supplied by an environment) and psychological privacy (a sense of control over access to oneself or one’s group), even among people with the least complex jobs (Sundstrom et al., 1980). Furthermore, no relationship has been found between architectural accessibility and social contact among coworkers. These findings directly contradict the claims of open office designers regarding increases in communication. Moreover, whereas one of the proposed advantages of the open office design was increased communication, they have actually been found to prohibit confidential conversations (Sundstrom, 1986). In short, empirical findings suggest that employees prefer privacy over accessibility because of the increases in noise and distractions experienced in nonprivate workspaces (Sundstrom et al., 1980). McCarrey, Peterson, Edwards, and Von Kulmiz (1974) suggested that the findings of lower satisfaction in open offices are due to employees’perceived lack of control over input to and from the environment. This occurs through lack of auditory privacy, lack of personal privacy, and lack of confidentiality of communications. This is supported by the concept of overload (Cohen, 1978), which posits that workers prefer quiet workplaces where neighboring coworkers are relatively few and far apart because exposure to sources of overload can then be controlled. Empirical research on open offices has supported the theory of overload, finding that employees tend to prefer lower 282", "title": "" }, { "docid": "d80070cf7ab3d3e75c2da1525e59be67", "text": "This paper presents for the first time the analysis and experimental validation of a six-slot four-pole synchronous reluctance motor with nonoverlapping fractional slot-concentrated windings. The machine exhibits high torque density and efficiency due to its high fill factor coils with very short end windings, facilitated by a segmented stator and bobbin winding of the coils. These advantages are coupled with its inherent robustness and low cost. The topology is presented as a logical step forward in advancing synchronous reluctance machines that have been universally wound with a sinusoidally distributed winding. The paper presents the motor design, performance evaluation through finite element studies and validation of the electromagnetic model, and thermal specification through empirical testing. It is shown that high performance synchronous reluctance motors can be constructed with single tooth wound coils, but considerations must be given regarding torque quality and the d-q axis inductances.", "title": "" }, { "docid": "e01d5be587c73aaa133acb3d8aaed996", "text": "This paper presents a new optimization-based method to control three micro-scale magnetic agents operating in close proximity to each other for applications in microrobotics. Controlling multiple magnetic microrobots close to each other is difficult due to magnetic interactions between the agents, and here we seek to control those interactions for the creation of desired multi-agent formations. Our control strategy arises from physics that apply force in the negative direction of states errors. The objective is to regulate the inter-agent spacing, heading and position of the set of agents, for motion in two dimensions, while the system is inherently underactuated. Simulation results on three agents and a proof-of-concept experiment on two agents show the feasibility of the idea to shed light on future micro/nanoscale multi-agent explorations. Average tracking error of less than 50 micrometers and 1.85 degrees is accomplished for the regulation of the inter-agent space and the pair heading angle, respectively, for identical spherical-shape agents with nominal radius less than of 250 micrometers operating within several body-lengths of each other.", "title": "" }, { "docid": "eb3a07c2295ba09c819c7a998b2fb337", "text": "Recent advances have demonstrated the potential of network MIMO (netMIMO), which combines a practical number of distributed antennas as a virtual netMIMO AP (nAP) to improve spatial multiplexing of an WLAN. Existing solutions, however, either simply cluster nearby antennas as static nAPs, or dynamically cluster antennas on a per-packet basis so as to maximize the sum rate of the scheduled clients. To strike the balance between the above two extremes, in this paper, we present the design, implementation and evaluation of FlexNEMO, a practical two-phase netMIMO clustering system. Unlike previous per-packet clustering approaches, FlexNEMO only clusters antennas when client distribution and traffic pattern change, as a result being more practical to be implemented. A medium access control protocol is then designed to allow the clients at the center of nAPs to have a higher probability to gain access opportunities, but still ensure long-term fairness among clients. By combining on-demand clustering and priority-based access control, FlexNEMO not only improves antenna utilization, but also optimizes the channel condition for every individual client. We evaluated our design via both testbed experiments on USRPs and trace-driven emulations. The results demonstrate that FlexNEMO can deliver 94.7% and 93.7% throughput gains over static antenna clustering in a 4-antenna testbed and 16-antenna emulation, respectively.", "title": "" }, { "docid": "63f0ff6663f334e1ab05d0ce5d2239cf", "text": "Railroad tracks need to be periodically inspected and monitored to ensure safe transportation. Automated track inspection using computer vision and pattern recognition methods has recently shown the potential to improve safety by allowing for more frequent inspections while reducing human errors. Achieving full automation is still very challenging due to the number of different possible failure modes, as well as the broad range of image variations that can potentially trigger false alarms. In addition, the number of defective components is very small, so not many training examples are available for the machine to learn a robust anomaly detector. In this paper, we show that detection performance can be improved by combining multiple detectors within a multitask learning framework. We show that this approach results in improved accuracy for detecting defects on railway ties and fasteners.", "title": "" }, { "docid": "fb7c268419d798587e1675a5a1a37232", "text": "Recently, image representation built upon Convolutional Neural Network (CNN) has been shown to provide effective descriptors for image search, outperforming pre-CNN features as short-vector representations. Yet such models are not compatible with geometry-aware re-ranking methods and still outperformed, on some particular object retrieval benchmarks, by traditional image search systems relying on precise descriptor matching, geometric re-ranking, or query expansion. This work revisits both retrieval stages, namely initial search and re-ranking, by employing the same primitive information derived from the CNN. We build compact feature vectors that encode several image regions without the need to feed multiple inputs to the network. Furthermore, we extend integral images to handle max-pooling on convolutional layer activations, allowing us to efficiently localize matching objects. The resulting bounding box is finally used for image reranking. As a result, this paper significantly improves existing CNN-based recognition pipeline: We report for the first time results competing with traditional methods on the challenging Oxford5k and Paris6k datasets.", "title": "" }, { "docid": "1c6b67ae3b069e40b600f1479782ef19", "text": "The evolution of IoT network is basically the effect of requirement of a system that is having better capabilities compared to existing ones. One main feature of the system that we need to satisfy is long range and low power. The protocols IEEE 802.15.4, 6LoWPAN, IPv6 and CoAP are used for achieving low rate, low power, large address space and reducing the data space respectively. In this paper we discuss other protocols which are intended mainly for providing long distance transmission with the less amount of power consumption. It mainly says about LoRa (Long Range protocol), IEEE 802.22 and weightless.", "title": "" }, { "docid": "0c975acb5ab3f413078171840b17b232", "text": "We have analysed associated factors in 164 patients with acute compartment syndrome whom we treated over an eight-year period. In 69% there was an associated fracture, about half of which were of the tibial shaft. Most patients were men, usually under 35 years of age. Acute compartment syndrome of the forearm, with associated fracture of the distal end of the radius, was again seen most commonly in young men. Injury to soft tissues, without fracture, was the second most common cause of the syndrome and one-tenth of the patients had a bleeding disorder or were taking anticoagulant drugs. We found that young patients, especially men, were at risk of acute compartment syndrome after injury. When treating such injured patients, the diagnosis should be made early, utilising measurements of tissue pressure.", "title": "" } ]
scidocsrr
fb362389826df4832c188d77800a4705
Iterative Machine Teaching
[ { "docid": "35625f248c81ebb5c20151147483f3f6", "text": "A very simple way to improve the performance of almost any mac hine learning algorithm is to train many different models on the same data a nd then to average their predictions [3]. Unfortunately, making predictions u ing a whole ensemble of models is cumbersome and may be too computationally expen sive to allow deployment to a large number of users, especially if the indivi dual models are large neural nets. Caruana and his collaborators [1] have shown th at it is possible to compress the knowledge in an ensemble into a single model whi ch is much easier to deploy and we develop this approach further using a dif ferent compression technique. We achieve some surprising results on MNIST and w e show that we can significantly improve the acoustic model of a heavily use d commercial system by distilling the knowledge in an ensemble of models into a si ngle model. We also introduce a new type of ensemble composed of one or more full m odels and many specialist models which learn to distinguish fine-grained c lasses that the full models confuse. Unlike a mixture of experts, these specialist m odels can be trained rapidly and in parallel.", "title": "" }, { "docid": "bf1252479d6c1af3ceea574e41a2a782", "text": "This paper is concerned with various combinatorial parameters of classes that can be learned from a small set of examples. We show that the recursive teaching dimension, recently introduced by Zilles et al. (2008), is strongly connected to known complexity notions in machine learning, e.g., the self-directed learning complexity and the VC-dimension. To the best of our knowledge these are the first results unveiling such relations between teaching and query learning as well as between teaching and the VC-dimension. It will turn out that for many natural classes the RTD is upper-bounded by the VCD, e.g., classes of VCdimension 1, intersection-closed classes and finite maximum classes. However, we will also show that there are certain (but rare) classes for which the recursive teaching dimension exceeds the VC-dimension. Moreover, for maximum classes, the combinatorial structure induced by the RTD, called teaching plan, is highly similar to the structure of sample compression schemes. Indeed one can transform any repetition-free teaching plan for a maximum class C into an unlabeled sample compression scheme for C and vice versa, while the latter is produced by (i) the corner-peeling algorithm of Rubinstein and Rubinstein (2012) and (ii) the tail matching algorithm of Kuzmin and Warmuth (2007).", "title": "" } ]
[ { "docid": "0a4f21f3254445c68f6e43f7d2ce5e8e", "text": "The Multidimensional (MD) modeling, which is the foundation of data warehouses (DWs), MD databases, and On-Line Analytical Processing (OLAP) applications, is based on several properties different from those in traditional database modeling. In the past few years, there have been some proposals, providing their own formal and graphical notations, for representing the main MD properties at the conceptual level. However, unfortunately none of them has been accepted as a standard for conceptual MD modeling. In this paper, we present an extension of the Unified Modeling Language (UML) using a UML profile. This profile is defined by a set of stereotypes, constraints and tagged values to elegantly represent main MD properties at the conceptual level. We make use of the Object Constraint Language (OCL) to specify the constraints attached to the defined stereotypes, thereby avoiding an arbitrary use of these stereotypes. We have based our proposal in UML for two main reasons: (i) UML is a well known standard modeling language known by most database designers, thereby designers can avoid learning a new notation, and (ii) UML can be easily extended so that it can be tailored for a specific domain with concrete peculiarities such as the multidimensional modeling for data warehouses. Moreover, our proposal is Model Driven Architecture (MDA) compliant and we use the Query View Transformation (QVT) approach for an automatic generation of the implementation in a target platform. Throughout the paper, we will describe how to easily accomplish the MD modeling of DWs at the conceptual level. Finally, we show how to use our extension in Rational Rose for MD modeling.", "title": "" }, { "docid": "83c87294c33601023fdd0624d2dacecc", "text": "In modern road surveys, hanging power cables are among the most commonly-found geometric features. These cables are catenary curves that are conventionally modelled with three parameters in 2D Cartesian space. With the advent and popularity of the mobile mapping system (MMS), the 3D point clouds of hanging power cables can be captured within a short period of time. These point clouds, similarly to those of planar features, can be used for feature-based self-calibration of the system assembly errors of an MMS. However, to achieve this, a well-defined 3D equation for the catenary curve is needed. This paper proposes three 3D catenary curve models, each having different parameters. The models are examined by least squares fitting of simulated data and real data captured with an MMS. The outcome of the fitting is investigated in terms of the residuals and correlation matrices. Among the proposed models, one of them could estimate the parameters accurately and without any extreme correlation between the variables. This model can also be applied to those transmission lines captured by airborne laser scanning or any other hanging cable-like objects.", "title": "" }, { "docid": "b779b82b0ecc316b13129480586ac483", "text": "Chainspace is a decentralized infrastructure, known as a distributed ledger, that supports user defined smart contracts and executes user-supplied transactions on their objects. The correct execution of smart contract transactions is verifiable by all. The system is scalable, by sharding state and the execution of transactions, and using S-BAC, a distributed commit protocol, to guarantee consistency. Chainspace is secure against subsets of nodes trying to compromise its integrity or availability properties through Byzantine Fault Tolerance (BFT), and extremely highauditability, non-repudiation and ‘blockchain’ techniques. Even when BFT fails, auditing mechanisms are in place to trace malicious participants. We present the design, rationale, and details of Chainspace; we argue through evaluating an implementation of the system about its scaling and other features; we illustrate a number of privacy-friendly smart contracts for smart metering, polling and banking and measure their performance.", "title": "" }, { "docid": "07657456a2328be11dfaf706b5728ddc", "text": "Knowledge of wheelchair kinematics during a match is prerequisite for performance improvement in wheelchair basketball. Unfortunately, no measurement system providing key kinematic outcomes proved to be reliable in competition. In this study, the reliability of estimated wheelchair kinematics based on a three inertial measurement unit (IMU) configuration was assessed in wheelchair basketball match-like conditions. Twenty participants performed a series of tests reflecting different motion aspects of wheelchair basketball. During the tests wheelchair kinematics were simultaneously measured using IMUs on wheels and frame, and a 24-camera optical motion analysis system serving as gold standard. Results showed only small deviations of the IMU method compared to the gold standard, once a newly developed skid correction algorithm was applied. Calculated Root Mean Square Errors (RMSE) showed good estimates for frame displacement (RMSE≤0.05 m) and speed (RMSE≤0.1m/s), except for three truly vigorous tests. Estimates of frame rotation in the horizontal plane (RMSE<3°) and rotational speed (RMSE<7°/s) were very accurate. Differences in calculated Instantaneous Rotation Centres (IRC) were small, but somewhat larger in tests performed at high speed (RMSE up to 0.19 m). Average test outcomes for linear speed (ICCs>0.90), rotational speed (ICC>0.99) and IRC (ICC> 0.90) showed high correlations between IMU data and gold standard. IMU based estimation of wheelchair kinematics provided reliable results, except for brief moments of wheel skidding in truly vigorous tests. The IMU method is believed to enable prospective research in wheelchair basketball match conditions and contribute to individual support of athletes in everyday sports practice.", "title": "" }, { "docid": "08a6297a0959e0c12801b603d585e12c", "text": "The national exchequer, the banking industry and regular citizens all incur a high overhead in using physical cash. Electronic cash and cell phone-based payment in particular is a viable alternative to physical cash since it incurs much lower overheads and offers more convenience. Because security is of paramount importance in financial transactions, it is imperative that attack vectors in this application be identified and analyzed. In this paper, we investigate vulnerabilities in several dimensions – in choice of hardware/software platform, in technology and in cell phone operating system. We examine how existing and future mobile worms can severely compromise the security of transacting payments through a cell phone.", "title": "" }, { "docid": "300e215e91bb49aef0fcb44c3084789e", "text": "We present an extension to the Tacotron speech synthesis architecture that learns a latent embedding space of prosody, derived from a reference acoustic representation containing the desired prosody. We show that conditioning Tacotron on this learned embedding space results in synthesized audio that matches the prosody of the reference signal with fine time detail even when the reference and synthesis speakers are different. Additionally, we show that a reference prosody embedding can be used to synthesize text that is different from that of the reference utterance. We define several quantitative and subjective metrics for evaluating prosody transfer, and report results with accompanying audio samples from single-speaker and 44-speaker Tacotron models on a prosody transfer task.", "title": "" }, { "docid": "94c5f0bba64e131a64989813652846a5", "text": "The ability to access patents and relevant patent-related information pertaining to a patented technology can fundamentally transform the patent system and its functioning and patent institutions such as the USPTO and the federal courts. This paper describes an ontology-based computational framework that can resolve some of difficult issues in retrieving patents and patent related information for the legal and justice system.", "title": "" }, { "docid": "e7808c1fa1c5e02119a3c9da855f7499", "text": "Cloud computing provides users with great flexibility when provisioning resources, with cloud providers offering a choice of reservation and on-demand purchasing options. Reservation plans offer cheaper prices, but must be chosen in advance, and therefore must be appropriate to users' requirements. If demand is uncertain, the reservation plan may not be sufficient and on-demand resources have to be provisioned. Previous work focused on optimally placing virtual machines with cloud providers to minimize total cost. However, many applications require large amounts of network bandwidth. Therefore, considering only virtual machines offers an incomplete view of the system. Exploiting recent developments in software defined networking (SDN), we propose a unified approach that integrates virtual machine and network bandwidth provisioning. We solve a stochastic integer programming problem to obtain an optimal provisioning of both virtual machines and network bandwidth, when demand is uncertain. Numerical results clearly show that our proposed solution minimizes users' costs and provides superior performance to alternative methods. We believe that this integrated approach is the way forward for cloud computing to support network intensive applications.", "title": "" }, { "docid": "48b14b78512a8f63d3a9dcdf70d88182", "text": "A cute lymphocytic leukemia (ALL) is a malignant disease characterized by the accumulation of lymphoblast in the bone marrow. An improved scheme for ALL detection in blood microscopic images is presented here. In this study features i.e. hausdorff dimension and contour signature are employed to classify a lymphocytic cell in the blood image into normal lymphocyte or lymphoblast (blasts). In addition shape and texture features are also extracted for better classification. Initial segmentation is done using K-means clustering which segregates leukocytes or white blood cells (WBC) from other blood components i.e. erythrocytes and platelets. The results of K-means are used for evaluating individual cell shape, texture and other features for final detection of leukemia. Fractal features i.e. hausdorff dimension is implemented for measuring perimeter roughness and hence classifying a lymphocytic cell nucleus. A total of 108 blood smear images were considered for feature extraction and final performance evaluation is validated with the results of a hematologist.", "title": "" }, { "docid": "42903610920a47773627a33db25590f3", "text": "We consider the analysis of Electroencephalography (EEG) and Local Field Potential (LFP) datasets, which are “big” in terms of the size of recorded data but rarely have sufficient labels required to train complex models (e.g., conventional deep learning methods). Furthermore, in many scientific applications, the goal is to be able to understand the underlying features related to the classification, which prohibits the blind application of deep networks. This motivates the development of a new model based on parameterized convolutional filters guided by previous neuroscience research; the filters learn relevant frequency bands while targeting synchrony, which are frequency-specific power and phase correlations between electrodes. This results in a highly expressive convolutional neural network with only a few hundred parameters, applicable to smaller datasets. The proposed approach is demonstrated to yield competitive (often state-of-the-art) predictive performance during our empirical tests while yielding interpretable features. Furthermore, a Gaussian process adapter is developed to combine analysis over distinct electrode layouts, allowing the joint processing of multiple datasets to address overfitting and improve generalizability. Finally, it is demonstrated that the proposed framework effectively tracks neural dynamics on children in a clinical trial on Autism Spectrum Disorder.", "title": "" }, { "docid": "a436bdc20d63dcf4f0647005bb3314a7", "text": "The purpose of this study is to evaluate the feasibility of the integration of concept maps and tablet PCs in anti-phishing education for enhancing students’ learning motivation and achievement. The subjects were 155 students from grades 8 and 9. They were divided into an experimental group (77 students) and a control group (78 students). To begin with, the two groups received identical anti-phishing training: the teacher explained the concept of anti-phishing and asked the students questions; the students then used tablet PCs for polling and answering the teachers’ questions. Afterwards, the two groups performed different group activities: the experimental group was divided into smaller groups, which used tablet PCs to draw concept maps; the control group was also divided into groups which completed worksheets. The study found that the use of concept maps on tablet PCs during the anti-phishing education significantly enhanced the students’ learning motivation when their initial motivation was already high. For learners with low initial motivation or prior knowledge, the use of worksheets could increase their posttest achievement and motivation. This study therefore proposes that motivation and achievement in teaching the anti-phishing concept can be effectively enhanced if the curriculum is designed based on the students’ learning preferences or prior knowledge, in conjunction with the integration of mature and accessible technological media into the learning activities. The findings can also serve as a reference for anti-phishing educators and researchers.", "title": "" }, { "docid": "80ae8494ba7ebc70e9454d68f4dc5cbd", "text": "Advanced deep learning methods have been developed to conduct prostate MR volume segmentation in either a 2D or 3D fully convolutional manner. However, 2D methods tend to have limited segmentation performance, since large amounts of spatial information of prostate volumes are discarded during the slice-by-slice segmentation process; and 3D methods also have room for improvement, since they use isotropic kernels to perform 3D convolutions whereas most prostate MR volumes have anisotropic spatial resolution. Besides, the fully convolutional structural methods achieve good performance for localization issues but neglect the per-voxel classification for segmentation tasks. In this paper, we propose a 3D Global Convolutional Adversarial Network (3D GCA-Net) to address efficient prostate MR volume segmentation. We first design a 3D ResNet encoder to extract 3D features from prostate scans, and then develop the decoder, which is composed of a multi-scale 3D global convolutional block and a 3D boundary refinement block, to address the classification and localization issues simultaneously for volumetric segmentation. Additionally, we combine the encoder-decoder segmentation network with an adversarial network in the training phrase to enforce the contiguity of long-range spatial predictions. Throughout the proposed model, we use anisotropic convolutional processing for better feature learning on prostate MR scans. We evaluated our 3D GCA-Net model on two public prostate MR datasets and achieved state-of-the-art performances.", "title": "" }, { "docid": "15316c80d2a880b06846e8dd398a5c3f", "text": "One weak spot is all it takes to open secured digital doors and online accounts causing untold damage and consequences.", "title": "" }, { "docid": "3ea533be157b63e673f43205d195d13e", "text": "Recent work on fairness in machine learning has begun to be extended to recommender systems. While there is a tension between the goals of fairness and of personalization, there are contexts in which a global evaluations of outcomes is possible and where equity across such outcomes is a desirable goal. In this paper, we introduce the concept of a balanced neighborhood as a mechanism to preserve personalization in recommendation while enhancing the fairness of recommendation outcomes. We show that a modified version of the SLIM algorithm can be used to improve the balance of user neighborhoods, with the result of achieving greater outcome fairness in a real-world dataset with minimal loss in ranking performance.", "title": "" }, { "docid": "87d51053f5e66aefaf24318cc2b3ba22", "text": "In this paper we study the distribution of average user rating of entities in three different domains: restaurants, movies, and products. We find that the distribution is heavily skewed, closely resembling a log-normal in all the cases. In contrast, the distribution of average critic rating is much closer to a normal distribution. We propose user selection bias as the underlying behavioral phenomenon causing this disparity in the two distributions. We show that selection bias can indeed lead to a skew in the distribution of user ratings even when we assume the quality of entities are normally distributed. Finally, we apply these insights to the problem of predicting the overall rating of an entity given its few initial ratings, and obtain a simple method that outperforms strong baselines.", "title": "" }, { "docid": "e6548454f46962b5ce4c5d4298deb8e7", "text": "The use of SVM (Support Vector Machines) in detecting e-mail as spam or nonspam by incorporating feature selection using GA (Genetic Algorithm) is investigated. An GA approach is adopted to select features that are most favorable to SVM classifier, which is named as GA-SVM. Scaling factor is exploited to measure the relevant coefficients of feature to the classification task and is estimated by GA. Heavy-bias operator is introduced in GA to promote sparse in the scaling factors of features. So, feature selection is performed by eliminating irrelevant features whose scaling factor is zero. The experiment results on UCI Spam database show that comparing with original SVM classifier, the number of support vector decreases while better classification results are achieved based on GA-SVM.", "title": "" }, { "docid": "a3f06bfcc2034483cac3ee200803878c", "text": "This paper presents a technique for motion detection that incorporates several innovative mechanisms. For example, our proposed technique stores, for each pixel, a set of values taken in the past at the same location or in the neighborhood. It then compares this set to the current pixel value in order to determine whether that pixel belongs to the background, and adapts the model by choosing randomly which values to substitute from the background model. This approach differs from those based upon the classical belief that the oldest values should be replaced first. Finally, when the pixel is found to be part of the background, its value is propagated into the background model of a neighboring pixel. We describe our method in full details (including pseudo-code and the parameter values used) and compare it to other background subtraction techniques. Efficiency figures show that our method outperforms recent and proven state-of-the-art methods in terms of both computation speed and detection rate. We also analyze the performance of a downscaled version of our algorithm to the absolute minimum of one comparison and one byte of memory per pixel. It appears that even such a simplified version of our algorithm performs better than mainstream techniques.", "title": "" }, { "docid": "6968d5646db3941b06d3763033cb8d45", "text": "Path prediction is useful in a wide range of applications. Most of the existing solutions, however, are based on eager learning methods where models and patterns are extracted from historical trajectories and then used for future prediction. Since such approaches are committed to a set of statistically significant models or patterns, problems can arise in dynamic environments where the underlying models change quickly or where the regions are not covered with statistically significant models or patterns.\n We propose a \"semi-lazy\" approach to path prediction that builds prediction models on the fly using dynamically selected reference trajectories. Such an approach has several advantages. First, the target trajectories to be predicted are known before the models are built, which allows us to construct models that are deemed relevant to the target trajectories. Second, unlike the lazy learning approaches, we use sophisticated learning algorithms to derive accurate prediction models with acceptable delay based on a small number of selected reference trajectories. Finally, our approach can be continuously self-correcting since we can dynamically re-construct new models if the predicted movements do not match the actual ones.\n Our prediction model can construct a probabilistic path whose probability of occurrence is larger than a threshold and which is furthest ahead in term of time. Users can control the confidence of the path prediction by setting a probability threshold. We conducted a comprehensive experimental study on real-world and synthetic datasets to show the effectiveness and efficiency of our approach.", "title": "" }, { "docid": "6b44ee250cce2aa7f7589d85cb26417f", "text": "Financial fraud under IoT environment refers to the unauthorized use ofmobile transaction usingmobile platform through identity theft or credit card stealing to obtain money fraudulently. Financial fraud under IoT environment is the fast-growing issue through the emergence of smartphone and online transition services. In the real world, a highly accurate process of financial fraud detection under IoT environment is needed since financial fraud causes financial loss. Therefore, we have surveyed financial fraud methods using machine learning and deep learning methodology, mainly from 2016 to 2018, and proposed a process for accurate fraud detection based on the advantages and limitations of each research. Moreover, our approach proposed the overall process of detecting financial fraud based on machine learning and compared with artificial neural networks approach to detect fraud and process large amounts of financial data. To detect financial fraud and process large amounts of financial data, our proposed process includes feature selection, sampling, and applying supervised and unsupervised algorithms. The final model was validated by the actual financial transaction data occurring in Korea, 2015.", "title": "" }, { "docid": "b76af76207fa3ef07e8f2fbe6436dca0", "text": "Face recognition applications for airport security and surveillance can benefit from the collaborative coupling of mobile and cloud computing as they become widely available today. This paper discusses our work with the design and implementation of face recognition applications using our mobile-cloudlet-cloud architecture named MOCHA and its initial performance results. The challenge lies with how to perform task partitioning from mobile devices to cloud and distribute compute load among cloud servers (cloudlet) to minimize the response time given diverse communication latencies and server compute powers. Our preliminary simulation results show that optimal task partitioning algorithms significantly affect response time with heterogeneous latencies and compute powers. Motivated by these results, we design, implement, and validate the basic functionalities of MOCHA as a proof-of-concept, and develop algorithms that minimize the overall response time for face recognition. Our experimental results demonstrate that high-powered cloudlets are technically feasible and indeed help reduce overall processing time when face recognition applications run on mobile devices using the cloud as the backend servers.", "title": "" } ]
scidocsrr
2d63698cbd21c4bed006f2b126a476dc
A Combined Deep Learning GRU-Autoencoder for the Early Detection of Respiratory Disease in Pigs Using Multiple Environmental Sensors
[ { "docid": "ba9122284ddc43eb3bc4dff89502aa9d", "text": "Recent advancements in sensor technology have made it possible to collect enormous amounts of data in real time. However, because of the sheer volume of data most of it will never be inspected by an algorithm, much less a human being. One way to mitigate this problem is to perform some type of anomaly (novelty /interestingness/surprisingness) detection and flag unusual patterns for further inspection by humans or more CPU intensive algorithms. Most current solutions are “custom made” for particular domains, such as ECG monitoring, valve pressure monitoring, etc. This customization requires extensive effort by domain expert. Furthermore, hand-crafted systems tend to be very brittle to concept drift. In this demonstration, we will show an online anomaly detection system that does not need to be customized for individual domains, yet performs with exceptionally high precision/recall. The system is based on the recently introduced idea of time series bitmaps. To demonstrate the universality of our system, we will allow testing on independently annotated datasets from domains as diverse as ECGs, Space Shuttle telemetry monitoring, video surveillance, and respiratory data. In addition, we invite attendees to test our system with any dataset available on the web.", "title": "" } ]
[ { "docid": "1095c68a0843daf6b8a3c8abc5ddc521", "text": "Crosslingual word embeddings represent lexical items from different languages using the same vector space, enabling crosslingual transfer. Most prior work constructs embeddings for a pair of languages, with English on one side. We investigate methods for building high quality crosslingual word embeddings for many languages in a unified vector space. In this way, we can exploit and combine information from many languages. We report competitive performance on bilingual lexicon induction, monolingual similarity and crosslingual document classification", "title": "" }, { "docid": "2f201cd1fe90e0cd3182c672110ce96d", "text": "BACKGROUND\nFor many years, high dose radiation therapy was the standard treatment for patients with locally or regionally advanced non-small-cell lung cancer (NSCLC), despite a 5-year survival rate of only 3%-10% following such therapy. From May 1984 through May 1987, the Cancer and Leukemia Group B (CALGB) conducted a randomized trial that showed that induction chemotherapy before radiation therapy improved survival during the first 3 years of follow-up.\n\n\nPURPOSE\nThis report provides data for 7 years of follow-up of patients enrolled in the CALGB trial.\n\n\nMETHODS\nThe patient population consisted of individuals who had clinical or surgical stage III, histologically documented NSCLC; a CALGB performance status of 0-1; less than 5% loss of body weight in the 3 months preceding diagnosis; and radiographically visible disease. Patients were randomly assigned to receive either 1) cisplatin (100 mg/m2 body surface area intravenously on days 1 and 29) and vinblastine (5 mg/m2 body surface area intravenously weekly on days 1, 8, 15, 22, and 29) followed by radiation therapy with 6000 cGy given in 30 fractions beginning on day 50 (CT-RT group) or 2) radiation therapy with 6000 cGy alone beginning on day 1 (RT group) for a maximum duration of 6-7 weeks. Patients were evaluated for tumor regression if they had measurable or evaluable disease and were monitored for toxic effects, disease progression, and date of death.\n\n\nRESULTS\nThere were 78 eligible patients randomly assigned to the CT-RT group and 77 randomly assigned to the RT group. Both groups were similar in terms of sex, age, histologic cell type, performance status, substage of disease, and whether staging had been clinical or surgical. All patients had measurable or evaluable disease at the time of random assignment to treatment groups. Both groups received a similar quantity and quality of radiation therapy. As previously reported, the rate of tumor response, as determined radiographically, was 56% for the CT-RT group and 43% for the RT group (P = .092). After more than 7 years of follow-up, the median survival remains greater for the CT-RT group (13.7 months) than for the RT group (9.6 months) (P = .012) as ascertained by the logrank test (two-sided). The percentages of patients surviving after years 1 through 7 were 54, 26, 24, 19, 17, 13, and 13 for the CT-RT group and 40, 13, 10, 7, 6, 6, and 6 for the RT group.\n\n\nCONCLUSIONS\nLong-term follow-up confirms that patients with stage III NSCLC who receive 5 weeks of chemotherapy with cisplatin and vinblastine before radiation therapy have a 4.1-month increase in median survival. The use of sequential chemotherapy-radiotherapy increases the projected proportion of 5-year survivors by a factor of 2.8 compared with that of radiotherapy alone. However, inasmuch as 80%-85% of such patients still die within 5 years and because treatment failure occurs both in the irradiated field and at distant sites in patients receiving either sequential chemotherapy-radiotherapy or radiotherapy alone, the need for further improvements in both the local and systemic treatment of this disease persists.", "title": "" }, { "docid": "819c9080a44a5ff6c8d99d37e82c7a0a", "text": "In this study we introduce a new indicator for private consumption based on search query time series provided by Google Trends. The indicator is based on factors extracted from consumption-related search categories of the Google Trends application Insights for Search. The forecasting performance of the new indicator is assessed relative to the two most common survey-based indicators the University of Michigan Consumer Sentiment Index and the Conference Board Consumer Confi dence Index. The results show that in almost all conducted in-sample and out-of-sample forecasting experiments the Google indicator outperforms the survey-based indicators. This suggests that incorporating information from Google Trends may off er signifi cant benefi ts to forecasters of private consumption. JEL Classifi cation: C53, E21, E27", "title": "" }, { "docid": "bf65f2c68808755cfcd13e6cc7d0ccab", "text": "Human identification by fingerprints is based on the fundamental premise that ridge patterns from distinct fingers are different (uniqueness) and a fingerprint pattern does not change over time (persistence). Although the uniqueness of fingerprints has been investigated by developing statistical models to estimate the probability of error in comparing two random samples of fingerprints, the persistence of fingerprints has remained a general belief based on only a few case studies. In this study, fingerprint match (similarity) scores are analyzed by multilevel statistical models with covariates such as time interval between two fingerprints in comparison, subject's age, and fingerprint image quality. Longitudinal fingerprint records of 15,597 subjects are sampled from an operational fingerprint database such that each individual has at least five 10-print records over a minimum time span of 5 y. In regard to the persistence of fingerprints, the longitudinal analysis on a single (right index) finger demonstrates that (i) genuine match scores tend to significantly decrease when time interval between two fingerprints in comparison increases, whereas the change in impostor match scores is negligible; and (ii) fingerprint recognition accuracy at operational settings, nevertheless, tends to be stable as the time interval increases up to 12 y, the maximum time span in the dataset. However, the uncertainty of temporal stability of fingerprint recognition accuracy becomes substantially large if either of the two fingerprints being compared is of poor quality. The conclusions drawn from 10-finger fusion analysis coincide with the conclusions from single-finger analysis.", "title": "" }, { "docid": "d909528f98e49f8107bf0cee7a83bbfe", "text": "INTRODUCTION\nThe increasing use of cone-beam computed tomography in orthodontics has been coupled with heightened concern about the long-term risks of x-ray exposure in orthodontic populations. An industry response to this has been to offer low-exposure alternative scanning options in newer cone-beam computed tomography models.\n\n\nMETHODS\nEffective doses resulting from various combinations of field of view size and field location comparing child and adult anthropomorphic phantoms with the recently introduced i-CAT FLX cone-beam computed tomography unit (Imaging Sciences, Hatfield, Pa) were measured with optical stimulated dosimetry using previously validated protocols. Scan protocols included high resolution (360° rotation, 600 image frames, 120 kV[p], 5 mA, 7.4 seconds), standard (360°, 300 frames, 120 kV[p], 5 mA, 3.7 seconds), QuickScan (180°, 160 frames, 120 kV[p], 5 mA, 2 seconds), and QuickScan+ (180°, 160 frames, 90 kV[p], 3 mA, 2 seconds). Contrast-to-noise ratio was calculated as a quantitative measure of image quality for the various exposure options using the QUART DVT phantom.\n\n\nRESULTS\nChild phantom doses were on average 36% greater than adult phantom doses. QuickScan+ protocols resulted in significantly lower doses than standard protocols for the child (P = 0.0167) and adult (P = 0.0055) phantoms. The 13 × 16-cm cephalometric fields of view ranged from 11 to 85 μSv in the adult phantom and 18 to 120 μSv in the child phantom for the QuickScan+ and standard protocols, respectively. The contrast-to-noise ratio was reduced by approximately two thirds when comparing QuickScan+ with standard exposure parameters.\n\n\nCONCLUSIONS\nQuickScan+ effective doses are comparable with conventional panoramic examinations. Significant dose reductions are accompanied by significant reductions in image quality. However, this trade-off might be acceptable for certain diagnostic tasks such as interim assessment of treatment results.", "title": "" }, { "docid": "e90b54f7ae5ebc0b46d0fb738bb0f458", "text": "The availability of large labeled datasets has allowed Convolutional Network models to achieve impressive recognition results. However, in many settings manual annotation of the data is impractical; instead our data has noisy labels, i.e. there is some freely available label for each image which may or may not be accurate. In this paper, we explore the performance of discriminatively-trained Convnets when trained on such noisy data. We introduce an extra noise layer into the network which adapts the network outputs to match the noisy label distribution. The parameters of this noise layer can be estimated as part of the training process and involve simple modifications to current training infrastructures for deep networks. We demonstrate the approaches on several datasets, including large scale experiments on the ImageNet classification benchmark.", "title": "" }, { "docid": "21c4cd3a91a659fcd3800967943a2ffd", "text": "Ground reaction force (GRF) measurement is important in the analysis of human body movements. The main drawback of the existing measurement systems is the restriction to a laboratory environment. This study proposes an ambulatory system for assessing the dynamics of ankle and foot, which integrates the measurement of the GRF with the measurement of human body movement. The GRF and the center of pressure (CoP) are measured using two 6D force/moment sensors mounted beneath the shoe. The movement of the foot and the lower leg is measured using three miniature inertial sensors, two rigidly attached to the shoe and one to the lower leg. The proposed system is validated using a force plate and an optical position measurement system as a reference. The results show good correspondence between both measurement systems, except for the ankle power. The root mean square (rms) difference of the magnitude of the GRF over 10 evaluated trials was 0.012 ± 0.001 N/N (mean ± standard deviation), being 1.1 ± 0.1 % of the maximal GRF magnitude. It should be noted that the forces, moments, and powers are normalized with respect to body weight. The CoP estimation using both methods shows good correspondence, as indicated by the rms difference of 5.1± 0.7 mm, corresponding to 1.7 ± 0.3 % of the length of the shoe. The rms difference between the magnitudes of the heel position estimates was calculated as 18 ± 6 mm, being 1.4 ± 0.5 % of the maximal magnitude. The ankle moment rms difference was 0.004 ± 0.001 Nm/N, being 2.3 ± 0.5 % of the maximal magnitude. Finally, the rms difference of the estimated power at the ankle was 0.02 ± 0.005 W/N, being 14 ± 5 % of the maximal power. This power difference is caused by an inaccurate estimation of the angular velocities using the optical reference measurement system, which is due to considering the foot as a single segment. The ambulatory system considers separate heel and forefoot segments, thus allowing an additional foot moment and power to be estimated. Based on the results of this research, it is concluded that the combination of the instrumented shoe and inertial sensing is a promising tool for the assessment of the dynamics of foot and ankle in an ambulatory setting.", "title": "" }, { "docid": "07c39fa141334c0b18ecb274a50bed44", "text": "Virtual reality (VR) using head-mounted displays (HMDs) is becoming popular. Smartphone-based HMDs (SbHMDs) are so low cost that users can easily experience VR. Unfortunately, their input modality is quite limited. We propose a real-time eye tracking technique that uses the built-in front facing camera to capture the user's eye. It realizes stand-alone pointing functionality without any additional device.", "title": "" }, { "docid": "499075bf796e8f914d1c925258497144", "text": "In this paper we examine the social and legal conditions in which many transgender people (often called trans people) live, and the medical perspectives that frame the provision of health care for transgender people across much of the world. Modern research shows much higher numbers of transgender people than were apparent in earlier clinic-based studies, as well as biological factors associated with gender incongruence. We examine research showing that many transgender people live on the margins of society, facing stigma, discrimination, exclusion, violence, and poor health. They often experience difficulties accessing appropriate health care, whether specific to their gender needs or more general in nature. Some governments are taking steps to address human rights issues and provide better legal protection for transgender people, but this action is by no means universal. The mental illness perspective that currently frames health-care provision for transgender people across much of the world is under scrutiny. The WHO diagnostic manual may soon abandon its current classification of transgender people as mentally disordered. Debate exists as to whether there should be a diagnosis of any sort for transgender children below the age of puberty.", "title": "" }, { "docid": "b8f7e3d3470766750374cefb9f4c9210", "text": "For years, recursive neural networks (RvNNs) have been shown to be suitable for representing text into fixed-length vectors and achieved good performance on several natural language processing tasks. However, the main drawback of RvNNs is that they require structured input, which makes data preparation and model implementation hard. In this paper, we propose Gumbel Tree-LSTM, a novel tree-structured long short-term memory architecture that learns how to compose task-specific tree structures only from plain text data efficiently. Our model uses Straight-Through Gumbel-Softmax estimator to decide the parent node among candidates dynamically and to calculate gradients of the discrete decision. We evaluate the proposed model on natural language inference and sentiment analysis, and show that our model outperforms or is at least comparable to previous models. We also find that our model converges significantly faster than other models.", "title": "" }, { "docid": "c1ee5f717481652d91431f647401d6d2", "text": "Cluster ensembles have recently emerged as a powerful alternative to standard cluster analysis, aggregating several input data clusterings to generate a single output clustering, with improved robustness and stability. From the early work, these techniques held great promise; however, most of them generate the final solution based on incomplete information of a cluster ensemble. The underlying ensemble-information matrix reflects only cluster-data point relations, while those among clusters are generally overlooked. This paper presents a new link-based approach to improve the conventional matrix. It achieves this using the similarity between clusters that are estimated from a link network model of the ensemble. In particular, three new link-based algorithms are proposed for the underlying similarity assessment. The final clustering result is generated from the refined matrix using two different consensus functions of feature-based and graph-based partitioning. This approach is the first to address and explicitly employ the relationship between input partitions, which has not been emphasized by recent studies of matrix refinement. The effectiveness of the link-based approach is empirically demonstrated over 10 data sets (synthetic and real) and three benchmark evaluation measures. The results suggest the new approach is able to efficiently extract information embedded in the input clusterings, and regularly illustrate higher clustering quality in comparison to several state-of-the-art techniques.", "title": "" }, { "docid": "616fcc0eb15da5d2e2b6ce2e63ad49dd", "text": "Many factory optimization problems, from inventory control to scheduling and reliability , can be formulated as continuous-time Markov decision processes. A primary goal in such problems is to nd a gain-optimal policy that minimizes the long-run average cost. This paper describes a new average-reward algorithm called SMART for nd-ing gain-optimal policies in continuous time semi-Markov decision processes. The paper presents a detailed experimental study of SMART on a large unreliable production inventory problem. SMART outperforms two well-known reliability heuristics from industrial engineering. A key feature of this study is the integration of the reinforcement learning algorithm directly into two commercial discrete-event simulation packages, ARENA and CSIM, paving the way for this approach to be applied to many other factory optimization problems for which there already exist simulation models.", "title": "" }, { "docid": "904efe77c6a31867cf096770b99e856b", "text": "Deep neural networks have been proven powerful at processing perceptual data, such as images and audio. However for tabular data, tree-based models are more popular. A nice property of tree-based models is their natural interpretability. In this work, we present Deep Neural Decision Trees (DNDT) – tree models realised by neural networks. A DNDT is intrinsically interpretable, as it is a tree. Yet as it is also a neural network (NN), it can be easily implemented in NN toolkits, and trained with gradient descent rather than greedy splitting. We evaluate DNDT on several tabular datasets, verify its efficacy, and investigate similarities and differences between DNDT and vanilla decision trees. Interestingly, DNDT self-prunes at both split and feature-level.", "title": "" }, { "docid": "28c3e990b40b62069010e0a7f94adb11", "text": "Steep sub-threshold transistors are promising candidates to replace the traditional MOSFETs for sub-threshold leakage reduction. In this paper, we explore the use of Inter-Band Tunnel Field Effect Transistors (TFETs) in SRAMs at ultra low supply voltages. The uni-directional current conducting TFETs limit the viability of 6T SRAM cells. To overcome this limitation, 7T SRAM designs were proposed earlier at the cost of extra silicon area. In this paper, we propose a novel 6T SRAM design using Si-TFETs for reliable operation with low leakage at ultra low voltages. We also demonstrate that a functional 6T TFET SRAM design with comparable stability margins and faster performances at low voltages can be realized using proposed design when compared with the 7T TFET SRAM cell. We achieve a leakage reduction improvement of 700X and 1600X over traditional CMOS SRAM designs at VDD of 0.3V and 0.5V respectively which makes it suitable for use at ultra-low power applications.", "title": "" }, { "docid": "9798859ddb2d29fa461dab938c5183bb", "text": "The emergence of the extended manufacturing enterprise, a globally dispersed collection of strategically aligned organizations, has brought new attention to how organizations coordinate the flow of information and materials across their w supply chains. This paper explores and develops the concept of enterprise logistics Greis, N.P., Kasarda, J.D., 1997. Ž . x Enterprise logistics in the information age. California Management Review 39 3 , 55–78 as a tool for integrating the logistics activities both within and between the strategically aligned organizations of the extended enterprise. Specifically, this paper examines the fit between an organization’s enterprise logistics integration capabilities and its supply chain structure. Using a configurations approach, we test whether globally dispersed network organizations that adopt enterprise logistics practices are able to achieve higher levels of organizational performance. Results indicate that enterprise logistics is a necessary tool for the coordination of supply chain operations that are geographically dispersed around the world. However, for a pure network structure, a high level of enterprise logistics integration alone does not guarantee improved organizational performance. The paper ends with a discussion of managerial implications and directions for future research. q 2000 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "392d6bf78f8a8a59f08d8102cec3ea91", "text": "Cancellous and cortical autografts histologically have three differences: (1) cancellous grafts are revascularized more rapidly and completely than cortical grafts; (2) creeping substitution of cancellous bone initially involves an appositional bone formation phase, followed by a resorptive phase, whereas cortical grafts undergo a reverse creeping substitution process; (3) cancellous grafts tend to repair completely with time, whereas cortical grafts remain as admixtures of necrotic and viable bone. Physiologic skeletal metabolic factors influence the rate, amount, and completeness of bone repair and graft incorporation. The mechanical strengths of cancellous and cortical grafts are correlated with their respective repair processes: cancellous grafts tend to be strengthened first, whereas cortical grafts are weakened. Bone allografts are influenced by the same immunologic factors as other tissue grafts. Fresh bone allografts may be rejected by the host's immune system. The histoincompatibility antigens of bone allografts are presumably the proteins or glycoproteins on cell surfaces. The matrix proteins may or may not elicit graft rejection. The rejection of a bone allograft is considered to be a cellular rather than a humoral response, although the humoral component may play a part. The degree of the host response to an allograft may be related to the antigen concentration and total dose. The rejection of a bone allograft is histologically expressed by the disruption of vessels, an inflammatory process including lymphocytes, fibrous encapsulation, peripheral graft resorption, callus bridging, nonunions, and fatigue fractures.", "title": "" }, { "docid": "c4fa5e593136812de615bcfae07ac5a9", "text": "BACKGROUND\nDelirium in critically ill children is a severe neuropsychiatric disorder which has gained increased attention from clinicians. Early identification of delirium is essential for successful management. The Sophia Observation withdrawal Symptoms-Paediatric Delirium (SOS-PD) scale was developed to detect Paediatric Delirium (PD) at an early stage.\n\n\nOBJECTIVE\nThe aim of this study was to determine the measurement properties of the PD component of the SOS-PD scale in critically ill children.\n\n\nMETHODS\nA prospective, observational study was performed in patients aged 3 months or older and admitted for more than 48h. These patients were assessed with the SOS-PD scale three times a day. If the SOS-PD total score was 4 or higher in two consecutive observations, the child psychiatrist was consulted to assess the diagnosis of PD using the Diagnostic and Statistical Manual-IV criteria as the \"gold standard\". The child psychiatrist was blinded to outcomes of the SOS-PD. The interrater reliability of the SOS-PD between the care-giving nurse and a researcher was calculated with the intraclass correlation coefficient (ICC).\n\n\nRESULTS\nA total of 2088 assessments were performed in 146 children (median age 49 months; IQR 13-140). The ICC of 16 paired nurse-researcher observations was 0.90 (95% CI 0.70-0.96). We compared 63 diagnoses of the child psychiatrist versus SOS-PD assessments in 14 patients, in 13 of whom the diagnosis of PD was confirmed. The sensitivity was 96.8% (95% CI 80.4-99.5%) and the specificity was 92.0% (95% CI 59.7-98.9%).\n\n\nCONCLUSIONS\nThe SOS-PD scale shows promising validity for early screening of PD. Further evidence should be obtained from an international multicentre study.", "title": "" }, { "docid": "71cac5680dafbc3c56dbfffa4472b67a", "text": "Three-dimensional printing has significant potential as a fabrication method in creating scaffolds for tissue engineering. The applications of 3D printing in the field of regenerative medicine and tissue engineering are limited by the variety of biomaterials that can be used in this technology. Many researchers have developed novel biomaterials and compositions to enable their use in 3D printing methods. The advantages of fabricating scaffolds using 3D printing are numerous, including the ability to create complex geometries, porosities, co-culture of multiple cells, and incorporate growth factors. In this review, recently-developed biomaterials for different tissues are discussed. Biomaterials used in 3D printing are categorized into ceramics, polymers, and composites. Due to the nature of 3D printing methods, most of the ceramics are combined with polymers to enhance their printability. Polymer-based biomaterials are 3D printed mostly using extrusion-based printing and have a broader range of applications in regenerative medicine. The goal of tissue engineering is to fabricate functional and viable organs and, to achieve this, multiple biomaterials and fabrication methods need to be researched.", "title": "" }, { "docid": "0305bac1e39203b49b794559bfe0b376", "text": "The emerging field of semantic web technologies promises new stimulus for Software Engineering research. However, since the underlying concepts of the semantic web have a long tradition in the knowledge engineering field, it is sometimes hard for software engineers to overlook the variety of ontology-enabled approaches to Software Engineering. In this paper we therefore present some examples of ontology applications throughout the Software Engineering lifecycle. We discuss the advantages of ontologies in each case and provide a framework for classifying the usage of ontologies in Software Engineering.", "title": "" }, { "docid": "fe65dd3bd5f11bea22c5421e84fad8da", "text": "*This contract was given to the United States Association for Small Business and Entrepreneurship (USASBE) for a best doctoral student paper award, presented to the awardees at the USASBE annual meeting. The opinions and recommendations of the authors of this study do not necessarily reflect official policies of the SBA or other agencies of the U.S. government. Note The 2009 Office of Advocacy Best Doctoral Paper award was presented to Pankaj Patel and Rodney D'Souza, doctoral students at the University of Louisville, at the United States Association for Small Business and Entrepreneurship (USASBE) annual meeting. Purpose Export strategy has become increasingly important for SMEs in recent years. To realize the full potential of export strategy, SMEs must be able to address challenges in export markets successfully. A firm must have adequate capabilities to meet unique challenges in such efforts. However, SMEs are limited by their access to resources and capabilities. While prior studies have looked at the importance of organizational learning in export strategy, they have overlooked the firm capabilities that facilitate the use of the learning. As firms that partake in export activity are entrepreneurial in nature, these firms would benefit by proactively seeking new markets, engaging in innovative action to meet local market needs, and be able and willing to take risks by venturing into previously unknown markets. The authors of this paper propose that SMEs make use of capabilities such as entrepreneurial orientation in an attempt to reduce impediments to exporting, which in turn could lead to enhanced export performance. This study finds that proactivity and risk-taking play a role in enhancing export performance of SMEs. However, it did not find support for innovation as a factor that enhances export performance. These findings could mean that firms that are proactive in nature are better at reducing export impediments. This is because these firms are able to bring new products quickly into the marketplace, and are better able to anticipate future demand, creating a first mover advantage. The results of the study also suggest that risk-taking firms might choose strategies that move away from the status quo, thereby increasing the firm's engagement in process enhancements, new product services, innovative marketing techniques , and the like. The data for this report were collected for the National Federation of Independent Business by the executive interviewing group of The Gallup Organization. The survey focused on international trade efforts of small manufacturers …", "title": "" } ]
scidocsrr
a3072ff2e4356281be2e6aa868ea432b
Narrowband and Wideband Metamaterial Antennas Based on Degenerate Band Edge and Magnetic Photonic Crystals
[ { "docid": "235f7fbae50e3952c74cbd67345acb74", "text": "The paper presents research results in the field of small antennas obtain ed at the Department of Wireless Communications, Faculty of Electrical Engineering and Computing, University of Zagreb. A study comparing the application of several miniaturization techniques on a shorted patch antenn is presented. Single and dual band shorted patch antennas with notches and/or slot are introduced. A PIFA d esigned for application in mobile GSM terminals is described. The application of stacked shorted patches as arr ay elements for a mobile communication base station as well as for electromagnetic field sensor is presented. The design of single and dual band folded monopoles is described. Prototypes of the presented antennas have be en manufactured and their characteristics were verified by measurements.", "title": "" } ]
[ { "docid": "f5b372607a89ea6595683276e48d6dce", "text": "In this paper, we present YAMAMA, a multi-dialect Arabic morphological analyzer and disambiguator. Our system is almost five times faster than the state-of-the-art MADAMIRA system with a slightly lower quality. In addition to speed, YAMAMA outputs a rich representation which allows for a wider spectrum of use. In this regard, YAMAMA transcends other systems, such as FARASA, which is faster but provides specific outputs catering to specific applications.", "title": "" }, { "docid": "4f8f34e72fffd80c4ed18b1f5923eca2", "text": "For pharmaceutical distribution companies it is essential to obtain good estimates of medicine needs, due to the short shelf life of many medicines and the need to control stock levels, so as to avoid excessive inventory costs while guaranteeing customer demand satisfaction, and thus decreasing the possibility of loss of customers due to stock outages. In this paper we explore the use of the time series data mining technique for the sales prediction of individual products of a pharmaceutical distribution company in Portugal. Through data mining techniques, the historical data of product sales are analyzed to detect patterns and make predictions based on the experience contained in the data. The results obtained with the technique as well as with the proposed method suggest that the performed modelling may be considered appropriate for the short term product sales prediction.", "title": "" }, { "docid": "88a052d1e6e5d6776711b58e0711869d", "text": "We are in the midst of a revolution in military affairs (RMA) unlike any seen since the Napoleonic Age, when France transformed warfare with the concept of levŽe en masse. Chief of Naval Operations Admiral Jay Johnson has called it \"a fundamental shift from what we call platform-centric warfare to something we call network-centric warfare,\" and it will prove to be the most important RMA in the past 200 years.", "title": "" }, { "docid": "f1582ae3d1ce78c1ad84ab5e552e29bd", "text": "The emergence of sensory-guided behavior depends on sensorimotor coupling during development. How sensorimotor experience shapes neural processing is unclear. Here, we show that the coupling between motor output and visual feedback is necessary for the functional development of visual processing in layer 2/3 (L2/3) of primary visual cortex (V1) of the mouse. Using a virtual reality system, we reared mice in conditions of normal or random visuomotor coupling. We recorded the activity of identified excitatory and inhibitory L2/3 neurons in response to transient visuomotor mismatches in both groups of mice. Mismatch responses in excitatory neurons were strongly experience dependent and driven by a transient release from inhibition mediated by somatostatin-positive interneurons. These data are consistent with a model in which L2/3 of V1 computes a difference between an inhibitory visual input and an excitatory locomotion-related input, where the balance between these two inputs is finely tuned by visuomotor experience.", "title": "" }, { "docid": "70d7c838e7b5c4318e8764edb5a70555", "text": "This research developed and tested a model of turnover contagion in which the job embeddedness and job search behaviors of coworkers influence employees’ decisions to quit. In a sample of 45 branches of a regional bank and 1,038 departments of a national hospitality firm, multilevel analysis revealed that coworkers’ job embeddedness and job search behaviors explain variance in individual “voluntary turnover” over and above that explained by other individual and group-level predictors. Broadly speaking, these results suggest that coworkers’ job embeddedness and job search behaviors play critical roles in explaining why people quit their jobs. Implications are discussed.", "title": "" }, { "docid": "773813311ca5cb2f68662faab7040678", "text": "This paper presents a latent variable structured prediction model for discriminative supervised clustering of items called the Latent Left-linking Model (LM). We present an online clustering algorithm for LM based on a feature-based item similarity function. We provide a learning framework for estimating the similarity function and present a fast stochastic gradient-based learning technique. In our experiments on coreference resolution and document clustering, LM outperforms several existing online as well as batch supervised clustering techniques.", "title": "" }, { "docid": "2bda1b1482ca7b74078b10654576b24d", "text": "A pattern recognition pipeline consists of three stages: data pre-processing, feature extraction, and classification. Traditionally, most research effort is put into extracting appropriate features. With the advent of GPU-accelerated computing and Deep Learning, appropriate features can be discovered as part of the training process. Understanding these discovered features is important: we might be able to learn something new about the domain in which our model operates, or be comforted by the fact that the model extracts “sensible” features. This work discusses and applies methods of visualizing the features learned by Convolutional Neural Networks (CNNs). Our main contribution is an extension of an existing visualization method. The extension makes the method able to visualize the features in intermediate layers of a CNN. Most notably, we show that the features extracted in the deeper layers of a CNN trained to diagnose Diabetic Retinopathy are also the features used by human clinicians. Additionally, we published our visualization method in a software package.", "title": "" }, { "docid": "c62742c65b105a83fa756af9b1a45a37", "text": "This article treats numerical methods for tracking an implicitly defined path. The numerical precision required to successfully track such a path is difficult to predict a priori, and indeed, it may change dramatically through the course of the path. In current practice, one must either choose a conservatively large numerical precision at the outset or re-run paths multiple times in successively higher precision until success is achieved. To avoid unnecessary computational cost, it would be preferable to adaptively adjust the precision as the tracking proceeds in response to the local conditioning of the path. We present an algorithm that can be set to either reactively adjust precision in response to step failure or proactively set the precision using error estimates. We then test the relative merits of reactive and proactive adaptation on several examples arising as homotopies for solving systems of polynomial equations.", "title": "" }, { "docid": "31404322fb03246ba2efe451191e29fa", "text": "OBJECTIVES\nThe aim of this study is to report an unusual form of penile cancer presentation associated with myiasis infestation, treatment options and outcomes.\n\n\nMATERIALS AND METHODS\nWe studied 10 patients with suspected malignant neoplasm of the penis associated with genital myiasis infestation. Diagnostic assessment was conducted through clinical history, physical examination, penile biopsy, larvae identification and computerized tomography scan of the chest, abdomen and pelvis. Clinical and pathological staging was done according to 2002 TNM classification system. Radical inguinal lymphadenectomy was conducted according to the primary penile tumor pathology and clinical lymph nodes status.\n\n\nRESULTS\nPatients age ranged from 41 to 77 years (mean=62.4). All patients presented squamous cell carcinoma of the penis in association with myiasis infestation caused by Psychoda albipennis. Tumor size ranged from 4cm to 12cm (mean=5.3). Circumcision was conducted in 1 (10%) patient, while penile partial penectomy was performed in 5 (50%). Total penectomy was conducted in 2 (20%) patients, while emasculation was the treatment option for 2 (20%). All patients underwent radical inguinal lymphadenectomy. Prophylactic lymphadenectomy was performed on 3 (30%) patients, therapeutic on 5 (50%), and palliative lymphadenectomy on 2 (20%) patients. Time elapsed from primary tumor treatment to radical inguinal lymphadenectomy was 2 to 6 weeks. The mean follow-up was 34.3 months.\n\n\nCONCLUSION\nThe occurrence of myiasis in the genitalia is more common in patients with precarious hygienic practices and low socio-economic level. The treatment option varied according to the primary tumor presentation and clinical lymph node status.", "title": "" }, { "docid": "9ff522e9874c924636f9daba90f9881a", "text": "Time management is required in simulations to ensure temporal aspects of the system under investigation are correctly reproduced by the simulation model. This paper describes the time management services that have been defined in the High Level Architecture. The need for time management services is discussed, as well as design rationales that lead to the current definition of the HLA time management services. These services are described, highlighting information that must flow between federates and the Runtime Infrastructure (RTI) software in order to efficiently implement time management algorithms.", "title": "" }, { "docid": "bbaf0867370f964d4dd3aca9c6a3836e", "text": "The Web of Things aims to make physical world objects and their data accessible through standard Web technologies to enable intelligent applications and sophisticated data analytics. Due to the amount and heterogeneity of the data, it is challenging to perform data analysis directly; especially when the data is captured from a large number of distributed sources. However, the size and scope of the data can be reduced and narrowed down with search techniques, so that only the most relevant and useful data items are selected according to the application requirements. Search is fundamental to the Web of Things while challenging by nature in this context, e.g., mobility of the objects, opportunistic presence and sensing, continuous data streams with changing spatial and temporal properties, efficient indexing for historical and real time data. The research community has developed numerous techniques and methods to tackle these problems as reported by a large body of literature in the last few years. A comprehensive investigation of the current and past studies is necessary to gain a clear view of the research landscape and to identify promising future directions. This survey reviews the state-of-the-art search methods for the Web of Things, which are classified according to three different viewpoints: basic principles, data/knowledge representation, and contents being searched. Experiences and lessons learned from the existing work and some EU research projects related to Web of Things are discussed, and an outlook to the future research is presented.", "title": "" }, { "docid": "08a62894bac4e272530d1630e720c7ad", "text": "Recently, along with the rapid development of mobile communication technology, edge computing theory and techniques have been attracting more and more attentions from global researchers and engineers, which can significantly bridge the capacity of cloud and requirement of devices by the network edges, and thus can accelerate the content deliveries and improve the quality of mobile services. In order to bring more intelligence to the edge systems, compared to traditional optimization methodology, and driven by the current deep learning techniques, we propose to integrate the Deep Reinforcement Learning techniques and Federated Learning framework with the mobile edge systems, for optimizing the mobile edge computing, caching and communication. And thus, we design the “In-Edge AI” framework in order to intelligently utilize the collaboration among devices and edge nodes to exchange the learning parameters for a better training and inference of the models, and thus to carry out dynamic system-level optimization and application-level enhancement while reducing the unnecessary system communication load. “In-Edge AI” is evaluated and proved to have near-optimal performance but relatively low overhead of learning, while the system is cognitive and adaptive to the mobile communication systems. Finally, we discuss several related challenges and opportunities for unveiling a promising upcoming future of “In-Edge AI”.", "title": "" }, { "docid": "634214c9c64e9266880ba255453af0d5", "text": "Ž . In this paper a solution in the continual plane to the Facility Layout Problem FLP is presented. It is based on Simulated Ž . Annealing SA , a relatively recent algorithm for solving hard combinatorial optimization problems, like FLP. This approach Ž . may be applied either in General Facility Layout Problems GFLP considering facilities areas, shapes and orientations or in Ž . Machine Layout problems MLP considering machine’s pick-up and drop-off points. It has been applied to real-life situations with useful results, indicating the effectiveness of this approach. q 1998 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "7e941f9534357fca740b97a99e86f384", "text": "The head-direction (HD) cells found in the limbic system in freely mov ing rats represent the instantaneous head direction of the animal in the horizontal plane regardless of the location of the animal. The internal direction represented by these cells uses both self-motion information for inertially based updating and familiar visual landmarks for calibration. Here, a model of the dynamics of the HD cell ensemble is presented. The stability of a localized static activity profile in the network and a dynamic shift mechanism are explained naturally by synaptic weight distribution components with even and odd symmetry, respectively. Under symmetric weights or symmetric reciprocal connections, a stable activity profile close to the known directional tuning curves will emerge. By adding a slight asymmetry to the weights, the activity profile will shift continuously without disturbances to its shape, and the shift speed can be controlled accurately by the strength of the odd-weight component. The generic formulation of the shift mechanism is determined uniquely within the current theoretical framework. The attractor dynamics of the system ensures modality-independence of the internal representation and facilitates the correction for cumulative error by the putative local-view detectors. The model offers a specific one-dimensional example of a computational mechanism in which a truly world-centered representation can be derived from observer-centered sensory inputs by integrating self-motion information.", "title": "" }, { "docid": "ce2e7b853c967a4c0980ae2ded36890a", "text": "In this paper, we use data augmentation to improve performance of deep neural network (DNN) embeddings for speaker recognition. The DNN, which is trained to discriminate between speakers, maps variable-length utterances to fixed-dimensional embeddings that we call x-vectors. Prior studies have found that embeddings leverage large-scale training datasets better than i-vectors. However, it can be challenging to collect substantial quantities of labeled data for training. We use data augmentation, consisting of added noise and reverberation, as an inexpensive method to multiply the amount of training data and improve robustness. The x-vectors are compared with i-vector baselines on Speakers in the Wild and NIST SRE 2016 Cantonese. We find that while augmentation is beneficial in the PLDA classifier, it is not helpful in the i-vector extractor. However, the x-vector DNN effectively exploits data augmentation, due to its supervised training. As a result, the x-vectors achieve superior performance on the evaluation datasets.", "title": "" }, { "docid": "597bfef473a39b5bf2890a2a697e5c26", "text": "Ripple is a payment system and a digital currency which evolved completely independently of Bitcoin. Although Ripple holds the second highest market cap after Bitcoin, there are surprisingly no studies which analyze the provisions of Ripple. In this paper, we study the current deployment of the Ripple payment system. For that purpose, we overview the Ripple protocol and outline its security and privacy provisions in relation to the Bitcoin system. We also discuss the consensus protocol of Ripple. Contrary to the statement of the Ripple designers, we show that the current choice of parameters does not prevent the occurrence of forks in the system. To remedy this problem, we give a necessary and sufficient condition to prevent any fork in the system. Finally, we analyze the current usage patterns and trade dynamics in Ripple by extracting information from the Ripple global ledger. As far as we are aware, this is the first contribution which sheds light on the current deployment of the Ripple system.", "title": "" }, { "docid": "3aca00d6a5038876340b1fbe08e5ddb6", "text": "People who design, use, and are affected by autonomous artificially intelligent agents want to be able to trust such agents—that is, to know that these agents will perform correctly, to understand the reasoning behind their actions, and to know how to use them appropriately. Many techniques have been devised to assess and influence human trust in artificially intelligent agents. However, these approaches are typically ad hoc and have not been formally related to each other or to formal trust models. This article presents a survey of algorithmic assurances, i.e., programmed components of agent operation that are expressly designed to calibrate user trust in artificially intelligent agents. Algorithmic assurances are first formally defined and classified from the perspective of formally modeled human-artificially intelligent agent trust relationships. Building on these definitions, a synthesis of research across communities such as machine learning, human-computer interaction, robotics, e-commerce, and others reveals that assurance algorithms naturally fall along a spectrum in terms of their impact on an agent’s core functionality, with seven notable classes ranging from integral assurances (which impact an agent’s core functionality) to supplemental assurances (which have no direct effect on agent performance). Common approaches within each of these classes are identified and discussed; benefits and drawbacks of different approaches are also investigated.", "title": "" }, { "docid": "1e8caa9f0a189bafebd65df092f918bc", "text": "For several decades, the role of hormone-replacement therapy (HRT) has been debated. Early observational data on HRT showed many benefits, including a reduction in coronary heart disease (CHD) and mortality. More recently, randomized trials, including the Women's Health Initiative (WHI), studying mostly women many years after the the onset of menopause, showed no such benefit and, indeed, an increased risk of CHD and breast cancer, which led to an abrupt decrease in the use of HRT. Subsequent reanalyzes of data from the WHI with age stratification, newer randomized and observational data and several meta-analyses now consistently show reductions in CHD and mortality when HRT is initiated soon after menopause. HRT also significantly decreases the incidence of various symptoms of menopause and the risk of osteoporotic fractures, and improves quality of life. In younger healthy women (aged 50–60 years), the risk–benefit balance is positive for using HRT, with risks considered rare. As no validated primary prevention strategies are available for younger women (<60 years of age), other than lifestyle management, some consideration might be given to HRT as a prevention strategy as treatment can reduce CHD and all-cause mortality. Although HRT should be primarily oestrogen-based, no particular HRT regimen can be advocated.", "title": "" }, { "docid": "209842e00957d1d1786008d943895dc9", "text": "The impact that urban green spaces have on sustainability and quality of life is phenomenal. This is also true for the local South African environment. However, in reality green spaces in urban environments are decreasing due to growing populations, increasing urbanization and development pressure. This further impacts on the provision of child-friendly spaces, a concept that is already limited in local context. Child-friendly spaces are described as environments in which people (children) feel intimately connected to, influencing the physical, social, emotional, and ecological health of individuals and communities. The benefits of providing such spaces for the youth are well documented in literature. This research therefore aimed to investigate the concept of childfriendly spaces and its applicability to the South African planning context, in order to guide the planning of such spaces for future communities and use. Child-friendly spaces in the urban environment of the city of Durban, was used as local case study, along with two international case studies namely Mullerpier public playground in Rotterdam, the Netherlands, and Kadidjiny Park in Melville, Australia. The aim was to determine how these spaces were planned and developed and to identify tools that were used to accomplish the goal of providing successful child-friendly green spaces within urban areas. The need and significance of planning for such spaces was portrayed within the international case studies. It is confirmed that minimal provision is made for green space planning within the South African context, when there is reflected on the international examples. As a result international examples and disciples of providing child-friendly green spaces should direct planning guidelines within local context. The research concluded that childfriendly green spaces have a positive impact on the urban environment and assist in a child’s development and interaction with the natural environment. Regrettably, the planning of these childfriendly spaces is not given priority within current spatial plans, despite the proven benefits of such. Keywords—Built environment, child-friendly spaces, green spaces. public places, urban area. E. J. Cilliers is a Professor at the North West University, Unit for Environmental Sciences and Management, Urban and Regional Planning, Potchestroom, 2531, South Africa (e-mail: juanee.cilliers@nwu.ac.za). Z. Goosen is a PhD student with the North West University, Unit for Environmental Sciences and Management, Urban and Regional Planning, Potchestroom, 2531, South Africa (e-mail: goosenzhangoosen@gmail.com). This research (or parts thereof) was made possible by the financial contribution of the NRF (National Research Foundation) South Africa. The opinions, findings and conclusions or recommendations expressed in this material are those of the authors and therefore the NRF does not accept any liability in regard thereto.", "title": "" }, { "docid": "0d945a9c0d17cb317c15cb9ec8595fe8", "text": "Executive dysfunction has been shown to be a promising endophenotype in neurodevelopmental disorders such as autism spectrum disorder (ASD) and attention-deficit/hyperactivity disorder (ADHD). This article reviewed 26 studies that examined executive function comparing ASD and/or ADHD children. In light of findings from this review, the ASD + ADHD group appears to share impairment in both flexibility and planning with the ASD group, while it shares the response inhibition deficit with the ADHD group. Conversely, deficit in attention, working memory, preparatory processes, fluency, and concept formation does not appear to be distinctive in discriminating from ASD, ADHD, or ASD + ADHD group. On the basis of neurocognitive endophenotype, the common co-occurrence of executive function deficits seems to reflect an additive comorbidity, rather than a separate condition with distinct impairments.", "title": "" } ]
scidocsrr
c06d126201b34125981da86c3611930e
Corpus domain effects on distributional semantic modeling of medical terms
[ { "docid": "e864bccfa711a5e773390524cd826808", "text": "Semantic similarity measures estimate the similarity between concepts, and play an important role in many text processing tasks. Approaches to semantic similarity in the biomedical domain can be roughly divided into knowledge based and distributional based methods. Knowledge based approaches utilize knowledge sources such as dictionaries, taxonomies, and semantic networks, and include path finding measures and intrinsic information content (IC) measures. Distributional measures utilize, in addition to a knowledge source, the distribution of concepts within a corpus to compute similarity; these include corpus IC and context vector methods. Prior evaluations of these measures in the biomedical domain showed that distributional measures outperform knowledge based path finding methods; but more recent studies suggested that intrinsic IC based measures exceed the accuracy of distributional approaches. Limitations of previous evaluations of similarity measures in the biomedical domain include their focus on the SNOMED CT ontology, and their reliance on small benchmarks not powered to detect significant differences between measure accuracy. There have been few evaluations of the relative performance of these measures on other biomedical knowledge sources such as the UMLS, and on larger, recently developed semantic similarity benchmarks. We evaluated knowledge based and corpus IC based semantic similarity measures derived from SNOMED CT, MeSH, and the UMLS on recently developed semantic similarity benchmarks. Semantic similarity measures based on the UMLS, which contains SNOMED CT and MeSH, significantly outperformed those based solely on SNOMED CT or MeSH across evaluations. Intrinsic IC based measures significantly outperformed path-based and distributional measures. We released all code required to reproduce our results and all tools developed as part of this study as open source, available under http://code.google.com/p/ytex . We provide a publicly-accessible web service to compute semantic similarity, available under http://informatics.med.yale.edu/ytex.web/ . Knowledge based semantic similarity measures are more practical to compute than distributional measures, as they do not require an external corpus. Furthermore, knowledge based measures significantly and meaningfully outperformed distributional measures on large semantic similarity benchmarks, suggesting that they are a practical alternative to distributional measures. Future evaluations of semantic similarity measures should utilize benchmarks powered to detect significant differences in measure accuracy.", "title": "" } ]
[ { "docid": "f7aac91b892013cfdc1302890cb7a263", "text": "We study the problem of learning a generalizable action policy for an intelligent agent to actively approach an object of interest in indoor environment solely from its visual inputs. While scene-driven or recognition-driven visual navigation has been widely studied, prior efforts suffer severely from the limited generalization capability. In this paper, we first argue the object searching task is environment dependent while the approaching ability is general. To learn a generalizable approaching policy, we present a novel solution dubbed as GAPLE which adopts two channels of visual features: depth and semantic segmentation, as the inputs to the policy learning module. The empirical studies conducted on the House3D dataset as well as on a physical platform in a real world scenario validate our hypothesis, and we further provide indepth qualitative analysis.", "title": "" }, { "docid": "9963e1f7126812d9111a4cb6a8eb8dc6", "text": "The renewed interest in grapheme to phoneme conversion (G2P), due to the need of developing multilingual speech synthesizers and recognizers, suggests new approaches more efficient than the traditional rule&exception ones. A number of studies have been performed to investigate the possible use of machine learning techniques to extract phonetic knowledge in a automatic way starting from a lexicon. In this paper, we present the results of our experiments in this research field. Starting from the state of art, our contribution is in the development of a language-independent learning scheme for G2P based on Classification and Regression Trees (CART). To validate our approach, we realized G2P converters for the following languages: British English, American English, French and Brazilian Portuguese.", "title": "" }, { "docid": "a5e8a45d3de85acfd4192a0d096be7c4", "text": "Fog computing, as a promising technique, is with huge advantages in dealing with large amounts of data and information with low latency and high security. We introduce a promising multiple access technique entitled nonorthogonal multiple access to provide communication service between the fog layer and the Internet of Things (IoT) device layer in fog computing, and propose a dynamic cooperative framework containing two stages. At the first stage, dynamic IoT device clustering is solved to reduce the system complexity and the delay for the IoT devices with better channel conditions. At the second stage, power allocation based energy management is solved using Nash bargaining solution in each cluster to ensure fairness among IoT devices. Simulation results reveal that our proposed scheme can simultaneously achieve higher spectrum efficiency and ensure fairness among IoT devices compared to other schemes.", "title": "" }, { "docid": "376eaf3814b9bc3bc68fcf3a3476839c", "text": "With the increasing usage of Internet users as part of an interactive tool for influencing purchasing decisions and measures of attention It has scholars attracted nearly 72% of Internet users at least 1 time per month online (online) to search for various merchandise Marketing mix, meaning the set of themes or categories in a study, Decisions and evaluations to assess a firm's Price includes product, distribution, promotion is. Research in this area indicates that includes internet marketing mix 4p is the same. Today, considering the increasing importance of the Internet and communication services to manufacturers and retailers use the Internet to sell his products Have. This paper is a combined online and traditional marketing like to buy products compared to culture.", "title": "" }, { "docid": "1d8f7705ba0dd969ed6de9e7e6a9a419", "text": "A Mecanum-wheeled robot benefits from great omni-direction maneuverability. However it suffers from random slippage and high-speed vibration, which creates electric power safety, uncertain position errors and energy waste problems for heavy-duty tasks. A lack of Mecanum research on heavy-duty autonomous navigation demands a robot platform to conduct experiments in the future. This paper introduces AuckBot, a heavy-duty omni-directional Mecanum robot platform developed at the University of Auckland, including its hardware overview, the control system architecture and the simulation design. In particular the control system, synergistically combining the Beckhoff system as the Controller-PC to serve low-level motion execution and ROS as the Navigation-PC to accomplish highlevel intelligent navigation tasks, is developed. In addition, a computer virtual simulation based on ISG-virtuos for virtual AuckBot has been validated. The present status and future work of AuckBot are described at the end.", "title": "" }, { "docid": "8eb3b8fb9420cc27ec17aa884531fa83", "text": "Participation has emerged as an appropriate approach for enhancing natural resources management. However, despite long experimentation with participation, there are still possibilities for improvement in designing a process of stakeholder involvement by addressing stakeholder heterogeneity and the complexity of decision-making processes. This paper provides a state-of-the-art overview of methods. It proposes a comprehensive framework to implement stakeholder participation in environmental projects, from stakeholder identification to evaluation. For each process within this framework, techniques are reviewed and practical tools proposed. The aim of this paper is to establish methods to determine who should participate, when and how. The application of this framework to one river restoration case study in Switzerland will illustrate its strengths and weaknesses.", "title": "" }, { "docid": "de1f680fd80b20f005dab2ef8067f773", "text": "This paper describes a convolutional neural network based deep learning approach for bird song classification that was used in an audio record-based bird identification challenge, called BirdCLEF 2016. The training and test set contained about 24k and 8.5k recordings, belonging to 999 bird species. The recorded waveforms were very diverse in terms of length and content. We converted the waveforms into frequency domain and splitted into equal segments. The segments were fed into a convolutional neural network for feature learning, which was followed by fully connected layers for classification. In the official scores our solution reached a MAP score of over 40% for main species, and MAP score of over 33% for main species mixed with background species.", "title": "" }, { "docid": "a32956703826761d16bba1a9665b215e", "text": "Triangle meshes are widely used in representing surfaces in computer vision and computer graphics. Although 2D image processingbased edge detection techniques have been popular in many application areas, they are not well developed for surfaces represented by triangle meshes. This paper proposes a robust edge detection algorithm for triangle meshes and its applications to surface segmentation and adaptive surface smoothing. The proposed edge detection technique is based on eigen analysis of the surface normal vector field in a geodesic window. To compute the edge strength of a certain vertex, the neighboring vertices in a specified geodesic distance are involved. Edge information are used further to segment the surfaces with watershed algorithm and to achieve edgepreserved, adaptive surface smoothing. The proposed algorithm is novel in robustly detecting edges on triangle meshes against noise. The 3D watershed algorithm is an extension from previous work. Experimental results on surfaces reconstructed from multi-view real range images are presented.", "title": "" }, { "docid": "57602f5e2f64514926ab96551f2b4fb6", "text": "Landscape genetics has seen rapid growth in number of publications since the term was coined in 2003. An extensive literature search from 1998 to 2008 using keywords associated with landscape genetics yielded 655 articles encompassing a vast array of study organisms, study designs and methodology. These publications were screened to identify 174 studies that explicitly incorporated at least one landscape variable with genetic data. We systematically reviewed this set of papers to assess taxonomic and temporal trends in: (i) geographic regions studied; (ii) types of questions addressed; (iii) molecular markers used; (iv) statistical analyses used; and (v) types and nature of spatial data used. Overall, studies have occurred in geographic regions proximal to developed countries and more commonly in terrestrial vs. aquatic habitats. Questions most often focused on effects of barriers and/or landscape variables on gene flow. The most commonly used molecular markers were microsatellites and amplified fragment length polymorphism (AFLPs), with AFLPs used more frequently in plants than animals. Analysis methods were dominated by Mantel and assignment tests. We also assessed differences among journals to evaluate the uniformity of reporting and publication standards. Few studies presented an explicit study design or explicit descriptions of spatial extent. While some landscape variables such as topographic relief affected most species studied, effects were not universal, and some species appeared unaffected by the landscape. Effects of habitat fragmentation were mixed, with some species altering movement paths and others unaffected. Taken together, although some generalities emerged regarding effects of specific landscape variables, results varied, thereby reinforcing the need for species-specific work. We conclude by: highlighting gaps in knowledge and methodology, providing guidelines to authors and reviewers of landscape genetics studies, and suggesting promising future directions of inquiry.", "title": "" }, { "docid": "87f5ed217015a5b9590290fe80278527", "text": "Probabilistic topic models are widely used in different contexts to uncover the hidden structure in large text corpora. One of the main (and perhaps strong) assumption of these models is that generative process follows a bag-of-words assumption, i.e. each token is independent from the previous one. We extend the popular Latent Dirichlet Allocation model by exploiting three different conditional Markovian assumptions: (i) the token generation depends on the current topic and on the previous token; (ii) the topic associated with each observation depends on topic associated with the previous one; (iii) the token generation depends on the current and previous topic. For each of these modeling assumptions we present a Gibbs Sampling procedure for parameter estimation. Experimental evaluation over real-word data shows the performance advantages, in terms of recall and precision, of the sequence-modeling approaches.", "title": "" }, { "docid": "8cfce71cc96c98063b29ec0603f5d18c", "text": "Time-series of count data are generated in many different contexts, such as web access logging, freeway traffic monitoring, and security logs associated with buildings. Since this data measures the aggregated behavior of individual human beings, it typically exhibits a periodicity in time on a number of scales (daily, weekly,etc.) that reflects the rhythms of the underlying human activity and makes the data appear non-homogeneous. At the same time, the data is often corrupted by a number of bursty periods of unusual behavior such as building events, traffic accidents, and so forth. The data mining problem of finding and extracting these anomalous events is made difficult by both of these elements. In this paper we describe a framework for unsupervised learning in this context, based on a time-varying Poisson process model that can also account for anomalous events. We show how the parameters of this model can be learned from count time series using statistical estimation techniques. We demonstrate the utility of this model on two datasets for which we have partial ground truth in the form of known events, one from freeway traffic data and another from building access data, and show that the model performs significantly better than a non-probabilistic, threshold-based technique. We also describe how the model can be used to investigate different degrees of periodicity in the data, including systematic day-of-week and time-of-day effects, and make inferences about the detected events (e.g., popularity or level of attendance). Our experimental results indicate that the proposed time-varying Poisson model provides a robust and accurate framework for adaptively and autonomously learning how to separate unusual bursty events from traces of normal human activity.", "title": "" }, { "docid": "0b89b8578afccbcdcf0cdf6d189edfe3", "text": "We previously developed a social mechanism for distributed reputation management, in which an agent combines testimonies from several witnesses to determine its ratings of another agent. However, that approach does not fully protect against spurious ratings generated by malicious agents. This paper focuses on the problem of deception in testimony propagation and aggregation. We introduce some models of deception and study how to efficiently detect deceptive agents following those models. Our approach involves a novel application of the well-known weighted majority technique to belief function and their aggregation. We describe simulation experiments to study the number of apparently accurate witnesses found in different settings, the number of witnesses on prediction accuracy, and the evolution of trust networks.", "title": "" }, { "docid": "a1554514d8288ba569608659fa93ab03", "text": "Smart antennas have received increasing interest for mitigating interference in the multiple-input-multiple-output (MIMO) wireless local area network (WLAN). In this paper, a dual-band dual-polarized compact bowtie dipole antenna array is proposed to support anti-interference MIMO WLAN applications. In the antenna array, there are 12 antennas, six for horizontal polarization and six for vertical polarization. In order to achieve dual linear polarizations and beam switching, six horizontal antennas are placed in a sequential, rotating arrangement on a horizontal substrate panel with an equal inclination angle of 60 ° to form a symmetrical structure, while the other six antennas for vertical polarization are inserted through slots made on the horizontal substrate panel. Furthermore, six pairs of meandered slits are introduced to reduce the mutual coupling between horizontal antennas in the lower band. A prototype of the array with a dimension of 150 × 150 × 60 mm3 is manufactured and exhibits the characteristics of high isolation, good front-to-back ratio, and average gains of 4.5 and 5 dBi over the 2.4- and 5-GHz band, respectively. The MIMO performance of the array is analyzed and evaluated by mutual coupling, the total active reflection coefficient (TARC) and the envelope correlation coefficient. The anti-interference capability of the array is also investigated by the experiment.", "title": "" }, { "docid": "2f51a5437b4951064cc4d8641e21017b", "text": "The operations of a smart grid heavily rely on the support of communication infrastructures for efficient electricity management and reliable power distribution. Due to the strong dependency, the robustness of a smart grid communication network against attack is of the utmost importance for the deployment of the smart grid. Notably, the large scale and autonomous features of a smart grid render its cyber security quite vulnerable to adversaries. In this article, we introduce several intelligent attacks and countermeasures in smart grid communication networks, which aim for maximal damage or benefits by taking advantage of the network structure as well as the protocol functionality. We adopt the percolation-based connectivity in statistic mechanics to quantitatively analyze the network robustness. If the attack and defense strategies are involved, the attack can be further smart and complicated. Consequently, a twoplayer zero-sum game is introduced between the adversary and the defender, and the outcome of the game equilibrium is used to evaluate the performance of defense mechanisms with different network configurations. This article therefore offers novel insights and comprehensive analysis on the cyber security of a smart grid.", "title": "" }, { "docid": "91542575c2a3cc70c5d1b9b277732a8e", "text": "Just a decade ago, attackers targeting electronic networks and communications were largely motivated by gaining kudos among their peers. The main consequence of such attacks was the cost of downtime and cleaning up systems that had been compromised. Today, the primary reasons for such attacks are to steal proprietary information, to sabotage systems or for extortion. For individuals who have had their personal details stolen and used for identity theft, the consequences can be far-reaching. For commercial organisations or governments, the effects can be dire in terms of financial loss and tarnished reputations that can see customers taking their business elsewhere. It is vital that all organisations put controls in place for protecting critical assets such as intellectual property, including source code and trade secrets, and customer information such as cardholder data.", "title": "" }, { "docid": "b84890b3a8d0311a14bf1c9aff773660", "text": "BACKGROUND\nHealth care systems will integrate new computing paradigms in the coming years. Context-awareness computing is a research field which often refers to health care as an interesting and rich area of application.\n\n\nAIM\nThrough a survey of the research literature, we intended to derive an objective view of the actual dynamism of context awareness in health care, and to identify strengths and weaknesses in this field.\n\n\nMETHODS\nAfter discussing definitions of context, we proposed a simple framework to analyse and characterize the use of context through three main axes. We then focused on context-awareness computing and reported on the main teams working in this area. We described some of the context-awareness projects in health care. A deeper analysis of the hospital-based projects demonstrated the gap between recommendations expressed for modelling context awareness and the actual use in a prototype. Finally, we identified pitfalls encountered in this area of research.\n\n\nRESULTS\nA number of opportunities remain for this evolving field of research. We found relatively few groups with such a specific focus. As yet there is no consensus as to the most appropriate models or attributes to include in context awareness. We conclude that a greater understanding of which aspects of context are important in a health care setting is required; the inherent sociotechnical nature of context-aware applications in health care; and the need to draw on a number of disciplines to conduct this research.", "title": "" }, { "docid": "a526cd280b4d15d3f2a3acbed60afae3", "text": "Vehicular communications, though a reality, must continue to evolve to support higher throughput and, above all, ultralow latency to accommodate new use cases, such as the fully autonomous vehicle. Cybersecurity must be assured since the risk of losing control of vehicles if a country were to come under attack is a matter of national security. This article presents the technological enablers that ensure security requirements are met. Under the umbrella of a dedicated network slice, this article proposes the use of content-centric networking (CCN), instead of conventional transmission control protocol/Internet protocol (TCP/IP) routing and permissioned blockchains that allow for the dynamic control of the source reliability, and the integrity and validity of the information exchanged.", "title": "" }, { "docid": "229fb099d2485907648d7a71cd8682af", "text": "This study was undertaken to determine the in vitro antimicrobial activities of 15 commercial essential oils and their main components in order to pre-select candidates for potential application in highly perishable food preservation. The antibacterial effects against food-borne pathogenic bacteria (Listeria monocytogenes, Salmonella Typhimurium, and enterohemorrhagic Escherichia coli O157:H7) and food spoilage bacteria (Brochothrix thermosphacta and Pseudomonas fluorescens) were tested using paper disk diffusion method, followed by determination of minimum inhibitory (MIC) and bactericidal (MBC) concentrations. Most of the tested essential oils exhibited antimicrobial activity against all tested bacteria, except galangal oil. The essential oils of cinnamon, oregano, and thyme showed strong antimicrobial activities with MIC ≥ 0.125 μL/mL and MBC ≥ 0.25 μL/mL. Among tested bacteria, P. fluorescens was the most resistant to selected essential oils with MICs and MBCs of 1 μL/mL. The results suggest that the activity of the essential oils of cinnamon, oregano, thyme, and clove can be attributed to the existence mostly of cinnamaldehyde, carvacrol, thymol, and eugenol, which appear to possess similar activities against all the tested bacteria. These materials could be served as an important natural alternative to prevent bacterial growth in food products.", "title": "" }, { "docid": "08675a0dc7a2f370d33704470297cec3", "text": "Construal level theory (CLT) is an account of how psychological distance influences individuals' thoughts and behavior. CLT assumes that people mentally construe objects that are psychologically near in terms of low-level, detailed, and contextualized features, whereas at a distance they construe the same objects or events in terms of high-level, abstract, and stable characteristics. Research has shown that different dimensions of psychological distance (time, space, social distance, and hypotheticality) affect mental construal and that these construals, in turn, guide prediction, evaluation, and behavior. The present paper reviews this research and its implications for consumer psychology.", "title": "" }, { "docid": "3d2060ef33910ef1c53b0130f3cc3ffc", "text": "Recommender systems help users deal with information overload and enjoy a personalized experience on the Web. One of the main challenges in these systems is the item cold-start problem which is very common in practice since modern online platforms have thousands of new items published every day. Furthermore, in many real-world scenarios, the item recommendation tasks are based on users’ implicit preference feedback such as whether a user has interacted with an item. To address the above challenges, we propose a probabilistic modeling approach called Neural Semantic Personalized Ranking (NSPR) to unify the strengths of deep neural network and pairwise learning. Specifically, NSPR tightly couples a latent factor model with a deep neural network to learn a robust feature representation from both implicit feedback and item content, consequently allowing our model to generalize to unseen items. We demonstrate NSPR’s versatility to integrate various pairwise probability functions and propose two variants based on the Logistic and Probit functions. We conduct a comprehensive set of experiments on two real-world public datasets and demonstrate that NSPR significantly outperforms the state-of-the-art baselines.", "title": "" } ]
scidocsrr
18fe3b8fc7efda816d0c99027ecaeefe
Discovering Adversarial Examples with Momentum
[ { "docid": "2a057079c544b97dded598b6f0d750ed", "text": "Introduction Sometimes it is not enough for a DNN to produce an outcome. For example, in applications such as healthcare, users need to understand the rationale of the decisions. Therefore, it is imperative to develop algorithms to learn models with good interpretability (Doshi-Velez 2017). An important factor that leads to the lack of interpretability of DNNs is the ambiguity of neurons, where a neuron may fire for various unrelated concepts. This work aims to increase the interpretability of DNNs on the whole image space by reducing the ambiguity of neurons. In this paper, we make the following contributions:", "title": "" }, { "docid": "4e847c4acec420ef833a08a17964cb28", "text": "Machine learning models are vulnerable to adversarial examples, inputs maliciously perturbed to mislead the model. These inputs transfer between models, thus enabling black-box attacks against deployed models. Adversarial training increases robustness to attacks by injecting adversarial examples into training data. Surprisingly, we find that although adversarially trained models exhibit strong robustness to some white-box attacks (i.e., with knowledge of the model parameters), they remain highly vulnerable to transferred adversarial examples crafted on other models. We show that the reason for this vulnerability is the model’s decision surface exhibiting sharp curvature in the vicinity of the data points, thus hindering attacks based on first-order approximations of the model’s loss, but permitting black-box attacks that use adversarial examples transferred from another model. We harness this observation in two ways: First, we propose a simple yet powerful novel attack that first applies a small random perturbation to an input, before finding the optimal perturbation under a first-order approximation. Our attack outperforms prior “single-step” attacks on models trained with or without adversarial training. Second, we propose Ensemble Adversarial Training, an extension of adversarial training that additionally augments training data with perturbed inputs transferred from a number of fixed pre-trained models. On MNIST and ImageNet, ensemble adversarial training vastly improves robustness to black-box attacks.", "title": "" } ]
[ { "docid": "98926294ff7f9e13f8187e8f261639e9", "text": "The resistive cross-point array architecture has been proposed for on-chip implementation of weighted sum and weight update operations in neuro-inspired learning algorithms. However, several limiting factors potentially hamper the learning accuracy, including the nonlinearity and device variations in weight update, and the read noise, limited ON/OFF weight ratio and array parasitics in weighted sum. With unsupervised sparse coding as a case study algorithm, this paper employs device-algorithm co-design methodologies to quantify and mitigate the impact of these non-ideal properties on the accuracy. Our analysis shows that the realistic properties in weight update are tolerable, while those in weighted sum are detrimental to the accuracy. With calibration of realistic synaptic behaviors from experimental data, our study shows that the recognition accuracy of MNIST handwriting digits degrades from ∼96 to ∼30 percent. The strategies to mitigate this accuracy loss include 1) redundant cells to alleviate the impact of device variations; 2) a dummy column to eliminate the off-state current; and 3) selector and larger wire width to reduce IR drop along interconnects. The selector also reduces the leakage power in weight update. With improved properties by these strategies, the accuracy increases back to ∼95 percent, enabling reliable integration of realistic synaptic devices in neuromorphic systems.", "title": "" }, { "docid": "8e8ba9e3178d6f586f8d551b4ba52851", "text": "Fake news, one of the biggest new-age problems has the potential to mould opinions and influence decisions. The proliferation of fake news on social media and Internet is deceiving people to an extent which needs to be stopped. The existing systems are inefficient in giving a precise statistical rating for any given news claim. Also, the restrictions on input and category of news make it less varied. This paper proposes a system that classifies unreliable news into different categories after computing an F-score. This system aims to use various NLP and classification techniques to help achieve maximum accuracy.", "title": "" }, { "docid": "74ea477258944c9da5a75dad5d7d9ccf", "text": "Usability is a main quality attribute for any interactive product. Usability in touch screen-based mobile devices is something essential and should be considered when launching a new product, it could be a distinguishing feature in a rushing market, as it is the one of the mobile devices nowadays. Traditional methods for usability measuring do not really fit the nature of these devices. There is a need for new usability evaluation methods or at least for the use of traditional evaluations in novel ways. A set of specific usability heuristics for touch screen-based mobile devices is proposed and (preliminary) validated.", "title": "" }, { "docid": "9f8136b2d9ff2088667875e4e22300d0", "text": "This review article describes different forms of tobacco usage and its direct relationship with the prevalence of dental caries. Smoking along with co-existing factors like old age, bad oral hygiene habits, food habits, limited preventive dental visits and over all health standards, can be associated with high caries incidence. However, a direct etiological relationship is lacking. Environmental tobacco smoke (ETS) causes dental caries in children but no studies have been reported in adults. Existing findings are not sufficient and conclusive enough to confirm that ETS causes dental caries. Oral use of smokeless tobacco (ST), predominantly tobacco chewing, is presumably a positive contributing factor to higher incidence of dental caries. Unfortunately, published studies are not converging towards one single factor through which tobacco usage can have direct relationship to dental caries.", "title": "" }, { "docid": "242ddf57f190424f966e258ed02dd7a2", "text": "The purpose of this article is to identify and rank factors associated with sudden death of individuals requiring restraint for excited delirium. Eighteen cases of such deaths witnessed by emergency medical service (EMS) personnel are reported. The 18 cases reported were restrained with the wrists and ankles bound and attached behind the back. This restraint technique was also used for all 196 surviving excited delirium victims encountered during the study period. Unique to these data is a description of the initial cardiopulmonary arrest rhythm in 72% of the sudden death cases. Associated with all sudden death cases was struggle by the victim with forced restraint and cessation of struggling with labored or agonal breathing immediately before cardiopulmonary arrest. Also associated was stimulant drug use (78%), chronic disease (56%), and obesity (56%). The primary cardiac arrest rhythm of ventricular tachycardia was found in 1 of 13 victims with confirmed initial cardiac rhythms, with none found in ventricular fibrillation. Our findings indicate that unexpected sudden death when excited delirium victims are restrained in the out-of-hospital setting is not infrequent and can be associated with multiple predictable but usually uncontrollable factors.", "title": "" }, { "docid": "6fe413cf75a694217c30a9ef79fab589", "text": "Zusammenfassung) Biometrics have been used for secure identification and authentication for more than two decades since biometric data is unique, non-transferable, unforgettable, and always with us. Recently, biometrics has pervaded other aspects of security applications that can be listed under the topic of “Biometric Cryptosystems”. Although the security of some of these systems is questionable when they are utilized alone, integration with other technologies such as digital signatures or Identity Based Encryption (IBE) schemes results in cryptographically secure applications of biometrics. It is exactly this field of biometric cryptosystems that we focused in this thesis. In particular, our goal is to design cryptographic protocols for biometrics in the framework of a realistic security model with a security reduction. Our protocols are designed for biometric based encryption, signature and remote authentication. We first analyze the recently introduced biometric remote authentication schemes designed according to the security model of Bringer et al.. In this model, we show that one can improve the database storage cost significantly by designing a new architecture, which is a two-factor authentication protocol. This construction is also secure against the new attacks we present, which disprove the claimed security of remote authentication schemes, in particular the ones requiring a secure sketch. Thus, we introduce a new notion called “Weak-identity Privacy” and propose a new construction by combining cancelable biometrics and distributed remote authentication in order to obtain a highly secure biometric authentication system. We continue our research on biometric remote authentication by analyzing the security issues of multi-factor biometric authentication (MFBA). We formally describe the security model for MFBA that captures simultaneous attacks against these systems and define the notion of user privacy, where the goal of the adversary is to impersonate a client to the server. We design a new protocol by combining bipartite biotokens, homomorphic encryption and zero-knowledge proofs and provide a security reduction to achieve user privacy. The main difference of this MFBA protocol is that the server-side computations are performed in the encrypted domain but without requiring a decryption key for the authentication decision of the server. Thus, leakage of the secret key of any system component does not affect the security of the scheme as opposed to the current biometric systems involving crypto-", "title": "" }, { "docid": "fba1b42d1b8240db986ff09b840b126f", "text": "Amino acid replacement matrices are an essential basis of protein phylogenetics. They are used to compute substitution probabilities along phylogeny branches and thus the likelihood of the data. They are also essential in protein alignment. A number of replacement matrices and methods to estimate these matrices from protein alignments have been proposed since the seminal work of Dayhoff et al. (1972). An important advance was achieved by Whelan and Goldman (2001) and their WAG matrix, thanks to an efficient maximum likelihood estimation approach that accounts for the phylogenies of sequences within each training alignment. We further refine this method by incorporating the variability of evolutionary rates across sites in the matrix estimation and using a much larger and diverse database than BRKALN, which was used to estimate WAG. To estimate our new matrix (called LG after the authors), we use an adaptation of the XRATE software and 3,912 alignments from Pfam, comprising approximately 50,000 sequences and approximately 6.5 million residues overall. To evaluate the LG performance, we use an independent sample consisting of 59 alignments from TreeBase and randomly divide Pfam alignments into 3,412 training and 500 test alignments. The comparison with WAG and JTT shows a clear likelihood improvement. With TreeBase, we find that 1) the average Akaike information criterion gain per site is 0.25 and 0.42, when compared with WAG and JTT, respectively; 2) LG is significantly better than WAG for 38 alignments (among 59), and significantly worse with 2 alignments only; and 3) tree topologies inferred with LG, WAG, and JTT frequently differ, indicating that using LG impacts not only the likelihood value but also the output tree. Results with the test alignments from Pfam are analogous. LG and a PHYML implementation can be downloaded from http://atgc.lirmm.fr/LG.", "title": "" }, { "docid": "9006ecc6ff087d6bdaf90bdb73860133", "text": "Next-generation datacenters (DCs) built on virtualization technologies are pivotal to the effective implementation of the cloud computing paradigm. To deliver the necessary services and quality of service, cloud DCs face major reliability and robustness challenges.", "title": "" }, { "docid": "1e4a502bfd4ae5ceffd922e48f8e364a", "text": "A soft wearable robot, which is an emerging type of wearable robot, can take advantage of tendon-driven mechanisms with a Bowden cable. These tendon-driven mechanisms benefits soft wearable robots because the actuator can be remotely placed and the transmission is very compact. However, it is difficult to compensate the friction along the Bowden cable which makes it hard to control. This study proposes the use of a position-based impedance controller, which is robust to the nonlinear dynamics of the system and provides compliant interaction between robot, human, and environment. Additionally, to eliminate disturbances from unexpected tension of the antagonistic wire arising from friction, this study proposes a new type of slack enabling tendon actuator. It can eliminate friction force along the antagonistic wire by actively pushing the wire while preventing derailment of the wire from the spool.", "title": "" }, { "docid": "2392f4dcf3486956d2c08c621492b715", "text": "As urban population grows, cities face many challenges related to transportation, resource consumption, and the environment. Ride sharing has been proposed as an effective approach to reduce traffic congestion, gasoline consumption, and pollution. Despite great promise, researchers and policy makers lack adequate tools to assess tradeoffs and benefits of various ride-sharing strategies. Existing approaches either make unrealistic modeling assumptions or do not scale to the sizes of existing data sets. In this paper, we propose a real-time, data-driven simulation framework that supports the efficient analysis of taxi ride sharing. By modeling taxis and trips as distinct entities, our framework is able to simulate a rich set of realistic scenarios. At the same time, by providing a comprehensive set of parameters, we are able to study the taxi ride-sharing problem from different angles, considering different stakeholders' interests and constraints. To address the computational complexity of the model, we describe a new optimization algorithm that is linear in the number of trips and makes use of an efficient indexing scheme, which combined with parallelization, makes our approach scalable. We evaluate our framework and algorithm using real data - 360 million trips taken by 13,000 taxis in New York City during 2011 and 2012. The results demonstrate that our framework is effective and can provide insights into strategies for implementing city-wide ride-sharing solutions. We describe the findings of the study as well as a performance analysis of the model.", "title": "" }, { "docid": "a55e37573cd779801167c9eee9a18fbb", "text": "Many large-scale multithreaded programs incur deadlock bugs. Existing deadlock warning detection techniques only report warning scenarios, which may or may not be real deadlocks. Each warning should be further verified on whether it may manifest into a real deadlock. For this purpose, a number of active randomized testing schedulers have been developed to trigger them, and yet pervious experiments show that their deadlock confirmation probability can be low. This paper presents ASN, a novel barrier-based randomized scheduler that triggers real deadlocks with high probabilities. We exploit the insights that in a confirmation run, the threads involved in a real deadlock should properly acquire one or more sets of locks prior to deadlocking. ASN automatically identifies three interesting sets of such positions. It guides the threads participating in a given warning to stay at these position sets in turn. When all the threads are staying at the last position set, ASN checks whether any deadlock that matches with the given warning has been triggered. We have evaluated ASN on 15 deadlock bugs in a suite of real-world multithreaded programs. The results show that ASN either confirms more deadlocks from the benchmark suite or triggers the same deadlocks with significantly higher probabilities than existing schedulers.", "title": "" }, { "docid": "b1da294b1d8f270cb2bfe0074231209e", "text": "The use of depth cameras in precision agriculture is increasing day by day. This type of sensor has been used for the plant structure characterization of several crops. However, the discrimination of small plants, such as weeds, is still a challenge within agricultural fields. Improvements in the new Microsoft Kinect v2 sensor can capture the details of plants. The use of a dual methodology using height selection and RGB (Red, Green, Blue) segmentation can separate crops, weeds, and soil. This paper explores the possibilities of this sensor by using Kinect Fusion algorithms to reconstruct 3D point clouds of weed-infested maize crops under real field conditions. The processed models showed good consistency among the 3D depth images and soil measurements obtained from the actual structural parameters. Maize plants were identified in the samples by height selection of the connected faces and showed a correlation of 0.77 with maize biomass. The lower height of the weeds made RGB recognition necessary to separate them from the soil microrelief of the samples, achieving a good correlation of 0.83 with weed biomass. In addition, weed density showed good correlation with volumetric measurements. The canonical discriminant analysis showed promising results for classification into monocots and dictos. These results suggest that estimating volume using the Kinect methodology can be a highly accurate method for crop status determination and weed detection. It offers several possibilities for the automation of agricultural processes by the construction of a new system integrating these sensors and the development of algorithms to properly process the information provided by them.", "title": "" }, { "docid": "7dcdad7b525dcc74f9333ab04e643c80", "text": "BACKGROUND\na large proportion of falls in older people occur when walking; however the mechanisms underlying impaired balance during gait are poorly understood.\n\n\nOBJECTIVE\nto evaluate acceleration patterns at the head and pelvis in young and older subjects when walking on a level and an irregular walking surface, in order to develop an understanding of how ageing affects postural responses to challenging walking conditions.\n\n\nMETHODS\ntemporo-spatial gait parameters and variables derived from acceleration signals were recorded in 30 young people aged 22-39 years (mean 29.0, SD 4.3), and 30 older people with a low risk of falling aged 75-85 years (mean 79.0, SD 3.0) while walking on a level and an irregular walking surface. Subjects also underwent tests of vision, sensation, strength, reaction time and balance.\n\n\nRESULTS\nolder subjects exhibited a more conservative gait pattern, characterised by reduced velocity, shorter step length and increased step timing variability. These differences were particularly pronounced when walking on the irregular surface. The magnitude of accelerations at the head and pelvis were generally smaller in older subjects; however the smoothness of the acceleration signals did not differ between the two groups. Older subjects performed worse on tests of vision, peripheral sensation, strength, reaction time and balance.\n\n\nCONCLUSION\nthe adoption of a more conservative basic gait pattern by older people with a low risk of falling reduces the magnitude of accelerations experienced by the head and pelvis when walking, which is likely to be a compensatory strategy to maintain balance in the presence of age-related deficits in physiological function, particularly reduced lower limb strength.", "title": "" }, { "docid": "29b4a9f3b3da3172e319d11b8f938a7b", "text": "Since social media have become very popular during the past few years, researchers have been focusing on being able to automatically process and extract sentiments information from large volume of social media data. This paper contributes to the topic, by focusing on sentiment analysis for Chinese social media. In this paper, we propose to rely on Part of Speech (POS) tags in order to extract unigrams and bigrams features. Bigrams are generated according to the grammatical relation between consecutive words. With those features, we have shown that focusing on a specific topic allows to reach higher estimation accuracy.", "title": "" }, { "docid": "2cbd6b3d19d0cf843a9e18f5b23872d2", "text": "The topic of multi-person pose estimation has been largely improved recently, especially with the development of convolutional neural network. However, there still exist a lot of challenging cases, such as occluded keypoints, invisible keypoints and complex background, which cannot be well addressed. In this paper, we present a novel network structure called Cascaded Pyramid Network (CPN) which targets to relieve the problem from these \"hard\" keypoints. More specifically, our algorithm includes two stages: GlobalNet and RefineNet. GlobalNet is a feature pyramid network which can successfully localize the \"simple\" keypoints like eyes and hands but may fail to precisely recognize the occluded or invisible keypoints. Our RefineNet tries explicitly handling the \"hard\" keypoints by integrating all levels of feature representations from the GlobalNet together with an online hard keypoint mining loss. In general, to address the multi-person pose estimation problem, a top-down pipeline is adopted to first generate a set of human bounding boxes based on a detector, followed by our CPN for keypoint localization in each human bounding box. Based on the proposed algorithm, we achieve state-of-art results on the COCO keypoint benchmark, with average precision at 73.0 on the COCO test-dev dataset and 72.1 on the COCO test-challenge dataset, which is a 19% relative improvement compared with 60.5 from the COCO 2016 keypoint challenge. Code1 and the detection results for person used will be publicly available for further research.", "title": "" }, { "docid": "1c2b5a414227bf2746e7dd4f9825fee9", "text": "Copy-move forgery detection (CMFD) is probably one of the most active research areas within the blind image forensics field. Among existing algorithms, most of them are based on block and key-point methods, or combination of them. Recently, some deep convolutional neural networks methods have been applied in the image classification, image forensic, image hashing retrieval, and so on, which have shown better performance than the traditional method. In the work, a novel copy-move forgery detection method based on convolutional neural network is proposed. The proposed method uses existing trained model from large database as ImageNet, and then adjusts slightly the net structure using small training samples. Experimental results show that the method we proposed obtains satisfactory performance to the forgery image generated automatically by computer with simple image copy-move operation", "title": "" }, { "docid": "e25165c558e668f7fb594381c32406fe", "text": "Recognizing emotion from facial expressions draws on diverse psychological processes implemented in a large array of neural structures. Studies using evoked potentials, lesions, and functional imaging have begun to elucidate some of the mechanisms. Early perceptual processing of faces draws on cortices in occipital and temporal lobes that construct detailed representations from the configuration of facial features. Subsequent recognition requires a set of structures, including amygdala and orbitofrontal cortex, that links perceptual representations of the face to the generation of knowledge about the emotion signaled, a complex set of mechanisms using multiple strategies. Although recent studies have provided a wealth of detail regarding these mechanisms in the adult human brain, investigations are also being extended to nonhuman primates, to infants, and to patients with psychiatric disorders.", "title": "" }, { "docid": "737f75e39cbf1b5226985e866a44c106", "text": "A security-enhanced agile software development process, SEAP, is introduced in the development of a mobile money transfer system at Ericsson Corp. A specific characteristic of SEAP is that it includes a security group consisting of four different competences, i.e., Security manager, security architect, security master and penetration tester. Another significant feature of SEAP is an integrated risk analysis process. In analyzing risks in the development of the mobile money transfer system, a general finding was that SEAP either solves risks that were previously postponed or solves a larger proportion of the risks in a timely manner. The previous software development process, i.e., The baseline process of the comparison outlined in this paper, required 2.7 employee hours spent for every risk identified in the analysis process compared to, on the average, 1.5 hours for the SEAP. The baseline development process left 50% of the risks unattended in the software version being developed, while SEAP reduced that figure to 22%. Furthermore, SEAP increased the proportion of risks that were corrected from 12.5% to 67.1%, i.e., More than a five times increment. This is important, since an early correction may avoid severe attacks in the future. The security competence in SEAP accounts for 5% of the personnel cost in the mobile money transfer system project. As a comparison, the corresponding figure, i.e., For security, was 1% in the previous development process.", "title": "" }, { "docid": "240809329ce269fb1c4844eeabd2e33f", "text": "R is a popular statistical programming language with a number of extensions that support data processing and machine learning tasks. However, interactive data analysis in R is usually limited as the R runtime is single threaded and can only process data sets that fit in a single machine's memory. We present SparkR, an R package that provides a frontend to Apache Spark and uses Spark's distributed computation engine to enable large scale data analysis from the R shell. We describe the main design goals of SparkR, discuss how the high-level DataFrame API enables scalable computation and present some of the key details of our implementation.", "title": "" }, { "docid": "8cbdd4f368ca9fd7dcf7e4f8c9748412", "text": "We describe an efficient neural network method to automatically learn sentiment lexicons without relying on any manual resources. The method takes inspiration from the NRC method, which gives the best results in SemEval13 by leveraging emoticons in large tweets, using the PMI between words and tweet sentiments to define the sentiment attributes of words. We show that better lexicons can be learned by using them to predict the tweet sentiment labels. By using a very simple neural network, our method is fast and can take advantage of the same data volume as the NRC method. Experiments show that our lexicons give significantly better accuracies on multiple languages compared to the current best methods.", "title": "" } ]
scidocsrr
87995e40fe92f97da59567bd39c02d9b
The Impact of Computer Self Efficacy and Technology Acceptance Model on Behavioral Intention in Internet Banking System
[ { "docid": "5ed955ddaaf09fc61c214adba6b18449", "text": "This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with an added construct Perceived Web Security, and empirically tested its ability in predicting customers’ behavioral intention of adopting IB. We designed a questionnaire and used it to survey a randomly selected sample of customers of IB from the Yellow Pages, and obtained 203 usable responses. We analyzed the data using Structured Equation Modeling (SEM) to evaluate the strength of the hypothesized relationships, if any, among the constructs, which include Perceived Ease of Use and Perceived Web Security as independent variables, Perceived Usefulness and Attitude as intervening variables, and Intention to Use as the dependent variable. The results provide support of the extended TAM model and confirm its robustness in predicting customers’ intention of adoption of IB. This study contributes to the literature by formulating and validating TAM to predict IB adoption, and its findings provide useful information for bank management in formulating IB marketing strategies.", "title": "" }, { "docid": "25ce68e2b2d9e9d8ff741e4e9ad1e378", "text": "Advances in electronic banking technology have created novel ways of handling daily banking affairs, especially via the online banking channel. The acceptance of online banking services has been rapid in many parts of the world, and in the leading ebanking countries the number of e-banking contracts has exceeded 50 percent. Investigates online banking acceptance in the light of the traditional technology acceptance model (TAM), which is leveraged into the online environment. On the basis of a focus group interview with banking professionals, TAM literature and e-banking studies, we develop a model indicating onlinebanking acceptance among private banking customers in Finland. The model was tested with a survey sample (n 1⁄4 268). The findings of the study indicate that perceived usefulness and information on online banking on the Web site were the main factors influencing online-banking acceptance.", "title": "" } ]
[ { "docid": "a6c9ff64c9c007e71192eb7023c8617f", "text": "Elderly individuals can access online 3D virtual stores from their homes to make purchases. However, most virtual environments (VEs) often elicit physical responses to certain types of movements in the VEs. Some users exhibit symptoms that parallel those of classical motion sickness, called cybersickness, both during and after the VE experience. This study investigated the factors that contribute to cybersickness among the elderly when immersed in a 3D virtual store. The results of the first experiment show that the simulator sickness questionnaire (SSQ) scores increased significantly by the reasons of navigational rotating speed and duration of exposure. Based on these results, a warning system with fuzzy control for combating cybersickness was developed. The results of the second and third experiments show that the proposed system can efficiently determine the level of cybersickness based on the fuzzy sets analysis of operating signals from scene rotating speed and exposure duration, and subsequently combat cybersickness. & 2014 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "559a4175347e5fea57911d9b8c5080e6", "text": "Online social networks offering various services have become ubiquitous in our daily life. Meanwhile, users nowadays are usually involved in multiple online social networks simultaneously to enjoy specific services provided by different networks. Formally, social networks that share some common users are named as partially aligned networks. In this paper, we want to predict the formation of social links in multiple partially aligned social networks at the same time, which is formally defined as the multi-network link (formation) prediction problem. In multiple partially aligned social networks, users can be extensively correlated with each other by various connections. To categorize these diverse connections among users, 7 \"intra-network social meta paths\" and 4 categories of \"inter-network social meta paths\" are proposed in this paper. These \"social meta paths\" can cover a wide variety of connection information in the network, some of which can be helpful for solving the multi-network link prediction problem but some can be not. To utilize useful connection, a subset of the most informative \"social meta paths\" are picked, the process of which is formally defined as \"social meta path selection\" in this paper. An effective general link formation prediction framework, Mli (Multi-network Link Identifier), is proposed in this paper to solve the multi-network link (formation) prediction problem. Built with heterogenous topological features extracted based on the selected \"social meta paths\" in the multiple partially aligned social networks, Mli can help refine and disambiguate the prediction results reciprocally in all aligned networks. Extensive experiments conducted on real-world partially aligned heterogeneous networks, Foursquare and Twitter, demonstrate that Mli can solve the multi-network link prediction problem very well.", "title": "" }, { "docid": "2417402cb45e5c96c8cb808afe38a4e3", "text": "The problems of finding a longest common subsequence of two sequencesA andB and a shortest edit script for transformingA intoB have long been known to be dual problems. In this paper, they are shown to be equivalent to finding a shortest/longest path in an edit graph. Using this perspective, a simpleO(ND) time and space algorithm is developed whereN is the sum of the lengths ofA andB andD is the size of the minimum edit script forA andB. The algorithm performs well when differences are small (sequences are similar) and is consequently fast in typical applications. The algorithm is shown to haveO(N+D 2) expected-time performance under a basic stochastic model. A refinement of the algorithm requires onlyO(N) space, and the use of suffix trees leads to anO(N logN+D 2) time variation.", "title": "" }, { "docid": "7a2d4032d79659a70ed2f8a6b75c4e71", "text": "In recent years, transition-based parsers have shown promise in terms of efficiency and accuracy. Though these parsers have been extensively explored for multiple Indian languages, there is still considerable scope for improvement by properly incorporating syntactically relevant information. In this article, we enhance transition-based parsing of Hindi and Urdu by redefining the features and feature extraction procedures that have been previously proposed in the parsing literature of Indian languages. We propose and empirically show that properly incorporating syntactically relevant information like case marking, complex predication and grammatical agreement in an arc-eager parsing model can significantly improve parsing accuracy. Our experiments show an absolute improvement of ∼2% LAS for parsing of both Hindi and Urdu over a competitive baseline which uses rich features like part-of-speech (POS) tags, chunk tags, cluster ids and lemmas. We also propose some heuristics to identify ezafe constructions in Urdu texts which show promising results in parsing these constructions.", "title": "" }, { "docid": "f8984d660f39c66b3bd484ec766fa509", "text": "The present paper focuses on Cyber Security Awareness Campaigns, and aims to identify key factors regarding security which may lead them to failing to appropriately change people’s behaviour. Past and current efforts to improve information-security practices and promote a sustainable society have not had the desired impact. It is important therefore to critically reflect on the challenges involved in improving information-security behaviours for citizens, consumers and employees. In particular, our work considers these challenges from a Psychology perspective, as we believe that understanding how people perceive risks is critical to creating effective awareness campaigns. Changing behaviour requires more than providing information about risks and reactive behaviours – firstly, people must be able to understand and apply the advice, and secondly, they must be motivated and willing to do so – and the latter requires changes to attitudes and intentions. These antecedents of behaviour change are identified in several psychological models of behaviour. We review the suitability of persuasion techniques, including the widely used ‘fear appeals’. From this range of literature, we extract essential components for an awareness campaign as well as factors which can lead to a campaign’s success or failure. Finally, we present examples of existing awareness campaigns in different cultures (the UK and Africa) and reflect on these.", "title": "" }, { "docid": "dcfc6f3c1eba7238bd6c6aa18dcff6df", "text": "With the evaluation and simulation of long-term evolution/4G cellular network and hot discussion about new technologies or network architecture for 5G, the appearance of simulation and evaluation guidelines for 5G is in urgent need. This paper analyzes the challenges of building a simulation platform for 5G considering the emerging new technologies and network architectures. Based on the overview of evaluation methodologies issued for 4G candidates, challenges in 5G evaluation are formulated. Additionally, a cloud-based two-level framework of system-level simulator is proposed to validate the candidate technologies and fulfill the promising technology performance identified for 5G.", "title": "" }, { "docid": "f5817d371dd3e8bd93d99a41210aed48", "text": "Early works on human action recognition focused on tracking and classifying articulated body motions. Such methods required accurate localisation of body parts, which is a difficult task, particularly under realistic imaging conditions. As such, recent trends have shifted towards the use of more abstract, low-level appearance features such as spatio-temporal interest points. Motivated by the recent progress in pose estimation, we feel that pose-based action recognition systems warrant a second look. In this paper, we address the question of whether pose estimation is useful for action recognition or if it is better to train a classifier only on low-level appearance features drawn from video data. We compare pose-based, appearance-based and combined pose and appearance features for action recognition in a home-monitoring scenario. Our experiments show that posebased features outperform low-level appearance features, even when heavily corrupted by noise, suggesting that pose estimation is beneficial for the action recognition task.", "title": "" }, { "docid": "e8880b633c3f4b9646a7f6e9c9273f6f", "text": "A) CTMC states. Since we assume that c, d and Xmax are integers, while the premiums that the customers pay are worth 1, every integer between 0 and Xmax is achievable. Accordingly, given our assumptions every cash flow consists of an integer-valued amount of money. Thus, the CTMC cannot reach any non-integer state. We are obviously assuming that the initial amount of cash X(0) is also an integer. Consequently, the state space of the CTMC consists of every nonnegative integer number between 0 and Xmax.", "title": "" }, { "docid": "735fe41fe73d527b3cbeb03926530344", "text": "Premalignant lesions of the lower female genital tract encompassing the cervix, vagina and vulva are variably common and many, but by no means all, are related to infection by human papillomavirus (HPV). In this review, pathological aspects of the various premalignant lesions are discussed, mainly concentrating on new developments. The value of ancillary studies, mainly immunohistochemical, is discussed at the appropriate points. In the cervix, the terminology and morphological features of premalignant glandular lesions is covered, as is the distinction between adenocarcinoma in situ (AIS) and early invasive adenocarcinoma, which may be very problematic. A spectrum of benign, premalignant and malignant cervical glandular lesions exhibiting gastric differentiation is emerging with lobular endocervical glandular hyperplasia (LEGH), including so-called atypical LEGH, representing a possible precursor of non HPV-related cervical adenocarcinomas exhibiting gastric differentiation; these include the cytologically bland adenoma malignum and the morphologically malignant gastric type adenocarcinoma. Stratified mucin producing intraepithelial lesion (SMILE) is a premalignant cervical lesion with morphological overlap between cervical intraepithelial neoplasia (CIN) and AIS and which is variably regarded as a form of reserve cell dysplasia or stratified AIS. It is now firmly established that there are two distinct types of vulval intraepithelial neoplasia (VIN) with a different pathogenesis, molecular events, morphological features and risk of progression to squamous carcinoma. These comprise a more common HPV-related usual type VIN (also referred to as classic, undifferentiated, basaloid, warty, Bowenoid type) and a more uncommon differentiated (simplex) type which is non-HPV related and which is sometimes associated with lichen sclerosus. The former has a relatively low risk of progression to HPV-related vulval squamous carcinoma and the latter a high risk of progression to non-HPV related vulval squamous carcinoma. Various aspects of vulval Paget's disease are also discussed.", "title": "" }, { "docid": "6c5b72121519e40934ac3ffe6a05c1c7", "text": "Learner modeling is a basis of personalized, adaptive learning. The research literature provides a wide range of modeling approaches, but it does not provide guidance for choosing a model suitable for a particular situation. We provide a systematic and up-to-date overview of current approaches to tracing learners’ knowledge and skill across interaction with multiple items, focusing in particular on the widely used Bayesian knowledge tracing and logistic models. We discuss factors that influence the choice of a model and highlight the importance of the learner modeling context: models are used for different purposes and deal with different types of learning processes. We also consider methodological issues in the evaluation of learner models and their relation to the modeling context. Overall, the overview provides basic guidelines for both researchers and practitioners and identifies areas that require further clarification in future research.", "title": "" }, { "docid": "db70302a3d7e7e7e5974dd013e587b12", "text": "In recent years, the emerging Internet-of-Things (IoT) has led to rising concerns about the security of networked embedded devices. In this work, we propose the SIPHON architecture---a Scalable high-Interaction Honeypot platform for IoT devices. Our architecture leverages IoT devices that are physically at one location and are connected to the Internet through so-called \\emph{wormholes} distributed around the world. The resulting architecture allows exposing few physical devices over a large number of geographically distributed IP addresses. We demonstrate the proposed architecture in a large scale experiment with 39 wormhole instances in 16 cities in 9 countries. Based on this setup, five physical IP cameras, one NVR and one IP printer are presented as 85 real IoT devices on the Internet, attracting a daily traffic of 700MB for a period of two months. A preliminary analysis of the collected traffic indicates that devices in some cities attracted significantly more traffic than others (ranging from 600 000 incoming TCP connections for the most popular destination to less than 50 000 for the least popular). We recorded over 400 brute-force login attempts to the web-interface of our devices using a total of 1826 distinct credentials, from which 11 attempts were successful. Moreover, we noted login attempts to Telnet and SSH ports some of which used credentials found in the recently disclosed Mirai malware.", "title": "" }, { "docid": "2bbc3d5c5b20249a2674b4d495f662d9", "text": "The effective work function of a reactively sputtered TiN metal gate is shown to be tunable from 4.30 to 4.65 eV. The effective work function decreases with nitrogen flow during reactive sputter deposition. Nitrogen annealing increases the effective work function and reduces Dit. Thinner TiN improves the variation in effective work function and reduces gate dielectric charge. Doping of the polysilicon above the TiN metal gate with B or P has negligible effect on the effective work function. The work-function-tuned TiN is integrated into ultralow-power fully depleted silicon-on-insulator CMOS transistors optimized for subthreshold operation at 0.3 V. The following performance metrics are achieved: 64-80-mV/dec subthreshold swing, PMOS/NMOS on-current ratio near 1, 71% reduction in Cgd, and 55% reduction in Vt variation when compared with conventional transistors, although significant short-channel effects are observed.", "title": "" }, { "docid": "9c519c7040192b1f726614513fbdbb11", "text": "We propose a novel recurrent encoder-decoder network model for real-time video-based face alignment. Our proposed model predicts 2D facial point maps regularized by a regression loss, while uniquely exploiting recurrent learning at both spatial and temporal dimensions. At the spatial level, we add a feedback loop connection between the combined output response map and the input, in order to enable iterative coarse-to-fine face alignment using a single network model. At the temporal level, we first decouple the features in the bottleneck of the network into temporalvariant factors, such as pose and expression, and temporalinvariant factors, such as identity information. Temporal recurrent learning is then applied to the decoupled temporalvariant features, yielding better generalization and significantly more accurate results at test time. We perform a comprehensive experimental analysis, showing the importance of each component of our proposed model, as well as superior results over the state-of-the-art in standard datasets.", "title": "" }, { "docid": "3cc5648cab5d732d3d30bd95d9d06c00", "text": "We are concerned with the utility of social laws in a computational environment laws which guarantee the successful coexistence of multi ple programs and programmers In this paper we are interested in the o line design of social laws where we as designers must decide ahead of time on useful social laws In the rst part of this paper we sug gest the use of social laws in the domain of mobile robots and prove analytic results about the usefulness of this approach in that setting In the second part of this paper we present a general model of social law in a computational system and investigate some of its proper ties This includes a de nition of the basic computational problem involved with the design of multi agent systems and an investigation of the automatic synthesis of useful social laws in the framework of a model which refers explicitly to social laws This work was supported in part by a grant from the US Israel Binational Science Foundation", "title": "" }, { "docid": "c2fb88df12e97e8475bb923063c8a46e", "text": "This paper addresses the job shop scheduling problem in the presence of machine breakdowns. In this work, we propose to exploit the advantages of data mining techniques to resolve the problem. We proposed an approach to discover a set of classification rules by using historic scheduling data. Intelligent decisions are then made in real time based on this constructed rules to assign the corresponding dispatching rule in a dynamic job shop scheduling environment. A simulation study is conducted at last with the constructed rules and four other dispatching rules from literature. The experimental results verify the performance of classification rule for minimizing mean tardiness.", "title": "" }, { "docid": "9d50be44155665f5fa2fb213c23d51f2", "text": "A number of proposals have been put forth in recent years for the solution of Markov decision processes (MDPs) whose state (and sometimes action) spaces are factored. One recent class of methods involves linear value function approximation, where the optimal value function is assumed to be a linear combination of some set of basis functions, with the aim of finding suitable weights. While sophisticated techniques have been developed for finding the best approximation within this constrained space, few methods have been proposed for choosing a suitable basis set, or modifying it if solution quality is found wanting. We propose a general framework, and specific proposals, that address both of these questions. In particular, we examine <i>weakly coupled MDPs</i> where a number of subtasks can be viewed independently modulo resource constraints. We then describe methods for constructing a piecewise linear combination of the subtask value functions, using greedy decision tree techniques. We argue that this architecture is suitable for many types of MDPs whose combinatorics are determined largely by the existence multiple conflicting objectives.", "title": "" }, { "docid": "bf241075beac4fedfb0ad9f8551c652d", "text": "This paper discloses a new very broadband compact transition between double-ridge waveguide and coaxial line. The transition includes an original waveguide to coaxial mode converter and modified impedance transformer. Very good performance is predicted theoretically and confirmed experimentally over a 3:1 bandwidth.", "title": "" }, { "docid": "3550dbe913466a675b621d476baba219", "text": "Successful implementing and managing of change is urgently necessary for each adult educational organization. During the process, leading of the staff is becoming a key condition and the most significant factor. Beside certain personal traits of the leader, change management demands also certain leadership knowledges, skills, versatilities and behaviour which may even border on changing the organizational culture. The paper finds the significance of certain values and of organizational climate and above all the significance of leadership style which a leader will adjust to the staff and to the circumstances. The author presents a multiple qualitative case study of managing change in three adult educational organizations. The paper finds that factors of successful leading of change exist which represent an adequate approach to leading the staff during the introduction of changes in educational organizations. Its originality/value is in providing information on the important relationship between culture, leadership styles and leader’s behaviour as preconditions for successful implementing and managing of strategic change.", "title": "" }, { "docid": "7c4cb5f52509ad5a3795e9ce59980fec", "text": "Line-of-sight stabilization against various disturbances is an essential property of gimbaled imaging systems mounted on mobile platforms. In recent years, the importance of target detection from higher distances has increased. This has raised the need for better stabilization performance. For that reason, stabilization loops are designed such that they have higher gains and larger bandwidths. As these are required for good disturbance attenuation, sufficient loop stability is also needed. However, model uncertainties around structural resonances impose strict restrictions on sufficient loop stability. Therefore, to satisfy high stabilization performance in the presence of model uncertainties, robust control methods are required. In this paper, a robust controller design in LQG/LTR, H∞ , and μ -synthesis framework is described for a two-axis gimbal. First, the performance criteria and weights are determined to minimize the stabilization error with moderate control effort under known platform disturbance profile. Second, model uncertainties are determined by considering locally linearized models at different operating points. Next, robust LQG/LTR, H∞ , and μ controllers are designed. Robust stability and performance of the three designs are investigated and compared. The paper finishes with the experimental performances to validate the designed robust controllers.", "title": "" } ]
scidocsrr
ef59c81859679c70eadc0da2ecb11ad6
Extracting Social Networks from Literary Fiction
[ { "docid": "45f75c8d642be90e45abff69b4c6fbcf", "text": "We describe a method for identifying the speakers of quoted speech in natural-language textual stories. We have assembled a corpus of more than 3,000 quotations, whose speakers (if any) are manually identified, from a collection of 19th and 20th century literature by six authors. Using rule-based and statistical learning, our method identifies candidate characters, determines their genders, and attributes each quote to the most likely speaker. We divide the quotes into syntactic classes in order to leverage common discourse patterns, which enable rapid attribution for many quotes. We apply learning algorithms to the remainder and achieve an overall accuracy of 83%.", "title": "" } ]
[ { "docid": "fe529aab49b0c985e40bab3ab0e0582c", "text": "A very deep convolutional neural network (CNN) has recently achieved great success for image super-resolution (SR) and offered hierarchical features as well. However, most deep CNN based SR models do not make full use of the hierarchical features from the original low-resolution (LR) images, thereby achieving relatively-low performance. In this paper, we propose a novel residual dense network (RDN) to address this problem in image SR. We fully exploit the hierarchical features from all the convolutional layers. Specifically, we propose residual dense block (RDB) to extract abundant local features via dense connected convolutional layers. RDB further allows direct connections from the state of preceding RDB to all the layers of current RDB, leading to a contiguous memory (CM) mechanism. Local feature fusion in RDB is then used to adaptively learn more effective features from preceding and current local features and stabilizes the training of wider network. After fully obtaining dense local features, we use global feature fusion to jointly and adaptively learn global hierarchical features in a holistic way. Experiments on benchmark datasets with different degradation models show that our RDN achieves favorable performance against state-of-the-art methods.", "title": "" }, { "docid": "58a846448de2be2ff14d0ebdff732e1f", "text": "Today a growing community of DIY-practitioners, artists and designers are using microcontroller-based toolkits to express their concepts for digital artifacts by building them. However, as these prototypes are generally constructed using solder-free technologies, they are often fragile and unreliable. This means a huge burden of care and upkeep for these inventions when they are either exhibited or sold.\n We present a software application called Fritzing which allows artists, designers and DIY-tinkerers to prepare their hardware inventions for production. Through an interface metaphor based on the typical workflow of the target group, Fritzing has proven its ability to provide useful support in the steps following the invention of an interactive artifact.\n Fritzing serves also as a tool for documenting these interactive artifacts. As sharing of knowledge has been a driving force within this new DIY-movement, there is a need for a consistent and readable form of documentation which Fritzing can provide.\n Fritzing has also proven to be a useful tool in teaching electronics to people without an engineering background.", "title": "" }, { "docid": "64a7885b10d3439feee616c359851ec4", "text": "While humans have an incredible capacity to acquire new skills and alter their behavior as a result of experience, enhancements in performance are typically narrowly restricted to the parameters of the training environment, with little evidence of generalization to different, even seemingly highly related, tasks. Such specificity is a major obstacle for the development of many real-world training or rehabilitation paradigms, which necessarily seek to promote more general learning. In contrast to these typical findings, research over the past decade has shown that training on 'action video games' produces learning that transfers well beyond the training task. This has led to substantial interest among those interested in rehabilitation, for instance, after stroke or to treat amblyopia, or training for various precision-demanding jobs, for instance, endoscopic surgery or piloting unmanned aerial drones. Although the predominant focus of the field has been on outlining the breadth of possible action-game-related enhancements, recent work has concentrated on uncovering the mechanisms that underlie these changes, an important first step towards the goal of designing and using video games for more definite purposes. Game playing may not convey an immediate advantage on new tasks (increased performance from the very first trial), but rather the true effect of action video game playing may be to enhance the ability to learn new tasks. Such a mechanism may serve as a signature of training regimens that are likely to produce transfer of learning.", "title": "" }, { "docid": "175eef49732b11de4c9542663fc9e93f", "text": "In this paper we outline a method of procedurally generating maps using Markov Chains. Our method attempts to learn what makes a “good” map from a set of given human-authored maps, and then uses those learned patterns to generate new maps. We present an empirical evaluation using the game Super Mario Bros., showing encouraging results.", "title": "" }, { "docid": "947d4c60427377bcb466fe1393c5474c", "text": "This paper presents a single BCD technology platform with high performance power devices at a wide range of operating voltages. The platform offers 6 V to 70 V LDMOS devices. All devices offer best-in-class specific on-resistance of 20 to 40 % lower than that of the state-of-the-art IC-based LDMOS devices and robustness better than the square SOA (safe-operating-area). Fully isolated LDMOS devices, in which independent bias is capable for circuit flexibility, demonstrate superior specific on-resistance (e.g. 11.9 mΩ-mm2 for breakdown voltage of 39 V). Moreover, the unusual sudden current enhancement appeared in the ID-VD saturation region of most of the high voltage LDMOS devices is significantly suppressed.", "title": "" }, { "docid": "cba5c85ee9a9c4f97f99c1fcb35d0623", "text": "Virtualized Cloud platforms have become increasingly common and the number of online services hosted on these platforms is also increasing rapidly. A key problem faced by providers in managing these services is detecting the performance anomalies and adjusting resources accordingly. As online services generate a very large amount of monitored data in the form of time series, it becomes very difficult to process this complex data by traditional approaches. In this work, we present a novel distributed parallel approach for performance anomaly detection. We build upon Holt-Winters forecasting for automatic aberrant behavior detection in time series. First, we extend the technique to work with MapReduce paradigm. Next, we correlate the anomalous metrics with the target Service Level Objective (SLO) in order to locate the suspicious metrics. We implemented and evaluated our approach on a production Cloud encompassing IaaS and PaaS service models. Experimental results confirm that our approach is efficient and effective in capturing the metrics causing performance anomalies in large time series datasets.", "title": "" }, { "docid": "35443ed37528685e3395622327f7ea06", "text": "The e-book industry is starting to flourish due, in part, to the availability of affordable and user-friendly e-book readers. As users are increasingly moving from traditional paper books to e-books, there is an opportunity to reinvent and enhance their reading experience, for example, by leveraging the multimedia capabilities of these devices in order to turn the act of reading into a real multimedia experience. In this paper, we focus on the augmentation of the written text with its associated audiobook, so that users can listen to the book they are (currently) reading. We propose an audiobook-to-ebook alignment system by applying a Text-to-Speech (TTS)-based text to audio alignment algorithm, and enhance it with a silence filtering algorithm to cope with the difference on reading style between the TTS output and the speakers in the ebook environment. Experiments done using 12 five-minute excerpts of 6 different audio-books (read by men and women) yield usable word alignment errors below 120ms for 90% of the words. Finally, we also show a user interface implementation in the Ipad for synchronized e-book reading while listening to the associated audiobook.", "title": "" }, { "docid": "015e678d9195b96ac8b818a62613d9b9", "text": "Information extraction and human collaboration techniques are widely applied in the construction of web-scale knowledge bases. However, these knowledge bases are often incomplete or uncertain. In this paper, we present ProbKB, a probabilistic knowledge base designed to infer missing facts in a scalable, probabilistic, and principled manner using a relational DBMS. The novel contributions we make to achieve scalability and high quality are: 1) We present a formal definition and a novel relational model for probabilistic knowledge bases. This model allows an efficient SQL-based inference algorithm for knowledge expansion that applies inference rules in batches; 2) We implement ProbKB on massive parallel processing databases to achieve further scalability; and 3) We combine several quality control methods that identify erroneous rules, facts, and ambiguous entities to improve the precision of inferred facts. Our experiments show that ProbKB system outperforms the state-of-the-art inference engine in terms of both performance and quality.", "title": "" }, { "docid": "124c73eb861c0b2fb64d0084b3961859", "text": "Treemaps are an important and commonly-used approach to hierarchy visualization, but an important limitation of treemaps is the difficulty of discerning the structure of a hierarchy. This paper presents cascaded treemaps, a new approach to treemap presentation that is based in cascaded rectangles instead of the traditional nested rectangles. Cascading uses less space to present the same containment relationship, and the space savings enable a depth effect and natural padding between siblings in complex hierarchies. In addition, we discuss two general limitations of existing treemap layout algorithms: disparities between node weight and relative node size that are introduced by layout algorithms ignoring the space dedicated to presenting internal nodes, and a lack of stability when generating views of different levels of treemaps as a part of supporting interactive zooming. We finally present a two-stage layout process that addresses both concerns, computing a stable structure for the treemap and then using that structure to consider the presentation of internal nodes when arranging the treemap. All of this work is presented in the context of two large real-world hierarchies, the Java package hierarchy and the eBay auction hierarchy.", "title": "" }, { "docid": "ad79b709607e468156060d9ac543638b", "text": "I. Introduction UNTIL 35 yr ago, most scientists did not take research on the pineal gland seriously. The decade beginning in 1956, however, provided several discoveries that laid the foundation for what has become a very active area of investigation. These important early observations included the findings that, 1), the physiological activity of the pineal is influenced by the photoperiodic environment (1–5); 2), the gland contains a substance, N-acetyl-5-methoxytryptamine or melatonin, which has obvious endocrine capabilities (6, 7); 3), the function of the reproductive system in photoperiodically dependent rodents is inextricably linked to the physiology of the pineal gland (5, 8, 9); 4), the sympathetic innervation to the pineal is required for the gland to maintain its biosynthetic and endocrine activities (10, 11); and 5), the pineal gland can be rapidly removed from rodents with minimal damage to adjacent neural structures using a specially designed trephine (12).", "title": "" }, { "docid": "4538e6bde228b0423f1ec2a41feae17c", "text": "In this paper, we revisit the classical perspective-n-point (PnP) problem, and propose the first non-iterative O(n) solution that is fast, generally applicable and globally optimal. Our basic idea is to formulate the PnP problem into a functional minimization problem and retrieve all its stationary points by using the Gr\"obner basis technique. The novelty lies in a non-unit quaternion representation to parameterize the rotation and a simple but elegant formulation of the PnP problem into an unconstrained optimization problem. Interestingly, the polynomial system arising from its first-order optimality condition assumes two-fold symmetry, a nice property that can be utilized to improve speed and numerical stability of a Grobner basis solver. Experiment results have demonstrated that, in terms of accuracy, our proposed solution is definitely better than the state-of-the-art O(n) methods, and even comparable with the reprojection error minimization method.", "title": "" }, { "docid": "817b1ec160974f41129e0dadd3cdaa27", "text": "Crude glycerin, the main by-product of biodiesel production, can replace dietary energy sources, such as corn. The objective of this study was to evaluate the inclusion of up to 30% of crude glycerin in dry matter (DM) of the total diets, and its effects on meat quality parameters of feedlot Nellore bulls. Thirty animals (227.7 ± 23.8 kg body weight; 18 months old) were housed in individual pens and fed 5 experimental diets, containing 0, 7.5, 15, 22.5 or 30% crude glycerin (DM basis). After 103 d (21 d adaptation) animals were slaughtered and the Longissimus muscle was collected. The characteristics assessed were chemical composition, fatty acid profile, cholesterol, shear force, pH, color, water-holding capacity, cooking loss and sensory properties. The increasing inclusion of crude glycerin in the diets did not affect the chemical composition of the Longissimus muscle (P > 0.10). A quadratic effect was observed when levels of crude glycerin were increased, on the concentration of pentadecanoic, palmitoleic and eicosenoic fatty acids in meat (P < 0.05), and on the activity of the delta-9 desaturase 16 and delta-9 desaturase 18 enzymes (P < 0.05). The addition of crude glycerin increased the gamma linolenic fatty acid concentration (P < 0.01), and altered the monounsaturated fatty acids in Longissimus muscle of animals (Pquad. < 0.05). Crude glycerin decreased cholesterol content in meat (P < 0.05), and promoted higher flavor score and greasy intensity perception of the meat (P < 0.01). The inclusion of up to 30% crude glycerin in Nellore cattle bulls`diets (DM basis) improves meat cholesterol and sensory attributes, such as flavor, without affecting significantly the physical traits, the main fatty acid concentrations and the chemical composition.", "title": "" }, { "docid": "3eff8dca65a9a119a9f5c38dbf8dc978", "text": "Advances in predicting in vivo performance of drug products has the potential to change how drug products are developed and reviewed. Modeling and simulation methods are now more commonly used in drug product development and regulatory drug review. These applications include, but are not limited to: the development of biorelevant specifications, the determination of bioequivalence metrics for modified release products with rapid therapeutic onset, the design of in vitro-in vivo correlations in a mechanistic framework, and prediction of food effect. As new regulatory concepts such as quality by design require better application of biopharmaceutical modeling in drug product development, regulatory challenges in bioequivalence demonstration of complex drug products also present exciting opportunities for creative modeling and simulation approaches. A collaborative effort among academia, government and industry in modeling and simulation will result in improved safe and effective new/generic drugs to the American public.", "title": "" }, { "docid": "97f8b8ee60e3f03e64833a16aaf5e743", "text": "OBJECTIVE\nA pilot randomized controlled trial (RCT) of the effectiveness of occupational therapy using a sensory integration approach (OT-SI) was conducted with children who had sensory modulation disorders (SMDs). This study evaluated the effectiveness of three treatment groups. In addition, sample size estimates for a large scale, multisite RCT were calculated.\n\n\nMETHOD\nTwenty-four children with SMD were randomly assigned to one of three treatment conditions; OT-SI, Activity Protocol, and No Treatment. Pretest and posttest measures of behavior, sensory and adaptive functioning, and physiology were administered.\n\n\nRESULTS\nThe OT-SI group, compared to the other two groups, made significant gains on goal attainment scaling and on the Attention subtest and the Cognitive/Social composite of the Leiter International Performance Scale-Revised. Compared to the control groups, OT-SI improvement trends on the Short Sensory Profile, Child Behavior Checklist, and electrodermal reactivity were in the hypothesized direction.\n\n\nCONCLUSION\nFindings suggest that OT-SI may be effective in ameliorating difficulties of children with SMD.", "title": "" }, { "docid": "898c617e6fb889a721f2935a9deb828c", "text": "Functionalist accounts of hierarchy, longstanding in the social sciences, have gained recent prominence in studies of leadership, power, and status. This chapter takes a critical look at a core implication of the functionalist perspective – namely, that steeper hierarchies help groups and organizations perform better than do flatter structures. We review previous research relevant to this question, ranging from studies of communication structures in small groups to studies of compensation systems in large corporations. This review finds that in contrast to strong functionalist assertions, the effects of steeper hierarchies are highly mixed. Sometimes steeper hierarchies benefit groups and sometimes they harm groups. We thus propose five conditions that moderate the effects of hierarchy steepness: (1) the kinds of tasks on which the group is working; (2) whether the right individuals have been selected as leaders; (3) how the possession of power modifies leaders’ psychology; (4) whether the hierarchy facilitates or hampers intra-group coordination; and (5) whether the hierarchy affects group members’ motivation in positive or deleterious ways. # 2010 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "5f8a2db77dfa71ea2051a1a92b97f1f5", "text": "Online communities are getting increasingly important for several different user groups; at the same time, community members seem to lack loyalty, as they often change from one community to another or use their community less over time. To survive and thrive, online communities must meet members' needs. By using qualitative data are from an extensive online survey of online community users and a representative sample of Internet users, 200 responses to an open quesion regarding community-loyalty was analyzed. Results show that there are 9 main reasons why community-users decrease in their participation over time or, in simple terms, stop using their online community: 1) Lack of interesting people/friends attending, 2) Low quality content, 3) Low usability, 4) Harassment and bullying 5) Time-consuming/isolating, 6) Low trust, 7) Over-commercialized, 8) Dissatisfaction with moderators and 9) Unspecified boring. The results, design implications and future research are discussed.", "title": "" }, { "docid": "140f5a29271e9f8c6dcda0be3ce74e2c", "text": "The fuzzy vault scheme is a cryptographic primitive that can be used to protect human fingerprint templates where stored. Analyses for most implementations account for brute-force security only. There are, however, other risks that have to be consider, such as false-accept attacks, record multiplicity attacks, and information leakage from auxiliary data, such as alignment parameters. In fact, the existing work lacks analyses of these weaknesses and are even susceptible to a variety of them. In view of these vulnerabilities, we redesign a minutiae-based fuzzy vault implementation preventing an adversary from running attacks via record multiplicity. Furthermore, we propose a mechanism for robust absolute fingerprint prealignment. In combination, we obtain a fingerprint-based fuzzy vault that resists known record multiplicity attacks and that does not leak information about the protected fingerprints from auxiliary alignment data. By experiments, we evaluate the performance of our security-improved implementation that, even though it has slight usability merits as compared with other minutiae-based implementations, provides improved security. However, despite heavy efforts spent in improving security, our implementation is, like all other implementations based on a single finger, subjected to a fundamental security limitation related to the false acceptance rate, i.e., false-accept attack. Consequently, this paper supports the notion that a single finger is not sufficient to provide acceptable security. Instead, implementations for multiple finger or even multiple modalities should be deployed the security of which may be improved by the technical contributions of this paper.", "title": "" }, { "docid": "4a6523b16ebe8bfa04421530f6252bd5", "text": "Representations are fundamental to artificial intelligence. The performance of a learning system depends on how the data is represented. Typically, these representations are hand-engineered using domain knowledge. Recently, the trend is to learn these representations through stochastic gradient descent in multi-layer neural networks, which is called backprop. Learning representations directly from the incoming data stream reduces human labour involved in designing a learning system. More importantly, this allows in scaling up a learning system to difficult tasks. In this paper, we introduce a new incremental learning algorithm called crossprop, that learns incoming weights of hidden units based on the meta-gradient descent approach. This meta-gradient descent approach was previously introduced by Sutton (1992) and Schraudolph (1999) for learning stepsizes. The final update equation introduces an additional memory parameter for each of these weights and generalizes the backprop update equation. From our empirical experiments, we show that crossprop learns and reuses its feature representation while tackling new and unseen tasks whereas backprop relearns a new feature representation.", "title": "" }, { "docid": "03a6656158a24606ee4ad6be0592e850", "text": "It is well known that earthquakes are a regional event, strongly controlled by local geological structures and circumstances. Reducing the research area can reduce the influence of other irrelevant seismotectonics. A new sub regiondividing scheme, considering the seismotectonics influence, was applied for the artificial neural network (ANN) earthquake prediction model in the northeast seismic region of China (NSRC). The improved set of input parameters and prediction time duration are also discussed in this work. The new dividing scheme improved the prediction accuracy for different prediction time frames. Three different research regions were analyzed as an earthquake data source for the ANN model under different prediction time duration frames. The results show: (1) dividing the research region into smaller subregions can improve the prediction accuracies in NSRC, (2) larger research regions need shorter prediction durations to obtain better performance, (3) different areas have different sets of input parameters in NSRC, and (4) the dividing scheme, considering the seismotectonics frame of the region, yields better results.", "title": "" }, { "docid": "040480722747c73e65dec3793e3c0877", "text": "In recent years, Multiply-Accumulate (MAC) unit is developing for various high performance applications. MAC unit is a fundamental block in the computing devices, especially Digital Signal Processor (DSP). MAC unit performs multiplication and accumulation process. Basic MAC unit consists of multiplier, adder, and accumulator. In the existing MAC unit model, multiplier is designed using modified Radix-2 booth multiplier. In this paper, MAC unit model is designed by incorporating the various multipliers such as Array Multiplier, Ripple Carry Array Multiplier with Row Bypassing Technique, Wallace Tree Multiplier and DADDA Multiplier in the multiplier module and the performance of MAC unit models is analyzed in terms of area, delay and power. The performance analysis of MAC unit models is done by designing the models in Verilog HDL. Then, MAC unit models are simulated and synthesized in Xilinx ISE 13.2 for Virtex-6 family 40nm technology.", "title": "" } ]
scidocsrr
cbc5fcfac69eb91fe3ec48f00893245a
Efficient Partial Order Preserving Unsupervised Feature Selection on Networks
[ { "docid": "d7573e7b3aac75b49132076ce9fc83e0", "text": "The prevalent use of social media produces mountains of unlabeled, high-dimensional data. Feature selection has been shown effective in dealing with high-dimensional data for efficient data mining. Feature selection for unlabeled data remains a challenging task due to the absence of label information by which the feature relevance can be assessed. The unique characteristics of social media data further complicate the already challenging problem of unsupervised feature selection, (e.g., part of social media data is linked, which makes invalid the independent and identically distributed assumption), bringing about new challenges to traditional unsupervised feature selection algorithms. In this paper, we study the differences between social media data and traditional attribute-value data, investigate if the relations revealed in linked data can be used to help select relevant features, and propose a novel unsupervised feature selection framework, LUFS, for linked social media data. We perform experiments with real-world social media datasets to evaluate the effectiveness of the proposed framework and probe the working of its key components.", "title": "" }, { "docid": "2052b47be2b5e4d0c54ab0be6ae1958b", "text": "Discriminative training approaches like structural SVMs have shown much promise for building highly complex and accurate models in areas like natural language processing, protein structure prediction, and information retrieval. However, current training algorithms are computationally expensive or intractable on large datasets. To overcome this bottleneck, this paper explores how cutting-plane methods can provide fast training not only for classification SVMs, but also for structural SVMs. We show that for an equivalent “1-slack” reformulation of the linear SVM training problem, our cutting-plane method has time complexity linear in the number of training examples. In particular, the number of iterations does not depend on the number of training examples, and it is linear in the desired precision and the regularization parameter. Furthermore, we present an extensive empirical evaluation of the method applied to binary classification, multi-class classification, HMM sequence tagging, and CFG parsing. The experiments show that the cutting-plane algorithm is broadly applicable and fast in practice. On large datasets, it is typically several orders of magnitude faster than conventional training methods derived from decomposition methods like SVM-light, or conventional cutting-plane methods. Implementations of our methods are available at www.joachims.org .", "title": "" }, { "docid": "227786365219fe1efab6414bae0d8cdb", "text": "Predicting the occurrence of links is a fundamental problem in networks. In the link prediction problem we are given a snapshot of a network and would like to infer which interactions among existing members are likely to occur in the near future or which existing interactions are we missing. Although this problem has been extensively studied, the challenge of how to effectively combine the information from the network structure with rich node and edge attribute data remains largely open.\n We develop an algorithm based on Supervised Random Walks that naturally combines the information from the network structure with node and edge level attributes. We achieve this by using these attributes to guide a random walk on the graph. We formulate a supervised learning task where the goal is to learn a function that assigns strengths to edges in the network such that a random walker is more likely to visit the nodes to which new links will be created in the future. We develop an efficient training algorithm to directly learn the edge strength estimation function.\n Our experiments on the Facebook social graph and large collaboration networks show that our approach outperforms state-of-the-art unsupervised approaches as well as approaches that are based on feature extraction.", "title": "" }, { "docid": "81c90998c5e456be34617e702dbfa4f5", "text": "In this paper, a new unsupervised learning algorithm, namely Nonnegative Discriminative Feature Selection (NDFS), is proposed. To exploit the discriminative information in unsupervised scenarios, we perform spectral clustering to learn the cluster labels of the input samples, during which the feature selection is performed simultaneously. The joint learning of the cluster labels and feature selection matrix enables NDFS to select the most discriminative features. To learn more accurate cluster labels, a nonnegative constraint is explicitly imposed to the class indicators. To reduce the redundant or even noisy features, `2,1-norm minimization constraint is added into the objective function, which guarantees the feature selection matrix sparse in rows. Our algorithm exploits the discriminative information and feature correlation simultaneously to select a better feature subset. A simple yet efficient iterative algorithm is designed to optimize the proposed objective function. Experimental results on different real world datasets demonstrate the encouraging performance of our algorithm over the state-of-the-arts. Introduction The dimension of data is often very high in many domains (Jain and Zongker 1997; Guyon and Elisseeff 2003), such as image and video understanding (Wang et al. 2009a; 2009b), and bio-informatics. In practice, not all the features are important and discriminative, since most of them are often correlated or redundant to each other, and sometimes noisy (Duda, Hart, and Stork 2001; Liu, Wu, and Zhang 2011). These features may result in adverse effects in some learning tasks, such as over-fitting, low efficiency and poor performance (Liu, Wu, and Zhang 2011). Consequently, it is necessary to reduce dimensionality, which can be achieved by feature selection or transformation to a low dimensional space. In this paper, we focus on feature selection, which is to choose discriminative features by eliminating the ones with little or no predictive information based on certain criteria. Many feature selection algorithms have been proposed, which can be classified into three main families: filter, wrapper, and embedded methods. The filter methods (Duda, Hart, Copyright c © 2012, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. and Stork 2001; He, Cai, and Niyogi 2005; Zhao and Liu 2007; Masaeli, Fung, and Dy 2010; Liu, Wu, and Zhang 2011; Yang et al. 2011a) use statistical properties of the features to filter out poorly informative ones. They are usually performed before applying classification algorithms. They select a subset of features only based on the intrinsic properties of the data. In the wrapper approaches (Guyon and Elisseeff 2003; Rakotomamonjy 2003), feature selection is “wrapped” in a learning algorithm and the classification performance of features is taken as the evaluation criterion. Embedded methods (Vapnik 1998; Zhu et al. 2003) perform feature selection in the process of model construction. In contrast with filter methods, wrapper and embedded methods are tightly coupled with in-built classifiers, which causes that they are less generality and computationally expensive. In this paper, we focus on the filter feature selection algorithm. Because of the importance of discriminative information in data analysis, it is beneficial to exploit discriminative information for feature selection, which is usually encoded in labels. However, how to select discriminative features in unsupervised scenarios is a significant but hard task due to the lack of labels. In light of this, we propose a novel unsupervised feature selection algorithm, namely Nonnegative Discriminative Feature Selection (NDFS), in this paper. We perform spectral clustering and feature selection simultaneously to select the discriminative features for unsupervised learning. The cluster label indicators are obtained by spectral clustering to guide the feature selection procedure. Different from most of the previous spectral clustering algorithms (Shi and Malik 2000; Yu and Shi 2003), we explicitly impose a nonnegative constraint into the objective function, which is natural and reasonable as discussed later in this paper. With nonnegative and orthogonality constraints, the learned cluster indicators are much closer to the ideal results and can be readily utilized to obtain cluster labels. Our method exploits the discriminative information and feature correlation in a joint framework. For the sake of feature selection, the feature selection matrix is constrained to be sparse in rows, which is formulated as `2,1-norm minimization term. To solve the proposed problem, a simple yet effective iterative algorithm is proposed. Extensive experiments are conducted on different datasets, which show that the proposed approach outperforms the state-of-the-arts in different applications. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence", "title": "" } ]
[ { "docid": "c1f6052ecf802f1b4b2e9fd515d7ea15", "text": "In recent years there has been a growing interest in the study of sparse representation of signals. Using an overcomplete dictionary that contains prototype signal-atoms, signals are described by sparse linear combinations of these atoms. Applications that use sparse representation are many and include compression, regularization in inverse problems, feature extraction, and more. Recent activity in this field concentrated mainly on the study of pursuit algorithms that decompose signals with respect to a given dictionary. Designing dictionaries to better fit the above model can be done by either selecting one from a pre-specified set of linear transforms, or by adapting the dictionary to a set of training signals. Both these techniques have been considered, but this topic is largely still open. In this paper we propose a novel algorithm for adapting dictionaries in order to achieve sparse signal representations. Given a set of training signals, we seek the dictionary that leads to the best representation for each member in this set, under strict sparsity constraints. We present a new method – the K-SVD algorithm – generalizing the K-Means clustering process. K-SVD is an iterative method that alternates between sparse coding of the examples based on the current dictionary, and a process of updating the dictionary atoms to better fit the data. The update of the dictionary columns is combined with an update of the sparse representations, thereby accelerating convergence. The K-SVD algorithm is flexible and can work with any pursuit method (e.g., basis pursuit, FOCUSS, or matching pursuit). We analyze this algorithm and demonstrate its results on both synthetic tests and in applications on real image data.", "title": "" }, { "docid": "f1af321a5d7c2e738c181373d5dbfc9a", "text": "This research examined how motivation (perceived control, intrinsic motivation, and extrinsic motivation), cognitive learning strategies (deep and surface strategies), and intelligence jointly predict long-term growth in students' mathematics achievement over 5 years. Using longitudinal data from six annual waves (Grades 5 through 10; Mage  = 11.7 years at baseline; N = 3,530), latent growth curve modeling was employed to analyze growth in achievement. Results showed that the initial level of achievement was strongly related to intelligence, with motivation and cognitive strategies explaining additional variance. In contrast, intelligence had no relation with the growth of achievement over years, whereas motivation and learning strategies were predictors of growth. These findings highlight the importance of motivation and learning strategies in facilitating adolescents' development of mathematical competencies.", "title": "" }, { "docid": "d292d1334594bec8531e6011fabaafd2", "text": "Insight into the growth (or shrinkage) of “knowledge communities” of authors that build on each other's work can be gained by studying the evolution over time of clusters of documents. We cluster documents based on the documents they cite in common using the Streemer clustering method, which finds cohesive foreground clusters (the knowledge communities) embedded in a diffuse background. We build predictive models with features based on the citation structure, the vocabulary of the papers, and the affiliations and prestige of the authors and use these models to study the drivers of community growth and the predictors of how widely a paper will be cited. We find that scientific knowledge communities tend to grow more rapidly if their publications build on diverse information and use narrow vocabulary and that papers that lie on the periphery of a community have the highest impact, while those not in any community have the lowest impact.", "title": "" }, { "docid": "09c5da2fbf8a160ba27221ff0c5417ac", "text": " The burst fracture of the spine was first described by Holdsworth in 1963 and redefined by Denis in 1983 as being a fracture of the anterior and middle columns of the spine with or without an associated posterior column fracture. This injury has received much attention in the literature as regards its radiological diagnosis and also its clinical managment. The purpose of this article is to review the way that imaging has been used both to diagnose the injury and to guide management. Current concepts of the stability of this fracture are presented and our experience in the use of magnetic resonance imaging in deciding treatment options is discussed.", "title": "" }, { "docid": "737231466c50ac647f247b60852026e2", "text": "The proliferation of wearable devices, e.g., smartwatches and activity trackers, with embedded sensors has already shown its great potential on monitoring and inferring human daily activities. This paper reveals a serious security breach of wearable devices in the context of divulging secret information (i.e., key entries) while people are accessing key-based security systems. Existing methods of obtaining such secret information rely on installations of dedicated hardware (e.g., video camera or fake keypad), or training with labeled data from body sensors, which restrict use cases in practical adversary scenarios. In this work, we show that a wearable device can be exploited to discriminate mm-level distances and directions of the user’s fine-grained hand movements, which enable attackers to reproduce the trajectories of the user’s hand and further to recover the secret key entries. In particular, our system confirms the possibility of using embedded sensors in wearable devices, i.e., accelerometers, gyroscopes, and magnetometers, to derive the moving distance of the user’s hand between consecutive key entries regardless of the pose of the hand. Our Backward PIN-Sequence Inference algorithm exploits the inherent physical constraints between key entries to infer the complete user key entry sequence. Extensive experiments are conducted with over 7,000 key entry traces collected from 20 adults for key-based security systems (i.e., ATM keypads and regular keyboards) through testing on different kinds of wearables. Results demonstrate that such a technique can achieve 80 percent accuracy with only one try and more than 90 percent accuracy with three tries. Moreover, the performance of our system is consistently good even under low sampling rate and when inferring long PIN sequences. To the best of our knowledge, this is the first technique that reveals personal PINs leveraging wearable devices without the need for labeled training data and contextual information.", "title": "" }, { "docid": "ceb02ddf8b2085d67ccf27c3c5b57dfd", "text": "We present a novel latent embedding model for learning a compatibility function between image and class embeddings, in the context of zero-shot classification. The proposed method augments the state-of-the-art bilinear compatibility model by incorporating latent variables. Instead of learning a single bilinear map, it learns a collection of maps with the selection, of which map to use, being a latent variable for the current image-class pair. We train the model with a ranking based objective function which penalizes incorrect rankings of the true class for a given image. We empirically demonstrate that our model improves the state-of-the-art for various class embeddings consistently on three challenging publicly available datasets for the zero-shot setting. Moreover, our method leads to visually highly interpretable results with clear clusters of different fine-grained object properties that correspond to different latent variable maps.", "title": "" }, { "docid": "29e5f1dfc38c48f5296d9dde3dbc3172", "text": "Low-cost smartphone adapters can bring virtual reality to the masses, but input is typically limited to using head tracking, which makes it difficult to perform complex tasks like navigation. Walking-in-place (WIP) offers a natural and immersive form of virtual locomotion that can reduce simulation sickness. We present VR-Drop; an immersive puzzle game that illustrates the use of WIP for virtual locomotion. Our WIP implementation doesn't require any instrumentation as it is implemented using a smartphone's inertial sensors. VR-Drop demonstrates that WIP can significantly increase VR input options and allows for a deep and immersive VR experience.", "title": "" }, { "docid": "527c1e2a78e7f171025231a475a828b9", "text": "Cryptography is the science to transform the information in secure way. Encryption is best alternative to convert the data to be transferred to cipher data which is an unintelligible image or data which cannot be understood by any third person. Images are form of the multimedia data. There are many image encryption schemes already have been proposed, each one of them has its own potency and limitation. This paper presents a new algorithm for the image encryption/decryption scheme which has been proposed using chaotic neural network. Chaotic system produces the same results if the given inputs are same, it is unpredictable in the sense that it cannot be predicted in what way the system's behavior will change for any little change in the input to the system. The objective is to investigate the use of ANNs in the field of chaotic Cryptography. The weights of neural network are achieved based on chaotic sequence. The chaotic sequence generated and forwarded to ANN and weighs of ANN are updated which influence the generation of the key in the encryption algorithm. The algorithm has been implemented in the software tool MATLAB and results have been studied. To compare the relative performance peak signal to noise ratio (PSNR) and mean square error (MSE) are used.", "title": "" }, { "docid": "429ac6709131b648bb44a6ccaebe6a19", "text": "We highlight a practical yet rarely discussed problem in dialogue state tracking (DST), namely handling unknown slot values. Previous approaches generally assume predefined candidate lists and thus are not designed to output unknown values, especially when the spoken language understanding (SLU) module is absent as in many end-to-end (E2E) systems. We describe in this paper an E2E architecture based on the pointer network (PtrNet) that can effectively extract unknown slot values while still obtains state-of-the-art accuracy on the standard DSTC2 benchmark. We also provide extensive empirical evidence to show that tracking unknown values can be challenging and our approach can bring significant improvement with the help of an effective feature dropout technique.", "title": "" }, { "docid": "9ac90eeb0dec90578e060828b210a120", "text": "Computer networks are limited in performance by the electronic equipment. Terminals have received little attention, but need to be redesigned in order to be able to manage 10 Gigabit Ethernet. The Internet checksum computation, which is used in TCP and UDP requires specialized processing resources. The TUCFP hardware accelerator calculates the Internet checksum. It processes 32 bits in parallel and is designed for easy integration in the general purpose protocol processor. It handles UDP as well as TCP packets in both IPv4 and IPv6 environments. A synthesized implementation for 0.18 micron technology proves a throughput of over 12 Gigabits/s.", "title": "" }, { "docid": "ea52c884ddfb34ce3336f6795455ddbe", "text": "In this paper we introduce Smooth Particle Networks (SPNets), a framework for integrating fluid dynamics with deep networks. SPNets adds two new layers to the neural network toolbox: ConvSP and ConvSDF, which enable computing physical interactions with unordered particle sets. We use these layers in combination with standard neural network layers to directly implement fluid dynamics inside a deep network, where the parameters of the network are the fluid parameters themselves (e.g., viscosity, cohesion, etc.). Because SPNets are implemented as a neural network, the resulting fluid dynamics are fully differentiable. We then show how this can be successfully used to learn fluid parameters from data, perform liquid control tasks, and learn policies to manipulate liquids.", "title": "" }, { "docid": "587682bab865d7d6386a4951aacba45b", "text": "Biogeography-based optimization algorithm(BBO) is a new kind of optimization algorithm based on Biogeography. It mimics the migration strategy of animals to solve the problem of optimization. A new algorithm for Traveling Salesman Problem(TSPBBO) based on BBO is presented in this paper. It is tested on classical TSP problem. The comparison results with the other kinds of optimization algorithm show that TSPBBO is a very effective algorithm for TSP combination optimization. It provides a new method for this kind of problem.", "title": "" }, { "docid": "9e37c463a38a3efe746d9af7e8872dc6", "text": "OBJECTIVES\nTo examine the relationship of corporal punishment with children's behavior problems while accounting for neighborhood context and while using stronger statistical methods than previous literature in this area, and to examine whether different levels of corporal punishment have different effects in different neighborhood contexts.\n\n\nDESIGN\nLongitudinal cohort study.\n\n\nSETTING\nGeneral community.\n\n\nPARTICIPANTS\n1943 mother-child pairs from the National Longitudinal Survey of Youth.\n\n\nMAIN OUTCOME MEASURE\nInternalizing and externalizing behavior problem scales of the Behavior Problems Index.\n\n\nRESULTS AND CONCLUSIONS\nParental use of corporal punishment was associated with a 0.71 increase (P<.05) in children's externalizing behavior problems even when several parenting behaviors, neighborhood quality, and all time-invariant variables were accounted for. The association of corporal punishment and children's externalizing behavior problems was not dependent on neighborhood context. The research found no discernible relationship between corporal punishment and internalizing behavior problems.", "title": "" }, { "docid": "5038df440c0db19e1588cc69b10cc3c4", "text": "Electronic document management (EDM) technology has the potential to enhance the information management in construction projects considerably, without radical changes to current practice. Over the past fifteen years this topic has been overshadowed by building product modelling in the construction IT research world, but at present EDM is quickly being introduced in practice, in particular in bigger projects. Often this is done in the form of third party services available over the World Wide Web. In the paper, a typology of research questions and methods is presented, which can be used to position the individual research efforts which are surveyed in the paper. Questions dealt with include: What features should EMD systems have? How much are they used? Are there benefits from use and how should these be measured? What are the barriers to wide-spread adoption? Which technical questions need to be solved? Is there scope for standardisation? How will the market for such systems evolve?", "title": "" }, { "docid": "37257f51eddbad5d7a151c12083e51a7", "text": "As data rate pushes to 10Gbps and beyond, timing jitter has become one of the major factors that limit the link performance. Thorough understanding of the link jitter characteristics and accurate modeling of their impact on link performance is a must even at early design stage. This paper discusses the characteristics of timing jitter in typical I/O interfaces and overviews various jitter modeling methods proposed in the literature during the past few years. Recommendations are given based on the characteristics of timing jitter and their locations.", "title": "" }, { "docid": "ea0c9e70789c43e2c14c0b35d8f45dc2", "text": "Harlequin ichthyosis (HI) is a rare and severe form of congenital ichthyosis. Linked to deletion and truncation mutations of a keratinocyte lipid transporter, HI is characterized by diffuse epidermal hyperkeratinization and defective desquamation. At birth, the HI phenotype is striking with thick hyperkeratotic plate-like scales with deep dermal fissures, severe ectropion and eclabium, among other findings. Over the first months of life, the hyperkeratotic covering is shed, revealing a diffusely erythematous, scaly epidermis, which persists for the remainder of the patient's life. Although HI infants have historically succumbed in the perinatal period related to their profound epidermal compromise, the prognosis of HI infants has vastly improved over the past 20 years. Here, we report a case of HI treated with acitretin, focusing on the multi-faceted management of the disease in the inpatient setting. A review of the literature of the management of HI during the perinatal period is also presented.", "title": "" }, { "docid": "3f220d8863302719d3cf69b7d99f8c4e", "text": "The numerical representation precision required by the computations performed by Deep Neural Networks (DNNs) varies across networks and between layers of a same network. This observation motivates a precision-based approach to acceleration which takes into account both the computational structure and the required numerical precision representation. This work presents <italic>Stripes</italic> (<italic>STR</italic>), a hardware accelerator that uses bit-serial computations to improve energy efficiency and performance. Experimental measurements over a set of state-of-the-art DNNs for image classification show that <italic>STR</italic> improves performance over a state-of-the-art accelerator from 1.35<inline-formula><tex-math notation=\"LaTeX\">$\\times$</tex-math><alternatives> <inline-graphic xlink:href=\"judd-ieq1-2597140.gif\"/></alternatives></inline-formula> to 5.33<inline-formula> <tex-math notation=\"LaTeX\">$\\times$</tex-math><alternatives><inline-graphic xlink:href=\"judd-ieq2-2597140.gif\"/> </alternatives></inline-formula> and by 2.24<inline-formula><tex-math notation=\"LaTeX\">$\\times$</tex-math> <alternatives><inline-graphic xlink:href=\"judd-ieq3-2597140.gif\"/></alternatives></inline-formula> on average. <italic>STR</italic>’s area and power overhead are estimated at 5 percent and 12 percent respectively. <italic> STR</italic> is 2.00<inline-formula><tex-math notation=\"LaTeX\">$\\times$</tex-math><alternatives> <inline-graphic xlink:href=\"judd-ieq4-2597140.gif\"/></alternatives></inline-formula> more energy efficient than the baseline.", "title": "" }, { "docid": "38fcf1fca6856c339cc7569ef725ab85", "text": "The multitarget recursive Bayes nonlinear filter is the theoretically optimal approach to multisensor-multitarget detection, tracking, and identification. For applications in which this filter is appropriate, it is likely to be tractable for only a small number of targets. In earlier papers we derived closed-form equations for an approximation of this filter based on propagation of a first-order multitarget moment called the probability hypothesis density (PHD). In a recent paper, Erdinc, Willett, and Bar-Shalom argued for the need for a PHD-type filter which remains first-order in the states of individual targets, but which is higher-order in target number. In this paper we show that this is indeed possible. We derive a closed-form cardinalized PHD (CPHD) filter, which propagates not only the PHD but also the entire probability distribution on target number.", "title": "" }, { "docid": "77c35887241735b833b0b8baaee569c4", "text": "Existing research efforts into tennis visualization have primarily focused on using ball and player tracking data to enhance professional tennis broadcasts and to aid coaches in helping their students. Gathering and analyzing this data typically requires the use of an array of synchronized cameras, which are expensive for non-professional tennis matches. In this paper, we propose TenniVis, a novel tennis match visualization system that relies entirely on data that can be easily collected, such as score, point outcomes, point lengths, service information, and match videos that can be captured by one consumer-level camera. It provides two new visualizations to allow tennis coaches and players to quickly gain insights into match performance. It also provides rich interactions to support ad hoc hypothesis development and testing. We first demonstrate the usefulness of the system by analyzing the 2007 Australian Open men's singles final. We then validate its usability by two pilot user studies where two college tennis coaches analyzed the matches of their own players. The results indicate that useful insights can quickly be discovered and ad hoc hypotheses based on these insights can conveniently be tested through linked match videos.", "title": "" }, { "docid": "604acce1aeb26ea5b6a72e230752ff60", "text": "Research in experimental psychology suggests that, in violation of Bayes' rule, most people tend to \"overreact\" to unexpected and dramatic news events. This study of market efficiency investigates whether such behavior affects stock prices. The empirical evidence, based on CRSP monthly return data, is consistent with the overreaction hypothesis. Substantial weak form market inefficiencies are discovered. The results also shed new light on the January returns earned by prior \"winners\" and \"losers.\" Portfolios of losers experience exceptionally large January returns as late as five years after portfolio formation. As ECONOMISTS INTERESTED IN both market behavior and the psychology of individual decision making, we have been struck by the similarity of two sets of empirical findings. Both classes of behavior can be characterized as displaying ouerreaction. This study was undertaken to investigate the possibility that these phenomena are related by more than just appearance. We begin by describing briefly the individual and market behavior that piqued our interest. The term overreaction carries with it an implicit comparison to some degree of reaction that is considered to be appropriate. What is an appropriate reaction? One class.of tasks which have a well-established norm are probability revision problems for which Bayes' rule prescribes the correct reaction to new information. It has now been well-established that Bayes' rule is not an apt characterization of how individuals actually respond to new data (Kahneman et al. [14]). In revising their beliefs, individuals tend to overweight recent information and underweight prior (or base rate) data. People seem to make predictions according to a simple matching rule: \"The predicted value is selected so that the standing of the case in the distribution of outcomes matches its standing in the distribution of impressions\" (Kahneman and Tversky [14, p. 4161). This rule-of-thumb, an instance of what Kahneman and Tversky call the representativeness heuristic, violates the basic statistical principal that the extremeness of predictions must be moderated by considerations of predictability. Grether [12] has replicated this finding under incentive compatible conditions. There is also considerable evidence that the actual expectations of professional security analysts and economic forecasters display the same overreaction bias (for a review, see De Bondt [7]). One of the earliest observations about overreaction in markets was made by J. M. Keynes:\". . .day-to-day fluctuations in the profits of existing investments, * University of Wisconsin at Madison and Cornell University, respectively. The financial support of the C.I.M. Doctoral Fellowship Program (Brussels, Belgium) and the Cornell Graduate School of Management is gratefully acknowledged. We received helpful comments from Seymour Smidt, Dale Morse, Peter Bernstein, Fischer Black, Robert Jarrow, Edwin Elton, and Ross Watts. 794 The Journal of Finance which are obviously of an ephemeral and nonsignificant character, tend to have an altogether excessive, and even an absurd, influence on the market\" [17, pp. 153-1541. About the same time, Williams noted in this Theory of Investment Value that \"prices have been based too much on current earning power and too little on long-term dividend paying power\" [28, p. 191. More recently, Arrow has concluded that the work of Kahneman and Tversky \"typifies very precisely the exessive reaction to current information which seems to characterize all the securities and futures markets\" [I, p. 51. Two specific examples of the research to which Arrow was referring are the excess volatility of security prices and the so-called price earnings ratio anomaly. The excess volatility issue has been investigated most thoroughly by Shiller [27]. Shiller interprets the Miller-Modigliani view of stock prices as a constraint on the likelihood function of a price-dividend sample. Shiller concludes that, at least over the last century, dividends simply do not vary enough to rationally justify observed aggregate price movements. Combining the results with Kleidon's [18] findings that stock price movements are strongly correlated with the following year's earnings changes suggests a clear pattern of overreaction. In spite of the observed trendiness of dividends, investors seem to attach disproportionate importance to short-run economic developments.' The price earnings ratio (PIE) anomaly refers to the observation that stocks with extremely low PIE ratios (i.e., lowest decile) earn larger risk-adjusted returns than high PIE stocks (Basu [3]). Most financial economists seem to regard the anomaly as a statistical artifact. Explanations are usually based on alleged misspecification of the capital asset pricing model (CAPM). Ball [2] emphasizes the effects of omitted risk factors. The PIE ratio is presumed to be a proxy for some omitted factor which, if included in the \"correct\" equilibrium valuation model, would eliminate the anomaly. Of course, unless these omitted factors can be identified, the hypothesis is untestable. Reinganum [21] has claimed that the small firm effect subsumes the PIE effect and that both are related to the same set of missing (and again unknown) factors. However, Basu [4] found a significant PIE effect after controlling for firm size, and earlier Graham [ l l ] even found an effect within the thirty Dow Jones Industrials, hardly a group of small firms! An alternative behavioral explanation for the anomaly based on investor overreaction is what Basu called the \"price-ratio\" hypothesis (e.g., Dreman [8]). Companies with very low PIE'Sare thought to be temporarily \"undervalued\" because investors become excessively pessimistic after a series of bad earnings reports or other bad news. Once future earnings turn out to be better than the unreasonably gloomy forecasts, the price adjusts. Similarly, the equity of companies with very high PIE'Sis thought to be \"overvalued,\" before (predictably) falling in price. While the overreaction hypothesis has considerable a priori appeal, the obvious question to ask is: How does the anomaly survive the process of arbitrage? There Of course, the variability of stock prices may also reflect changes in real interest rates. If so, the price movements of other assets-such as land or housing-should match those of stocks. However, this is not actually observed. A third hypothesis, advocated by Marsh and Merton [19], is that Shiller's findings are a result of his misspecification of the dividend process. 795 Does the Stock Market Overreact? is really a more general question here. What are the equilibria conditions for markets in which some agents are not rational in the sense that they fail to revise their expectations according to Bayes' rule? Russell and Thaler [24] address this issue. They conclude that the existence of some rational agents is not sufficient to guarantee a rational expectations equilibrium in an economy with some of what they call quasi-rational agents. (The related question of market equilibria with agents having heterogeneous expectations is investigated by Jarrow [13].) While we are highly sensitive to these issues, we do not have the space to address them here. Instead, we will concentrate on an empirical test of the overreaction hypothesis. If stock prices systematically overshoot, then their reversal should be predictable from past return data alone, with no use of any accounting data such as earnings. Specifically, two hypotheses are suggested: (1)Extreme movements in stock prices will be followed by subsequent price movements in the opposite direction. (2) The more extreme the initial price movement, the greater will be the subsequent adjustment. Both hypotheses imply a violation of weak-form market efficiency. To repeat, our goal is to test whether the overreaction hypothesis is predictive. In other words, whether it does more for us than merely to explain, ex post, the PIE effect or Shiller's results on asset price dispersion. The overreaction effect deserves attention because it represents a behavioral principle that may apply in many other contexts. For example, investor overreaction possibly explains Shiller's earlier [26] findings that when long-term interest rates are high relative to short rates, they tend to move down later on. Ohlson and Penman [20] have further suggested that the increased volatility of security returns following stock splits may also be linked to overreaction. The present empirical tests are to our knowledge the first attempt to use a behavioral principle to predict a new market anomaly. The remainder of the paper is organized as follows. The next section describes the actual empirical tests we have performed. Section I1 describes the results. Consistent with the overreaction hypothesis, evidence of weak-form market inefficiency is found. We discuss the implications for other empirical work on asset pricing anomalies. The paper ends with a brief summary of conclusions. I. The Overreaction Hypothesis: Empirical Tests The empirical testing procedures are a variant on a design originally proposed by Beaver and Landsman [5] in a different context. Typically, tests of semistrong form market efficiency start, at time t = 0, with the formation of portfolios on the basis of some event that affects all stocks in the portfolio, say, an earnings announcement. One then goes on to investigate whether later on ( t > 0) the estimated residual portfolio return rip,--measured relative to the single-period CAPM-equals zero. Statistically significant departures from zero are interpreted as evidence consistent with semistrong form market inefficiency, even though the results may also be due to misspecification of the CAPM, misestimation of the relevant alphas and/or betas, or simply market inefficiency of the weak form. 796 The Journal of Finance In contrast, the tests in this study assess the extent to which systematic nonzero", "title": "" } ]
scidocsrr
ea0427b1ae02b4a1df2e37f7b37efc3c
Eye Blink Detection Using Variance of Motion Vectors
[ { "docid": "773b5914dce6770b2db707ff4536c7f6", "text": "This paper presents an automatic drowsy driver monitoring and accident prevention system that is based on monitoring the changes in the eye blink duration. Our proposed method detects visual changes in eye locations using the proposed horizontal symmetry feature of the eyes. Our new method detects eye blinks via a standard webcam in real-time at 110fps for a 320×240 resolution. Experimental results in the JZU [3] eye-blink database showed that the proposed system detects eye blinks with a 94% accuracy with a 1% false positive rate.", "title": "" }, { "docid": "9096c5bfe44df6dc32641b8f5370d8d0", "text": "This paper presents a nonintrusive prototype computer vision system for monitoring a driver's vigilance in real time. It is based on a hardware system for the real-time acquisition of a driver's images using an active IR illuminator and the software implementation for monitoring some visual behaviors that characterize a driver's level of vigilance. Six parameters are calculated: Percent eye closure (PERCLOS), eye closure duration, blink frequency, nodding frequency, face position, and fixed gaze. These parameters are combined using a fuzzy classifier to infer the level of inattentiveness of the driver. The use of multiple visual parameters and the fusion of these parameters yield a more robust and accurate inattention characterization than by using a single parameter. The system has been tested with different sequences recorded in night and day driving conditions in a motorway and with different users. Some experimental results and conclusions about the performance of the system are presented", "title": "" } ]
[ { "docid": "4b97e5694dc8f1d2e1b5bf8f28bd9b10", "text": "Poor eating habits are an important public health issue that has large health and economic implications. Many food preferences are established early, but because people make more and more independent eating decisions as they move through adolescence, the transition to independent living during the university days is an important event. To study the phenomenon of food selection, the heath belief model was applied to predict the likelihood of healthy eating among university students. Structural equation modeling was used to investigate the validity of the health belief model (HBM) among 194 students, followed by gender-based analyses. The data strongly supported the HBM. Social change campaign implications are discussed.", "title": "" }, { "docid": "3e5d34ff78903e6d1a6433a940b5891b", "text": "For the production of a clinical 15 MV photon beam, the design of accelerator head assembly has been optimized using Monte Carlo based FLUKA code. The accelerator head assembly consists of etarget, flattening filter, primary collimator and an adjustable rectangular secondary collimator. Accelerators used for medical radiation therapy generate continuous energy gamma rays called bremsstrahlung radiations by impinging high energy electrons on high Z materials. The electron accelerators operating above 10 MeV can result in the production of neutrons, mainly due to photo nuclear reaction ( ,n) induced by high energy photons in the accelerator head materials. These neutrons contaminate the therapeutic beam and give a non negligible contribution to patient dose. The gamma dose and neutron dose equivalent at the patient plane were obtained at different field sizes and maximum neutron dose equivalent observed near the central axis of of 30 30 cm.", "title": "" }, { "docid": "482fb0c3b5ead028180c57466f3a092e", "text": "Separating text lines in handwritten documents remains a challenge because the text lines are often ununiformly skewed and curved. In this paper, we propose a novel text line segmentation algorithm based on Minimal Spanning Tree (MST) clustering with distance metric learning. Given a distance metric, the connected components of document image are grouped into a tree structure. Text lines are extracted by dynamically cutting the edges of the tree using a new objective function. For avoiding artificial parameters and improving the segmentation accuracy, we design the distance metric by supervised learning. Experiments on handwritten Chinese documents demonstrate the superiority of the approach.", "title": "" }, { "docid": "5c5e133f1280a5b3b42477fd94fbb338", "text": "Linear subspace methods that provide sufficient reconstruction of the data, such as PCA, offer an efficient way of dealing with missing pixels, outliers, and occlusions that often appear in the visual data. Discriminative methods, such as LDA, which, on the other hand, are better suited for classification tasks, are highly sensitive to corrupted data. We present a theoretical framework for achieving the best of both types of methods: an approach that combines the discrimination power of discriminative methods with the reconstruction property of reconstructive methods which enables one to work on subsets of pixels in images to efficiently detect and reject the outliers. The proposed approach is therefore capable of robust classification with a high-breakdown point. We also show that subspace methods, such as CCA, which are used for solving regression tasks, can be treated in a similar manner. The theoretical results are demonstrated on several computer vision tasks showing that the proposed approach significantly outperforms the standard discriminative methods in the case of missing pixels and images containing occlusions and outliers.", "title": "" }, { "docid": "609c3a75308eb951079373feb88432ae", "text": "We propose DuoRC, a novel dataset for Reading Comprehension (RC) that motivates several new challenges for neural approaches in language understanding beyond those offered by existing RC datasets. DuoRC contains 186,089 unique question-answer pairs created from a collection of 7680 pairs of movie plots where each pair in the collection reflects two versions of the same movie one from Wikipedia and the other from IMDb written by two different authors. We asked crowdsourced workers to create questions from one version of the plot and a different set of workers to extract or synthesize answers from the other version. This unique characteristic of DuoRC where questions and answers are created from different versions of a document narrating the same underlying story, ensures by design, that there is very little lexical overlap between the questions created from one version and the segments containing the answer in the other version. Further, since the two versions have different levels of plot detail, narration style, vocabulary, etc., answering questions from the second version requires deeper language understanding and incorporating external background knowledge. Additionally, the narrative style of passages arising from movie plots (as opposed to typical descriptive passages in existing datasets) exhibits the need to perform complex reasoning over events across multiple sentences. Indeed, we observe that state-ofthe-art neural RC models which have achieved near human performance on the SQuAD dataset (Rajpurkar et al., 2016b), even when coupled with traditional NLP techniques to address the challenges presented in DuoRC exhibit very poor performance (F1 score of 37.42% on DuoRC v/s 86% on SQuAD dataset). This opens up several interesting research avenues wherein DuoRC could complement other RC datasets to explore novel neural approaches for studying language understanding.", "title": "" }, { "docid": "cec6cf7e47b87f148e187a11c98d251f", "text": "With the rise of user-generated content in social media coupled with almost non-existent moderation in many such systems, aggressive contents have been observed to rise in such forums. In this paper, we work on the problem of aggression detection in social media. Aggression can sometimes be expressed directly or overtly or it can be hidden or covert in the text. On the other hand, most of the content in social media is non-aggressive in nature. We propose an ensemble based system to classify an input post into one of three classes, namely, Overtly Aggressive, Covertly Aggressive, and Non-aggressive. Our approach uses three deep learning methods, namely, Convolutional Neural Networks (CNN) with five layers (input, convolution, pooling, hidden, and output), Long Short Term Memory networks (LSTM), and Bi-directional Long Short Term Memory networks (Bi-LSTM). A majority voting based ensemble method is used to combine these classifiers (CNN, LSTM, and Bi-LSTM). We trained our method on Facebook comments dataset and tested on Facebook comments (in-domain) and other social media posts (cross-domain). Our system achieves the F1-score (weighted) of 0.604 for Facebook posts and 0.508 for social media posts.", "title": "" }, { "docid": "ff91ed2072c93eeae5f254fb3de0d780", "text": "Machine learning requires access to all the data used for training. Recently, Google Research proposed Federated Learning as an alternative, where the training data is distributed over a federation of clients that each only access their own training data; the partially trained model is updated in a distributed fashion to maintain a situation where the data from all participating clients remains unknown. In this research we construct different distributions of the DMOZ dataset over the clients in the network and compare the resulting performance of Federated Averaging when learning a classifier. We find that the difference in spread of topics for each client has a strong correlation with the performance of the Federated Averaging algorithm.", "title": "" }, { "docid": "4dbf3d3da434a81032560855ea7121f8", "text": "The increasing globalization has made the preservation of the Intangible Cultural Heritage (ICH) an urgent need, and the UNESCO's states parties have compromised to make collaborative inventories of ICH. Many traditional inventories become obsolete quickly because they present rigid data models and/or because data adquisition from scarce specialists are required. This article proposes to introduce a participative inventory as a semantic wiki, combining the familiarity of the audience with the free text, the expressive power of ontologies, and the benefits of wikis for the controled social enrichment. The scope has been validated in a pilot inventory with public access, that combine an Ontowiki instance, a new ontology based on UNESCO's clasification, and the data of an existent Chilean ICH inventory. Preliminary results indicate that the semantic-based catalog is much more flexible than existing traditional catalogs. Using these collaborative enrichment will enable active involvement to citizenship in recording their immaterial heritage.", "title": "" }, { "docid": "b22fff6f567db717b00e67a63fa23ca9", "text": "This paper was originally published in Biological Procedures Online (BPO) on March 23, 2006. It was brought to the attention of the journal and authors that reference 74 was incorrect. The original citation for reference 74, “Stanford V. Biosignals offer potential for direct interfaces and health monitoring. Pervasive Computing, IEEE 2004; 3(1):99–103.” should read “Costanza E, Inverso SA, Allen R. ‘Toward Subtle Intimate Interfaces for Mobile Devices Using an EMG Controller’ in Proc CHI2005, April 2005, Portland, OR, USA.”", "title": "" }, { "docid": "1768ecf6a2d8a42ea701d7f242edb472", "text": "Satisfaction prediction is one of the prime concerns in search performance evaluation. It is a non-trivial task for two major reasons: (1) The definition of satisfaction is rather subjective and different users may have different opinions in satisfaction judgement. (2) Most existing studies on satisfaction prediction mainly rely on users' click-through or query reformulation behaviors but there are many sessions without such kind of interactions. To shed light on these research questions, we construct an experimental search engine that could collect users' satisfaction feedback as well as mouse click-through/movement data. Different from existing studies, we compare for the first time search users' and external assessors' opinions on satisfaction. We find that search users pay more attention to the utility of results while external assessors emphasize on the efforts spent in search sessions. Inspired by recent studies in predicting result relevance based on mouse movement patterns (namely motifs), we propose to estimate the utilities of search results and the efforts in search sessions with motifs extracted from mouse movement data on search result pages (SERPs). Besides the existing frequency-based motif selection method, two novel selection strategies (distance-based and distribution-based) are also adopted to extract high quality motifs for satisfaction prediction. Experimental results on over 1,000 user sessions show that the proposed strategies outperform existing methods and also have promising generalization capability for different users and queries.", "title": "" }, { "docid": "f6031e9a3fbe7cb6f2e4d0d71d02a275", "text": "This paper presents an ultra low power reconfigurable, multi-standard (IEEE802.15.4, BLE, 5Mbps proprietary) ISM2.4GHz band transceiver compliant to FCC, ETSI class 2 and ARIB regulations. It uses a DPLL with counter based area and power efficient re-circulating TDC, current reuse low area DCO, dynamic divider, class-AB PA, and fully integrated LDOs. The RX is reconfigurable between zero-IF/low-IF along with antenna diversity. The transceiver consumes 3.5mA (TX), 3.1mA (RX) from 3.0V battery with on-chip DCDC converter, and occupies 1.1mm2 in 65nm CMOS process. The RX front-end provides 42dB gain, 6dB NF, and -34dBm input P1dB.", "title": "" }, { "docid": "5c3ae59522d549bed4c059a11b9724c6", "text": "The chemokine receptor CCR7 drives leukocyte migration into and within lymph nodes (LNs). It is activated by chemokines CCL19 and CCL21, which are scavenged by the atypical chemokine receptor ACKR4. CCR7-dependent navigation is determined by the distribution of extracellular CCL19 and CCL21, which form concentration gradients at specific microanatomical locations. The mechanisms underpinning the establishment and regulation of these gradients are poorly understood. In this article, we have incorporated multiple biochemical processes describing the CCL19-CCL21-CCR7-ACKR4 network into our model of LN fluid flow to establish a computational model to investigate intranodal chemokine gradients. Importantly, the model recapitulates CCL21 gradients observed experimentally in B cell follicles and interfollicular regions, building confidence in its ability to accurately predict intranodal chemokine distribution. Parameter variation analysis indicates that the directionality of these gradients is robust, but their magnitude is sensitive to these key parameters: chemokine production, diffusivity, matrix binding site availability, and CCR7 abundance. The model indicates that lymph flow shapes intranodal CCL21 gradients, and that CCL19 is functionally important at the boundary between B cell follicles and the T cell area. It also predicts that ACKR4 in LNs prevents CCL19/CCL21 accumulation in efferent lymph, but does not control intranodal gradients. Instead, it attributes the disrupted interfollicular CCL21 gradients observed in Ackr4-deficient LNs to ACKR4 loss upstream. Our novel approach has therefore generated new testable hypotheses and alternative interpretations of experimental data. Moreover, it acts as a framework to investigate gradients at other locations, including those that cannot be visualized experimentally or involve other chemokines.", "title": "" }, { "docid": "7c0586335facd8388814f863e19e3d06", "text": "OBJECTIVE\nWe reviewed randomized controlled trials of complementary and alternative medicine (CAM) treatments for depression, anxiety, and sleep disturbance in nondemented older adults.\n\n\nDATA SOURCES\nWe searched PubMed (1966-September 2006) and PsycINFO (1984-September 2006) databases using combinations of terms including depression, anxiety, and sleep; older adult/elderly; randomized controlled trial; and a list of 56 terms related to CAM.\n\n\nSTUDY SELECTION\nOf the 855 studies identified by database searches, 29 met our inclusion criteria: sample size >or= 30, treatment duration >or= 2 weeks, and publication in English. Four additional articles from manual bibliography searches met inclusion criteria, totaling 33 studies.\n\n\nDATA EXTRACTION\nWe reviewed identified articles for methodological quality using a modified Scale for Assessing Scientific Quality of Investigations (SASQI). We categorized a study as positive if the CAM therapy proved significantly more effective than an inactive control (or as effective as active control) on at least 1 primary psychological outcome. Positive and negative studies were compared on the following characteristics: CAM treatment category, symptom(s) assessed, country where the study was conducted, sample size, treatment duration, and mean sample age.\n\n\nDATA SYNTHESIS\n67% of the 33 studies reviewed were positive. Positive studies had lower SASQI scores for methodology than negative studies. Mind-body and body-based therapies had somewhat higher rates of positive results than energy- or biologically-based therapies.\n\n\nCONCLUSIONS\nMost studies had substantial methodological limitations. A few well-conducted studies suggested therapeutic potential for certain CAM interventions in older adults (e.g., mind-body interventions for sleep disturbances and acupressure for sleep and anxiety). More rigorous research is needed, and suggestions for future research are summarized.", "title": "" }, { "docid": "d94d49cde6878e0841c1654090062559", "text": "In previous work we described a method for compactly representing graphs with small separators, which makes use of small separators, and presented preliminary experimental results. In this paper we extend the experimental results in several ways, including extensions for dynamic insertion and deletion of edges, a comparison of a variety of coding schemes, and an implementation of two applications using the representation. The results show that the representation is quite effective for a wide variety of real-world graphs, including graphs from finite-element meshes, circuits, street maps, router connectivity, and web links. In addition to significantly reducing the memory requirements, our implementation of the representation is faster than standard representations for queries. The byte codes we introduce lead to DFT times that are a factor of 2.5 faster than our previous results with gamma codes and a factor of between 1 and 9 faster than adjacency lists, while using a factor of between 3 and 6 less space.", "title": "" }, { "docid": "ad23230c4ee2ed2216378a3ab833d3eb", "text": "We present a framework for precomputed volume radiance transfer that achieves real-time rendering of global illumination effects for volume data sets such as multiple scattering, volumetric shadows, and so on. Our approach incorporates the volumetric photon mapping method into the classical precomputed radiance transfer pipeline. We contribute several techniques for light approximation, radiance transfer precomputation, and real-time radiance estimation, which are essential to make the approach practical and to achieve high frame rates. For light approximation, we propose a new discrete spherical function that has better performance for construction and evaluation when compared with existing rotational invariant spherical functions such as spherical harmonics and spherical radial basis functions. In addition, we present a fast splatting-based radiance transfer precomputation method and an early evaluation technique for real-time radiance estimation in the clustered principal component analysis space. Our techniques are validated through comprehensive evaluations and rendering tests. We also apply our rendering approach to volume visualization.", "title": "" }, { "docid": "2331098bd8099a8dba7bab10c9322b5f", "text": "Aggregating extra features has been considered as an effective approach to boost traditional pedestrian detection methods. However, there is still a lack of studies on whether and how CNN-based pedestrian detectors can benefit from these extra features. The first contribution of this paper is exploring this issue by aggregating extra features into CNN-based pedestrian detection framework. Through extensive experiments, we evaluate the effects of different kinds of extra features quantitatively. Moreover, we propose a novel network architecture, namely HyperLearner, to jointly learn pedestrian detection as well as the given extra feature. By multi-task training, HyperLearner is able to utilize the information of given features and improve detection performance without extra inputs in inference. The experimental results on multiple pedestrian benchmarks validate the effectiveness of the proposed HyperLearner.", "title": "" }, { "docid": "4cbb079f49104c26af24bbf34255492f", "text": "In the business sector, it has always been a difficult task to predict the exact daily price of the stock market index, hence, there is a great deal of research being conducted regarding the prediction of the direction of stock price index movement. Many factors such as political events, general economic conditions, and traders' expectations may have an influence on the stock market index. There are numerous research studies that use indicators to forecast the direction of the stock market index. In this study, we applied two types of input variables to predict the direction of the daily stock market index. The main contribution of this study is the ability to predict the direction of the next day's price of the Japanese stock market index by using an optimized artificial neural network (ANN) model. To improve the prediction accuracy of the trend of the stock market index in the future, we optimize the ANN model using genetic algorithms (GA). We demonstrate and verify the predictability of stock price direction by using the hybrid GA-ANN model and then compare the performance with prior studies. Empirical results show that the Type 2 input variables can generate a higher forecast accuracy and that it is possible to enhance the performance of the optimized ANN model.", "title": "" }, { "docid": "c9b2525d34eb58130d3f8c5d68bb8714", "text": "Cloud gaming is a new way to deliver high-quality gaming experience to gamers anywhere and anytime. In cloud gaming, sophisticated game software runs on powerful servers in data centers, rendered game scenes are streamed to gamers over the Internet in real time, and the gamers use light-weight software executed on heterogeneous devices to interact with the games. Due to the proliferation of high-speed networks and cloud computing, cloud gaming has attracted tremendous attentions in both the academia and industry since late 2000's. In this paper, we survey the latest cloud gaming research from different aspects, spanning over cloud gaming platforms, optimization techniques, and commercial cloud gaming services. The readers will gain the overview of cloud gaming research and get familiar with the recent developments in this area.", "title": "" }, { "docid": "d6f473f6b6758b2243dde898840656b0", "text": "In this paper, we introduce the new generation 3300V HiPak2 IGBT module (130x190)mm employing the recently developed TSPT+ IGBT with Enhanced Trench MOS technology and Field Charge Extraction (FCE) diode. The new chip-set enables IGBT modules with improved electrical performance in terms of low losses, good controllability, high robustness and soft diode recovery. Due to the lower losses and the excellent SOA, the current rating of the 3300V HiPak2 module can be increased from 1500A for the current SPT+ generation to 1800A for the new TSPT+ version.", "title": "" }, { "docid": "e4920839c6b2bcacd72cbce578f44f01", "text": "The ability to predict the reliability of a software system early in its development, e.g., during architectural design, can help to improve the system's quality in a cost-effective manner. Existing architecture-level reliability prediction approaches focus on system-level reliability and assume that the reliabilities of individual components are known. In general, this assumption is unreasonable, making component reliability prediction an important missing ingredient in the current literature. Early prediction of component reliability is a challenging problem because of many uncertainties associated with components under development. In this paper we address these challenges in developing a software component reliability prediction framework. We do this by exploiting architectural models and associated analysis techniques, stochastic modeling approaches, and information sources available early in the development lifecycle. We extensively evaluate our framework to illustrate its utility as an early reliability prediction approach.", "title": "" } ]
scidocsrr
6152ef013710e91ee1b49d780ac4d16d
TR 09-004 Detecting Anomalies in a Time Series Database
[ { "docid": "ba9122284ddc43eb3bc4dff89502aa9d", "text": "Recent advancements in sensor technology have made it possible to collect enormous amounts of data in real time. However, because of the sheer volume of data most of it will never be inspected by an algorithm, much less a human being. One way to mitigate this problem is to perform some type of anomaly (novelty /interestingness/surprisingness) detection and flag unusual patterns for further inspection by humans or more CPU intensive algorithms. Most current solutions are “custom made” for particular domains, such as ECG monitoring, valve pressure monitoring, etc. This customization requires extensive effort by domain expert. Furthermore, hand-crafted systems tend to be very brittle to concept drift. In this demonstration, we will show an online anomaly detection system that does not need to be customized for individual domains, yet performs with exceptionally high precision/recall. The system is based on the recently introduced idea of time series bitmaps. To demonstrate the universality of our system, we will allow testing on independently annotated datasets from domains as diverse as ECGs, Space Shuttle telemetry monitoring, video surveillance, and respiratory data. In addition, we invite attendees to test our system with any dataset available on the web.", "title": "" } ]
[ { "docid": "21cde70c4255e706cb05ff38aec99406", "text": "In this paper, a multiple classifier machine learning (ML) methodology for predictive maintenance (PdM) is presented. PdM is a prominent strategy for dealing with maintenance issues given the increasing need to minimize downtime and associated costs. One of the challenges with PdM is generating the so-called “health factors,” or quantitative indicators, of the status of a system associated with a given maintenance issue, and determining their relationship to operating costs and failure risk. The proposed PdM methodology allows dynamical decision rules to be adopted for maintenance management, and can be used with high-dimensional and censored data problems. This is achieved by training multiple classification modules with different prediction horizons to provide different performance tradeoffs in terms of frequency of unexpected breaks and unexploited lifetime, and then employing this information in an operating cost-based maintenance decision system to minimize expected costs. The effectiveness of the methodology is demonstrated using a simulated example and a benchmark semiconductor manufacturing maintenance problem.", "title": "" }, { "docid": "0f49e229c08672dfba4026ec5ebca3bc", "text": "A grid array antenna is presented in this paper with sub grid arrays and multiple feed points, showing enhanced radiation characteristics and sufficient design flexibility. For instance, the grid array antenna can be easily designed as a linearly- or circularly-polarized, unbalanced or balanced antenna. A design example is given for a linearly-polarized unbalanced grid array antenna in Ferro A6M low temperature co-fired ceramic technology for 60-GHz radios to operate from 57 to 66 GHz (≈ 14.6% at 61.5 GHz ). It consists of 4 sub grid arrays and 4 feed points that are connected to a single-ended 50-Ω source by a quarter-wave matched T-junction network. The simulated results indicate that the grid array antenna has the maximum gain of 17.7 dBi at 59 GHz , an impedance bandwidth (|S11| ≤ -10&nbsp;dB) nearly from 56 to 67.5 GHz (or 18.7%), a 3-dB gain bandwidth from 55.4 to 66 GHz (or 17.2%), and a vertical beam bandwidth in the broadside direction from 57 to 66 GHz (14.6%). The measured results are compared with the simulated ones. Discrepancies and their causes are identified with a tolerance analysis on the fabrication process.", "title": "" }, { "docid": "a1d300bd5ac779e1b21a7ed20b3b01ad", "text": "a r t i c l e i n f o Keywords: Luxury brands Perceived social media marketing (SMM) activities Value equity Relationship equity Brand equity Customer equity Purchase intention In light of a growing interest in the use of social media marketing (SMM) among luxury fashion brands, this study set out to identify attributes of SMM activities and examine the relationships among those perceived activities, value equity, relationship equity, brand equity, customer equity, and purchase intention through a structural equation model. Five constructs of perceived SSM activities of luxury fashion brands are entertainment , interaction, trendiness, customization, and word of mouth. Their effects on value equity, relationship equity, and brand equity are significantly positive. For the relationship between customer equity drivers and customer equity, brand equity has significant negative effect on customer equity while value equity and relationship equity show no significant effect. As for purchase intention, value equity and relationship equity had significant positive effects, while relationship equity had no significant influence. Finally, the relationship between purchase intention and customer equity has significance. The findings of this study can enable luxury brands to forecast the future purchasing behavior of their customers more accurately and provide a guide to managing their assets and marketing activities as well. The luxury market has attained maturity, along with the gradual expansion of the scope of its market and a rapid growth in the number of customers. Luxury market is a high value-added industry basing on high brand assets. Due to the increased demand for luxury in emerging markets such as China, India, and the Middle East, opportunities abound to expand the business more than ever. In the past, luxury fashion brands could rely on strong brand assets and secure regular customers. However, the recent entrance of numerous fashion brands into the luxury market, followed by heated competition, signals unforeseen changes in the market. A decrease in sales related to a global economic downturn drives luxury businesses to change. Now they can no longer depend solely on their brand symbol but must focus on brand legacy, quality, esthetic value, and trustworthy customer relationships in order to succeed. A key element to luxury industry becomes providing values to customers in every way possible. As a means to constitute customer assets through effective communication with consumers, luxury brands have tilted their eyes toward social media. Marketing communication using social media such as Twitter, Facebook, and …", "title": "" }, { "docid": "765e766515c9c241ffd2d84572fd887f", "text": "The cost of reconciling consistency and state management with high availability is highly magnified by the unprecedented scale and robustness requirements of today’s Internet applications. We propose two strategies for improving overall availability using simple mechanisms that scale over large applications whose output behavior tolerates graceful degradation. We characterize this degradation in terms of harvest and yield, and map it directly onto engineering mechanisms that enhance availability by improving fault isolation, and in some cases also simplify programming. By collecting examples of related techniques in the literature and illustrating the surprising range of applications that can benefit from these approaches, we hope to motivate a broader research program in this area. 1. Motivation, Hypothesis, Relevance Increasingly, infrastructure services comprise not only routing, but also application-level resources such as search engines [15], adaptation proxies [8], and Web caches [20]. These applications must confront the same operational expectations and exponentially-growing user loads as the routing infrastructure, and consequently are absorbing comparable amounts of hardware and software. The current trend of harnessing commodity-PC clusters for scalability and availability [9] is reflected in the largest web server installations. These sites use tens to hundreds of PC’s to deliver 100M or more read-mostly page views per day, primarily using simple replication or relatively small data sets to increase throughput. The scale of these applications is bringing the wellknown tradeoff between consistency and availability [4] into very sharp relief. In this paper we propose two general directions for future work in building large-scale robust systems. Our approaches tolerate partial failures by emphasizing simple composition mechanisms that promote fault containment, and by translating possible partial failure modes into engineering mechanisms that provide smoothlydegrading functionality rather than lack of availability of the service as a whole. The approaches were developed in the context of cluster computing, where it is well accepted [22] that one of the major challenges is the nontrivial software engineering required to automate partial-failure handling in order to keep system management tractable. 2. Related Work and the CAP Principle In this discussion, strong consistency means singlecopy ACID [13] consistency; by assumption a stronglyconsistent system provides the ability to perform updates, otherwise discussing consistency is irrelevant. High availability is assumed to be provided through redundancy, e.g. data replication; data is considered highly available if a given consumer of the data can always reach some replica. Partition-resilience means that the system as whole can survive a partition between data replicas. Strong CAP Principle. Strong Consistency, High Availability, Partition-resilience: Pick at most 2. The CAP formulation makes explicit the trade-offs in designing distributed infrastructure applications. It is easy to identify examples of each pairing of CAP, outlining the proof by exhaustive example of the Strong CAP Principle: CA without P: Databases that provide distributed transactional semantics can only do so in the absence of a network partition separating server peers. CP without A: In the event of a partition, further transactions to an ACID database may be blocked until the partition heals, to avoid the risk of introducing merge conflicts (and thus inconsistency). AP without C: HTTP Web caching provides clientserver partition resilience by replicating documents, but a client-server partition prevents verification of the freshness of an expired replica. In general, any distributed database problem can be solved with either expiration-based caching to get AP, or replicas and majority voting to get PC (the minority is unavailable). In practice, many applications are best described in terms of reduced consistency or availability. For example, weakly-consistent distributed databases such as Bayou [5] provide specific models with well-defined consistency/availability tradeoffs; disconnected filesystems such as Coda [16] explicitly argued for availability over strong consistency; and expiration-based consistency mechanisms such as leases [12] provide fault-tolerant consistency management. These examples suggest that there is a Weak CAP Principle which we have yet to characterize precisely: The stronger the guarantees made about any two of strong consistency, high availability, or resilience to partitions, the weaker the guarantees that can be made about the third. 3. Harvest, Yield, and the CAP Principle Both strategies we propose for improving availability with simple mechanisms rely on the ability to broaden our notion of “correct behavior” for the target application, and then exploit the tradeoffs in the CAP principle to improve availability at large scale. We assume that clients make queries to servers, in which case there are at least two metrics for correct behavior: yield, which is the probability of completing a request, and harvest, which measures the fraction of the data reflected in the response, i.e. the completeness of the answer to the query. Yield is the common metric and is typically measured in “nines”: “four-nines availability” means a completion probability of . In practice, good HA systems aim for four or five nines. In the presence of faults there is typically a tradeoff between providing no answer (reducing yield) and providing an imperfect answer (maintaining yield, but reducing harvest). Some applications do not tolerate harvest degradation because any deviation from the single well-defined correct behavior renders the result useless. For example, a sensor application that must provide a binary sensor reading (presence/absence) does not tolerate degradation of the output.1 On the other hand, some applications tolerate graceful degradation of harvest: online aggregation [14] allows a user to explicitly trade running time for precision and confidence in performing arithmetic aggregation queries over a large dataset, thereby smoothly trading harvest for response time, which is particularly useful for approximate answers and for avoiding work that looks unlikely to be worthwhile based on preliminary results. At first glance, it would appear that this kind of degradation applies only to queries and not to updates. However, the model can be applied in the case of “single-location” updates: those changes that are localized to a single node (or technically a single partition). In this case, updates that 1This is consistent with the use of the term yield in semiconductor manufacturing: typically, each die on a wafer is intolerant to harvest degradation, and yield is defined as the fraction of working dice on a wafer. affect reachable nodes occur correctly but have limited visibility (a form of reduced harvest), while those that require unreachable nodes fail (reducing yield). These localized changes are consistent exactly because the new values are not available everywhere. This model of updates fails for global changes, but it is still quite useful for many practical applications, including personalization databases and collaborative filtering. 4. Strategy 1: Trading Harvest for Yield— Probabilistic Availability Nearly all systems are probabilistic whether they realize it or not. In particular, any system that is 100% available under single faults is probabilistically available overall (since there is a non-zero probability of multiple failures), and Internet-based servers are dependent on the best-effort Internet for true availability. Therefore availability maps naturally to probabilistic approaches, and it is worth addressing probabilistic systems directly, so that we can understand and limit the impact of faults. This requires some basic decisions about what needs to be available and the expected nature of faults. For example, node faults in the Inktomi search engine remove a proportional fraction of the search database. Thus in a 100-node cluster a single-node fault reduces the harvest by 1% during the duration of the fault (the overall harvest is usually measured over a longer interval). Implicit in this approach is graceful degradation under multiple node faults, specifically, linear degradation in harvest. By randomly placing data on nodes, we can ensure that the 1% lost is a random 1%, which makes the average-case and worstcase fault behavior the same. In addition, by replicating a high-priority subset of data, we reduce the probability of losing that data. This gives us more precise control of harvest, both increasing it and reducing the practical impact of missing data. Of course, it is possible to replicate all data, but doing so may have relatively little impact on harvest and yield despite significant cost, and in any case can never ensure 100% harvest or yield because of the best-effort Internet protocols the service relies on. As a similar example, transformation proxies for thin clients [8] also trade harvest for yield, by degrading results on demand to match the capabilities of clients that might otherwise be unable to get results at all. Even when the 100%-harvest answer is useful to the client, it may still be preferable to trade response time for harvest when clientto-server bandwidth is limited, for example, by intelligent degradation to low-bandwidth formats [7]. 5. Strategy 2: Application Decomposition and Orthogonal Mechanisms Some large applications can be decomposed into subsystems that are independently intolerant to harvest degradation (i.e. they fail by reducing yield), but whose independent failure allows the overall application to continue functioning with reduced utility. The application as a whole is then tolerant of harvest degradation. A good decomposition has at least one actual benefit and one potential benefit. The actual benefi", "title": "" }, { "docid": "627587e2503a2555846efb5f0bca833b", "text": "Image generation has been successfully cast as an autoregressive sequence generation or transformation problem. Recent work has shown that self-attention is an effective way of modeling textual sequences. In this work, we generalize a recently proposed model architecture based on self-attention, the Transformer, to a sequence modeling formulation of image generation with a tractable likelihood. By restricting the selfattention mechanism to attend to local neighborhoods we significantly increase the size of images the model can process in practice, despite maintaining significantly larger receptive fields per layer than typical convolutional neural networks. While conceptually simple, our generative models significantly outperform the current state of the art in image generation on ImageNet, improving the best published negative log-likelihood on ImageNet from 3.83 to 3.77. We also present results on image super-resolution with a large magnification ratio, applying an encoder-decoder configuration of our architecture. In a human evaluation study, we find that images generated by our super-resolution model fool human observers three times more often than the previous state of the art.", "title": "" }, { "docid": "88ff3300dafab6b87d770549a1dc4f0e", "text": "Novelty search is a recent algorithm geared toward exploring search spaces without regard to objectives. When the presence of constraints divides a search space into feasible space and infeasible space, interesting implications arise regarding how novelty search explores such spaces. This paper elaborates on the problem of constrained novelty search and proposes two novelty search algorithms which search within both the feasible and the infeasible space. Inspired by the FI-2pop genetic algorithm, both algorithms maintain and evolve two separate populations, one with feasible and one with infeasible individuals, while each population can use its own selection method. The proposed algorithms are applied to the problem of generating diverse but playable game levels, which is representative of the larger problem of procedural game content generation. Results show that the two-population constrained novelty search methods can create, under certain conditions, larger and more diverse sets of feasible game levels than current methods of novelty search, whether constrained or unconstrained. However, the best algorithm is contingent on the particularities of the search space and the genetic operators used. Additionally, the proposed enhancement of offspring boosting is shown to enhance performance in all cases of two-population novelty search.", "title": "" }, { "docid": "3899c40009ac15e213e74bd08392ecec", "text": "In the past decade, research in person re-identification (re-id) has exploded due to its broad use in security and surveillance applications. Issues such as inter-camera viewpoint, illumination and pose variations make it an extremely difficult problem. Consequently, many algorithms have been proposed to tackle these issues. To validate the efficacy of re-id algorithms, numerous benchmarking datasets have been constructed. While early datasets contained relatively few identities and images, several large-scale datasets have recently been proposed, motivated by data-driven machine learning. In this paper, we introduce a new large-scale real-world re-id dataset, DukeMTMC4ReID, using 8 disjoint surveillance camera views covering parts of the Duke University campus. The dataset was created from the recently proposed fully annotated multi-target multi-camera tracking dataset DukeMTMC[36]. A benchmark summarizing extensive experiments with many combinations of existing re-id algorithms on this dataset is also provided for an up-to-date performance analysis.", "title": "" }, { "docid": "17752f2b561d81643b35b6d2d10e4e46", "text": "This randomised controlled trial was undertaken to evaluate the effectiveness of acupuncture as a treatment for frozen shoulder. Thirty-five patients with a diagnosis of frozen shoulder were randomly allocated to an exercise group or an exercise plus acupuncture group and treated for a period of 6 weeks. Functional mobility, power, and pain were assessed by a blinded assessor using the Constant Shoulder Assessment, at baseline, 6 weeks and 20 weeks. Analysis was based on the intention-to-treat principle. Compared with the exercise group, the exercise plus acupuncture group experienced significantly greater improvement with treatment. Improvements in scores by 39.8% (standard deviation, 27.1) and 76.4% (55.0) were seen for the exercise and the exercise plus acupuncture groups, respectively at 6 weeks (P=0.048), and were sustained at the 20-week re-assessment (40.3% [26.7] and 77.2% [54.0], respectively; P=0.025). We conclude that the combination of acupuncture with shoulder exercise may offer effective treatment for frozen shoulder.", "title": "" }, { "docid": "f3641aadeaf2ccd31f96e2db8d33f936", "text": "This paper proposes a novel approach to dynamically manage the traffic lights cycles and phases in an isolated intersection. The target of the work is a system that, comparing with previous solutions, offers improved performance, is flexible and can be implemented on off-the-shelf components. The challenge here is to find an effective design that achieves the target while avoiding complex and computationally expensive solutions, which would not be appropriate for the problem at hand and would impair the practical applicability of the approach in real scenarios. The proposed solution is a traffic lights dynamic control system that combines an IEEE 802.15.4 Wireless Sensor Network (WSN) for real-time traffic monitoring with multiple fuzzy logic controllers, one for each phase, that work in parallel. Each fuzzy controller addresses vehicles turning movements and dynamically manages both the phase and the green time of traffic lights. The proposed system combines the advantages of the WSN, such as easy deployment and maintenance, flexibility, low cost, noninvasiveness, and scalability, with the benefits of using four parallel fuzzy controllers, i.e., better performance, fault-tolerance, and support for phase-specific management. Simulation results show that the proposed system outperforms other solutions in the literature, significantly reducing the vehicles waiting times. A proof-of-concept implementation on an off-the-shelf device proves that the proposed controller does not require powerful hardware and can be easily implemented on a low-cost device, thus paving the way for extensive usage in practice. 2015 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "c1b34059a896564df02ef984085b93a0", "text": "Robotics has become a standard tool in outreaching to grades K-12 and attracting students to the STEM disciplines. Performing these activities in the class room usually requires substantial time commitment by the teacher and integration into the curriculum requires major effort, which makes spontaneous and short-term engagements difficult. This paper studies using “Cubelets”, a modular robotic construction kit, which requires virtually no setup time and allows substantial engagement and change of perception of STEM in as little as a 1-hour session. This paper describes the constructivist curriculum and provides qualitative and quantitative results on perception changes with respect to STEM and computer science in particular as a field of study.", "title": "" }, { "docid": "5093e3d152d053a9f3322b34096d3e4e", "text": "To create conversational systems working in actual situations, it is crucial to assume that they interact with multiple agents. In this work, we tackle addressee and response selection for multi-party conversation, in which systems are expected to select whom they address as well as what they say. The key challenge of this task is to jointly model who is talking about what in a previous context. For the joint modeling, we propose two modeling frameworks: 1) static modeling and 2) dynamic modeling. To show benchmark results of our frameworks, we created a multi-party conversation corpus. Our experiments on the dataset show that the recurrent neural network based models of our frameworks robustly predict addressees and responses in conversations with a large number of agents.", "title": "" }, { "docid": "7e4b634b7b16d152fefe476d264c6726", "text": "We introduce openXBOW, an open-source toolkit for the generation of bag-of-words (BoW) representations from multimodal input. In the BoW principle, word histograms were first used as features in document classification, but the idea was and can easily be adapted to, e. g., acoustic or visual low-level descriptors, introducing a prior step of vector quantisation. The openXBOW toolkit supports arbitrary numeric input features and text input and concatenates computed subbags to a final bag. It provides a variety of extensions and options. To our knowledge, openXBOW is the first publicly available toolkit for the generation of crossmodal bags-of-words. The capabilities of the tool are exemplified in two sample scenarios: time-continuous speech-based emotion recognition and sentiment analysis in tweets where improved results over other feature representation forms were observed.", "title": "" }, { "docid": "3e0741fb69ee9bdd3cc455577aab4409", "text": "Recurrent neural network architectures have been shown to efficiently model long term temporal dependencies between acoustic events. However the training time of recurrent networks is higher than feedforward networks due to the sequential nature of the learning algorithm. In this paper we propose a time delay neural network architecture which models long term temporal dependencies with training times comparable to standard feed-forward DNNs. The network uses sub-sampling to reduce computation during training. On the Switchboard task we show a relative improvement of 6% over the baseline DNN model. We present results on several LVCSR tasks with training data ranging from 3 to 1800 hours to show the effectiveness of the TDNN architecture in learning wider temporal dependencies in both small and large data scenarios.", "title": "" }, { "docid": "a8cad81570a7391175acdcf82bc9040b", "text": "A model of Convolutional Fuzzy Neural Network for real world objects and scenes images classification is proposed. The Convolutional Fuzzy Neural Network consists of convolutional, pooling and fully-connected layers and a Fuzzy Self Organization Layer. The model combines the power of convolutional neural networks and fuzzy logic and is capable of handling uncertainty and impreciseness in the input pattern representation. The Training of The Convolutional Fuzzy Neural Network consists of three independent steps for three components of the net.", "title": "" }, { "docid": "2462af24189262b0145a6559d4aa6b3d", "text": "A 30-MHz voltage-mode buck converter using a delay-line-based pulse-width-modulation controller is proposed in this brief. Two voltage-to-delay cells are used to convert the voltage difference to delay-time difference. A charge pump is used to charge or discharge the loop filter, depending on whether the feedback voltage is larger or smaller than the reference voltage. A delay-line-based voltage-to-duty-cycle (V2D) controller is used to replace the classical ramp-comparator-based V2D controller to achieve wide duty cycle. A type-II compensator is implemented in this design with a capacitor and resistor in the loop filter. The prototype buck converter was fabricated using a 0.18-<inline-formula> <tex-math notation=\"LaTeX\">${\\mu }\\text{m}$ </tex-math></inline-formula> CMOS process. It occupies an active area of 0.834 mm<sup>2</sup> including the testing PADs. The tunable duty cycle ranges from 11.9%–86.3%, corresponding to 0.4 V–2.8 V output voltage with 3.3 V input. With a step of 400 mA in the load current, the settling time is around 3 <inline-formula> <tex-math notation=\"LaTeX\">${\\mu }\\text{s}$ </tex-math></inline-formula>. The peak efficiency is as high as 90.2% with 2.4 V output and the maximum load current is 800 mA.", "title": "" }, { "docid": "ab33dcd4172dec6cc88e13af867fed88", "text": "It is necessary to understand the content of articles and user preferences to make effective news recommendations. While ID-based methods, such as collaborative filtering and low-rank factorization, are well known for making recommendations, they are not suitable for news recommendations because candidate articles expire quickly and are replaced with new ones within short spans of time. Word-based methods, which are often used in information retrieval settings, are good candidates in terms of system performance but have issues such as their ability to cope with synonyms and orthographical variants and define \"queries\" from users' historical activities. This paper proposes an embedding-based method to use distributed representations in a three step end-to-end manner: (i) start with distributed representations of articles based on a variant of a denoising autoencoder, (ii) generate user representations by using a recurrent neural network (RNN) with browsing histories as input sequences, and (iii) match and list articles for users based on inner-product operations by taking system performance into consideration. The proposed method performed well in an experimental offline evaluation using past access data on Yahoo! JAPAN's homepage. We implemented it on our actual news distribution system based on these experimental results and compared its online performance with a method that was conventionally incorporated into the system. As a result, the click-through rate (CTR) improved by 23% and the total duration improved by 10%, compared with the conventionally incorporated method. Services that incorporated the method we propose are already open to all users and provide recommendations to over ten million individual users per day who make billions of accesses per month.", "title": "" }, { "docid": "ef53fb4fa95575c6472173db51d77a65", "text": "I review existing knowledge, unanswered questions, and new directions in research on stress, coping resource, coping strategies, and social support processes. New directions in research on stressors include examining the differing impacts of stress across a range of physical and mental health outcomes, the \"carry-overs\" of stress from one role domain or stage of life into another, the benefits derived from negative experiences, and the determinants of the meaning of stressors. Although a sense of personal control and perceived social support influence health and mental health both directly and as stress buffers, the theoretical mechanisms through which they do so still require elaboration and testing. New work suggests that coping flexibility and structural constraints on individuals' coping efforts may be important to pursue. Promising new directions in social support research include studies of the negative effects of social relationships and of support giving, mutual coping and support-giving dynamics, optimal \"matches\" between individuals' needs and support received, and properties of groups which can provide a sense of social support. Qualitative comparative analysis, optimal matching analysis, and event-structure analysis are new techniques which may help advance research in these broad topic areas. To enhance the effectiveness of coping and social support interventions, intervening mechanisms need to be better understood. Nevertheless, the policy implications of stress research are clear and are important given current interest in health care reform in the United States.", "title": "" }, { "docid": "12bdec4e6f70a7fe2bd4c750752287c3", "text": "Rapid growth in the Internet of Things (IoT) has resulted in a massive growth of data generated by these devices and sensors put on the Internet. Physical-cyber-social (PCS) big data consist of this IoT data, complemented by relevant Web-based and social data of various modalities. Smart data is about exploiting this PCS big data to get deep insights and make it actionable, and making it possible to facilitate building intelligent systems and applications. This article discusses key AI research in semantic computing, cognitive computing, and perceptual computing. Their synergistic use is expected to power future progress in building intelligent systems and applications for rapidly expanding markets in multiple industries. Over the next two years, this column on IoT will explore many challenges and technologies on intelligent use and applications of IoT data.", "title": "" }, { "docid": "940b907c28adeaddc2515f304b1d885e", "text": "In this study, we intend to identify the evolutionary footprints of the South Iberian population focusing on the Berber and Arab influence, which has received little attention in the literature. Analysis of the Y-chromosome variation represents a convenient way to assess the genetic contribution of North African populations to the present-day South Iberian genetic pool and could help to reconstruct other demographic events that could have influenced on that region. A total of 26 Y-SNPs and 17 Y-STRs were genotyped in 144 samples from 26 different districts of South Iberia in order to assess the male genetic composition and the level of substructure of male lineages in this area. To obtain a more comprehensive picture of the genetic structure of the South Iberian region as a whole, our data were compared with published data on neighboring populations. Our analyses allow us to confirm the specific impact of the Arab and Berber expansion and dominion of the Peninsula. Nevertheless, our results suggest that this influence is not bigger in Andalusia than in other Iberian populations.", "title": "" }, { "docid": "eb71ba791776ddfe0c1ddb3dc66f6e06", "text": "An enterprise resource planning (ERP) is an enterprise-wide application software package that integrates all necessary business functions into a single system with a common database. In order to implement an ERP project successfully in an organization, it is necessary to select a suitable ERP system. This paper presents a new model, which is based on linguistic information processing, for dealing with such a problem. In the study, a similarity degree based algorithm is proposed to aggregate the objective information about ERP systems from some external professional organizations, which may be expressed by different linguistic term sets. The consistency and inconsistency indices are defined by considering the subject information obtained from internal interviews with ERP vendors, and then a linear programming model is established for selecting the most suitable ERP system. Finally, a numerical example is given to demonstrate the application of the", "title": "" } ]
scidocsrr
3e39a8a2ed84ab07d64bc8a385a1d969
6 Seconds of Sound and Vision: Creativity in Micro-videos
[ { "docid": "c87fa26d080442b1527fcc6a74df7ec4", "text": "We present MIRtoolbox, an integrated set of functions written in Matlab, dedicated to the extraction of musical features from audio files. The design is based on a modular framework: the different algorithms are decomposed into stages, formalized using a minimal set of elementary mechanisms, and integrating different variants proposed by alternative approaches – including new strategies we have developed –, that users can select and parametrize. This paper offers an overview of the set of features, related, among others, to timbre, tonality, rhythm or form, that can be extracted with MIRtoolbox. Four particular analyses are provided as examples. The toolbox also includes functions for statistical analysis, segmentation and clustering. Particular attention has been paid to the design of a syntax that offers both simplicity of use and transparent adaptiveness to a multiplicity of possible input types. Each feature extraction method can accept as argument an audio file, or any preliminary result from intermediary stages of the chain of operations. Also the same syntax can be used for analyses of single audio files, batches of files, series of audio segments, multichannel signals, etc. For that purpose, the data and methods of the toolbox are organised in an object-oriented architecture. 1. MOTIVATION AND APPROACH MIRToolbox is a Matlab toolbox dedicated to the extraction of musically-related features from audio recordings. It has been designed in particular with the objective of enabling the computation of a large range of features from databases of audio files, that can be applied to statistical analyses. Few softwares have been proposed in this area. The most important one, Marsyas [1], provides a general architecture for connecting audio, soundfiles, signal processing blocks and machine learning (see section 5 for more details). One particularity of our own approach relies in the use of the Matlab computing environment, which offers good visualisation capabilities and gives access to a large variety of other toolboxes. In particular, the MIRToolbox makes use of functions available in recommended public-domain toolboxes such as the Auditory Toolbox [2], NetLab [3], or SOMtoolbox [4]. Other toolboxes, such as the Statistics toolbox or the Neural Network toolbox from MathWorks, can be directly used for further analyses of the features extracted by MIRToolbox without having to export the data from one software to another. Such computational framework, because of its general objectives, could be useful to the research community in Music Information Retrieval (MIR), but also for educational purposes. For that reason, particular attention has been paid concerning the ease of use of the toolbox. In particular, complex analytic processes can be designed using a very simple syntax, whose expressive power comes from the use of an object-oriented paradigm. The different musical features extracted from the audio files are highly interdependent: in particular, as can be seen in figure 1, some features are based on the same initial computations. In order to improve the computational efficiency, it is important to avoid redundant computations of these common components. Each of these intermediary components, and the final musical features, are therefore considered as building blocks that can been freely articulated one with each other. Besides, in keeping with the objective of optimal ease of use of the toolbox, each building block has been conceived in a way that it can adapt to the type of input data. For instance, the computation of the MFCCs can be based on the waveform of the initial audio signal, or on the intermediary representations such as spectrum, or mel-scale spectrum (see Fig. 1). Similarly, autocorrelation is computed for different range of delays depending on the type of input data (audio waveform, envelope, spectrum). This decomposition of all the set of feature extraction algorithms into a common set of building blocks has the advantage of offering a synthetic overview of the different approaches studied in this domain of research. 2. FEATURE EXTRACTION 2.1. Feature overview Figure 1 shows an overview of the main features implemented in the toolbox. All the different processes start from the audio signal (on the left) and form a chain of operations proceeding to right. The vertical disposition of the processes indicates an increasing order of complexity of the operations, from simplest computation (top) to more detailed auditory modelling (bottom). Each musical feature is related to one of the musical dimensions traditionally defined in music theory. Boldface characters highlight features related to pitch, to tonality (chromagram, key strength and key Self-Organising Map, or SOM) and to dynamics (Root Mean Square, or RMS, energy). Bold italics indicate features related to rhythm, namely tempo, pulse clarity and fluctuation. Simple italics highlight a large set of features that can be associated to timbre. Among them, all the operators in grey italics can be in fact applied to many others different representations: for instance, statistical moments such as centroid, kurtosis, etc., can be applied to either spectra, envelopes, but also to histograms based on any given feature. One of the simplest features, zero-crossing rate, is based on a simple description of the audio waveform itself: it counts the number of sign changes of the waveform. Signal energy is computed using root mean square, or RMS [5]. The envelope of the audio signal offers timbral characteristics of isolated sonic event. FFT-based spectrum can be computed along the frequency domain or along Mel-bands, with linear or decibel energy scale, and", "title": "" } ]
[ { "docid": "f6294233564c0d84c72c37fc3c88c2df", "text": "The structural theory of average case com plexity introduced by Levin gives a for mal setting for discussing the types of inputs for which a problem is di cult This is vital to understanding both when a seemingly di cult e g NP complete problem is actually easy on almost all in stances and to determining which prob lems might be suitable for applications re quiring hard problems such as cryptog raphy This paper attempts to summarize the state of knowledge in this area includ ing some folklore results that have not explicitly appeared in print We also try to standardize and unify de nitions Fi nally we indicate what we feel are inter esting research directions We hope that this paper will motivate more research in this area and provide an introduction to the area for people new to it Research Supported by NSF YI Award CCR Sloan Research Fellowship BR and USA Israel BSF Grant Introduction There is a large gap between a problem not being easy and the same problem be ing di cult A problem could have no e cient worst case algorithm but still be solvable for most instances or on in stances that arise in practice Thus a con ventional completeness result can be rel atively meaningless in terms of the real life di culty of the problem since two problems can both be NP complete but one can be solvable quickly on most in stances that arise in practice and the other not However average run time argu ments of particular algorithms for partic ular distributions are also unenlightening as to the complexity of real instances of a problem First they only analyze the performance of speci c algorithms rather than describing the inherent complexity of the problem Secondly the distributions of inputs that arise in practice are often di cult to characterize so analysis of al gorithms on nice distributions does not capture the real life average di culty Thus a structural theory of distribu tional complexity is necessary Such a the ory should allow one to compare the inher ent intractability of distributional prob lems computational problems together with distributions on instances It should also provide results that are meaningful with respect to instances from an arbitrary distribution that might arise Besides capturing more accurately the real world di culty of problems the average case complexity of a problem is important in determining its suitability for applications such as cryptography and the de randomization of algorithms For such applications one needs more than the mere existence of hard instances of the problem one needs to be able to generate instances in a way that guarantees that al most all generated instances are hard For these reasons Levin in L intro duced a structural theory of the average case complexity of problems The main contributions of his paper were a gen eral notion of a distributional problem a machine independent de nition of the average case performance of an algorithm an appropriate notion of reduction be tween distributional problems and an ex ample of a problem that was complete for the class of all NP problems on su ciently uniform distributions Since he and many others have built on this foundation see e g BCGL G VL G Despite the above work I feel the struc ture of average case complexity has not re ceived the attention due to a central prob lem in complexity theory The goal of this paper is to motivate more research in this area and to make the research frontier more accessible to people starting work in this area Several caveats are necessary with re spect to this goal As this is basically a propaganda piece I will present my own personal view of what makes the eld ex citing I will not present a comprehensive summary or bibliography of work in the area nor do I claim that the work men tioned here is the best in the area I will also attempt to clarify and sim plify concepts in the area by presenting both my own equivalent formulations and also by trying to make a uniform taxon omy for concepts The current de nitions are the product of much thought and work by top researchers so many researchers in the area will consider my attempts to do this as a confusion and complicating of the issues rather than a clari cation and simpli cation of them However I feel someone starting out in the area might bene t from seeing a variety of perspec tives Many of the results mentioned in this paper should be considered folklore in that they merely formally state ideas that are well known to researchers in the area but may not be obvious to beginners and to the best of my knowledge do not appear elsewhere in print Five possible worlds To illustrate the central role in complex ity theory of questions regarding the aver age case complexity of problems in NP we will now take a guided tour of ve possible i e not currently known to be false outcomes for these questions and see how they would a ect computer sci ence In each such world we will look at the in uence of the outcomes of these questions on algorithm design for such ar eas as arti cial intelligence and VLSI de sign and for cryptography and computer security We will also consider the more technical issue of derandomization of al gorithms the simulation of probabilistic algorithms by deterministic algorithms This will have a much smaller impact on society than the other issues but we in clude it as another situation besides cryp tography where having di cult problems is actually useful Finally to provide a human angle we will consider the impact these questions would have had on the sad story of Profes sor Grouse the teacher who assigned the young Gauss s class the problem of sum ming the numbers from to The be ginning of this story is well known but few people realize that Professor Grouse then became obsessed with getting his re venge by humiliating Gauss in front of the class by inventing problems Gauss could not solve In real life this led to Grouse s commitment to a lunatic asylum not a pleasant end especially in the th cen tury and to Gauss s developing a life long interest in number theoretic algorithms Here we imagine how the story might have turned out had Grouse been an expert in computational complexity at a time when the main questions about average case complexity had been resolved We believe that this story inspired Gurevich s Challenger Solver Game G In this section we will leave unresolved the questions of how to properly formal ize the complexity assumptions behind the worlds In particular we will leave open which model of computation we are talk ing about e g deterministic algorithms probabilistic algorithms Boolean circuits or even quantum computers and we shall ignore quantitative issues such as whether an n time algorithm for satis ability would be feasible We also assume that if an algorithm exists then it is known to the inhabitants of the world We also ig nore the issue of whether it might be possi ble that algorithms are fast for some input sizes but not others which would have the e ect of bouncing us from world to world as technology advanced We will take as our standard for whether these worlds are indeed possible the ex istence of an oracle relative to which the appropriate assumptions hold Of course this is far from a de nitive answer and the existence of an oracle should not stop the researcher from attempting to nd non relativizing techniques to narrow the range of possibilities Indeed it would be won derful to eliminate one or more of these worlds from consideration preferably the pestilent Pessiland We will try to suc cinctly and informally describe what type of algorithm and or lower bound would be needed to conclude that we are in a partic ular world Barring the caveats mentioned in the previous paragraph these condi tions will basically cover all eventualities thus showing that these are the only possi ble worlds This is an informal statement and will be more true for some worlds than", "title": "" }, { "docid": "8a1ba356c34935a2f3a14656138f0414", "text": "We propose an efficient approach to exploiting motion information from consecutive frames of a video sequence to recover the 3D pose of people. Previous approaches typically compute candidate poses in individual frames and then link them in a post-processing step to resolve ambiguities. By contrast, we directly regress from a spatio-temporal volume of bounding boxes to a 3D pose in the central frame. We further show that, for this approach to achieve its full potential, it is essential to compensate for the motion in consecutive frames so that the subject remains centered. This then allows us to effectively overcome ambiguities and improve upon the state-of-the-art by a large margin on the Human3.6m, HumanEva, and KTH Multiview Football 3D human pose estimation benchmarks.", "title": "" }, { "docid": "ee4f354f43b27e0275ae4b06869dddde", "text": "We report on the design of the new clearinghouse adopted by the National Resident Matching Program, which annually fills approximately 20,000 jobs for new physicians. Because the market has complementarities between applicants and between positions, the theory of simple matching markets does not apply directly. However, computational experiments show the theory provides good approximations. Furthermore, the set of stable matchings, and the opportunities for strategic manipulation, are surprisingly small. A new kind of \"core convergence\" result explains this; that each applicant interviews only a small fraction of available positions is important. We also describe engineering aspects of the design process.", "title": "" }, { "docid": "bcd81794f9e1fc6f6b92fd36ccaa8dac", "text": "Reliable detection and avoidance of obstacles is a crucial prerequisite for autonomously navigating robots as both guarantee safety and mobility. To ensure safe mobility, the obstacle detection needs to run online, thereby taking limited resources of autonomous systems into account. At the same time, robust obstacle detection is highly important. Here, a too conservative approach might restrict the mobility of the robot, while a more reckless one might harm the robot or the environment it is operating in. In this paper, we present a terrain-adaptive approach to obstacle detection that relies on 3D-Lidar data and combines computationally cheap and fast geometric features, like step height and steepness, which are updated with the frequency of the lidar sensor, with semantic terrain information, which is updated with at lower frequency. We provide experiments in which we evaluate our approach on a real robot on an autonomous run over several kilometers containing different terrain types. The experiments demonstrate that our approach is suitable for autonomous systems that have to navigate reliable on different terrain types including concrete, dirt roads and grass.", "title": "" }, { "docid": "2494840a6f833bd5b20b9b1fadcfc2f8", "text": "Tracing neurons in large-scale microscopy data is crucial to establishing a wiring diagram of the brain, which is needed to understand how neural circuits in the brain process information and generate behavior. Automatic techniques often fail for large and complex datasets, and connectomics researchers may spend weeks or months manually tracing neurons using 2D image stacks. We present a design study of a new virtual reality (VR) system, developed in collaboration with trained neuroanatomists, to trace neurons in microscope scans of the visual cortex of primates. We hypothesize that using consumer-grade VR technology to interact with neurons directly in 3D will help neuroscientists better resolve complex cases and enable them to trace neurons faster and with less physical and mental strain. We discuss both the design process and technical challenges in developing an interactive system to navigate and manipulate terabyte-sized image volumes in VR. Using a number of different datasets, we demonstrate that, compared to widely used commercial software, consumer-grade VR presents a promising alternative for scientists.", "title": "" }, { "docid": "8ee1abcf16433d333e530f83be29722f", "text": "Since the evolution of the internet, many small and large companies have moved their businesses to the internet to provide services to customers worldwide. Cyber credit‐card fraud or no card present fraud is increasingly rampant in the recent years for the reason that the credit‐card i s majorly used to request payments by these companies on the internet. Therefore the need to ensure secured transactions for credit-card owners when consuming their credit cards to make electronic payments for goods and services provided on the internet is a criterion. Data mining has popularly gained recognition in combating cyber credit-card fraud because of its effective artificial intelligence (AI) techniques and algorithms that can be implemented to detect or predict fraud through Knowledge Discovery from unusual patterns derived from gathered data. In this study, a system’s model for cyber credit card fraud detection is discussed and designed. This system implements the supervised anomaly detection algorithm of Data mining to detect fraud in a real time transaction on the internet, and thereby classifying the transaction as legitimate, suspicious fraud and illegitimate transaction. The anomaly detection algorithm is designed on the Neural Networks which implements the working principal of the human brain (as we humans learns from past experience and then make our present day decisions on what we have learned from our past experience). To understand how cyber credit card fraud are being committed, in this study the different types of cyber fraudsters that commit cyber credit card fraud and the techniques used by these cyber fraudsters to commit fraud on the internet is discussed.", "title": "" }, { "docid": "940f460457b117c156b6e39e9586a0b9", "text": "The flipped classroom is an innovative pedagogical approach that focuses on learner-centered instruction. The purposes of this report were to illustrate how to implement the flipped classroom and to describe students' perceptions of this approach within 2 undergraduate nutrition courses. The template provided enables faculty to design before, during, and after class activities and assessments based on objectives using all levels of Bloom's taxonomy. The majority of the 142 students completing the evaluation preferred the flipped method compared with traditional pedagogical strategies. The process described in the report was successful for both faculty and students.", "title": "" }, { "docid": "2a8f464e709dcae4e34f73654aefe31f", "text": "LTE 4G cellular networks are gradually being adopted by all major operators in the world and are expected to rule the cellular landscape at least for the current decade. They will also form the starting point for further progress beyond the current generation of mobile cellular networks to chalk a path towards fifth generation mobile networks. The lack of open cellular ecosystem has limited applied research in this field within the boundaries of vendor and operator R&D groups. Furthermore, several new approaches and technologies are being considered as potential elements making up such a future mobile network, including cloudification of radio network, radio network programability and APIs following SDN principles, native support of machine-type communication, and massive MIMO. Research on these technologies requires realistic and flexible experimentation platforms that offer a wide range of experimentation modes from real-world experimentation to controlled and scalable evaluations while at the same time retaining backward compatibility with current generation systems.\n In this work, we present OpenAirInterface (OAI) as a suitably flexible platform towards open LTE ecosystem and playground [1]. We will demonstrate an example of the use of OAI to deploy a low-cost open LTE network using commodity hardware with standard LTE-compatible devices. We also show the reconfigurability features of the platform.", "title": "" }, { "docid": "2eff84064f1d9d183eddc7e048efa8e6", "text": "Rupinder Kaur, Dr. Jyotsna Sengupta Abstract— The software process model consists of a set of activities undertaken to design, develop and maintain software systems. A variety of software process models have been designed to structure, describe and prescribe the software development process. The software process models play a very important role in software development, so it forms the core of the software product. Software project failure is often devastating to an organization. Schedule slips, buggy releases and missing features can mean the end of the project or even financial ruin for a company. Oddly, there is disagreement over what it means for a project to fail. In this paper, discussion is done on current process models and analysis on failure of software development, which shows the need of new research.", "title": "" }, { "docid": "f34e6c34a499b7b88c18049eec221d36", "text": "The double-gimbal mechanism (DGM) is a multibody mechanical device composed of three rigid bodies, namely, a base, an inner gimbal, and an outer gimbal, interconnected by two revolute joints. A typical DGM, where the cylindrical base is connected to the outer gimbal by a revolute joint, and the inner gimbal, which is the disk-shaped payload, is connected to the outer gimbal by a revolute joint. The DGM is an integral component of an inertially stabilized platform, which provides motion to maintain line of sight between a target and a platform payload sensor. Modern, commercially available gimbals use two direct-drive or gear-driven motors on orthogonal axes to actuate the joints. Many of these mechanisms are constrained to a reduced operational region, while moresophisticated models use a slip ring to allow continuous rotation about an axis. Angle measurements for each axis are obtained from either a rotary encoder or a resolver. The DGM is a fundamental component of pointing and tracking applications that include missile guidance systems, ground-based telescopes, antenna assemblies, laser communication systems, and close-in weapon systems (CIWSs) such as the Phalanx 1B.", "title": "" }, { "docid": "461d0b9ca1d0f1395d98cb18b2f45a0f", "text": "Semantic maps augment metric-topological maps with meta-information, i.e. semantic knowledge aimed at the planning and execution of high-level robotic tasks. Semantic knowledge typically encodes human-like concepts, like types of objects and rooms, which are connected to sensory data when symbolic representations of percepts from the robot workspace are grounded to those concepts. This symbol grounding is usually carried out by algorithms that individually categorize each symbol and provide a crispy outcome – a symbol is either a member of a category or not. Such approach is valid for a variety of tasks, but it fails at: (i) dealing with the uncertainty inherent to the grounding process, and (ii) jointly exploiting the contextual relations among concepts (e.g. microwaves are usually in kitchens). This work provides a solution for probabilistic symbol grounding that overcomes these limitations. Concretely, we rely on Conditional Random Fields (CRFs) to model and exploit contextual relations, and to provide measurements about the uncertainty coming from the possible groundings in the form of beliefs (e.g. an object can be categorized (grounded) as a microwave or as a nightstand with beliefs 0.6 and 0.4, respectively). Our solution is integrated into a novel semantic map representation called Multiversal Semantic Map (MvSmap ), which keeps the different groundings, or universes, as instances of ontologies annotated with the obtained beliefs for their posterior exploitation. The suitability of our proposal has been proven with the Robot@Home dataset, a repository that contains challenging multi-modal sensory information gathered by a mobile robot in home environments.", "title": "" }, { "docid": "4ecf150613d45ae0f92485b8faa0deef", "text": "Query optimizers in current database systems are designed to pick a single efficient plan for a given query based on current statistical properties of the data. However, different subsets of the data can sometimes have very different statistical properties. In such scenarios it can be more efficient to process different subsets of the data for a query using different plans. We propose a new query processing technique called content-based routing (CBR) that eliminates the single-plan restriction in current systems. We present low-overhead adaptive algorithms that partition input data based on statistical properties relevant to query execution strategies, and efficiently route individual tuples through customized plans based on their partition. We have implemented CBR as an extension to the Eddies query processor in the TelegraphCQ system, and we present an extensive experimental evaluation showing the significant performance benefits of CBR.", "title": "" }, { "docid": "5da9811fb60b5f6334e05ba71902ddfd", "text": "In this paper, a numerical TRL calibration technique is used to accurately extract the equivalent circuit parameters of post-wall iris and input/output coupling structure which are used for the design of directly-coupled substrate integrated waveguide (SIW) filter with the first/last SIW cavities directly excited by 50 Ω microstrip line. On the basis of this dimensional design process, the entire procedure of filter design can meet all of the design specifications without resort to any time-consuming tuning and optimization. A K-band 5th-degree SIW filter with relative bandwidth of 6% was designed and fabricated by low-cost PCB process on Rogers RT/duroid 5880. Measured results which agree well with simulated results validate the accurate dimensional synthesis procedure.", "title": "" }, { "docid": "249543df444c1a5e0d37de8c017e5167", "text": "This review provides an overview of the changing US epidemiology of cannabis use and associated problems. Adults and adolescents increasingly view cannabis as harmless, and some can use cannabis without harm. However, potential problems include harms from prenatal exposure and unintentional childhood exposure; decline in educational or occupational functioning after early adolescent use, and in adulthood, impaired driving and vehicle crashes; cannabis use disorders (CUD), cannabis withdrawal, and psychiatric comorbidity. Evidence suggests national increases in cannabis potency, prenatal and unintentional childhood exposure; and in adults, increased use, CUD, cannabis-related emergency room visits, and fatal vehicle crashes. Twenty-nine states have medical marijuana laws (MMLs) and of these, 8 have recreational marijuana laws (RMLs). Many studies indicate that MMLs or their specific provisions did not increase adolescent cannabis use. However, the more limited literature suggests that MMLs have led to increased cannabis potency, unintentional childhood exposures, adult cannabis use, and adult CUD. Ecological-level studies suggest that MMLs have led to substitution of cannabis for opioids, and also possibly for psychiatric medications. Much remains to be determined about cannabis trends and the role of MMLs and RMLs in these trends. The public, health professionals, and policy makers would benefit from education about the risks of cannabis use, the increases in such risks, and the role of marijuana laws in these increases.", "title": "" }, { "docid": "037042318b99bf9c32831a6b25dcd50e", "text": "Autoencoders are popular among neural-network-based matrix completion models due to their ability to retrieve potential latent factors from the partially observed matrices. Nevertheless, when training data is scarce their performance is significantly degraded due to overfitting. In this paper, we mitigate overfitting with a data-dependent regularization technique that relies on the principles of multi-task learning. Specifically, we propose an autoencoder-based matrix completion model that performs prediction of the unknown matrix values as a main task, and manifold learning as an auxiliary task. The latter acts as an inductive bias, leading to solutions that generalize better. The proposed model outperforms the existing autoencoder-based models designed for matrix completion, achieving high reconstruction accuracy in well-known datasets.", "title": "" }, { "docid": "ba2f7eb97611cb3a75f236436b048820", "text": "Learning interpretable disentangled representations is a crucial yet challenging task. In this paper, we propose a weakly semi-supervised method, termed as Dual Swap Disentangling (DSD), for disentangling using both labeled and unlabeled data. Unlike conventional weakly supervised methods that rely on full annotations on the group of samples, we require only limited annotations on paired samples that indicate their shared attribute like the color. Our model takes the form of a dual autoencoder structure. To achieve disentangling using the labeled pairs, we follow a “encoding-swap-decoding” process, where we first swap the parts of their encodings corresponding to the shared attribute, and then decode the obtained hybrid codes to reconstruct the original input pairs. For unlabeled pairs, we follow the “encoding-swap-decoding” process twice on designated encoding parts and enforce the final outputs to approximate the input pairs. By isolating parts of the encoding and swapping them back and forth, we impose the dimension-wise modularity and portability of the encodings of the unlabeled samples, which implicitly encourages disentangling under the guidance of labeled pairs. This dual swap mechanism, tailored for semi-supervised setting, turns out to be very effective. Experiments on image datasets from a wide domain show that our model yields state-of-the-art disentangling performances.", "title": "" }, { "docid": "c1981c3b0ccd26d4c8f02c2aa5e71c7a", "text": "Functional genomics studies have led to the discovery of a large amount of non-coding RNAs from the human genome; among them are long non-coding RNAs (lncRNAs). Emerging evidence indicates that lncRNAs could have a critical role in the regulation of cellular processes such as cell growth and apoptosis as well as cancer progression and metastasis. As master gene regulators, lncRNAs are capable of forming lncRNA–protein (ribonucleoprotein) complexes to regulate a large number of genes. For example, lincRNA-RoR suppresses p53 in response to DNA damage through interaction with heterogeneous nuclear ribonucleoprotein I (hnRNP I). The present study demonstrates that hnRNP I can also form a functional ribonucleoprotein complex with lncRNA urothelial carcinoma-associated 1 (UCA1) and increase the UCA1 stability. Of interest, the phosphorylated form of hnRNP I, predominantly in the cytoplasm, is responsible for the interaction with UCA1. Moreover, although hnRNP I enhances the translation of p27 (Kip1) through interaction with the 5′-untranslated region (5′-UTR) of p27 mRNAs, the interaction of UCA1 with hnRNP I suppresses the p27 protein level by competitive inhibition. In support of this finding, UCA1 has an oncogenic role in breast cancer both in vitro and in vivo. Finally, we show a negative correlation between p27 and UCA in the breast tumor cancer tissue microarray. Together, our results suggest an important role of UCA1 in breast cancer.", "title": "" }, { "docid": "16a3bf4df6fb8e61efad6f053f1c6f9c", "text": "The objective of this paper is to improve large scale visual object retrieval for visual place recognition. Geo-localization based on a visual query is made difficult by plenty of non-distinctive features which commonly occur in imagery of urban environments, such as generic modern windows, doors, cars, trees, etc. The focus of this work is to adapt standard Hamming Embedding retrieval system to account for varying descriptor distinctiveness. To this end, we propose a novel method for efficiently estimating distinctiveness of all database descriptors, based on estimating local descriptor density everywhere in the descriptor space. In contrast to all competing methods, the (unsupervised) training time for our method (DisLoc) is linear in the number database descriptors and takes only a 100 seconds on a single CPU core for a 1 million image database. Furthermore, the added memory requirements are negligible (1%). The method is evaluated on standard publicly available large-scale place recognition benchmarks containing street-view imagery of Pittsburgh and San Francisco. DisLoc is shown to outperform all baselines, while setting the new state-of-the-art on both benchmarks. The method is compatible with spatial reranking, which further improves recognition results. Finally, we also demonstrate that 7% of the least distinctive features can be removed, therefore reducing storage requirements and improving retrieval speed, without any loss in place recognition accuracy.", "title": "" }, { "docid": "0d45af6e2d038f7fbfd3c39c887b242e", "text": "Recent studies have shown that deep neural networks (DNNs) are vulnerable to adversarial attacks. To this end, many defense approaches that attempt to improve the robustness of DNNs have been proposed. In a separate and yet related area, recent works have explored to quantize neural network weights and activation functions into low bit-width to compress model size and reduce computational complexity. In this work, we find that these two different tracks, namely the pursuit of network compactness and robustness, can be merged into one and give rise to networks of both advantages. To the best of our knowledge, this is the first work that uses quantization of activation functions to defend against adversarial examples. We also propose to train robust neural networks by using adaptive quantization techniques for the activation functions. Our proposed Dynamic Quantized Activation (DQA) is verified through a wide range of experiments with the MNIST and CIFAR-10 datasets under different white-box attack methods, including FGSM, PGD, and C&W attacks. Furthermore, Zeroth Order Optimization and substitute model based black-box attacks are also considered in this work. The experimental results clearly show that the robustness of DNNs could be greatly improved using the proposed DQA.", "title": "" }, { "docid": "eb9f34cd2b10f1c8099aad5e9064578a", "text": "Deep distance metric learning (DDML), which is proposed to learn image similarity metrics in an end-toend manner based on the convolution neural network, has achieved encouraging results in many computer vision tasks. L2-normalization in the embedding space has been used to improve the performance of several DDML methods. However, the commonly used Euclidean distance is no longer an accurate metric for L2-normalized embedding space, i.e., a hyper-sphere. Another challenge of current DDML methods is that their loss functions are usually based on rigid data formats, such as the triplet tuple. Thus, an extra process is needed to prepare data in specific formats. In addition, their losses are obtained from a limited number of samples, which leads to a lack of the global view of the embedding space. In this paper, we replace the Euclidean distance with the cosine similarity to better utilize the L2-normalization, which is able to attenuate the curse of dimensionality. More specifically, a novel loss function based on the von Mises-Fisher distribution is proposed to learn a compact hyper-spherical embedding space. Moreover, a new efficient learning algorithm is developed to better capture the global structure of the embedding space. Experiments for both classification and retrieval tasks on several standard datasets show that our method achieves state-of-the-art performance with a simpler training procedure. Furthermore, we demonstrate that, even with a small number of convolutional layers, our model can still obtain significantly better classification performance than the widely used softmax loss.", "title": "" } ]
scidocsrr
8764b9aaa0d34c414d427fdf682f298d
Spring parameters design to increase the loading capability of a hydraulic quadruped robot
[ { "docid": "c7eceedbb7c6665dca1db772a22452dc", "text": "This paper proposes a quadruped walking robot that has high performance as a working machine. This robot is needed for various tasks controlled by tele-operation, especially for humanitarian mine detection and removal. Since there are numerous personnel landmines that are still in place from many wars, it is desirable to provide a safe and inexpensive tool that civilians can use to remove those mines. The authors have been working on the concept of the humanitarian demining robot systems for 4 years and have performed basic experiments with the Ž rst prototype VK-I using the modiŽ ed quadruped walking robot, TITAN-VIII. After those experiments, it was possible to reŽ ne some concepts and now the new robot has a tool (end-effector)changing system on its back, so that by utilizing the legs as manipulation arms and connecting various tools to the foot, it can perform mine detection and removal tasks. To accomplish these tasks, we developed various end-effectors that can be attached to the working leg. In this paper we will discuss the mechanical design of the new walking robot called TITAN-IX to be applied to the new system VK-II.", "title": "" } ]
[ { "docid": "555b07171f5305f7ae968d9a76d74ec3", "text": "The production of lithium-ion (Li-ion) batteries has been continually increasing since their first introduction into the market in 1991 because of their excellent performance, which is related to their high specific energy, energy density, specific power, efficiency, and long life. Li-ion batteries were first used for consumer electronics products such as mobile phones, camcorders, and laptop computers, followed by automotive applications that emerged during the last decade and are still expanding, and finally industrial applications including energy storage. There are four promising cell chemistries considered for energy storage applications: 1) LiMn2O4/graphite cell chemistry uses low-cost materials that are naturally abundant; 2) LiNi1-X-Y2CoXAlYO2/graphite cell chemistry has high specific energy and long life; 3) LiFePO4/graphite (or carbon) cell chemistry has good safety characteristics; and 4) Li4Ti5O12 is used as the negative electrode material in Li-ion batteries with long life and good safety features. However, each of the cell chemistries has some disadvantages, and the development of these technologies is still in progress. Therefore, it is too early to predict which cell chemistry will be the main candidate for energy storage applications, and we have to remain vigilant with respect to trends in technological progress and also consider changes in economic and social conditions before this can be determined.", "title": "" }, { "docid": "a9664b0b87fabeb87478433b6c8c513b", "text": "Rendering realistic organic materials is a challenging issue. The human eye is an important part of nonverbal communication which, consequently, requires specific modeling and rendering techniques to enhance the realism of virtual characters. We propose an image-based method for estimating both iris morphology and scattering features in order to generate convincing images of virtual eyes. In this regard, we develop a technique to unrefract iris photographs. We model the morphology of the human iris as an irregular multilayered tissue. We then approximate the scattering features of the captured iris. Finally, we propose a real-time rendering technique based on the subsurface texture mapping representation and introduce a precomputed refraction function as well as a caustic function, which accounts for the light interactions at the corneal interface.", "title": "" }, { "docid": "6d72d7232f9df9157b2e83211d610b74", "text": "Exemplar-based texture synthesis is defined as the process of generating, from an input texture sample, new texture images that are perceptually equivalent to the input. In the present work, we model texture self-similarity with conditional Gaussian distributions in the patch space in order to extend the use of stitching techniques. Then, a multiscale texture synthesis algorithm is introduced, where texture patches are modeled at each scale as spatially variable Gaussian vectors in the patch space. The Gaussian distribution for each patch is inferred from the set of its nearest neighbors in the patch space obtained from the input sample. This approach is tested over several real and synthetic texture images, and its results show the effectiveness of the proposed technique for a wide range of textures.", "title": "" }, { "docid": "7abdb102a876d669bdf254f7d91121c1", "text": "OBJECTIVE\nRegular physical activity (PA) is important for maintaining long-term physical, cognitive, and emotional health. However, few older adults engage in routine PA, and even fewer take advantage of programs designed to enhance PA participation. Though most managed Medicare members have free access to the Silver Sneakers and EnhanceFitness PA programs, the vast majority of eligible seniors do not utilize these programs. The goal of this qualitative study was to better understand the barriers to and facilitators of PA and participation in PA programs among older adults.\n\n\nDESIGN\nThis was a qualitative study using focus group interviews.\n\n\nSETTING\nFocus groups took place at three Group Health clinics in King County, Washington.\n\n\nPARTICIPANTS\nFifty-two randomly selected Group Health Medicare members between the ages of 66 to 78 participated.\n\n\nMETHODS\nWe conducted four focus groups with 13 participants each. Focus group discussions were audio-recorded, transcribed, and analyzed using an inductive thematic approach and a social-ecological framework.\n\n\nRESULTS\nMen and women were nearly equally represented among the participants, and the sample was largely white (77%), well-educated (69% college graduates), and relatively physically active. Prominent barriers to PA and PA program participation were physical limitations due to health conditions or aging, lack of professional guidance, and inadequate distribution of information on available and appropriate PA options and programs. Facilitators included the motivation to maintain physical and mental health and access to affordable, convenient, and stimulating PA options.\n\n\nCONCLUSION\nOlder adult populations may benefit from greater support and information from their providers and health care systems on how to safely and successfully improve or maintain PA levels through later adulthood. Efforts among health care systems to boost PA among older adults may need to consider patient-centered adjustments to current PA programs, as well as alternative methods for promoting overall active lifestyle choices.", "title": "" }, { "docid": "6669f7260e0df11c320ac739433c6b40", "text": "OBJECTIVE\nThis study was conducted to determine the attitudes of university students studying in different fields toward discrimination of the elderly.\n\n\nMETHODS\nThis descriptive study was conducted with students who were still studying in the 2015-2016 period. A sample size of 416 students was determined by the stratified sampling method, and students were selected by simple random sampling. Data were collected using an identifying information form and an Age Discrimination Attitude Scale (ADAS) by face-to-face interview. Statistical analysis was performed using the program SPSS 20.0.\n\n\nRESULTS\nThe mean total ADAS score of students was 67.7±6.0. The total ADAS scores and the scores of male students on limiting the life of the elderly was significantly higher than those of female students (p<0.05).\n\n\nCONCLUSION\nIt was determined that university students studying in different fields have a positive attitude toward the elderly. Action must be taken to remove discrimination of the elderly, and policies must be developed to increase social sensitivity.", "title": "" }, { "docid": "c9e47bfe0f1721a937ba503ed9913dba", "text": "The Web contains a vast amount of structured information such as HTML tables, HTML lists and deep-web databases; there is enormous potential in combining and re-purposing this data in creative ways. However, integrating data from this relational web raises several challenges that are not addressed by current data integration systems or mash-up tools. First, the structured data is usually not published cleanly and must be extracted (say, from an HTML list) before it can be used. Second, due to the vastness of the corpus, a user can never know all of the potentially-relevant databases ahead of time (much less write a wrapper or mapping for each one); the source databases must be discovered during the integration process. Third, some of the important information regarding the data is only present in its enclosing web page and needs to be extracted appropriately. This paper describes Octopus, a system that combines search, extraction, data cleaning and integration, and enables users to create new data sets from those found on the Web. The key idea underlying Octopus is to offer the user a set of best-effort operators that automate the most labor-intensive tasks. For example, the Search operator takes a search-style keyword query and returns a set of relevance-ranked and similarity-clustered structured data sources on the Web; the Context operator helps the user specify the semantics of the sources by inferring attribute values that may not appear in the source itself, and the Extend operator helps the user find related sources that can be joined to add new attributes to a table. Octopus executes some of these operators automatically, but always allows the user to provide feedback and correct errors. We describe the algorithms underlying each of these operators and experiments that demonstrate their efficacy.", "title": "" }, { "docid": "c2a32d79289299ef255ab53af02b7c6a", "text": "Deep latent variable models have been shown to facilitate the response generation for open-domain dialog systems. However, these latent variables are highly randomized, leading to uncontrollable generated responses. In this paper, we propose a framework allowing conditional response generation based on specific attributes. These attributes can be either manually assigned or automatically detected. Moreover, the dialog states for both speakers are modeled separately in order to reflect personal features. We validate this framework on two different scenarios, where the attribute refers to genericness and sentiment states respectively. The experiment result testified the potential of our model, where meaningful responses can be generated in accordance with the specified attributes.", "title": "" }, { "docid": "612330c4bfbfddd07251ee0a07912526", "text": "Radiofrequency-induced calf muscle volume reduction is a commonly used method for cosmetic shaping of the lower leg contour. Functional disabilities associated with the use of the radiofrequency (RF) technique, with this procedure targeting the normal gastrocnemius muscle, still have not been reported. However, the authors have experienced several severe ankle equinus cases after RF-induced calf muscle volume reduction. This study retrospectively reviewed 19 calves of 12 patients who showed more than 20° of fixed equinus even though they underwent physical therapy for more than 6 months. All were women with a mean age of 32 years (range, 23–41 years). Of the 12 patients, 7 were bilateral. All the patients received surgical Achilles lengthening for deformity correction. To evaluate the clinical outcome, serial ankle dorsiflexion was measured, and the American Orthopedic Foot and Ankle Society (AOFAS) score was evaluated at the latest follow-up visit. The presence of soleus muscle involvement and an ongoing lesion that might affect the postoperative results of preoperative magnetic resonance imaging (MRI) were investigated. Statistical analysis was conducted to analyze preoperative factors strongly associated with patient clinical outcomes. The mean follow-up period after surgery was 18.6 months (range, 12–28 months). At the latest follow-up visit, the mean ankle dorsiflexion was 9° (range, 0–20°), and the mean AOFAS score was 87.7 (range, 80–98). On preoperative MRI, 13 calves showed soleus muscle involvement. Seven calves had ongoing lesions. Five of the ongoing lesions were muscle edema, and the remaining two lesions were cystic mass lesions resulting from muscle necrosis. Ankle dorsiflexion and AOFAS scores at the latest follow-up evaluation were insufficient in the ongoing lesions group. Although RF-induced calf muscle reduction is believed to be a safer method than conventional procedures, careful handling is needed because of the side effects that may occur in some instances. The slow progression of fibrosis could be observed after RF-induced calf reduction. Therefore, long-term follow-up evaluation is needed after the procedure. Therapeutic case series.", "title": "" }, { "docid": "323d633995296611c903874aefa5cdb7", "text": "This paper investigates the possibility of communicating through vibrations. By modulating the vibration motors available in all mobile phones, and decoding them through accelerometers, we aim to communicate small packets of information. Of course, this will not match the bit rates available through RF modalities, such as NFC or Bluetooth, which utilize a much larger bandwidth. However, where security is vital, vibratory communication may offer advantages. We develop Ripple, a system that achieves up to 200 bits/s of secure transmission using off-the-shelf vibration motor chips, and 80 bits/s on Android smartphones. This is an outcome of designing and integrating a range of techniques, including multicarrier modulation, orthogonal vibration division, vibration braking, side-channel jamming, etc. Not all these techniques are novel; some are borrowed and suitably modified for our purposes, while others are unique to this relatively new platform of vibratory communication.", "title": "" }, { "docid": "ab2a73c5bf3c8d7c65cdde282de1b62c", "text": "Centuries of co-evolution between Castanea spp. biodiversity and human populations has resulted in the spread of rich and varied chestnut genetic diversity throughout most of the world, especially in mountainous and forested regions. Its plasticity and adaptability to different pedoclimates and the wide genetic variability of the species determined the spread of many different ecotypes and varieties in the wild. Throughout the centuries, man has used, selected and preserved these different genotypes, vegetatively propagating them by grafting, for many applications: fresh consumption, production of flour, animal nutrition, timber production, thereby actively contributing to the maintenance of the natural biodiversity of the species, and providing an excellent example of conservation horticulture. Nonetheless, currently the genetic variability of the species is critically endangered and hundreds of ecotypes and varieties are at risk of being lost due to a number of phytosanitary problems (canker blight, Chryphonectria parasitica; ink disease, Phytophthora spp.; gall wasp, Dryocosmus kuriphilus), and because of the many years of decline and abandonment of chestnut cultivation, which resulted in the loss of the binomial male chestnut. Recently, several research and experimentation programmes have attempted to develop strategies for the conservation of chestnut biodiversity. The purpose of this paper is to give an overview of the status of biodiversity conservation of the species and to present the results of a 7 year project aimed at the individuation and study of genetic diversity and conservation of Castanea spp. germplasm.", "title": "" }, { "docid": "da82c8a49cb22f8a01aa4c374084853b", "text": "During the analysis of an Irish customs seizure (14 packages each containing approximately one kilogram of a white wet paste) were analysed for the suspected presence of controlled drugs. The samples were found to contain amphetamine and also characteristic by-products including benzyl cyanide, phenylacetone (P2P), methyl-phenyl-pyrimidines, N-formylamphetamine, naphthalene derivatives and amphetamine dimers. The analytical results corresponded with the impurity profile observed and recently reported for the synthesis of 4-methylamphetamine from 4-methylphenylacetoacetonitrile [1]. The synthesis of amphetamine from alpha-phenylacetoacetonitrile (APAAN) was performed (via an acid hydrolysis and subsequent Leuckart reaction) and the impurity profile of the product obtained was compared to those observed in the customs seizure. Observations are made regarding the route specificity of these by-products.", "title": "" }, { "docid": "bb2c1b4b08a25df54fbd46eaca138337", "text": "The zero-shot paradigm exploits vector-based word representations extracted from text corpora with unsupervised methods to learn general mapping functions from other feature spaces onto word space, where the words associated to the nearest neighbours of the mapped vectors are used as their linguistic labels. We show that the neighbourhoods of the mapped elements are strongly polluted by hubs, vectors that tend to be near a high proportion of items, pushing their correct labels down the neighbour list. After illustrating the problem empirically, we propose a simple method to correct it by taking the proximity distribution of potential neighbours across many mapped vectors into account. We show that this correction leads to consistent improvements in realistic zero-shot experiments in the cross-lingual, image labeling and image retrieval domains.", "title": "" }, { "docid": "e8a0e37fcb90f43785da710792b02c3c", "text": "As the use of Twitter has become more commonplace throughout many nations, its role in political discussion has also increased. This has been evident in contexts ranging from general political discussion through local, state, and national elections (such as in the 2010 Australian elections) to protests and other activist mobilisation (for example in the current uprisings in Tunisia, Egypt, and Yemen, as well as in the controversy around Wikileaks). Research into the use of Twitter in such political contexts has also developed rapidly, aided by substantial advancements in quantitative and qualitative methodologies for capturing, processing, analysing, and visualising Twitter updates by large groups of users. Recent work has especially highlighted the role of the Twitter hashtag – a short keyword, prefixed with the hash symbol ‘#’ – as a means of coordinating a distributed discussion between more or less large groups of users, who do not need to be connected through existing ‘follower’ networks. Twitter hashtags – such as ‘#ausvotes’ for the 2010 Australian elections, ‘#londonriots’ for the coordination of information and political debates around the recent unrest in London, or ‘#wikileaks’ for the controversy around Wikileaks thus aid the formation of ad hoc publics around specific themes and topics. They emerge from within the Twitter community – sometimes as a result of pre-planning or quickly reached consensus, sometimes through protracted debate about what the appropriate hashtag for an event or topic should be (which may also lead to the formation of competing publics using different hashtags). Drawing on innovative methodologies for the study of Twitter content, this paper examines the use of hashtags in political debate in the context of a number of major case studies.", "title": "" }, { "docid": "9ff59fcccfdfb9c4c6c34322a6bffb9e", "text": "A growing number of affective computing researches recently developed a computer system that can recognize an emotional state of the human user to establish affective human-computer interactions. Various measures have been used to estimate emotional states, including self-report, startle response, behavioral response, autonomic measurement, and neurophysiologic measurement. Among them, inferring emotional states from electroencephalography (EEG) has received considerable attention as EEG could directly reflect emotional states with relatively low costs and simplicity. Yet, EEG-based emotional state estimation requires well-designed computational methods to extract information from complex and noisy multichannel EEG data. In this paper, we review the computational methods that have been developed to deduct EEG indices of emotion, to extract emotion-related features, or to classify EEG signals into one of many emotional states. We also propose using sequential Bayesian inference to estimate the continuous emotional state in real time. We present current challenges for building an EEG-based emotion recognition system and suggest some future directions.", "title": "" }, { "docid": "f9ba5eccc4eafec9baee4ecd923f3764", "text": "Automated guided vehicles (AGVs) are used as a material handling device in flexible manufacturing systems. Traditionally, AGVs were mostly used at manufacturing systems, but currently other applications of AGVs are extensively developed in other areas, such as warehouses, container terminals and transportation systems. This paper discusses literature related to different methodologies to optimize AGV systems for the two significant problems of scheduling and routing at manufacturing, distribution, transshipment and transportation systems. We categorized the methodologies into mathematical methods (exact and heuristics), simulation studies, metaheuristic techniques and artificial intelligent based approaches.", "title": "" }, { "docid": "adc0de2a4c4baf4fdd35ff5a585550ef", "text": "Sequence generation models such as recurrent networks can be trained with a diverse set of learning algorithms. For example, maximum likelihood learning is simple and efficient, yet suffers from the exposure bias problem. Reinforcement learning like policy gradient addresses the problem but can have prohibitively poor exploration efficiency. A variety of other algorithms such as RAML, SPG, and data noising, have also been developed from different perspectives. This paper establishes a formal connection between these algorithms. We present a generalized entropy regularized policy optimization formulation, and show that the apparently divergent algorithms can all be reformulated as special instances of the framework, with the only difference being the configurations of reward function and a couple of hyperparameters. The unified interpretation offers a systematic view of the varying properties of exploration and learning efficiency. Besides, based on the framework, we present a new algorithm that dynamically interpolates among the existing algorithms for improved learning. Experiments on machine translation and text summarization demonstrate the superiority of the proposed algorithm.", "title": "" }, { "docid": "3f904e591a46f770e9a1425e6276041b", "text": "Several decades of research in underwater communication and networking has resulted in novel and innovative solutions to combat challenges such as long delay spread, rapid channel variation, significant Doppler, high levels of non-Gaussian noise, limited bandwidth and long propagation delays. Many of the physical layer solutions can be tested by transmitting carefully designed signals, recording them after passing through the underwater channel, and then processing them offline using appropriate algorithms. However some solutions requiring online feedback to the transmitter cannot be tested without real-time processing capability in the field. Protocols and algorithms for underwater networking also require real-time communication capability for experimental testing. Although many modems are commercially available, they provide limited flexibility in physical layer signaling and sensing. They also provide limited control over the exact timing of transmission and reception, which can be critical for efficient implementation of some networking protocols with strict time constraints. To aid in our physical and higher layer research, we developed the UNET-2 software-defined modem with flexibility and extensibility as primary design objectives. We present the hardware and software architecture of the modem, focusing on the flexibility and adaptability that it provides researchers with. We describe the network stack that the modem uses, and show how it can also be used as a powerful tool for underwater network simulation. We illustrate the flexibility provided by the modem through a number of practical examples and experiments.", "title": "" }, { "docid": "998a163b4c7e39be2b371ec42be0662a", "text": "In recent years, car makers and tech companies have been racing towards self driving cars. It seems that the main parameter in this race is who will have the first car on the road. The goal of this paper is to add to the equation two additional crucial parameters. The first is standardization of safety assurance — what are the minimal requirements that every self-driving car must satisfy, and how can we verify these requirements. The second parameter is scalability — engineering solutions that lead to unleashed costs will not scale to millions of cars, which will push interest in this field into a niche academic corner, and drive the entire field into a “winter of autonomous driving”. In the first part of the paper we propose a white-box, interpretable, mathematical model for safety assurance, which we call Responsibility-Sensitive Safety (RSS). In the second part we describe a design of a system that adheres to our safety assurance requirements and is scalable to millions of cars.", "title": "" }, { "docid": "d91e3f1a92052d48b8033e3d9c3dd695", "text": "This work investigates the impact of syntactic features in a completely unsupervised semantic relation extraction experiment. Automated relation extraction deals with identifying semantic relation instances in a text and classifying them according to the type of relation. This task is essential in information and knowledge extraction and in knowledge base population. Supervised relation extraction systems rely on annotated examples [ , – , ] and extract di erent kinds of features from the training data, and eventually from external knowledge sources. The types of extracted relations are necessarily limited to a pre-defined list. In Open Information Extraction (OpenIE) [ , ] relation types are inferred directly from the data: concept pairs representing the same relation are grouped together and relation labels can be generated from context segments or through labeling by domain experts [ , , ]. A commonly used method [ , ] is to represent entity couples by a pair-pattern matrix, and cluster relation instances according to the similarity of their distribution over patterns. Pattern-based approaches [ , , , , ] typically use lexical context patterns, assuming that the semantic relation between two entities is explicitly mentioned in the text. Patterns can be defined manually [ ], obtained by Latent Relational Analysis [ ], or from a corpus by sequential pattern mining [ , , ]. Previous works, especially in the biomedical domain, have shown that not only lexical patterns, but also syntactic dependency trees can be beneficial in supervised and semi-supervised relation extraction [ , , – ]. Early experiments on combining lexical patterns with di erent types of distributional information in unsupervised relation clustering did not bring significant improvement [ ]. The underlying di culty is that while supervised classifiers can learn to weight attributes from di erent sources, it is not trivial to combine di erent types of features in a single clustering feature space. In our experiments, we propose to combine syntactic features with sequential lexical patterns for unsupervised clustering of semantic relation instances in the context of (NLP-related) scientific texts. We replicate the experiments of [ ] and augment them with dependency-based syntactic features. We adopt a pairpattern matrix for clustering relation instances. The task can be described as follows: if a1, a2, b1, b2 are pre-annotated domain concepts extracted from a corpus, we would like to classify concept pairs a = (a1, a2) and b = (b1, b2) in homogeneous groups according to their semantic relation. We need an e cient", "title": "" }, { "docid": "b134cf07e01f1568d127880777492770", "text": "This paper addresses the problem of recovering 3D nonrigid shape models from image sequences. For example, given a video recording of a talking person, we would like to estimate a 3D model of the lips and the full face and its internal modes of variation. Many solutions that recover 3D shape from 2D image sequences have been proposed; these so-called structure-from-motion techniques usually assume that the 3D object is rigid. For example, Tomasi and Kanades’ factorization technique is based on a rigid shape matrix, which produces a tracking matrix of rank 3 under orthographic projection. We propose a novel technique based on a non-rigid model, where the 3D shape in each frame is a linear combination of a set of basis shapes. Under this model, the tracking matrix is of higher rank, and can be factored in a three-step process to yield pose, configuration and shape. To the best of our knowledge, this is the first model free approach that can recover from single-view video sequences nonrigid shape models. We demonstrate this new algorithm on several video sequences. We were able to recover 3D non-rigid human face and animal models with high accuracy.", "title": "" } ]
scidocsrr
030f5fe0356b20354dbf83aa8447bcbe
Face Recognition by Humans: Nineteen Results All Computer Vision Researchers Should Know About
[ { "docid": "a1147a7b8bc6777ebb2ab7b4f308cc80", "text": "We present a new graph-theoretic approach to the problem of image segmentation. Our method uses local criteria and yet produces results that reflect global properties of the image. We develop a framework that provides specific definitions of what it means for an image to be underor over-segmented. We then present an efficient algorithm for computing a segmentation that is neither undernor over-segmented according to these definitions. Our segmentation criterion is based on intensity differences between neighboring pixels. An important characteristic of the approach is that it is able to preserve detail in low-variability regions while ignoring detail in high-variability regions, which we illustrate with several examples on both real and sythetic images.", "title": "" } ]
[ { "docid": "6bbcbe9f4f4ede20d2b86f6da9167110", "text": "Avoiding vehicle-to-pedestrian crashes is a critical requirement for nowadays advanced driver assistant systems (ADAS) and future self-driving vehicles. Accordingly, detecting pedestrians from raw sensor data has a history of more than 15 years of research, with vision playing a central role. During the last years, deep learning has boosted the accuracy of image-based pedestrian detectors. However, detection is just the first step towards answering the core question, namely is the vehicle going to crash with a pedestrian provided preventive actions are not taken? Therefore, knowing as soon as possible if a detected pedestrian has the intention of crossing the road ahead of the vehicle is essential for performing safe and comfortable maneuvers that prevent a crash. However, compared to pedestrian detection, there is relatively little literature on detecting pedestrian intentions. This paper aims to contribute along this line by presenting a new vision-based approach which analyzes the pose of a pedestrian along several frames to determine if he or she is going to enter the road or not. We present experiments showing 750 ms of anticipation for pedestrians crossing the road, which at a typical urban driving speed of 50 km/h can provide 15 additional meters (compared to a pure pedestrian detector) for vehicle automatic reactions or to warn the driver. Moreover, in contrast with state-of-the-art methods, our approach is monocular, neither requiring stereo nor optical flow information.", "title": "" }, { "docid": "5a97d79641f7006d7b5d0decd3a7ad3e", "text": "We present a cognitive model of inducing verb selectional preferences from individual verb usages. The selectional preferences for each verb argument are represented as a probability distribution over the set of semantic properties that the argument can possess—asemantic profile . The semantic profiles yield verb-specific conceptualizations of the arguments associated with a syntactic position. The proposed model can learn appropriate verb profiles from a small set of noisy training data, and can use them in simulating human plausibility judgments and analyzing implicit object alternation.", "title": "" }, { "docid": "1880bb9c3229cab3e614ca39079c7781", "text": "Emerging low-power radio triggering techniques for wireless motes are a promising approach to prolong the lifetime of Wireless Sensor Networks (WSNs). By allowing nodes to activate their main transceiver only when data need to be transmitted or received, wake-up-enabled solutions virtually eliminate the need for idle listening, thus drastically reducing the energy toll of communication. In this paper we describe the design of a novel wake-up receiver architecture based on an innovative pass-band filter bank with high selectivity capability. The proposed concept, demonstrated by a prototype implementation, combines both frequency-domain and time-domain addressing space to allow selective addressing of nodes. To take advantage of the functionalities of the proposed receiver, as well as of energy-harvesting capabilities modern sensor nodes are equipped with, we present a novel wake-up-enabled harvesting-aware communication stack that supports both interest dissemination and converge casting primitives. This stack builds on the ability of the proposed WuR to support dynamic address assignment, which is exploited to optimize system performance. Comparison against traditional WSN protocols shows that the proposed concept allows to optimize performance tradeoffs with respect to existing low-power communication stacks.", "title": "" }, { "docid": "9099ced3a3dc2207e997d2cbdae6b84f", "text": "In this paper, we propose a generalized minimum-sum decoding algorithm using a linear approximation (LAMS) for protograph-based low-density parity-check (PB-LDPC) codes with quasi-cyclic (QC) structures. The linear approximation introduces some factors in each decoding iteration, which linearly adjust the check node updating and channel output. These factors are optimized iteratively using machine learning, where the optimization can be efficiently solved by a small and shallow neural network with training data produced by the LAMS decoder. The neural network is built according to the parity check matrix of a PB-LDPC code with a QC structure which can greatly reduce the size of the neural network. Since, we optimize the factors once per decoding iteration, the optimization is not limited by the number of the iterations. Then, we give the optimized results of the factors in the LAMS decoder and perform decoding simulations for PB-LDPC codes in fifth generation mobile networks (5G). In the simulations, the LAMS algorithm shows noticeable improvement over the normalized and the offset minimum-sum algorithms and even better performance than the belief propagation algorithm in some high signal-to-noise ratio regions.", "title": "" }, { "docid": "83f18d74ca28f615899f185bc592c9a4", "text": "A simple circuit technique is presented for improving poor midband power supply rejection ratio (PSRR) of single ended amplifiers that use Miller capacitance to set the location of the dominant pole. The principle of the technique is to create an additional parallel signal path from the power supply to the output, which cancels the dominating unity gain signal path through the output stage and Miller capacitor above the dominant pole frequency. Simulation results of a two-stage amplifier show that more than a 20dB improvement in the midband PSRR is obtainable as compared with an amplifier without the suggested circuit", "title": "" }, { "docid": "86b8f11b19fec6a120edddc12e107215", "text": "This paper presents the design procedure, optimization strategy, theoretical analysis, and experimental results of a wideband dual-polarized base station antenna element with superior performance. The proposed antenna element consists of four electric folded dipoles arranged in an octagon shape that are excited simultaneously for each polarization. It provides ±45° slant-polarized radiation that meets all the requirements for base station antenna elements, including stable radiation patterns, low cross polarization level, high port-to-port isolation, and excellent matching across the wide band. The problem of beam squint for beam-tilted arrays is discussed and it is found that the geometry of this element serves to reduce beam squint. Experimental results show that this element has a wide bandwidth of 46.4% from 1.69 to 2.71 GHz with ≥15-dB return loss and 9.8 ± 0.9-dBi gain. Across this wide band, the variations of the half-power-beamwidths of the two polarizations are all within 66.5° ± 5.5°, the port-to-port isolation is >28 dB, the cross-polarization discrimination is >25 dB, and most importantly, the beam squint is <4° with a maximum 10° down-tilt.", "title": "" }, { "docid": "4ba81ce5756f2311dde3fa438f81e527", "text": "To prevent password breaches and guessing attacks, banks increasingly turn to two-factor authentication (2FA), requiring users to present at least one more factor, such as a one-time password generated by a hardware token or received via SMS, besides a password. We can expect some solutions – especially those adding a token – to create extra work for users, but little research has investigated usability, user acceptance, and perceived security of deployed 2FA. This paper presents an in-depth study of 2FA usability with 21 UK online banking customers, 16 of whom had accounts with more than one bank. We collected a rich set of qualitative and quantitative data through two rounds of semi-structured interviews, and an authentication diary over an average of 11 days. Our participants reported a wide range of usability issues, especially with the use of hardware tokens, showing that the mental and physical workload involved shapes how they use online banking. Key targets for improvements are (i) the reduction in the number of authentication steps, and (ii) removing features that do not add any security but negatively affect the user experience.", "title": "" }, { "docid": "6b55931c9945a71de6b28789323f191b", "text": "Resistant hypertension-uncontrolled hypertension with 3 or more antihypertensive agents-is increasingly common in clinical practice. Clinicians should exclude pseudoresistant hypertension, which results from nonadherence to medications or from elevated blood pressure related to the white coat syndrome. In patients with truly resistant hypertension, thiazide diuretics, particularly chlorthalidone, should be considered as one of the initial agents. The other 2 agents should include calcium channel blockers and angiotensin-converting enzyme inhibitors for cardiovascular protection. An increasing body of evidence has suggested benefits of mineralocorticoid receptor antagonists, such as eplerenone and spironolactone, in improving blood pressure control in patients with resistant hypertension, regardless of circulating aldosterone levels. Thus, this class of drugs should be considered for patients whose blood pressure remains elevated after treatment with a 3-drug regimen to maximal or near maximal doses. Resistant hypertension may be associated with secondary causes of hypertension including obstructive sleep apnea or primary aldosteronism. Treating these disorders can significantly improve blood pressure beyond medical therapy alone. The role of device therapy for treating the typical patient with resistant hypertension remains unclear.", "title": "" }, { "docid": "92e955705aa333923bb7b14af946fc2f", "text": "This study examines the role of online daters’ physical attractiveness in their profile selfpresentation and, in particular, their use of deception. Sixty-nine online daters identified the deceptions in their online dating profiles and had their photograph taken in the lab. Independent judges rated the online daters’ physical attractiveness. Results show that the lower online daters’ attractiveness, the more likely they were to enhance their profile photographs and lie about their physical descriptors (height, weight, age). The association between attractiveness and deception did not extend to profile elements unrelated to their physical appearance (e.g., income, occupation), suggesting that their deceptions were limited and strategic. Results are discussed in terms of (a) evolutionary theories about the importance of physical attractiveness in the dating realm and (b) the technological affordances that allow online daters to engage in selective self-presentation.", "title": "" }, { "docid": "0afb2a40553e1bef9d8250a3c5012180", "text": "Attacks to networks are becoming more complex and sophisticated every day. Beyond the so-called script-kiddies and hacking newbies, there is a myriad of professional attackers seeking to make serious profits infiltrating in corporate networks. Either hostile governments, big corporations or mafias are constantly increasing their resources and skills in cybercrime in order to spy, steal or cause damage more effectively. With the ability and resources of hackers growing, the traditional approaches to Network Security seem to start hitting their limits and it’s being recognized the need for a smarter approach to threat detections. This paper provides an introduction on the need for evolution of Cyber Security techniques and how Artificial Intelligence (AI) could be of application to help solving some of the problems. It provides also, a high-level overview of some state of the art AI Network Security techniques, to finish analysing what is the foreseeable future of the application of AI to Network Security. Applications of Artificial Intelligence (AI) to Network Security 3", "title": "" }, { "docid": "951c2ce5816ffd7be55b8ae99a82f5fc", "text": "Many Android apps have a legitimate need to communicate over the Internet and are then responsible for protecting potentially sensitive data during transit. This paper seeks to better understand the potential security threats posed by benign Android apps that use the SSL/TLS protocols to protect data they transmit. Since the lack of visual security indicators for SSL/TLS usage and the inadequate use of SSL/TLS can be exploited to launch Man-in-the-Middle (MITM) attacks, an analysis of 13,500 popular free apps downloaded from Google's Play Market is presented. \n We introduce MalloDroid, a tool to detect potential vulnerability against MITM attacks. Our analysis revealed that 1,074 (8.0%) of the apps examined contain SSL/TLS code that is potentially vulnerable to MITM attacks. Various forms of SSL/TLS misuse were discovered during a further manual audit of 100 selected apps that allowed us to successfully launch MITM attacks against 41 apps and gather a large variety of sensitive data. Furthermore, an online survey was conducted to evaluate users' perceptions of certificate warnings and HTTPS visual security indicators in Android's browser, showing that half of the 754 participating users were not able to correctly judge whether their browser session was protected by SSL/TLS or not. We conclude by considering the implications of these findings and discuss several countermeasures with which these problems could be alleviated.", "title": "" }, { "docid": "19b537f7356da81830c8f7908af83669", "text": "Investigation of the hippocampus has historically focused on computations within the trisynaptic circuit. However, discovery of important anatomical and functional variability along its long axis has inspired recent proposals of long-axis functional specialization in both the animal and human literatures. Here, we review and evaluate these proposals. We suggest that various long-axis specializations arise out of differences between the anterior (aHPC) and posterior hippocampus (pHPC) in large-scale network connectivity, the organization of entorhinal grid cells, and subfield compositions that bias the aHPC and pHPC towards pattern completion and separation, respectively. The latter two differences give rise to a property, reflected in the expression of multiple other functional specializations, of coarse, global representations in anterior hippocampus and fine-grained, local representations in posterior hippocampus.", "title": "" }, { "docid": "a51a8dbf4b44953e4cee202099d46a0e", "text": "The effects of selected nonionic emulsifiers on the physicochemical characteristics of astaxanthin nanodispersions produced by an emulsification/evaporation technique were studied. The emulsifiers used were polysorbates (Polysorbate 20, Polysorbate 40, Polysorbate 60 and Polysorbate 80) and sucrose esters of fatty acids (sucrose laurate, palmitate, stearate and oleate). The mean particle diameters of the nanodispersions ranged from 70 nm to 150 nm, depending on the emulsifier used. In the prepared nanodispersions, the astaxanthin particle diameter decreased with increasing emulsifier hydrophilicity and decreasing carbon number of the fatty acid in the emulsifier structure. Astaxanthin nanodispersions with the smallest particle diameters were produced with Polysorbate 20 and sucrose laurate among the polysorbates and the sucrose esters, respectively. We also found that the Polysorbate 80- and sucrose oleate-stabilized nanodispersions had the highest astaxanthin losses (i.e., the lowest astaxanthin contents in the final products) among the nanodispersions. This work demonstrated the importance of emulsifier type in determining the physicochemical characteristics of astaxanthin nano-dispersions.", "title": "" }, { "docid": "dd9d776dbc470945154d460921005204", "text": "The Ant Colony System (ACS) is, next to Ant Colony Optimization (ACO) and the MAX-MIN Ant System (MMAS), one of the most efficient metaheuristic algorithms inspired by the behavior of ants. In this article we present three novel parallel versions of the ACS for the graphics processing units (GPUs). To the best of our knowledge, this is the first such work on the ACS which shares many key elements of the ACO and the MMAS, but differences in the process of building solutions and updating the pheromone trails make obtaining an efficient parallel version for the GPUs a difficult task. The proposed parallel versions of the ACS differ mainly in their implementations of the pheromone memory. The first two use the standard pheromone matrix, and the third uses a novel selective pheromone memory. Computational experiments conducted on several Travelling Salesman Problem (TSP) instances of sizes ranging from 198 to 2392 cities showed that the parallel ACS on Nvidia Kepler GK104 GPU (1536 CUDA cores) is able to obtain a speedup up to 24.29x vs the sequential ACS running on a single core of Intel Xeon E5-2670 CPU. The parallel ACS with the selective pheromone memory achieved speedups up to 16.85x, but in most cases the obtained solutions were of significantly better quality than for the sequential ACS.", "title": "" }, { "docid": "248a447eb07f0939fa479b0eb8778756", "text": "The present study was done to determine the long-term success and survival of fixed partial dentures (FPDs) and to evaluate the risks for failures due to specific biological and technical complications. A MEDLINE search (PubMed) from 1966 up to March 2004 was conducted, as well as hand searching of bibliographies from relevant articles. Nineteen studies from an initial yield of 3658 titles were finally selected and data were extracted independently by three reviewers. Prospective and retrospective cohort studies with a mean follow-up time of at least 5 years in which patients had been examined clinically at the follow-up visits were included in the meta-analysis. Publications only based on patients records, questionnaires or interviews were excluded. Survival of the FPDs was analyzed according to in situ and intact failure risks. Specific biological and technical complications such as caries, loss of vitality and periodontal disease recurrence as well as loss of retention, loss of vitality, tooth and material fractures were also analyzed. The 10-year probability of survival for fixed partial dentures was 89.1% (95% confidence interval (CI): 81-93.8%) while the probability of success was 71.1% (95% CI: 47.7-85.2%). The 10-year risk for caries and periodontitis leading to FPD loss was 2.6% and 0.7%, respectively. The 10-year risk for loss of retention was 6.4%, for abutment fracture 2.1% and for material fractures 3.2%.", "title": "" }, { "docid": "14ca9dfee206612e36cd6c3b3e0ca61e", "text": "Radio-frequency identification (RFID) technology promises to revolutionize the way we track items in supply chain, retail store, and asset management applications. The size and different characteristics of RFID data pose many interesting challenges in the current data management systems. In this paper, we provide a brief overview of RFID technology and highlight a few of the data management challenges that we believe are suitable topics for exploratory research.", "title": "" }, { "docid": "8d7a7bc2b186d819b36a0a8a8ba70e39", "text": "Recent stereo algorithms have achieved impressive results by modelling the disparity image as a Markov Random Field (MRF). An important component of an MRF-based approach is the inference algorithm used to find the most likely setting of each node in the MRF. Algorithms have been proposed which use Graph Cuts or Belief Propagation for inference. These stereo algorithms differ in both the inference algorithm used and the formulation of the MRF. It is unknown whether to attribute the responsibility for differences in performance to the MRF or the inference algorithm. We address this through controlled experiments by comparing the Belief Propagation algorithm and the Graph Cuts algorithm on the same MRF’s, which have been created for calculating stereo disparities. We find that the labellings produced by the two algorithms are comparable. The solutions produced by Graph Cuts have a lower energy than those produced with Belief Propagation, but this does not necessarily lead to increased performance relative to the ground-truth.", "title": "" }, { "docid": "70cad4982e42d44eec890faf6ddc5c75", "text": "Both translation arrest and proteasome stress associated with accumulation of ubiquitin-conjugated protein aggregates were considered as a cause of delayed neuronal death after transient global brain ischemia; however, exact mechanisms as well as possible relationships are not fully understood. The aim of this study was to compare the effect of chemical ischemia and proteasome stress on cellular stress responses and viability of neuroblastoma SH-SY5Y and glioblastoma T98G cells. Chemical ischemia was induced by transient treatment of the cells with sodium azide in combination with 2-deoxyglucose. Proteasome stress was induced by treatment of the cells with bortezomib. Treatment of SH-SY5Y cells with sodium azide/2-deoxyglucose for 15 min was associated with cell death observed 24 h after treatment, while glioblastoma T98G cells were resistant to the same treatment. Treatment of both SH-SY5Y and T98G cells with bortezomib was associated with cell death, accumulation of ubiquitin-conjugated proteins, and increased expression of Hsp70. These typical cellular responses to proteasome stress, observed also after transient global brain ischemia, were not observed after chemical ischemia. Finally, chemical ischemia, but not proteasome stress, was in SH-SY5Y cells associated with increased phosphorylation of eIF2α, another typical cellular response triggered after transient global brain ischemia. Our results showed that short chemical ischemia of SH-SY5Y cells is not sufficient to induce both proteasome stress associated with accumulation of ubiquitin-conjugated proteins and stress response at the level of heat shock proteins despite induction of cell death and eIF2α phosphorylation.", "title": "" } ]
scidocsrr
8296a5113d06eaa5ce94aecce8cdaf91
Manufacturing Strategy , Capabilities and Performance
[ { "docid": "cddca3a23ea0568988243c8f005e0edc", "text": "This paper investigates the mechanisms through which organizations develop dynamic capabilities, defined as routinized activities directed to the development and adaptation of operating routines, and reflects upon the role of (1) experience accumulation, (2) knowledge articulation and (3) knowledge codification processes in the evolution of dynamic, as well as operational, routines. The argument is made that dynamic capabilities are shaped by the co-evolution of these learning mechanisms. At any point in time, firms adopt a mix of learning behaviors constituted by a semi-automatic accumulation of experience and by deliberate investments in knowledge articulation and codification activities. The relative effectiveness of these capability-building mechanisms is analyzed here as contingent upon selected features of the task to be learned, such as its frequency, homogeneity and degree of causal ambiguity, and testable hypotheses are derived. Somewhat counterintuitive implications of the analysis include the relatively superior effectiveness of highly deliberate learning processes, such as knowledge codification, at lower levels of frequency and homogeneity of the organizational task, in contrast with common managerial practice.", "title": "" }, { "docid": "cf2e23cddb72b02d1cca83b4c3bf17a8", "text": "This article seeks to reconceptualize the relationship between flexibility and efficiency. Much organization theory argues that efficiency requires bureaucracy, that bureaucracy impedes flexibility, and that organizations therefore confront a tradeoff between efficiency and flexibility. Some researchers have challenged this line of reasoning, arguing that organizations can shift the efficiency/flexibility tradeoff to attain both superior efficiency and superior flexibility. Others have pointed out numerous obstacles to successfully shifting the tradeoff. Seeking to advance our understanding of these obstacles and how they might be overcome, we analyze an auto assembly plant that appears to be far above average industry performance in both efficiency and flexibility. NUMMI, a Toyota subsidiary located in Fremont, California, relied on a highly bureaucratic organization to achieve its high efficiency. Analyzing two recent major model changes, we find that NUMMI used four mechanisms to support its exceptional flexibility/efficiency combination. First, metaroutines (routines for changing other routines) facilitated the efficient performance of nonroutine tasks. Second, both workers and suppliers contributed to nonroutine tasks while they worked in routine production. Third, routine and nonroutine tasks were separated temporally, and workers switched sequentially between them. Finally, novel forms of organizational partitioning enabled differentiated subunits to work in parallel on routine and nonroutine tasks. NUMMI’s success with these four mechanisms depended on several features of the broader organizational context, most notably training, trust, and leadership. (Flexibility; Bureaucracy; Tradeoffs; Routines; Metaroutines; Ambidexterity; Switching; Partitioning; Trust) Introduction The postulate of a tradeoff between efficiency and flexibility is one of the more enduring ideas in organizational theory. Thompson (1967, p. 15) described it as a central “paradox of administration.” Managers must choose between organization designs suited to routine, repetitive tasks and those suited to nonroutine, innovative tasks. However, as competitive rivalry intensifies, a growing number of firms are trying to improve simultaneously in efficiencyand flexibility-related dimensions (de Meyer et al. 1989, Volberda 1996, Organization Science 1996). How can firms shift the terms of the efficiency-flexibility tradeoff? To explore how firms can create simultaneously superior efficiency and superior flexibility, we examine an exceptional auto assembly plant, NUMMI, a joint venture of Toyota and GM whose day-to-day operations were unD ow nl oa de d fr om in fo rm s. or g by [ 12 8. 32 .7 5. 11 8] o n 28 A pr il 20 14 , a t 1 0: 21 . Fo r pe rs on al u se o nl y, a ll ri gh ts r es er ve d. PAUL S. ADLER, BARBARA GOLDOFTAS AND DAVID I. LEVINE Flexibility Versus Efficiency? 44 ORGANIZATION SCIENCE/Vol. 10, No. 1, January–February 1999 der Toyota control. Like other Japanese auto transplants in the U.S., NUMMI far outpaced its Big Three counterparts simultaneously in efficiency and quality and in model change flexibility (Womack et al. 1990, Business Week 1994). In the next section we set the theoretical stage by reviewing prior research on the efficiency/flexibility tradeoff. Prior research suggests four mechanisms by which organizations can shift the tradeoff as well as some potentially serious impediments to each mechanism. We then describe our research methods and the NUMMI organization. The following sections first outline in summary form the results of this investigation, then provide the supporting evidence in our analysis of two major model changeovers at NUMMI and how they differed from traditional U.S. Big Three practice. A discussion section identifies some conditions underlying NUMMI’s success in shifting the tradeoff and in overcoming the potential impediments to the four trade-off shifting mechanisms. Flexibility Versus Efficiency? There are many kinds of flexibility and indeed a sizable literature devoted to competing typologies of the various kinds of flexibility (see overview by Sethi and Sethi 1990). However, from an organizational point of view, all forms of flexibility present a common challenge: efficiency requires a bureaucratic form of organization with high levels of standardization, formalization, specialization, hierarchy, and staffs; but these features of bureaucracy impede the fluid process of mutual adjustment required for flexibility; and organizations therefore confront a tradeoff between efficiency and flexibility (Knott 1996, Kurke 1988). Contingency theory argues that organizations will be more effective if they are designed to fit the nature of their primary task. Specifically, organizations should adopt a mechanistic form if their task is simple and stable and their goal is efficiency, and they should adopt an organic form if their task is complex and changing and their goal is therefore flexibility (Burns and Stalker 1961). Organizational theory presents a string of contrasts reflecting this mechanistic/organic polarity: machine bureaucracies vs. adhocracies (Mintzberg 1979); adaptive learning based on formal rules and hierarchical controls versus generative learning relying on shared values, teams, and lateral communication (McGill et al. 1992); generalists who pursue opportunistic r-strategies and rely on excess capacity to do well in open environments versus specialists that are more likely to survive in competitive environments by pursuing k-strategies that trade less flexibility for greater efficiency (Hannan and Freeman 1977, 1989). March (1991) and Levinthal and March (1993) make the parallel argument that organizations must choose between structures that facilitate exploration—the search for new knowledge—and those that facilitate exploitation—the use of existing knowledge. Social-psychological theories provide a rationale for this polarization. Merton (1958) shows how goal displacement in bureaucratic organizations generates rigidity. Argyris and Schon (1978) show how defensiveness makes single-loop learning—focused on pursuing given goals more effectively (read: efficiency)—an impediment to double-loop learning—focused on defining new task goals (read: flexibility). Thus, argues Weick (1969), adaptation precludes adaptability. This tradeoff view has been echoed in other disciplines. Standard economic theory postulates a tradeoff between flexibility and average costs (e.g., Stigler 1939, Hart 1942). Further extending this line of thought, Klein (1984) contrasts static and dynamic efficiency. Operations management researchers have long argued that productivity and flexibility or innovation trade off against each other in manufacturing plant performance (Abernathy 1978; see reviews by Gerwin 1993, Suárez et al. 1996, Corrêa 1994). Hayes and Wheelwright’s (1984) product/process matrix postulates a close correspondence between product variety and process efficiency (see Safizadeh et al. 1996). Strategy researchers such as Ghemawat and Costa (1993) argue that firms must chose between a strategy of dynamic effectiveness through flexibility and static efficiency through more rigid discipline. In support of a key corollary of the tradeoff postulate articulated in the organization theory literature, they argue that in general the optimal choice is at one end or the other of the spectrum, since a firm pursuing both goals simultaneously would have to mix organizational elements appropriate to each strategy and thus lose the benefit of the complementarities that typically obtain between the various elements of each type of organization. They would thus be “stuck in the middle” (Porter 1980). Beyond the Tradeoff? Empirical evidence for the tradeoff postulate is, however, remarkably weak. Take, for example, product mix flexibility. On the one hand, Hayes and Wheelwright (1984) and Skinner (1985) provide anecdotal evidence that more focused factories—ones producing a narrower range of products—are more efficient. In their survey of plants across a range of manufacturing industries, Safizadeh et al. (1996) confirmed that in general more product variety was associated with reliance on job-shop rather continuous processes. D ow nl oa de d fr om in fo rm s. or g by [ 12 8. 32 .7 5. 11 8] o n 28 A pr il 20 14 , a t 1 0: 21 . Fo r pe rs on al u se o nl y, a ll ri gh ts r es er ve d. PAUL S. ADLER, BARBARA GOLDOFTAS AND DAVID I. LEVINE Flexibility Versus Efficiency? ORGANIZATION SCIENCE/Vol. 10, No. 1, January–February 1999 45 On the other hand, Kekre and Srinivasan’s (1990) study of companies selling industrial products found that a broader product line was significantly associated with lower manufacturing costs. MacDuffie et al. (1996) found that greater product variety had no discernible affect on auto assembly plant productivity. Suárez et al. (1996) found that product mix flexibility had no discernible relationship to costs or quality in printed circuit board assembly. Brush and Karnani (1996) found only three out of 19 manufacturing industries showed statistically significant productivity returns to narrower product lines, while two industries showed significant returns to broader product lines. Research by Fleischman (1996) on employment flexibility revealed a similar pattern: within 2digit SIC code industries that face relatively homogeneous levels of expected volatility of employment, the employment adjustment costs of the least flexible 4-digit industries were anywhere between 4 and 10 times greater than the adjustment costs found in the most flexible 4digit industries. Some authors argue that the era of tradeoffs is behind us (Ferdows and de Meyer 1990). Hypercompetitive environments force firms to compete on several dimensions at once (Organization Science 1996), and flexible technologies enable firms to shift the tradeoff curve just as quickly as they could move to a different point on the existing tr", "title": "" } ]
[ { "docid": "a38d0e0d032c3e4074f9ac0f09719737", "text": "A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). The goal of this paper is to show how the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to \"straightforward\" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. PNC can yield higher capacity than straight-forward network coding when applied to wireless networks. We believe this is a first paper that ventures into EM-wave-based network coding at the physical layer and demonstrates its potential for boosting network capacity. PNC opens up a whole new research area because of its implications and new design requirements for the physical, MAC, and network layers of ad hoc wireless stations. The resolution of the many outstanding but interesting issues in PNC may lead to a revolutionary new paradigm for wireless ad hoc networking.", "title": "" }, { "docid": "18827ff3d37d293846f37cbed65f7a09", "text": "The growth of Instagram continues, with the majority of its users being young women. This study investigates the impact of Instagram upon source credibility, consumer buying intention and social identification with different types of celebrities. In-depth interviews were conducted with 18 female Instagram users aged 18-30 to determine the extent to which Instagram influences their buying behaviour. The research findings show that celebrities on Instagram are influential in the purchase behaviour of young female users. However, non-traditional celebrities such as bloggers, YouTube personalities and ‘Instafamous’ profiles are more powerful, as participants regard them as more credible and are able to relate to these, rather than more traditional, celebrities. Female users are perceptively aware and prefer to follow Instagram profiles that intentionally portray positive images and provide encouraging reviews.", "title": "" }, { "docid": "8b947250873921478dd7798c47314979", "text": "In this letter, an ultra-wideband (UWB) bandpass filter (BPF) using stepped-impedance stub-loaded resonator (SISLR) is presented. Characterized by theoretical analysis, the proposed SISLR is found to have the advantage of providing more degrees of freedom to adjust the resonant frequencies. Besides, two transmission zeros can be created at both lower and upper sides of the passband. Benefiting from these features, a UWB BPF is then investigated by incorporating this SISLR and two aperture-backed interdigital coupled-lines. Finally, this filter is built and tested. The simulated and measured results are in good agreement with each other, showing good wideband filtering performance with sharp rejection skirts outside the passband.", "title": "" }, { "docid": "2a5f555c00d98a87fe8dd6d10e27dc38", "text": "Neurodegeneration is a phenomenon that occurs in the central nervous system through the hallmarks associating the loss of neuronal structure and function. Neurodegeneration is observed after viral insult and mostly in various so-called 'neurodegenerative diseases', generally observed in the elderly, such as Alzheimer's disease, multiple sclerosis, Parkinson's disease and amyotrophic lateral sclerosis that negatively affect mental and physical functioning. Causative agents of neurodegeneration have yet to be identified. However, recent data have identified the inflammatory process as being closely linked with multiple neurodegenerative pathways, which are associated with depression, a consequence of neurodegenerative disease. Accordingly, pro‑inflammatory cytokines are important in the pathophysiology of depression and dementia. These data suggest that the role of neuroinflammation in neurodegeneration must be fully elucidated, since pro‑inflammatory agents, which are the causative effects of neuroinflammation, occur widely, particularly in the elderly in whom inflammatory mechanisms are linked to the pathogenesis of functional and mental impairments. In this review, we investigated the role played by the inflammatory process in neurodegenerative diseases.", "title": "" }, { "docid": "5cdb945589f528d28fe6d0dce360a0e1", "text": "Bankruptcy prediction has been a subject of interests for almost a century and it still ranks high among hottest topics in economics. The aim of predicting financial distress is to develop a predictive model that combines various econometric measures and allows to foresee a financial condition of a firm. In this domain various methods were proposed that were based on statistical hypothesis testing, statistical modelling (e.g., generalized linear models), and recently artificial intelligence (e.g., neural networks, Support Vector Machines, decision tress). In this paper, we propose a novel approach for bankruptcy prediction that utilizes Extreme Gradient Boosting for learning an ensemble of decision trees. Additionally, in order to reflect higher-order statistics in data and impose a prior knowledge about data representation, we introduce a new concept that we refer as to synthetic features. A synthetic feature is a combination of the econometric measures using arithmetic operations (addition, subtraction, multiplication, division). Each synthetic feature can be seen as a single regression model that is developed in an evolutionary manner. We evaluate our solution using the collected data about Polish companies in five tasks corresponding to the bankruptcy prediction in the 1st, 2nd, 3rd, 4th, and 5th year. We compare our approach with the reference methods. ∗Corresponding author, Tel.: (+48) 71 320 44 53. Email addresses: maciej.zieba@pwr.edu.pl (Maciej Zięba ), sebastian.tomczak@pwr.edu.pl (Sebastian K. Tomczak), jakub.tomczak@pwr.edu.pl (Jakub M. Tomczak) Preprint submitted to Expert Systems with Applications April 4, 2016", "title": "" }, { "docid": "a936b6d3b0f4a99042260abea0f39032", "text": "In this paper, a new type of 3D bin packing problem (BPP) is proposed, in which a number of cuboidshaped items must be put into a bin one by one orthogonally. The objective is to find a way to place these items that can minimize the surface area of the bin. This problem is based on the fact that there is no fixed-sized bin in many real business scenarios and the cost of a bin is proportional to its surface area. Our research shows that this problem is NP-hard. Based on previous research on 3D BPP, the surface area is determined by the sequence, spatial locations and orientations of items. Among these factors, the sequence of items plays a key role in minimizing the surface area. Inspired by recent achievements of deep reinforcement learning (DRL) techniques, especially Pointer Network, on combinatorial optimization problems such as TSP, a DRL-based method is applied to optimize the sequence of items to be packed into the bin. Numerical results show that the method proposed in this paper achieve about 5% improvement than heuristic method.", "title": "" }, { "docid": "9a071b23eb370f053a5ecfd65f4a847d", "text": "INTRODUCTION\nConcomitant obesity significantly impairs asthma control. Obese asthmatics show more severe symptoms and an increased use of medications.\n\n\nOBJECTIVES\nThe primary aim of the study was to identify genes that are differentially expressed in the peripheral blood of asthmatic patients with obesity, asthmatic patients with normal body mass, and obese patients without asthma. Secondly, we investigated whether the analysis of gene expression in peripheral blood may be helpful in the differential diagnosis of obese patients who present with symptoms similar to asthma.\n\n\nPATIENTS AND METHODS\nThe study group included 15 patients with asthma (9 obese and 6 normal-weight patients), while the control group-13 obese patients in whom asthma was excluded. The analysis of whole-genome expression was performed on RNA samples isolated from peripheral blood.\n\n\nRESULTS\nThe comparison of gene expression profiles between asthmatic patients with obesity and those with normal body mass revealed a significant difference in 6 genes. The comparison of the expression between controls and normal-weight patients with asthma showed a significant difference in 23 genes. The analysis of genes with a different expression revealed a group of transcripts that may be related to an increased body mass (PI3, LOC100008589, RPS6KA3, LOC441763, IFIT1, and LOC100133565). Based on gene expression results, a prediction model was constructed, which allowed to correctly classify 92% of obese controls and 89% of obese asthmatic patients, resulting in the overall accuracy of the model of 90.9%.\n\n\nCONCLUSIONS\nThe results of our study showed significant differences in gene expression between obese asthmatic patients compared with asthmatic patients with normal body mass as well as in obese patients without asthma compared with asthmatic patients with normal body mass.", "title": "" }, { "docid": "075e263303b73ee5d1ed6cff026aee63", "text": "Automatic and accurate whole-heart and great vessel segmentation from 3D cardiac magnetic resonance (MR) images plays an important role in the computer-assisted diagnosis and treatment of cardiovascular disease. However, this task is very challenging due to ambiguous cardiac borders and large anatomical variations among different subjects. In this paper, we propose a novel densely-connected volumetric convolutional neural network, referred as DenseVoxNet, to automatically segment the cardiac and vascular structures from 3D cardiac MR images. The DenseVoxNet adopts the 3D fully convolutional architecture for effective volume-to-volume prediction. From the learning perspective, our DenseVoxNet has three compelling advantages. First, it preserves the maximum information flow between layers by a densely-connected mechanism and hence eases the network training. Second, it avoids learning redundant feature maps by encouraging feature reuse and hence requires fewer parameters to achieve high performance, which is essential for medical applications with limited training data. Third, we add auxiliary side paths to strengthen the gradient propagation and stabilize the learning process. We demonstrate the effectiveness of DenseVoxNet by comparing it with the state-of-the-art approaches from HVSMR 2016 challenge in conjunction with MICCAI, and our network achieves the best dice coefficient. We also show that our network can achieve better performance than other 3D ConvNets but with fewer parameters.", "title": "" }, { "docid": "cf419597981ba159ac3c1e85af683871", "text": "Energy is a vital input for social and economic development. As a result of the generalization of agricultural, industrial and domestic activities the demand for energy has increased remarkably, especially in emergent countries. This has meant rapid grower in the level of greenhouse gas emissions and the increase in fuel prices, which are the main driving forces behind efforts to utilize renewable energy sources more effectively, i.e. energy which comes from natural resources and is also naturally replenished. Despite the obvious advantages of renewable energy, it presents important drawbacks, such as the discontinuity of ulti-criteria decision analysis", "title": "" }, { "docid": "8e52cdff14dddd82a4ad8fc5b967c1b2", "text": "Learning-based binary hashing has become a powerful paradigm for fast search and retrieval in massive databases. However, due to the requirement of discrete outputs for the hash functions, learning such functions is known to be very challenging. In addition, the objective functions adopted by existing hashing techniques are mostly chosen heuristically. In this paper, we propose a novel generative approach to learn hash functions through Minimum Description Length principle such that the learned hash codes maximally compress the dataset and can also be used to regenerate the inputs. We also develop an efficient learning algorithm based on the stochastic distributional gradient, which avoids the notorious difficulty caused by binary output constraints, to jointly optimize the parameters of the hash function and the associated generative model. Extensive experiments on a variety of large-scale datasets show that the proposed method achieves better retrieval results than the existing state-of-the-art methods.", "title": "" }, { "docid": "7ea56b976524d77b7234340318f7e8dc", "text": "Market Integration and Market Structure in the European Soft Drinks Industry: Always Coca-Cola? by Catherine Matraves* This paper focuses on the question of European integration, considering whether the geographic level at which competition takes place differs across the two major segments of the soft drinks industry: carbonated soft drinks and mineral water. Our evidence shows firms are competing at the European level in both segments. Interestingly, the European market is being integrated through corporate strategy, defined as increased multinationality, rather than increased trade flows. To interpret these results, this paper uses the new theory of market structure where the essential notion is that in endogenous sunk cost industries such as soft drinks, the traditional inverse structure-size relation may break down, due to the escalation of overhead expenditures.", "title": "" }, { "docid": "df35b679204e0729266a1076685600a1", "text": "A new innovations state space modeling framework, incorporating Box-Cox transformations, Fourier series with time varying coefficients and ARMA error correction, is introduced for forecasting complex seasonal time series that cannot be handled using existing forecasting models. Such complex time series include time series with multiple seasonal periods, high frequency seasonality, non-integer seasonality and dual-calendar effects. Our new modelling framework provides an alternative to existing exponential smoothing models, and is shown to have many advantages. The methods for initialization and estimation, including likelihood evaluation, are presented, and analytical expressions for point forecasts and interval predictions under the assumption of Gaussian errors are derived, leading to a simple, comprehensible approach to forecasting complex seasonal time series. Our trigonometric formulation is also presented as a means of decomposing complex seasonal time series, which cannot be decomposed using any of the existing decomposition methods. The approach is useful in a broad range of applications, and we illustrate its versatility in three empirical studies where it demonstrates excellent forecasting performance over a range of prediction horizons. In addition, we show that our trigonometric decomposition leads to the identification and extraction of seasonal components, which are otherwise not apparent in the time series plot itself.", "title": "" }, { "docid": "89d736c68d2befba66a0b7d876e52502", "text": "The optical properties of human skin, subcutaneous adipose tissue and human mucosa were measured in the wavelength range 400–2000 nm. The measurements were carried out using a commercially available spectrophotometer with an integrating sphere. The inverse adding–doubling method was used to determine the absorption and reduced scattering coefficients from the measurements.", "title": "" }, { "docid": "b27ac6851bb576cac1c8d2f7e76fc8f1", "text": "A novel 3-dimensional Dual Control-gate with Surrounding Floating-gate (DC-SF) NAND flash cell has been successfully developed, for the first time. The DC-SF cell consists of a surrounding floating gate with stacked dual control gate. With this structure, high coupling ratio, low voltage cell operation (program: 15V and erase: −11V), and wide P/E window (9.2V) can be obtained. Moreover, negligible FG-FG interference (12mV/V) is achieved due to the control gate shield effect. Then we propose 3D DC-SF NAND flash cell as the most promising candidate for 1Tb and beyond with stacked multi bit FG cell (2 ∼ 4bit/cell).", "title": "" }, { "docid": "aa50aeb6c1c4b52ff677a313d49fd8df", "text": "Monocular depth estimation, which plays a key role in understanding 3D scene geometry, is fundamentally an illposed problem. Existing methods based on deep convolutional neural networks (DCNNs) have examined this problem by learning convolutional networks to estimate continuous depth maps from monocular images. However, we find that training a network to predict a high spatial resolution continuous depth map often suffers from poor local solutions. In this paper, we hypothesize that achieving a compromise between spatial and depth resolutions can improve network training. Based on this “compromise principle”, we propose a regression-classification cascaded network (RCCN), which consists of a regression branch predicting a low spatial resolution continuous depth map and a classification branch predicting a high spatial resolution discrete depth map. The two branches form a cascaded structure allowing the main classification branch to benefit from the auxiliary regression branch. By leveraging large-scale raw training datasets and some data augmentation strategies, our network achieves competitive or state-of-the-art results on three challenging benchmarks, including NYU Depth V2 [1], KITTI [2], and Make3D [3].", "title": "" }, { "docid": "8d7f2c3d2b0a02f6ad571ae44a6f7a9f", "text": "Synthetic Aperture Radar (SAR) satellite images have proven to be a successful tool for identifying oil slicks. Natural oil seeps can be detected as elongated, radar-dark slicks in SAR images. Use of SAR images for seep detection is enhanced by a Texture Classifying Neural Network Algorithm (TCNNA), which delineates areas where layers of floating oil suppress Bragg scattering. The effect is strongly influenced by wind strength and sea state. A multi orientation Leung-Malik filter bank [1] is used to identify slick shapes under projection of edges. By integrating ancillary data consisting of the incidence angle, descriptors of texture and environmental variables, considerable accuracy were added to the classification ability to discriminate false targets from oil slicks and look-alike pixels. The reliability of the TCNNA is measured after processing 71 images containing oil slicks.", "title": "" }, { "docid": "f0659349cab12decbc4d07eb74361b79", "text": "This article suggests that the context and process of resource selection have an important influence on firm heterogeneity and sustainable competitive advantage. It is argued that a firm’s sustainable advantage depends on its ability to manage the institutional context of its resource decisions. A firm’s institutional context includes its internal culture as well as broader influences from the state, society, and interfirm relations that define socially acceptable economic behavior. A process model of firm heterogeneity is proposed that combines the insights of a resourcebased view with the institutional perspective from organization theory. Normative rationality, institutional isolating mechanisms, and institutional sources of firm homogeneity are proposed as determinants of rent potential that complement and extend resource-based explanations of firm variation and sustainable competitive advantage. The article suggests that both resource capital and institutional capital are indispensable to sustainable competitive advantage.  1997 by John Wiley & Sons, Ltd.", "title": "" }, { "docid": "66133239610bb08d83fb37f2c11a8dc5", "text": "sists of two excitation laser beams. One beam scans the volume of the brain from the side of a horizontally positioned zebrafish but is rapidly switched off when inside an elliptical exclusion region located over the eye (Fig. 1b). Simultaneously, a second beam scans from the front, to cover the forebrain and the regions between the eyes. Together, these two beams achieve nearly complete coverage of the brain without exposing the retina to direct laser excitation, which allows unimpeded presentation of visual stimuli that are projected onto a screen below the fish. To monitor intended swimming behavior, we used existing methods for recording activity from motor neuron axons in the tail of paralyzed larval zebrafish1 (Fig. 1a and Supplementary Note). This system provides imaging speeds of up to three brain volumes per second (40 planes per brain volume); increases in camera speed will allow for faster volumetric sampling. Because light-sheet imaging may still introduce some additional sensory stimulation (excitation light scattering in the brain and reflected from the glass walls of the chamber), we assessed whether fictive behavior in 5–7 d post-fertilization (d.p.f.) fish was robust to the presence of the light sheets. We tested two visuoLight-sheet functional imaging in fictively behaving zebrafish", "title": "" }, { "docid": "109644763e3a5ee5f59ec8e83719cc8d", "text": "The field of Natural Language Processing (NLP) is growing rapidly, with new research published daily along with an abundance of tutorials, codebases and other online resources. In order to learn this dynamic field or stay up-to-date on the latest research, students as well as educators and researchers must constantly sift through multiple sources to find valuable, relevant information. To address this situation, we introduce TutorialBank, a new, publicly available dataset which aims to facilitate NLP education and research. We have manually collected and categorized over 6,300 resources on NLP as well as the related fields of Artificial Intelligence (AI), Machine Learning (ML) and Information Retrieval (IR). Our dataset is notably the largest manually-picked corpus of resources intended for NLP education which does not include only academic papers. Additionally, we have created both a search engine 1 and a command-line tool for the resources and have annotated the corpus to include lists of research topics, relevant resources for each topic, prerequisite relations among topics, relevant subparts of individual resources, among other annotations. We are releasing the dataset and present several avenues for further research.", "title": "" }, { "docid": "bf00f7d7cdcbdc3e9d082bf92eec075c", "text": "Network software is a critical component of any distributed system. Because of its complexity, network software is commonly layered into a hierarchy of protocols, or more generally, into a protocol graph. Typical protocol graphs—including those standardized in the ISO and TCP/IP network architectures—share three important properties; the protocol graph is simple, the nodes of the graph (protocols) encapsulate complex functionality, and the topology of the graph is relatively static. This paper describes a new way to organize network software that differs from conventional architectures in all three of these properties. In our approach, the protocol graph is complex, individual protocols encapsulate a single function, and the topology of the graph is dynamic. The main contribution of this paper is to describe the ideas behind our new architecture, illustrate the advantages of using the architecture, and demonstrate that the architecture results in efficient network software.", "title": "" } ]
scidocsrr
7c6962f955fef9a1cce3c32f8237b476
The effect of organizational support on ERP implementation
[ { "docid": "e964a46706179a92b775307166a64c8a", "text": "I general, perceptions of information systems (IS) success have been investigated within two primary research streams—the user satisfaction literature and the technology acceptance literature. These two approaches have been developed in parallel and have not been reconciled or integrated. This paper develops an integrated research model that distinguishes beliefs and attitudes about the system (i.e., object-based beliefs and attitudes) from beliefs and attitudes about using the system (i.e., behavioral beliefs and attitudes) to build the theoretical logic that links the user satisfaction and technology acceptance literature. The model is then tested using a sample of 465 users from seven different organizations who completed a survey regarding their use of data warehousing software. The proposed model was supported, providing preliminary evidence that the two perspectives can and should be integrated. The integrated model helps build the bridge from design and implementation decisions to system characteristics (a core strength of the user satisfaction literature) to the prediction of usage (a core strength of the technology acceptance literature).", "title": "" } ]
[ { "docid": "f6ba46b72139f61cfb098656d71553ed", "text": "This paper introduces the Voice Conversion Octave Toolbox made available to the public as open source. The first version of the toolbox features tools for VTLN-based voice conversion supporting a variety of warping functions. The authors describe the implemented functionality and how to configure the included tools.", "title": "" }, { "docid": "51d950dfb9f71b9c8948198c147b9884", "text": "Collaborative filtering is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it cannot make recommendations for so-called cold start users that have rated only a very small number of items. In addition, these methods do not know how confident they are in their recommendations. Trust-based recommendation methods assume the additional knowledge of a trust network among users and can better deal with cold start users, since users only need to be simply connected to the trust network. On the other hand, the sparsity of the user item ratings forces the trust-based approach to consider ratings of indirect neighbors that are only weakly trusted, which may decrease its precision. In order to find a good trade-off, we propose a random walk model combining the trust-based and the collaborative filtering approach for recommendation. The random walk model allows us to define and to measure the confidence of a recommendation. We performed an evaluation on the Epinions dataset and compared our model with existing trust-based and collaborative filtering methods.", "title": "" }, { "docid": "30d6cab338420bc48b93aeb70d3e72c0", "text": "This paper presents a real-time video traffic monitoring application based on object detection and tracking, for determining traffic parameters such as vehicle velocity and number of vehicles. In detection step, background modeling approach based on edge information is proposed for separating moving foreground objects from the background. An advantage of edge is more robust to lighting changes in outdoor environments and requires significantly less computing resource. In tracking step, optical flow Lucas-Kanade (Pyramid) is applied to track each segmented object. The proposed system was evaluated on six video sequences recorded in various daytime environment", "title": "" }, { "docid": "26d6ffbc4ee2e0f5e3e6699fd33bdc5f", "text": "We present a method for efficient learning of control policies for multiple related robotic motor skills. Our approach consists of two stages, joint training and specialization training. During the joint training stage, a neural network policy is trained with minimal information to disambiguate the motor skills. This forces the policy to learn a common representation of the different tasks. Then, during the specialization training stage we selectively split the weights of the policy based on a per-weight metric that measures the disagreement among the multiple tasks. By splitting part of the control policy, it can be further trained to specialize to each task. To update the control policy during learning, we use Trust Region Policy Optimization with Generalized Advantage Function (TRPOGAE). We propose a modification to the gradient update stage of TRPO to better accommodate multi-task learning scenarios. We evaluate our approach on three continuous motor skill learning problems in simulation: 1) a locomotion task where three single legged robots with considerable difference in shape and size are trained to hop forward, 2) a manipulation task where three robot manipulators with different sizes and joint types are trained to reach different locations in 3D space, and 3) locomotion of a two-legged robot, whose range of motion of one leg is constrained in different ways. We compare our training method to three baselines. The first baseline uses only jointtraining for the policy, the second trains independent policies for each task, and the last randomly selects weights to split. We show that our approach learns more efficiently than each of the baseline methods.", "title": "" }, { "docid": "0f505d193991bd0e3186409290e56217", "text": "This stamp, honoring a Mexican artist who has transcended “la frontera” and has become and icon to Hispanics, feminists, and art lovers, will be a further reminder of the continuous cultural contributions of Latinos to the United States. (Cecilia Alvear, President of National Association of Hispanic Journalists (NAHJ) on the occasion of the introduction of the Frida Kahlo U.S. postage stamp; 2001; emphasis added)", "title": "" }, { "docid": "2c0a4b5c819a8fcfd5a9ab92f59c311e", "text": "Line starting capability of Synchronous Reluctance Motors (SynRM) is a crucial challenge in their design that if solved, could lead to a valuable category of motors. In this paper, the so-called crawling effect as a potential problem in Line-Start Synchronous Reluctance Motors (LS-SynRM) is analyzed. Two interfering scenarios on LS-SynRM start-up are introduced and one of them is treated in detail by constructing the asynchronous model of the motor. In the third section, a definition of this phenomenon is given utilizing a sample cage configuration. The LS-SynRM model and characteristics are compared with that of a reference induction motor (IM) in all sections of this work to convey a better perception of successful and unsuccessful synchronization consequences to the reader. Several important post effects of crawling on motor performance are discussed in the rest of the paper to evaluate how it would influence the motor operation. All simulations have been performed using Finite Element Analysis (FEA).", "title": "" }, { "docid": "7277ab3a4228a9f266549952fc668afd", "text": "Anomaly detection in a WSN is an important aspect of data analysis in order to identify data items that significantly differ from normal data. A characteristic of the data generated by a WSN is that the data distribution may alter over the lifetime of the network due to the changing nature of the phenomenon being observed. Anomaly detection techniques must be able to adapt to a non-stationary data distribution in order to perform optimally. In this survey, we provide a comprehensive overview of approaches to anomaly detection in a WSN and their operation in a non-stationary environment.", "title": "" }, { "docid": "d2d7595f04af96d7499d7b7c06ba2608", "text": "Deep Neural Network (DNN) is a widely used deep learning technique. How to ensure the safety of DNN-based system is a critical problem for the research and application of DNN. Robustness is an important safety property of DNN. However, existing work of verifying DNN’s robustness is timeconsuming and hard to scale to large-scale DNNs. In this paper, we propose a boosting method for DNN robustness verification, aiming to find counter-examples earlier. Our observation is DNN’s different inputs have different possibilities of existing counter-examples around them, and the input with a small difference between the largest output value and the second largest output value tends to be the achilles’s heel of the DNN. We have implemented our method and applied it on Reluplex, a state-ofthe-art DNN verification tool, and four DNN attacking methods. The results of the extensive experiments on two benchmarks indicate the effectiveness of our boosting method.", "title": "" }, { "docid": "01572c84840fe3449dca555a087d2551", "text": "A printed two-multiple-input multiple-output (MIMO)-antenna system incorporating a neutralization line for antenna port decoupling for wireless USB-dongle applications is proposed. The two monopoles are located on the two opposite corners of the system PCB and spaced apart by a small ground portion, which serves as a layout area for antenna feeding network and connectors for the use of standalone antennas as an optional scheme. It was found that by removing only 1.5 mm long inwards from the top edge in the small ground portion and connecting the two antennas therein with a thin printed line, the antenna port isolation can be effectively improved. The neutralization line in this study occupies very little board space, and the design requires no conventional modification to the ground plane for mitigating mutual coupling. The behavior of the neutralization line was rigorously analyzed, and the MIMO characteristics of the proposed antennas was also studied and tested in the reverberation chamber. Details of the constructed prototype are described and discussed in this paper.", "title": "" }, { "docid": "3503074668bd55868f86a99a8a171073", "text": "Deep Neural Networks (DNNs) provide state-of-the-art solutions in several difficult machine perceptual tasks. However, their performance relies on the availability of a large set of labeled training data, which limits the breadth of their applicability. Hence, there is a need for new semisupervised learning methods for DNNs that can leverage both (a small amount of) labeled and unlabeled training data. In this paper, we develop a general loss function enabling DNNs of any topology to be trained in a semi-supervised manner without extra hyper-parameters. As opposed to current semi-supervised techniques based on topology-specific or unstable approaches, ours is both robust and general. We demonstrate that our approach reaches state-of-the-art performance on the SVHN (9.82% test error, with 500 labels and wide Resnet) and CIFAR10 (16.38% test error, with 8000 labels and sigmoid convolutional neural network) data sets.", "title": "" }, { "docid": "6d2449941d27774451edde784d3521fe", "text": "Convolutional neural networks (CNNs) have recently been applied to the optical flow estimation problem. As training the CNNs requires sufficiently large amounts of labeled data, existing approaches resort to synthetic, unrealistic datasets. On the other hand, unsupervised methods are capable of leveraging real-world videos for training where the ground truth flow fields are not available. These methods, however, rely on the fundamental assumptions of brightness constancy and spatial smoothness priors that do not hold near motion boundaries. In this paper, we propose to exploit unlabeled videos for semi-supervised learning of optical flow with a Generative Adversarial Network. Our key insight is that the adversarial loss can capture the structural patterns of flow warp errors without making explicit assumptions. Extensive experiments on benchmark datasets demonstrate that the proposed semi-supervised algorithm performs favorably against purely supervised and baseline semi-supervised learning schemes.", "title": "" }, { "docid": "bd3dd79aa5ecb5815b7ca4d461578f20", "text": "Deep Reinforcement Learning (RL) recently emerged as one of the most competitive approaches for learning in sequential decision making problems with fully observable environments, e.g., computer Go. However, very little work has been done in deep RL to handle partially observable environments. We propose a new architecture called Action-specific Deep Recurrent QNetwork (ADRQN) to enhance learning performance in partially observable domains. Actions are encoded by a fully connected layer and coupled with a convolutional observation to form an action-observation pair. The time series of actionobservation pairs are then integrated by an LSTM layer that learns latent states based on which a fully connected layer computes Q-values as in conventional Deep Q-Networks (DQNs). We demonstrate the effectiveness of our new architecture in several partially observable domains, including flickering Atari games.", "title": "" }, { "docid": "1a11a6cb0795d432ecdbb5ab4a540a43", "text": "This article offers a critical examination and reassessment of the history of CALL, and argues for three new categories—Restricted, Open and Integrated CALL. It offers definitions and description of the three approaches and argues that they allow a more detailed analysis of institutions and classrooms than earlier analyses. It is suggested that we are currently using the second approach, Open CALL, but that our aim should be to attain a state of ‘normalisation’ in which the technology is invisible and truly integrated. This state is defined and discussed. In the final section the article proposes some ways in which this normalisation can be achieved—using ethnographic assessments and action research, for example—thus setting an agenda for CALL practice in the future. # 2003 Elsevier Science Ltd. All rights reserved.", "title": "" }, { "docid": "375de005698ccaf54d7b82875f1f16c5", "text": "This paper describes design, Simulation and manufacturing procedures of HIRAD - a teleoperated Tracked Surveillance UGV for military, Rescue and other civilian missions in various hazardous environments. A Double Stabilizer Flipper mechanism mounted on front pulleys enables the Robot to have good performance in travelling over uneven terrains and climbing stairs. Using this Stabilizer flipper mechanism reduces energy consumption while climbing the stairs or crossing over obstacles. The locomotion system mechanical design is also described in detail. The CAD geometry 3D-model has been produced by CATIA software. To analyze the system mobility, a virtual model was developed with ADAMS Software. This simulation included different mobility maneuvers such as stair climbing, gap crossing and travelling over steep slopes. The simulations enabled us to define motor torque requirements. We performed many experiments with manufactured prototype under various terrain conditions Such as stair climbing, gap crossing and slope elevation. In experiments, HIRAD shows good overcoming ability for the tested terrain conditions.", "title": "" }, { "docid": "9e65315d4e241dc8d4ea777247f7c733", "text": "A long-standing focus on compliance has traditionally constrained development of fundamental design changes for Electronic Health Records (EHRs). We now face a critical need for such innovation, as personalization and data science prompt patients to engage in the details of their healthcare and restore agency over their medical data. In this paper, we propose MedRec: a novel, decentralized record management system to handle EHRs, using blockchain technology. Our system gives patients a comprehensive, immutable log and easy access to their medical information across providers and treatment sites. Leveraging unique blockchain properties, MedRec manages authentication, confidentiality, accountability and data sharing—crucial considerations when handling sensitive information. A modular design integrates with providers' existing, local data storage solutions, facilitating interoperability and making our system convenient and adaptable. We incentivize medical stakeholders (researchers, public health authorities, etc.) to participate in the network as blockchain “miners”. This provides them with access to aggregate, anonymized data as mining rewards, in return for sustaining and securing the network via Proof of Work. MedRec thus enables the emergence of data economics, supplying big data to empower researchers while engaging patients and providers in the choice to release metadata. The purpose of this paper is to expose, in preparation for field tests, a working prototype through which we analyze and discuss our approach and the potential for blockchain in health IT and research.", "title": "" }, { "docid": "61aa40b1119dcc636c2f4a15a64ffce3", "text": "While online product reviews are valuable sources of information to facilitate consumers’ purchase decisions, it is deemed meaningful and important to distinguish helpful reviews from unhelpful ones for consumers facing huge amounts of reviews nowadays. Thus, in light of review classification, this paper proposes a novel approach to identifying review helpfulness. In doing so, a Bayesian inference is introduced to estimate the probabilities of the reviews belonging to respective classes, which differs from the traditional approach that only assigns class labels in a binary manner. Furthermore, an extended fuzzy associative classifier, namely GARCfp, is developed to train review helpfulness classification models based on review class probabilities and fuzzily partitioned review feature values. Finally, data experiments conducted on the reviews from amazon.com reveal the effectiveness of the proposed approach.", "title": "" }, { "docid": "a646dd3603e0204f0eccdf24c415b3be", "text": "A new re¯ow parameter, heating factor (Q g), which is de®ned as the integral of the measured temperature over the dwell time above liquidus, has been proposed in this report. It can suitably represent the combined e€ect of both temperature and time in usual re¯ow process. Relationship between reliability of the micro-ball grid array (micro-BGA) package and heating factor has been discussed. The fatigue failure of micro-BGA solder joints re¯owed with di€erent heating factor in nitrogen ambient has been investigated using the bending cycle test. The fatigue lifetime of the micro-BGA assemblies ®rstly increases and then decreases with increasing heating factor. The greatest lifetime happens at Q g near 500 s °C. The optimal Q g range is between 300 and 750 s °C. In this range, the lifetime of the micro-BGA assemblies is greater than 4500 cycles. SEM micrographs reveal that cracks always initiate at the point of the acute angle where the solder joint joins the PCB pad.", "title": "" }, { "docid": "051d402ce90d7d326cc567e228c8411f", "text": "CDM ESD event has become the main ESD reliability concern for integrated-circuits products using nanoscale CMOS technology. A novel CDM ESD protection design, using self-biased current trigger (SBCT) and source pumping, has been proposed and successfully verified in 0.13-lm CMOS technology to achieve 1-kV CDM ESD robustness. 2007 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "dbcef163643232313207cd45402158de", "text": "Every industry has significant data output as a product of their working process, and with the recent advent of big data mining and integrated data warehousing it is the case for a robust methodology for assessing the quality for sustainable and consistent processing. In this paper a review is conducted on Data Quality (DQ) in multiple domains in order to propose connections between their methodologies. This critical review suggests that within the process of DQ assessment of heterogeneous data sets, not often are they treated as separate types of data in need of an alternate data quality assessment framework. We discuss the need for such a directed DQ framework and the opportunities that are foreseen in this research area and propose to address it through degrees of heterogeneity.", "title": "" }, { "docid": "1eea111c3efcc67fcc1bb6f358622475", "text": "Methyl Cellosolve (the monomethyl ether of ethylene glycol) has been widely used as the organic solvent in ninhydrin reagents for amino acid analysis; it has, however, properties that are disadvantageous in a reagent for everyday employment. The solvent is toxic and it is difficult to keep the ether peroxide-free. A continuing effort to arrive at a chemically preferable and relatively nontoxic substitute for methyl Cellosolve has led to experiments with dimethyl s&oxide, which proves to be a better solvent for the reduced form of ninhydrin (hydrindantin) than is methyl Cellosolve. Dimethyl sulfoxide can replace the latter, volume for volume, in a ninhydrin reagent mixture that gives equal performance and has improved stability. The result is a ninhydrin-hydrindantin solution in 75% dimethyl sulfoxide25 % 4 M lithium acetate buffer at pH 5.2. This type of mixture, with appropriate hydrindantin concentrations, is recommended to replace methyl Cellosolve-containing reagents in the quantitative determination of amino acids by automatic analyzers and by the manual ninhydrin method.", "title": "" } ]
scidocsrr
13b3b07f24bbf66a2f40f19c8b240723
PPSGen : Learning to Generate Presentation Slides for
[ { "docid": "c8768e560af11068890cc097f1255474", "text": "Abstract This paper describes the functionality of MEAD, a comprehensive, public domain, open source, multidocument multilingual summarization environment that has been thus far downloaded by more than 500 organizations. MEAD has been used in a variety of summarization applications ranging from summarization for mobile devices to Web page summarization within a search engine and to novelty detection.", "title": "" } ]
[ { "docid": "f94ef71233db13830d29ef9a0802f140", "text": "In deterministic optimization, line searches are a standard tool ensuring stability and efficiency. Where only stochastic gradients are available, no direct equivalent has so far been formulated, because uncertain gradients do not allow for a strict sequence of decisions collapsing the search space. We construct a probabilistic line search by combining the structure of existing deterministic methods with notions from Bayesian optimization. Our method retains a Gaussian process surrogate of the univariate optimization objective, and uses a probabilistic belief over the Wolfe conditions to monitor the descent. The algorithm has very low computational cost, and no user-controlled parameters. Experiments show that it effectively removes the need to define a learning rate for stochastic gradient descent.", "title": "" }, { "docid": "2e088ce4f7e5b3633fa904eab7563875", "text": "Large numbers of websites have started to markup their content using standards such as Microdata, Microformats, and RDFa. The marked-up content elements comprise descriptions of people, organizations, places, events, products, ratings, and reviews. This development has accelerated in last years as major search engines such as Google, Bing and Yahoo! use the markup to improve their search results. Embedding semantic markup facilitates identifying content elements on webpages. However, the markup is mostly not as fine-grained as desirable for applications that aim to integrate data from large numbers of websites. This paper discusses the challenges that arise in the task of integrating descriptions of electronic products from several thousand e-shops that offer Microdata markup. We present a solution for each step of the data integration process including Microdata extraction, product classification, product feature extraction, identity resolution, and data fusion. We evaluate our processing pipeline using 1.9 million product offers from 9240 e-shops which we extracted from the Common Crawl 2012, a large public Web corpus.", "title": "" }, { "docid": "23190a7fed3673af72563627245d57cd", "text": "We demonstrate an end-to-end question answering system that integrates BERT with the open-source Anserini information retrieval toolkit. In contrast to most question answering and reading comprehension models today, which operate over small amounts of input text, our system integrates best practices from IR with a BERT-based reader to identify answers from a large corpus of Wikipedia articles in an end-to-end fashion. We report large improvements over previous results on a standard benchmark test collection, showing that fine-tuning pretrained BERT with SQuAD is sufficient to achieve high accuracy in identifying answer spans.", "title": "" }, { "docid": "4d429f5f5d46dc1beb9b681c4578f34a", "text": "Recently, many digital service providers started to gamify their services to promote continued service usage. Although gamification has drawn attention in both practice and research, it remains unclear how users experience gamified services and how these gameful experiences may increase service usage. This research adopts a user-centered perspective to reveal the underlying gameful experience dimensions during gamified service usage and how they drive continued service usage. Findings from Study 1 – a survey with 148 app-users – reveal four essential gameful experience dimensions (skill development, social comparison, social connectedness, and expressive freedom) and how they relate to game mechanics. Study 2, which is based on a survey among 821 app-users, shows that gameful experiences trigger continued service usage through two different types of motivation, namely autonomous and controlled motivation.", "title": "" }, { "docid": "42613c6a08ce7d86f81ec51255a1071d", "text": "Happiness and other emotions spread between people in direct contact, but it is unclear whether massive online social networks also contribute to this spread. Here, we elaborate a novel method for measuring the contagion of emotional expression. With data from millions of Facebook users, we show that rainfall directly influences the emotional content of their status messages, and it also affects the status messages of friends in other cities who are not experiencing rainfall. For every one person affected directly, rainfall alters the emotional expression of about one to two other people, suggesting that online social networks may magnify the intensity of global emotional synchrony.", "title": "" }, { "docid": "f7d30db4b04b33676d386953aebf503c", "text": "Microvascular free flap transfer currently represents one of the most popular methods for mandibularreconstruction. With the various free flap options nowavailable, there is a general consensus that no single kindof osseous or osteocutaneous flap can resolve the entire spectrum of mandibular defects. A suitable flap, therefore, should be selected according to the specific type of bone and soft tissue defect. We have developed an algorithm for mandibular reconstruction, in which the bony defect is termed as either “lateral” or “anterior” and the soft-tissue defect is classified as “none,” “skin or mucosal,” or “through-and-through.” For proper flap selection, the bony defect condition should be considered first, followed by the soft-tissue defect condition. When the bony defect is “lateral” and the soft tissue is not defective, the ilium is the best choice. When the bony defect is “lateral” and a small “skin or mucosal” soft-tissue defect is present, the fibula represents the optimal choice. When the bony defect is “lateral” and an extensive “skin or mucosal” or “through-and-through” soft-tissue defect exists, the scapula should be selected. When the bony defect is “anterior,” the fibula should always be selected. However, when an “anterior” bone defect also displays an “extensive” or “through-and-through” soft-tissue defect, the fibula should be usedwith other soft-tissue flaps. Flaps such as a forearm flap, anterior thigh flap, or rectus abdominis musculocutaneous flap are suitable, depending on the size of the soft-tissue defect.", "title": "" }, { "docid": "ada7b43edc18b321c57a978d7a3859ae", "text": "We present AutoExtend, a system that combines word embeddings with semantic resources by learning embeddings for non-word objects like synsets and entities and learning word embeddings that incorporate the semantic information from the resource. The method is based on encoding and decoding the word embeddings and is flexible in that it can take any word embeddings as input and does not need an additional training corpus. The obtained embeddings live in the same vector space as the input word embeddings. A sparse tensor formalization guarantees efficiency and parallelizability. We use WordNet, GermaNet, and Freebase as semantic resources. AutoExtend achieves state-of-the-art performance on Word-in-Context Similarity and Word Sense Disambiguation tasks.", "title": "" }, { "docid": "89d1d029f606710f03f386762583f6e8", "text": "Aspects of business process models' integration with structured business vocabularies & rules are analyzed in this paper. Despite the fact that business process (BP) modeling has its long-lasting traditions in various areas of application, this discipline remains in the constant process of improvement and issue-solving. The paper deals with one of such issues, namely, the existing gap between BP modeling and specification of business vocabularies & rules. In not dealt appropriately, this may lead to some issues while developing, reading and interpreting business models themselves, also to miscommunication issues within and among the organizations dependent on such models, and so on. The gap could be diminished by the means of integration of BP models with business vocabularies & rules; the paper presents some argumentation to back such statements. Later, basic principles of the approach for BPMN BP model integration with SBVR business vocabulary & rules are presented and briefly described in this paper.", "title": "" }, { "docid": "59291cb1c13ab274f06b619698784e23", "text": "We present a new class of Byzantine-tolerant State Machine Replication protocols for asynchronous environments that we term Byzantine Chain Replication. We demonstrate two implementations that present different trade-offs between performance and security, and compare these with related work. Leveraging an external reconfiguration service, these protocols are not based on Byzantine consensus, do not require majoritybased quorums during normal operation, and the set of replicas is easy to reconfigure. One of the implementations is instantiated with t+ 1 replicas to tolerate t failures and is useful in situations where perimeter security makes malicious attacks unlikely. Applied to in-memory BerkeleyDB replication, it supports 20,000 transactions per second while a fully Byzantine implementation supports 12,000 transactions per second—about 70% of the throughput of a non-replicated database.", "title": "" }, { "docid": "decd813dfea894afdceb55b3ca087487", "text": "BACKGROUND\nAddiction to smartphone usage is a common worldwide problem among adults, which might negatively affect their wellbeing. This study investigated the prevalence and factors associated with smartphone addiction and depression among a Middle Eastern population.\n\n\nMETHODS\nThis cross-sectional study was conducted in 2017 using a web-based questionnaire distributed via social media. Responses to the Smartphone Addiction Scale - Short version (10-items) were rated on a 6-point Likert scale, and their percentage mean score (PMS) was commuted. Responses to Beck's Depression Inventory (20-items) were summated (range 0-60); their mean score (MS) was commuted and categorized. Higher scores indicated higher levels of addiction and depression. Factors associated with these outcomes were identified using descriptive and regression analyses. Statistical significance was set at P < 0.05.\n\n\nRESULTS\nComplete questionnaires were 935/1120 (83.5%), of which 619 (66.2%) were females and 316 (33.8%) were males. The mean ± standard deviation of their age was 31.7 ± 11  years. Majority of participants obtained university education 766 (81.9%), while 169 (18.1%) had school education. The PMS of addiction was 50.2 ± 20.3, and MS of depression was 13.6 ± 10.0. A significant positive linear relationship was present between smart phone addiction and depression (y = 39.2 + 0.8×; P < 0.001). Significantly higher smartphone addiction scores were associated with younger age users, (β = - 0.203, adj. P = 0.004). Factors associated with higher depression scores were school educated users (β = - 2.03, adj. P = 0.01) compared to the university educated group and users with higher smart phone addiction scores (β =0.194, adj. P < 0.001).\n\n\nCONCLUSIONS\nThe positive correlation between smartphone addiction and depression is alarming. Reasonable usage of smart phones is advised, especially among younger adults and less educated users who could be at higher risk of depression.", "title": "" }, { "docid": "2d45388b6c229dedc1532adc1e1eeeeb", "text": "Data flow testing has recently attracted new interest in the context of testing object oriented systems, since data flow information is well suited to capture relations among the object states, and can thus provide useful information for testing method interactions. Unfortunately, classic data flow testing, which is based on static analysis of the source code, fails to identify many important data flow relations due to the dynamic nature of object oriented systems. In this paper, we propose a new technique to generate test cases for object oriented software. The technique exploits useful inter-procedural data flow information extracted dynamically from execution traces for object oriented systems. The technique is designed to enhance an initial test suite with test cases that exercise complex state based method interactions. The experimental results indicate that dynamic data flow testing can indeed generate test cases that exercise relevant behaviors otherwise missed by both the original test suite and by test suites that satisfy classic data flow criteria.", "title": "" }, { "docid": "5bf172cfc7d7de0c82707889cf722ab2", "text": "The concept of a decentralized ledger usually implies that each node of a blockchain network stores the entire blockchain. However, in the case of popular blockchains, which each weigh several hundreds of GB, the large amount of data to be stored can incite new or low-capacity nodes to run lightweight clients. Such nodes do not participate to the global storage effort and can result in a centralization of the blockchain by very few nodes, which is contrary to the basic concepts of a blockchain. To avoid this problem, we propose new low storage nodes that store a reduced amount of data generated from the blockchain by using erasure codes. The properties of this technique ensure that any block of the chain can be easily rebuilt from a small number of such nodes. This system should encourage low storage nodes to contribute to the storage of the blockchain and to maintain decentralization despite of a globally increasing size of the blockchain. This system paves the way to new types of blockchains which would only be managed by low capacity nodes.", "title": "" }, { "docid": "73a998535ab03730595ce5d9c1f071f7", "text": "This article familiarizes counseling psychologists with qualitative research methods in psychology developed in the tradition of European phenomenology. A brief history includes some of Edmund Husserl’s basic methods and concepts, the adoption of existential-phenomenology among psychologists, and the development and formalization of qualitative research procedures in North America. The choice points and alternatives in phenomenological research in psychology are delineated. The approach is illustrated by a study of a recovery program for persons repeatedly hospitalized for chronic mental illness. Phenomenological research is compared with other qualitative methods, and some of its benefits for counseling psychology are identified.", "title": "" }, { "docid": "7da0d66b512c79ebc00d676cac04eefc", "text": "Social psychologists have often followed other scientists in treating religiosity primarily as a set of beliefs held by individuals. But, beliefs are only one facet of this complex and multidimensional construct. The authors argue that social psychology can best contribute to scholarship on religion by being relentlessly social. They begin with a social-functionalist approach in which beliefs, rituals, and other aspects of religious practice are best understood as means of creating a moral community. They discuss the ways that religion is intertwined with five moral foundations, in particular the group-focused \"binding\" foundations of Ingroup/loyalty, Authority/respect, Purity/sanctity. The authors use this theoretical perspective to address three mysteries about religiosity, including why religious people are happier, why they are more charitable, and why most people in the world are religious.", "title": "" }, { "docid": "47eead9bbba9ffdce948a0a58c81ac7a", "text": "Oxidative damage and inflammation have been pointed out in preclinical studies as the root cause of cancer and other chronic diseases such as diabetes, hypertension, Alzheimer's disease, etc. Epidemiological and clinical studies have suggested that cancer could be prevented or significantly reduced by treatment with anti-oxidant and anti-inflammatory drugs, therefore, curcumin, a principal component of turmeric (a curry spice) showing strong anti-oxidant and anti-inflammatory activities, might be a potential candidate for the prevention and/or treatment of cancer and other chronic diseases. However, curcumin, a highly pleiotropic molecule with an excellent safety profile targeting multiple diseases with strong evidence on the molecular level, could not achieve its optimum therapeutic outcome in past clinical trials, largely due to its low solubility and poor bioavailability. Curcumin can be developed as a therapeutic drug through improvement in formulation properties or delivery systems, enabling its enhanced absorption and cellular uptake. This review mainly focuses on the anti-inflammatory potential of curcumin and recent developments in dosage form and nanoparticulate delivery systems with the possibilities of therapeutic application of curcumin for the prevention and/or treatment of cancer.", "title": "" }, { "docid": "4c596974ba7dde7525e028bd7f168e61", "text": "In ranking with the pairwise classification approach, the loss associated to a predicted ranked list is the mean of the pairwise classification losses. This loss is inadequate for tasks like information retrieval where we prefer ranked lists with high precision on the top of the list. We propose to optimize a larger class of loss functions for ranking, based on an ordered weighted average (OWA) (Yager, 1988) of the classification losses. Convex OWA aggregation operators range from the max to the mean depending on their weights, and can be used to focus on the top ranked elements as they give more weight to the largest losses. When aggregating hinge losses, the optimization problem is similar to the SVM for interdependent output spaces. Moreover, we show that OWA aggregates of margin-based classification losses have good generalization properties. Experiments on the Letor 3.0 benchmark dataset for information retrieval validate our approach.", "title": "" }, { "docid": "f1ada71621322b8f0b4c48130aa79bd5", "text": "In this paper, we study a set of real-time scheduling problems whose objectives can be expressed as piecewise linear utility functions. This model has very wide applications in scheduling-related problems, such as mixed criticality, response time minimization, and tardiness analysis. Approximation schemes and matrix vectorization techniques are applied to transform scheduling problems into linear constraint optimization with a piecewise linear and concave objective; thus, a neural network-based optimization method can be adopted to solve such scheduling problems efficiently. This neural network model has a parallel structure, and can also be implemented on circuits, on which the converging time can be significantly limited to meet real-time requirements. Examples are provided to illustrate how to solve the optimization problem and to form a schedule. An approximation ratio bound of 0.5 is further provided. Experimental studies on a large number of randomly generated sets suggest that our algorithm is optimal when the set is nonoverloaded, and outperforms existing typical scheduling strategies when there is overload. Moreover, the number of steps for finding an approximate solution remains at the same level when the size of the problem (number of jobs within a set) increases.", "title": "" }, { "docid": "fdc8a54623f38ec29012d2f0f3bda8b1", "text": "Object tracking is an important issue for research and application related to visual servoing and more generally for robot vision. In this paper, we address the problem of realizing visual servoing tasks on complex objects in real environments. We briefly present a set of tracking algorithms (2D features-based or motion-based tracking, 3D model-based tracking, . . . ) that have been used for ten years to achieve this goal.", "title": "" }, { "docid": "f3002c5d152c8bf3d00473cbebdb6052", "text": "I unstructured natural language — allow any statements, but make mistakes or failure. I controlled natural language — only allow unambiguous statements that can be interpreted (e.g., in supermarkets or for doctors). There is a vast amount of information in natural language. Understanding language to extract information or answering questions is more difficult than getting extracting gestalt properties such as topic, or choosing a help page. Many of the problems of AI are explicit in natural language understanding. “AI complete”.", "title": "" } ]
scidocsrr
1f49b5eb014ac3afa920d4b6e4f9347c
Blind Navigation Support System based on Microsoft Kinect
[ { "docid": "889e3d786a27a3e75972573e30f02e9b", "text": "We present part of a vision system for blind and visually impaired people. It detects obstacles on sidewalks and provides guidance to avoid them. Obstacles are trees, light poles, trash cans, holes, branches, stones and other objects at a distance of 3 to 5 meters from the camera position. The system first detects the sidewalk borders, using edge information in combination with a tracking mask, to obtain straight lines with their slopes and the vanishing point. Once the borders are found, a rectangular window is defined within which two obstacle detection methods are applied. The first determines the variation of the maxima and minima of the gray levels of the pixels. The second uses the binary edge image and searches in the vertical and horizontal histograms for discrepancies of the number of edge points. Together, these methods allow to detect possible obstacles with their position and size, such that the user can be alerted and informed about the best way to avoid them. The system works in realtime and complements normal navigation with the cane.", "title": "" } ]
[ { "docid": "66e43ce62fd7e9cf78c4ff90b82afb8d", "text": "BACKGROUND\nConcern over the frequency of unintended harm to patients has focused attention on the importance of teamwork and communication in avoiding errors. This has led to experiments with teamwork training programmes for clinical staff, mostly based on aviation models. These are widely assumed to be effective in improving patient safety, but the extent to which this assumption is justified by evidence remains unclear.\n\n\nMETHODS\nA systematic literature review on the effects of teamwork training for clinical staff was performed. Information was sought on outcomes including staff attitudes, teamwork skills, technical performance, efficiency and clinical outcomes.\n\n\nRESULTS\nOf 1036 relevant abstracts identified, 14 articles were analysed in detail: four randomized trials and ten non-randomized studies. Overall study quality was poor, with particular problems over blinding, subjective measures and Hawthorne effects. Few studies reported on every outcome category. Most reported improved staff attitudes, and six of eight reported significantly better teamwork after training. Five of eight studies reported improved technical performance, improved efficiency or reduced errors. Three studies reported evidence of clinical benefit, but this was modest or of borderline significance in each case. Studies with a stronger intervention were more likely to report benefits than those providing less training. None of the randomized trials found evidence of technical or clinical benefit.\n\n\nCONCLUSION\nThe evidence for technical or clinical benefit from teamwork training in medicine is weak. There is some evidence of benefit from studies with more intensive training programmes, but better quality research and cost-benefit analysis are needed.", "title": "" }, { "docid": "b8bee026b35868b62ef2ffe5029bfb7b", "text": "In this paper, we propose a novel network architecture, a recurrent convolutional neural network, which is trained to learn a joint spectral-spatial-temporal feature representation in a unified framework for change detection of multispectral images. To this end, we bring together a convolutional neural network (CNN) and a recurrent neural network (RNN) into one end-to-end network. The former is able to generate rich spectral-spatial feature representations while the latter effectively analyzes temporal dependency in bi-temporal images. Although both CNN and RNN are well-established techniques for remote sensing applications, to the best of our knowledge, we are the first to combine them for multitemporal data analysis in the remote sensing community. Both visual and quantitative analysis of experimental results demonstrates competitive performance in the proposed mode.", "title": "" }, { "docid": "ed75192dcb1356820fdb6411593dd233", "text": "We introduce QVEC-CCA—an intrinsic evaluation metric for word vector representations based on correlations of learned vectors with features extracted from linguistic resources. We show that QVECCCA scores are an effective proxy for a range of extrinsic semantic and syntactic tasks. We also show that the proposed evaluation obtains higher and more consistent correlations with downstream tasks, compared to existing approaches to intrinsic evaluation of word vectors that are based on word similarity.", "title": "" }, { "docid": "a169848d576e25967f7a223dca4737ea", "text": "Reengineering of the aircraft structural life prediction process to fully exploit advances in very high performance digital computing is proposed. The proposed process utilizes an ultrahigh fidelity model of individual aircraft by tail number, a Digital Twin, to integrate computation of structural deflections and temperatures in response to flight conditions, with resulting local damage and material state evolution. A conceptual model of how the Digital Twin can be used for predicting the life of aircraft structure and assuring its structural integrity is presented. The technical challenges to developing and deploying a Digital Twin are discussed in detail.", "title": "" }, { "docid": "6eeeb343309fc24326ed42b62d5524b1", "text": "We introduce a novel machine learning framework based on recursive autoencoders for sentence-level prediction of sentiment label distributions. Our method learns vector space representations for multi-word phrases. In sentiment prediction tasks these representations outperform other state-of-the-art approaches on commonly used datasets, such as movie reviews, without using any pre-defined sentiment lexica or polarity shifting rules. We also evaluate the model’s ability to predict sentiment distributions on a new dataset based on confessions from the experience project. The dataset consists of personal user stories annotated with multiple labels which, when aggregated, form a multinomial distribution that captures emotional reactions. Our algorithm can more accurately predict distributions over such labels compared to several competitive baselines.", "title": "" }, { "docid": "c91e966b803826908ae4dd82cc4a483e", "text": "Many shallow natural language understanding tasks use dependency trees to extract relations between content words. However, strict surface-structure dependency trees tend to follow the linguistic structure of sentences too closely and frequently fail to provide direct relations between content words. To mitigate this problem, the original Stanford Dependencies representation also defines two dependency graph representations which contain additional and augmented relations that explicitly capture otherwise implicit relations between content words. In this paper, we revisit and extend these dependency graph representations in light of the recent Universal Dependencies (UD) initiative and provide a detailed account of an enhanced and an enhanced++ English UD representation. We further present a converter from constituency to basic, i.e., strict surface structure, UD trees, and a converter from basic UD trees to enhanced and enhanced++ English UD graphs. We release both converters as part of Stanford CoreNLP and the Stanford Parser.", "title": "" }, { "docid": "46a775db27136b8f2c2b39fa14a3e22b", "text": "Many defect prediction techniques have been proposed. While they often take the author of the code into consideration, none of these techniques build a separate prediction model for each developer. Different developers have different coding styles, commit frequencies, and experience levels, causing different defect patterns. When the defects of different developers are combined, such differences are obscured, hurting prediction performance. This paper proposes personalized defect prediction-building a separate prediction model for each developer to predict software defects. As a proof of concept, we apply our personalized defect prediction to classify defects at the file change level. We evaluate our personalized change classification technique on six large software projects written in C and Java-the Linux kernel, PostgreSQL, Xorg, Eclipse, Lucene and Jackrabbit. Our personalized approach can discover up to 155 more bugs than the traditional change classification (210 versus 55) if developers inspect the top 20% lines of code that are predicted buggy. In addition, our approach improves the F1-score by 0.01-0.06 compared to the traditional change classification.", "title": "" }, { "docid": "d31cd5f7dbdbd3dd7e5d8895d359a958", "text": "AIM\nThe aim of this cross-sectional descriptive study was to compare the different leadership styles based on perceptions of nurse managers and their staff.\n\n\nBACKGROUND\nNurse managers' styles are fundamental to improving subordinates' performance and achieving goals at health-care institutions.\n\n\nMETHODS\nThis was a cross-sectional study. A questionnaire developed by Ekvall & Arvonen, considering three leadership domains (Change, Production and Employee relations), was administered to all nurse managers and to their subordinates at a city hospital in north-east Italy.\n\n\nRESULTS\nThe comparison between the leadership styles actually adopted and those preferred by the nurse managers showed that the preferred style always scored higher than the style adopted, the difference reaching statistical significance for Change and Production. The leadership styles preferred by subordinates always scored higher than the styles their nurse managers actually adopted; in the subordinates' opinion, the differences being statistically significant in all three leadership domains.\n\n\nIMPLICATION FOR NURSING MANAGEMENT\nThe study showed that nurse managers' expectations in relation to their leadership differ from those of their subordinates. These findings should be borne in mind when selecting and training nurse managers and other personnel, and they should influence the hospital's strategic management of nurses.", "title": "" }, { "docid": "1c3a87fd2e10a9799e7c0a79be635816", "text": "According to Network Effect literature network externalities lead to market failure due to Pareto-inferior coordination results. We show that the assumptions and simplifications implicitly used for modeling standardization processes fail to explain the real-world variety of diffusion courses in today’s dynamic IT markets and derive requirements for a more general model of network effects. We argue that Agent-based Computational Economics provides a solid basis for meeting these requirements by integrating evolutionary models from Game Theory and Institutional Economics.", "title": "" }, { "docid": "0f17262293f98685383c71381ca10bd9", "text": "This paper presents the application of frequency selective surfaces in antenna arrays as an alternative to improve radiation parameters of the array. A microstrip antenna array between two FSS was proposed for application in WLAN and LTE 4G systems. Several parameters have been significantly improved, in particular the bandwidth, gain and radiation efficiency, compared with a conventional array. Numerical and measured results are presented.", "title": "" }, { "docid": "03cd77a9a08e4a0f7836815f71bfbb89", "text": "We consider the problem of learning deep neural networks (DNNs) for object category segmentation, where the goal is to label each pixel in an image as being part of a given object (foreground) or not (background). Deep neural networks are usually trained with simple loss functions (e.g., softmax loss). These loss functions are appropriate for standard classification problems where the performance is measured by the overall classification accuracy. For object category segmentation, the two classes (foreground and background) are very imbalanced. The intersectionover-union (IoU) is usually used to measure the performance of any object category segmentation method. In this paper, we propose an approach for directly optimizing this IoU measure in deep neural networks. Our experimental results on two object category segmentation datasets demonstrate that our approach outperforms DNNs trained with standard softmax loss.", "title": "" }, { "docid": "5ded801b3c778d012a78aa467e01bd89", "text": "To overcome limitations of fusion welding of the AA7050-T7451aluminum alloy friction stir welding (FSW) has become a prominent process which uses a non-consumable FSW tool to weld the two abutting plates of the workpiece. The FSW produces a joint with advantages of high joint strength, lower distortion and absence of metallurgical defects. Process parameters such as tool rotational speed, tool traverse speed and axial force and tool dimensions play an important role in obtaining a specific temperature distribution and subsequent flow stresses within the material being welded. Friction stir welding of AA7050-T7451 aluminum alloy has been simulated to obtain the temperature profiles & flow stresses using a recent FEA software called HyperWorks.; the former controlling the microstruture and in turn, mechanical properties and later, the flow of material which depends up on the peak temperatures obtained during FSW. A software based study has been carried out to avoid the difficulty in measuring the temperatures directly and explore the capabilities of the same to provide a basis for further research work related to the said aluminum alloy.", "title": "" }, { "docid": "837803a140450d594d5693a06ba3be4b", "text": "Allocation of very scarce medical interventions such as organs and vaccines is a persistent ethical challenge. We evaluate eight simple allocation principles that can be classified into four categories: treating people equally, favouring the worst-off, maximising total benefits, and promoting and rewarding social usefulness. No single principle is sufficient to incorporate all morally relevant considerations and therefore individual principles must be combined into multiprinciple allocation systems. We evaluate three systems: the United Network for Organ Sharing points systems, quality-adjusted life-years, and disability-adjusted life-years. We recommend an alternative system-the complete lives system-which prioritises younger people who have not yet lived a complete life, and also incorporates prognosis, save the most lives, lottery, and instrumental value principles.", "title": "" }, { "docid": "d6edac3a6675c9edb2b36e75ac356ebd", "text": "Ranking web pages for presenting the most relevant web pages to user’s queries is one of the main issues in any search engine. In this paper, two new ranking algorithms are offered, using Reinforcement Learning (RL) concepts. RL is a powerful technique of modern artificial intelligence that tunes agent’s parameters, interactively. In the first step, with formulation of ranking as an RL problem, a new connectivity-based ranking algorithm, called RL Rank, is proposed. In RL Rank, agent is considered as a surfer who travels between web pages by clicking randomly on a link in the current page. Each web page is considered as a", "title": "" }, { "docid": "aba7cb0f5f50a062c42b6b51457eb363", "text": "Nowadays, there is increasing interest in the development of teamwork skills in the educational context. This growing interest is motivated by its pedagogical effectiveness and the fact that, in labour contexts, enterprises organize their employees in teams to carry out complex projects. Despite its crucial importance in the classroom and industry, there is a lack of support for the team formation process. Not only do many factors influence team performance, but the problem becomes exponentially costly if teams are to be optimized. In this article, we propose a tool whose aim it is to cover such a gap. It combines artificial intelligence techniques such as coalition structure generation, Bayesian learning, and Belbin’s role theory to facilitate the generation of working groups in an educational context. This tool improves current state of the art proposals in three ways: i) it takes into account the feedback of other teammates in order to establish the most predominant role of a student instead of self-perception questionnaires; ii) it handles uncertainty with regard to each student’s predominant team role; iii) it is iterative since it considers information from several interactions in order to improve the estimation of role assignments. We tested the performance of the proposed tool in an experiment involving students that took part in three different team activities. The experiments suggest that the proposed tool is able to improve different teamwork aspects such as team dynamics and student satisfaction.", "title": "" }, { "docid": "3ade96c73db1f06d7e0c1f48a0b33387", "text": "To achieve enduring retention, people must usually study information on multiple occasions. How does the timing of study events affect retention? Prior research has examined this issue only in a spotty fashion, usually with very short time intervals. In a study aimed at characterizing spacing effects over significant durations, more than 1,350 individuals were taught a set of facts and--after a gap of up to 3.5 months--given a review. A final test was administered at a further delay of up to 1 year. At any given test delay, an increase in the interstudy gap at first increased, and then gradually reduced, final test performance. The optimal gap increased as test delay increased. However, when measured as a proportion of test delay, the optimal gap declined from about 20 to 40% of a 1-week test delay to about 5 to 10% of a 1-year test delay. The interaction of gap and test delay implies that many educational practices are highly inefficient.", "title": "" }, { "docid": "1b3d6129c05d8880cf7cba98b78bc720", "text": "The underlying paradigm of big data-driven machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. Is having simply more data always helpful? In 1936, The Literary Digest collected 2.3M filled in questionnaires to predict the outcome of that year’s US presidential election. The outcome of this big data prediction proved to be entirely wrong, whereas George Gallup only needed 3K handpicked people to make an accurate prediction. Generally, biases occur in machine learning whenever the distributions of training set and test set are different. In this work, we provide a review of different sorts of biases in (big) data sets in machine learning. We provide definitions and discussions of the most commonly appearing biases in machine learning: class imbalance and covariate shift. We also show how these biases can be quantified and corrected. This work is an introductory text for both researchers and practitioners to become more aware of this topic and thus to derive more reliable models for their learning problems.", "title": "" }, { "docid": "24544d2f92f8b736969dbcce0e6fd5d6", "text": "This paper reports emotion recognition results from speech signals, with particular focus on extracting emotion features from the short utterances typical of Interactive Voice Response (IVR) applications. We focus on distinguishing anger versus neutral speech, which is salient to call center applications. We report on classification of other types of emotions such as sadness, boredom, happy, and cold anger. We compare results from using neural networks, Support Vector Machines (SVM), K-Nearest Neighbors, and decision trees. We use a database from the Linguistic Data Consortium at University of Pennsylvania, which is recorded by 8 actors expressing 15 emotions. Results indicate that hot anger and neutral utterances can be distinguished with over 90% accuracy. We show results from recognizing other emotions. We also illustrate which emotions can be clustered together using the selected prosodic features.", "title": "" }, { "docid": "7adffc2dd1d6412b4bb01b38ced51c24", "text": "With the popularity of the Internet and mobile intelligent terminals, the number of mobile applications is exploding. Mobile intelligent terminals trend to be the mainstream way of people's work and daily life online in place of PC terminals. Mobile application system brings some security problems inevitably while it provides convenience for people, and becomes a main target of hackers. Therefore, it is imminent to strengthen the security detection of mobile applications. This paper divides mobile application security detection into client security detection and server security detection. We propose a combining static and dynamic security detection method to detect client-side. We provide a method to get network information of server by capturing and analyzing mobile application traffic, and propose a fuzzy testing method based on HTTP protocol to detect server-side security vulnerabilities. Finally, on the basis of this, an automated platform for security detection of mobile application system is developed. Experiments show that the platform can detect the vulnerabilities of mobile application client and server effectively, and realize the automation of mobile application security detection. It can also reduce the cost of mobile security detection and enhance the security of mobile applications.", "title": "" }, { "docid": "eba25ae59603328f3ef84c0994d46472", "text": "We address the problem of how to personalize educational content to students in order to maximize their learning gains over time. We present a new computational approach to this problem called MAPLE (Multi-Armed Bandits based Personalization for Learning Environments) that combines difficulty ranking with multi-armed bandits. Given a set of target questions MAPLE estimates the expected learning gains for each question and uses an exploration-exploitation strategy to choose the next question to pose to the student. It maintains a personalized ranking over the difficulties of question in the target set and updates it in real-time according to students’ progress. We show in simulations that MAPLE was able to improve students’ learning gains compared to approaches that sequence questions in increasing level of difficulty, or rely on content experts. When implemented in a live e-learning system in the wild, MAPLE showed promising initial results.", "title": "" } ]
scidocsrr
0b221b3182715e8cd03771a46fb0cf45
The effect of social media on brand loyalty
[ { "docid": "368f904533e17beec78d347ee8ceabb1", "text": "A brand community from a customer-experiential perspective is a fabric of relationships in which the customer is situated. Crucial relationships include those between the customer and the brand, between the customer and the firm, between the customer and the product in use, and among fellow customers. The authors delve ethnographically into a brand community and test key findings through quantitative methods. Conceptually, the study reveals insights that differ from prior research in four important ways: First, it expands the definition of a brand community to entities and relationships neglected by previous research. Second, it treats vital characteristics of brand communities, such as geotemporal concentrations and the richness of social context, as dynamic rather than static phenomena. Third, it demonstrates that marketers can strengthen brand communities by facilitating shared customer experiences in ways that alter those dynamic characteristics. Fourth, it yields a new and richer conceptualization of customer loyalty as integration in a brand community.", "title": "" } ]
[ { "docid": "5699f53cb26484b33b52df57f97a3e92", "text": "In this paper we propose a novel model for unconditional audio generation based on generating one audio sample at a time. We show that our model, which profits from combining memory-less modules, namely autoregressive multilayer perceptrons, and stateful recurrent neural networks in a hierarchical structure is able to capture underlying sources of variations in the temporal sequences over very long time spans, on three datasets of different nature. Human evaluation on the generated samples indicate that our model is preferred over competing models. We also show how each component of the model contributes to the exhibited performance.", "title": "" }, { "docid": "1ca70e99cf3dc1957627efc68af32e0c", "text": "In the paradigm of multi-task learning, multiple related prediction tasks are learned jointly, sharing information across the tasks. We propose a framework for multi-task learning that enables one to selectively share the information across the tasks. We assume that each task parameter vector is a linear combination of a finite number of underlying basis tasks. The coefficients of the linear combination are sparse in nature and the overlap in the sparsity patterns of two tasks controls the amount of sharing across these. Our model is based on the assumption that task parameters within a group lie in a low dimensional subspace but allows the tasks in different groups to overlap with each other in one or more bases. Experimental results on four datasets show that our approach outperforms competing methods.", "title": "" }, { "docid": "0778eff54b2f48c9ed4554c617b2dcab", "text": "The diagnosis of heart disease is a significant and tedious task in medicine. The healthcare industry gathers enormous amounts of heart disease data that regrettably, are not “mined” to determine concealed information for effective decision making by healthcare practitioners. The term Heart disease encompasses the diverse diseases that affect the heart. Cardiomyopathy and Cardiovascular disease are some categories of heart diseases. The reduction of blood and oxygen supply to the heart leads to heart disease. In this paper the data classification is based on supervised machine learning algorithms which result in accuracy, time taken to build the algorithm. Tanagra tool is used to classify the data and the data is evaluated using 10-fold cross validation and the results are compared.", "title": "" }, { "docid": "b169e0e76f26db1f08cd84524aa10a53", "text": "A very lightweight, broad-band, dual polarized antenna array with 128 elements for the frequency range from 7 GHz to 18 GHz has been designed, manufactured and measured. The total gain at the center frequency was measured to be 20 dBi excluding feeding network losses.", "title": "" }, { "docid": "4702fceea318c326856cc2a7ae553e1f", "text": "The Institute of Medicine identified “timeliness” as one of six key “aims for improvement” in its most recent report on quality. Yet patient delays remain prevalent, resulting in dissatisfaction, adverse clinical consequences, and often, higher costs. This tutorial describes several areas in which patients routinely experience significant and potentially dangerous delays and presents operations research (OR) models that have been developed to help reduce these delays, often at little or no cost. I also describe the difficulties in developing and implementing models as well as the factors that increase the likelihood of success. Finally, I discuss the opportunities, large and small, for using OR methodologies to significantly impact practices and policies that will affect timely access to healthcare.", "title": "" }, { "docid": "f28008f9a90112a412d91d61916ac9a6", "text": "Steady-State Visual Evoked Potential (SSVEP) is a visual cortical response evoked by repetitive stimuli with a light source flickering at frequencies above 4 Hz and could be classified into three ranges: low (up to 12 Hz), medium (12-30) and high frequency (> 30 Hz). SSVEP-based Brain-Computer Interfaces (BCI) are principally focused on the low and medium range of frequencies whereas there are only a few projects in the high-frequency range. However, they only evaluate the performance of different methods to extract SSVEP. This research proposed a high-frequency SSVEP-based asynchronous BCI in order to control the navigation of a mobile object on the screen through a scenario and to reach its final destination. This could help impaired people to navigate a robotic wheelchair. There were three different scenarios with different difficulty levels (easy, medium and difficult). The signal processing method is based on Fourier transform and three EEG measurement channels. The research obtained accuracies ranging in classification from 65% to 100% with Information Transfer Rate varying from 9.4 to 45 bits/min. Our proposed method allows all subjects participating in the study to control the mobile object and to reach a final target without prior training.", "title": "" }, { "docid": "810a4573ca075d83e8bf2ece4fafe236", "text": "IN this chapter we analyze four paradigms that currently are competing, or have until recently competed, for acceptance as the paradigm of choice in informing and guiding inquiry, especially qualitative inquiry: positivism, postpositivism, critical theory and related ideological positions, and constructivism. We acknowledge at once our own commitment to constructivism (which we earlier called \"naturalistic inquiry\"; Lincoln & Guba, 1985); the reader may wish to take that fact into account in judging the appropriateness and usefulness of our analysis. Although the title of this volume, Handbook of Qualitative Research, implies that the term qualitative is an umbrella term superior to the term paradigm (and, indeed, that usage is not uncommon), it is our position that it is a term that ought to be reserved for a description of types of methods. From our perspective, both qualitative and quantitative methods may be used appropriately with any research paradigm. Questions of method are secondary to questions of paradigm, which we define as the basic belief system or worldview that guides the investigator, not only in choices of method but in ontologicallyandepistemologicallyfundamentalways. It is certainly the case that interest in alternative paradigms has been stimulated by a growing dissatisfaction with the patent overemphasis on quantitative methods. But as efforts were made to build a case for a renewed interest in qualitative approaches, it became clear that the metaphysical assumptions undergirding the conventional paradigm (the \"received view\") must be seriously questioned. Thus the emphasis of this chapter is on paradigms, their assumptions, and the implications of those assumptions for a variety of research issues, not on the relative utility of qualitative versus quantitative methods. Nevertheless, as discussions of paradigms/methods over the past decade have often begun with a consideration of problems associated with overquantification, we will also begin there, shifting only later to our predominant interest.", "title": "" }, { "docid": "7ab15804bd53aa8288aafc5374a12499", "text": "We have used a modified technique in five patients to correct winging of the scapula caused by injury to the brachial plexus or the long thoracic nerve during transaxillary resection of the first rib. The procedure stabilises the scapulothoracic articulation by using strips of autogenous fascia lata wrapped around the 4th, 6th and 7th ribs at least two, and preferably three, times. The mean age of the patients at the time of operation was 38 years (26 to 47) and the mean follow-up six years and four months (three years and three months to 11 years). Satisfactory stability was achieved in all patients with considerable improvement in shoulder function. There were no complications.", "title": "" }, { "docid": "405acd07ad0d1b3b82ada19e85e23ce6", "text": "Self-driving technology is advancing rapidly — albeit with significant challenges and limitations. This progress is largely due to recent developments in deep learning algorithms. To date, however, there has been no systematic comparison of how different deep learning architectures perform at such tasks, or an attempt to determine a correlation between classification performance and performance in an actual vehicle, a potentially critical factor in developing self-driving systems. Here, we introduce the first controlled comparison of multiple deep-learning architectures in an end-to-end autonomous driving task across multiple testing conditions. We used a simple and affordable platform consisting of an off-the-shelf, remotely operated vehicle, a GPU-equipped computer, and an indoor foamrubber racetrack. We compared performance, under identical driving conditions, across seven architectures including a fully-connected network, a simple 2 layer CNN, AlexNet, VGG-16, Inception-V3, ResNet, and an LSTM by assessing the number of laps each model was able to successfully complete without crashing while traversing an indoor racetrack. We compared performance across models when the conditions exactly matched those in training as well as when the local environment and track were configured differently and objects that were not included in the training dataset were placed on the track in various positions. In addition, we considered performance using several different data types for training and testing including single grayscale and color frames, and multiple grayscale frames stacked together in sequence. With the exception of a fully-connected network, all models performed reasonably well (around or above 80%) and most very well (∼95%) on at least one input type but with considerable variation across models and inputs. Overall, AlexNet, operating on single color frames as input, achieved the best level of performance (100% success rate in phase one and 55% in phase two) while VGG-16 performed well most consistently across image types. Performance with obstacles on the track and conditions that were different than those in training was much more variable than without objects and under conditions similar to those in the training set. Analysis of the model’s driving paths found greater consistency within vs. between models. Path similarity between models did not correlate strongly with success similarity. Our novel pixelflipping method allowed us to create a heatmap for each given image to observe what features of the image were weighted most heavily by the network when making its decision. Finally, we found that the variability across models in the driving task was not fully predicted by validation performance, indicating the presence of a ‘deployment gap’ between model training and performance in a simple, real-world task. Overall, these results demonstrate the need for increased field research in self-driving. 1Center for Complex Systems and Brain Sciences, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431, USA 2College of Computer and Information Science, Northeastern University, 360 Huntington Ave, Boston, MA 02115, USA 3Department of Ocean and Mechanical Engineering, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431, USA † mteti@fau.edu", "title": "" }, { "docid": "70c75c5456563a80276d883d8a5241b3", "text": "One of the main problems in underwater communications is the low data rate available due to the use of low frequencies. Moreover, there are many problems inherent to the medium such as reflections, refraction, energy dispersion, etc., that greatly degrade communication between devices. In some cases, wireless sensors must be placed quite close to each other in order to take more accurate measurements from the water while having high communication bandwidth. In these cases, while most researchers focus their efforts on increasing the data rate for low frequencies, we propose the use of the 2.4 GHz ISM frequency band in these special cases. In this paper, we show our wireless sensor node deployment and its performance obtained from a real scenario and measures taken for different frequencies, modulations and data transfer rates. The performed tests show the maximum distance between sensors, the number of lost packets and the average round trip time. Based on our measurements, we provide some experimental models of underwater communication in fresh water using EM waves in the 2.4 GHz ISM frequency band. Finally, we compare our communication system proposal with the existing systems. Although our proposal provides short communication distances, it provides high data transfer rates. It can be used for precision monitoring in applications such as contaminated ecosystems or for device communicate at high depth.", "title": "" }, { "docid": "0bf3c08b71fedd629bdc584c3deeaa34", "text": "Unsupervised learning of linguistic structure is a difficult problem. A common approach is to define a generative model and maximize the probability of the hidden structure given the observed data. Typically, this is done using maximum-likelihood estimation (MLE) of the model parameters. We show using part-of-speech tagging that a fully Bayesian approach can greatly improve performance. Rather than estimating a single set of parameters, the Bayesian approach integrates over all possible parameter values. This difference ensures that the learned structure will have high probability over a range of possible parameters, and permits the use of priors favoring the sparse distributions that are typical of natural language. Our model has the structure of a standard trigram HMM, yet its accuracy is closer to that of a state-of-the-art discriminative model (Smith and Eisner, 2005), up to 14 percentage points better than MLE. We find improvements both when training from data alone, and using a tagging dictionary.", "title": "" }, { "docid": "9ea9b364e2123d8917d4a2f25e69e084", "text": "Movement observation and imagery are increasingly propagandized for motor rehabilitation. Both observation and imagery are thought to improve motor function through repeated activation of mental motor representations. However, it is unknown what stimulation parameters or imagery conditions are optimal for rehabilitation purposes. A better understanding of the mechanisms underlying movement observation and imagery is essential for the optimization of functional outcome using these training conditions. This study systematically assessed the corticospinal excitability during rest, observation, imagery and execution of a simple and a complex finger-tapping sequence in healthy controls using transcranial magnetic stimulation (TMS). Observation was conducted passively (without prior instructions) as well as actively (in order to imitate). Imagery was performed visually and kinesthetically. A larger increase in corticospinal excitability was found during active observation in comparison with passive observation and visual or kinesthetic imagery. No significant difference between kinesthetic and visual imagery was found. Overall, the complex task led to a higher corticospinal excitability in comparison with the simple task. In conclusion, the corticospinal excitability was modulated during both movement observation and imagery. Specifically, active observation of a complex motor task resulted in increased corticospinal excitability. Active observation may be more effective than imagery for motor rehabilitation purposes. In addition, the activation of mental motor representations may be optimized by varying task-complexity.", "title": "" }, { "docid": "e995adcdeb6c290eb484ad136d48e8a0", "text": "Extended-connectivity fingerprints (ECFPs) are a novel class of topological fingerprints for molecular characterization. Historically, topological fingerprints were developed for substructure and similarity searching. ECFPs were developed specifically for structure-activity modeling. ECFPs are circular fingerprints with a number of useful qualities: they can be very rapidly calculated; they are not predefined and can represent an essentially infinite number of different molecular features (including stereochemical information); their features represent the presence of particular substructures, allowing easier interpretation of analysis results; and the ECFP algorithm can be tailored to generate different types of circular fingerprints, optimized for different uses. While the use of ECFPs has been widely adopted and validated, a description of their implementation has not previously been presented in the literature.", "title": "" }, { "docid": "ce650daedc7ba277d245a2150062775f", "text": "Amongst the large number of write-and-throw-away-spreadsheets developed for one-time use there is a rather neglected proportion of spreadsheets that are huge, periodically used, and submitted to regular update-cycles like any conventionally evolving valuable legacy application software. However, due to the very nature of spreadsheets, their evolution is particularly tricky and therefore error-prone. In our strive to develop tools and methodologies to improve spreadsheet quality, we analysed consolidation spreadsheets of an internationally operating company for the errors they contain. The paper presents the results of the field audit, involving 78 spreadsheets with 60,446 non-empty cells. As a by-product, the study performed was also to validate our analysis tools in an industrial context. The evaluated auditing tool offers the auditor a new view on the formula structure of the spreadsheet by grouping similar formulas into equivalence classes. Our auditing approach defines three similarity criteria between formulae, namely copy, logical and structural equivalence. To improve the visualization of large spreadsheets, equivalences and data dependencies are displayed in separated windows that are interlinked with the spreadsheet. The auditing approach helps to find irregularities in the geometrical pattern of similar formulas.", "title": "" }, { "docid": "9cd92fa5085c1f7edec5c2ba53c549cc", "text": "Support theory represents probability judgment in terms of the support, or strength of evidence, of the focal relative to the alternative hypothesis. It assumes that the judged probability of an event generally increases when its description is unpacked into disjoint components (implicit subadditivity). This article presents a significant extension of the theory in which the judged probability of an explicit disjunction is less than or equal to the sum of the judged probabilities of its disjoint components (explicit subadditivity). Several studies of probability and frequency judgment demonstrate both implicit and explicit subadditivity. The former is attributed to enhanced availability, whereas the latter is attributed to repacking and anchoring.", "title": "" }, { "docid": "b045e59c52ff1d555f79831f96309d5c", "text": "In this paper, we show that for several clustering problems one can extract a small set of points, so that using those core-sets enable us to perform approximate clustering efficiently. The surprising property of those core-sets is that their size is independent of the dimension.Using those, we present a (1+ ε)-approximation algorithms for the k-center clustering and k-median clustering problems in Euclidean space. The running time of the new algorithms has linear or near linear dependency on the number of points and the dimension, and exponential dependency on 1/ε and k. As such, our results are a substantial improvement over what was previously known.We also present some other clustering results including (1+ ε)-approximate 1-cylinder clustering, and k-center clustering with outliers.", "title": "" }, { "docid": "38499d78ab2b66f87e8314d75ff1c72f", "text": "We investigated large-scale systems organization of the whole human brain using functional magnetic resonance imaging (fMRI) data acquired from healthy volunteers in a no-task or 'resting' state. Images were parcellated using a prior anatomical template, yielding regional mean time series for each of 90 regions (major cortical gyri and subcortical nuclei) in each subject. Significant pairwise functional connections, defined by the group mean inter-regional partial correlation matrix, were mostly either local and intrahemispheric or symmetrically interhemispheric. Low-frequency components in the time series subtended stronger inter-regional correlations than high-frequency components. Intrahemispheric connectivity was generally related to anatomical distance by an inverse square law; many symmetrical interhemispheric connections were stronger than predicted by the anatomical distance between bilaterally homologous regions. Strong interhemispheric connectivity was notably absent in data acquired from a single patient, minimally conscious following a brainstem lesion. Multivariate analysis by hierarchical clustering and multidimensional scaling consistently defined six major systems in healthy volunteers-- corresponding approximately to four neocortical lobes, medial temporal lobe and subcortical nuclei- - that could be further decomposed into anatomically and functionally plausible subsystems, e.g. dorsal and ventral divisions of occipital cortex. An undirected graph derived by thresholding the healthy group mean partial correlation matrix demonstrated local clustering or cliquishness of connectivity and short mean path length compatible with prior data on small world characteristics of non-human cortical anatomy. Functional MRI demonstrates a neurophysiological architecture of the normal human brain that is anatomically sensible, strongly symmetrical, disrupted by acute brain injury, subtended predominantly by low frequencies and consistent with a small world network topology.", "title": "" }, { "docid": "9c77080dbab62dc7a5ddafcde98d094c", "text": "A cornucopia of dimensionality reduction techniques have emerged over the past decade, leaving data analysts with a wide variety of choices for reducing their data. Means of evaluating and comparing low-dimensional embeddings useful for visualization, however, are very limited. When proposing a new technique it is common to simply show rival embeddings side-by-side and let human judgment determine which embedding is superior. This study investigates whether such human embedding evaluations are reliable, i.e., whether humans tend to agree on the quality of an embedding. We also investigate what types of embedding structures humans appreciate a priori. Our results reveal that, although experts are reasonably consistent in their evaluation of embeddings, novices generally disagree on the quality of an embedding. We discuss the impact of this result on the way dimensionality reduction researchers should present their results, and on applicability of dimensionality reduction outside of machine learning.", "title": "" }, { "docid": "48ecc1d2fd36350dc1dd2f097f05d9ba", "text": "This paper is divided in two parts. Part one examines the relevance of Artificial Neural Networks (ANNs) for various business applications. The first section sets the stage for ANNs in the context of modern day business by discussing the evolution of businesses from Industrial Revolution to current Information Age to outline why business today are in critical need of technology that sifts through massive data. Next section introduces Artificial Neural Network technology as a favorable alternative to traditional analytics and informs the reader of the basic concept underlying the technology. Finally, third section screens through four different applications of ANNs to gain an insight into potential business opportunities that lie abound.", "title": "" }, { "docid": "a1f60b03cf3a7dde3090cbf0a926a7e9", "text": "Secondary analyses of Revised NEO Personality Inventory data from 26 cultures (N = 23,031) suggest that gender differences are small relative to individual variation within genders; differences are replicated across cultures for both college-age and adult samples, and differences are broadly consistent with gender stereotypes: Women reported themselves to be higher in Neuroticism, Agreeableness, Warmth, and Openness to Feelings, whereas men were higher in Assertiveness and Openness to Ideas. Contrary to predictions from evolutionary theory, the magnitude of gender differences varied across cultures. Contrary to predictions from the social role model, gender differences were most pronounced in European and American cultures in which traditional sex roles are minimized. Possible explanations for this surprising finding are discussed, including the attribution of masculine and feminine behaviors to roles rather than traits in traditional cultures.", "title": "" } ]
scidocsrr
aaf3bdeab1b2a539cf00bbd7adcdd263
A Redundancy-Aware Sentence Regression Framework for Extractive Summarization
[ { "docid": "73b3c2f34386d8ba642a61528d158d21", "text": "Existing multi-document summarization systems usually rely on a specific summarization model (i.e., a summarization method with a specific parameter setting) to extract summaries for different document sets with different topics. However, according to our quantitative analysis, none of the existing summarization models can always produce high-quality summaries for different document sets, and even a summarization model with good overall performance may produce low-quality summaries for some document sets. On the contrary, a baseline summarization model may produce high-quality summaries for some document sets. Based on the above observations, we treat the summaries produced by different summarization models as candidate summaries, and then explore discriminative reranking techniques to identify high-quality summaries from the candidates for difference document sets. We propose to extract a set of candidate summaries for each document set based on an ILP framework, and then leverage Ranking SVM for summary reranking. Various useful features have been developed for the reranking process, including word-level features, sentence-level features and summary-level features. Evaluation results on the benchmark DUC datasets validate the efficacy and robustness of our proposed approach.", "title": "" }, { "docid": "cfeb97a848766269c2088d8191206cc8", "text": "We design a class of submodular functions meant for document summarization tasks. These functions each combine two terms, one which encourages the summary to be representative of the corpus, and the other which positively rewards diversity. Critically, our functions are monotone nondecreasing and submodular, which means that an efficient scalable greedy optimization scheme has a constant factor guarantee of optimality. When evaluated on DUC 2004-2007 corpora, we obtain better than existing state-of-art results in both generic and query-focused document summarization. Lastly, we show that several well-established methods for document summarization correspond, in fact, to submodular function optimization, adding further evidence that submodular functions are a natural fit for document summarization.", "title": "" } ]
[ { "docid": "13774d2655f2f0ac575e11991eae0972", "text": "This paper considers regularized block multiconvex optimization, where the feasible set and objective function are generally nonconvex but convex in each block of variables. It also accepts nonconvex blocks and requires these blocks to be updated by proximal minimization. We review some interesting applications and propose a generalized block coordinate descent method. Under certain conditions, we show that any limit point satisfies the Nash equilibrium conditions. Furthermore, we establish global convergence and estimate the asymptotic convergence rate of the method by assuming a property based on the Kurdyka– Lojasiewicz inequality. The proposed algorithms are tested on nonnegative matrix and tensor factorization, as well as matrix and tensor recovery from incomplete observations. The tests include synthetic data and hyperspectral data, as well as image sets from the CBCL and ORL databases. Compared to the existing state-of-the-art algorithms, the proposed algorithms demonstrate superior performance in both speed and solution quality. The MATLAB code of nonnegative matrix/tensor decomposition and completion, along with a few demos, are accessible from the authors’ homepages.", "title": "" }, { "docid": "187b77bfa5ac3110a7fd91ff17a1b456", "text": "Educational games have enhanced the value of instruction procedures in institutions and business organizations. Factors that increase students’ adoption of learning games have been widely studied in past; however, the effect of these factors on learners’ performance is yet to be explored. In this study, factors of Enjoyment, Happiness, and Intention to Use were chosen as important attitudes in learning educational games and increasing learning performance. A two-step between group experiment was conducted: the first study compared game-based learning and traditional instruction in order to verify the value of the game. 41 Gymnasium (middle school) students were involved, and the control and experimental groups were formed based on a pretest method. The second study, involving 46 Gymnasium students, empirically evaluates whether and how certain attitudinal factors affect learners’ performance. The results of the two-part experiment showed that a) the game demonstrated good performance (as compared to traditional instruction) concerning the gain of knowledge, b) learners’ enjoyment of the game has a significant relation with their performance, and c) learners’ intention to use and happiness with the game do not have any relation with their performance. Our results suggest that there are attitudinal factors affecting knowledge acquisition gained by a game. 2013 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "cf58d2d80764a5c8446d82b1b9499c00", "text": "Estimation is a critical component of synchronization in wireless and signal processing systems. There is a rich body of work on estimator derivation, optimization, and statistical characterization from analytic system models which are used pervasively today. We explore an alternative approach to building estimators which relies principally on approximate regression using large datasets and large computationally efficient artificial neural network models capable of learning non-linear function mappings which provide compact and accurate estimates. For single carrier PSK modulation, we explore the accuracy and computational complexity of such estimators compared with the current gold-standard analytically derived alternatives. We compare performance in various wireless operating conditions and consider the trade offs between the two different classes of systems. Our results show the learned estimators can provide improvements in areas such as short-time estimation and estimation under non-trivial real world channel conditions such as fading or other non-linear hardware or propagation effects.", "title": "" }, { "docid": "9b45bb1734e9afc34b14fa4bc47d8fba", "text": "To achieve complex solutions in the rapidly changing world of e-commerce, it is impossible to go it alone. This explains the latest trend in IT outsourcing---global and partner-based alliances. But where do we go from here?", "title": "" }, { "docid": "314e1b8bbcc0a5735d86bb751d524a93", "text": "Ubiquinone (coenzyme Q), in addition to its function as an electron and proton carrier in mitochondrial and bacterial electron transport linked to ATP synthesis, acts in its reduced form (ubiquinol) as an antioxidant, preventing the initiation and/or propagation of lipid peroxidation in biological membranes and in serum low-density lipoprotein. The antioxidant activity of ubiquinol is independent of the effect of vitamin E, which acts as a chain-breaking antioxidant inhibiting the propagation of lipid peroxidation. In addition, ubiquinol can efficiently sustain the effect of vitamin E by regenerating the vitamin from the tocopheroxyl radical, which otherwise must rely on water-soluble agents such as ascorbate (vitamin C). Ubiquinol is the only known lipid-soluble antioxidant that animal cells can synthesize de novo, and for which there exist enzymic mechanisms that can regenerate the antioxidant from its oxidized form resulting from its inhibitory effect of lipid peroxidation. These features, together with its high degree of hydrophobicity and its widespread occurrence in biological membranes and in low-density lipoprotein, suggest an important role of ubiquinol in cellular defense against oxidative damage. Degenerative diseases and aging may bc 1 manifestations of a decreased capacity to maintain adequate ubiquinol levels.", "title": "" }, { "docid": "b75847420d86f2dfd4d1e43b8f23d449", "text": "Since the inception of Deep Reinforcement Learning (DRL) algorithms, there has been a growing interest in both research and industrial communities in the promising potentials of this paradigm. The list of current and envisioned applications of deep RL ranges from autonomous navigation and robotics to control applications in the critical infrastructure, air traffic control, defense technologies, and cybersecurity. While the landscape of opportunities and the advantages of deep RL algorithms are justifiably vast, the security risks and issues in such algorithms remain largely unexplored. To facilitate and motivate further research on these critical challenges, this paper presents a foundational treatment of the security problem in DRL. We formulate the security requirements of DRL, and provide a high-level threat model through the classification and identification of vulnerabilities, attack vectors, and adversarial capabilities. Furthermore, we present a review of current literature on security of deep RL from both offensive and defensive perspectives. Lastly, we enumerate critical research venues and open problems in mitigation and prevention of intentional attacks against deep RL as a roadmap for further research in this area.", "title": "" }, { "docid": "1700ee1ba5fef2c9efa9a2b8bfa7d6bd", "text": "This work studies resource allocation in a cloud market through the auction of Virtual Machine (VM) instances. It generalizes the existing literature by introducing combinatorial auctions of heterogeneous VMs, and models dynamic VM provisioning. Social welfare maximization under dynamic resource provisioning is proven NP-hard, and modeled with a linear integer program. An efficient α-approximation algorithm is designed, with α ~ 2.72 in typical scenarios. We then employ this algorithm as a building block for designing a randomized combinatorial auction that is computationally efficient, truthful in expectation, and guarantees the same social welfare approximation factor α. A key technique in the design is to utilize a pair of tailored primal and dual LPs for exploiting the underlying packing structure of the social welfare maximization problem, to decompose its fractional solution into a convex combination of integral solutions. Empirical studies driven by Google Cluster traces verify the efficacy of the randomized auction.", "title": "" }, { "docid": "66c8bf3b0cfbfdf8add2fffd055b7f03", "text": "This paper continues the long-standing tradition of gradually improving the construction speed of spatial acceleration structures using sorted Morton codes. Previous work on this topic forms a clear sequence where each new paper sheds more light on the nature of the problem and improves the hierarchy generation phase in terms of performance, simplicity, parallelism and generality. Previous approaches constructed the tree by firstly generating the hierarchy and then calculating the bounding boxes of each node by using a bottom-up traversal. Continuing the work, we present an improvement by providing a bottom-up method that finds each node’s parent while assigning bounding boxes, thus constructing the tree in linear time in a single kernel launch. Also, our method allows clustering the sorted points using an user-defined distance metric function.", "title": "" }, { "docid": "41be57e3d2a09de36f3881cb08a028db", "text": "Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for information security domain knowledge. Besides existing best-practice guidelines such as the German IT Grundschutz Manual also concrete knowledge of the considered organization is incorporated. An evaluation conducted by an information security expert team has shown that this knowledge model can be used to support a broad range of information security risk management approaches.", "title": "" }, { "docid": "7e736d4f906a28d4796fe7ac404b5f94", "text": "The internal program representation chosen for a software development environment plays a critical role in the nature of that environment. A form should facilitate implementation and contribute to the responsiveness of the environment to the user. The program dependence graph (PDG) may be a suitable internal form. It allows programs to be sliced in linear time for debugging and for use by language-directed editors. The slices obtained are more accurate than those obtained with existing methods because I/O is accounted for correctly and irrelevant statements on multi-statement lines are not displayed. The PDG may be interpreted in a data driven fashion or may have highly optimized (including vectorized) code produced from it. It is amenable to incremental data flow analysis, improving response time to the user in an interactive environment and facilitating debugging through data flow anomaly detection. It may also offer a good basis for software complexity metrics, adding to the completeness of an environment based on it.", "title": "" }, { "docid": "82e13bf3c98942f69bc438535f882fbd", "text": "While residential broadband Internet access is popular in many parts of the world, only a few studies have examined the characteristics of such traffic. In this paper we describe observations from monitoring the network activity for more than 20,000 residential DSL customers in an urban area. To ensure privacy, all data is immediately anonymized. We augment the anonymized packet traces with information about DSL-level sessions, IP (re-)assignments, and DSL link bandwidth.\n Our analysis reveals a number of surprises in terms of the mental models we developed from the measurement literature. For example, we find that HTTP - not peer-to-peer - traffic dominates by a significant margin; that more often than not the home user's immediate ISP connectivity contributes more to the round-trip times the user experiences than the WAN portion of the path; and that the DSL lines are frequently not the bottleneck in bulk-transfer performance.", "title": "" }, { "docid": "3cd359e15635b8c9485df5c37118e607", "text": "PROBLEM/CONDITION\nData from a population-based, multisite surveillance network were used to determine the prevalence of autism spectrum disorders (ASDs) among children aged 8 years in 14 areas of the United States and to describe the characteristics of these children.\n\n\nREPORTING PERIOD\n2002.\n\n\nMETHODS\nChildren aged 8 years were identified as having an ASD through screening and abstraction of evaluation records at health facilities for all 14 sites and through information from psychoeducational evaluations for special education services for 10 of the 14 sites. Case status was determined through clinician review of data abstracted from the records. Children whose parent(s) or legal guardian(s) resided in the respective areas in 2002 and whose records documented behaviors consistent with the Diagnostic and Statistical Manual, Fourth Edition, Text Revision (DSM-IV-TR) criteria for autistic disorder; pervasive developmental disorder, not otherwise specified; or Asperger disorder were classified as having ASDs.\n\n\nRESULTS\nFor 2002, of 407,578 children aged 8 years in the 14 surveillance areas, 2,685 (0.66%) were identified as having an ASD. ASD prevalence per 1,000 children aged 8 years ranged from 3.3 (Alabama) to 10.6 (New Jersey), with the majority of sites ranging from 5.2 to 7.6 (overall mean: 6.6 [i.e., one of every 152 children across all sites). ASD prevalence was significantly lower than all other sites in Alabama (p<0.001) and higher in New Jersey (p<0.0001). ASD prevalence varied by identification source, with higher average prevalence for ASDs in sites with access to health and education records (mean: 7.2) compared with sites with health records only (mean: 5.1). Five sites identified a higher prevalence of ASDs for non-Hispanic white children than for non-Hispanic black children. The ratio of males to females ranged from 3.4:1.0 in Maryland, South Carolina, and Wisconsin to 6.5:1.0 in Utah. The majority of children were receiving special education services at age 8 years and had a documented history of concerns regarding their development before age 3 years. However, the median age of earliest documented ASD diagnosis was much later (range: 49 months [Utah]--66 months [Alabama]). The proportion of children with characteristics consistent with the criteria for an ASD classification who had a previously documented ASD classification varied across sites. In the majority of sites, females with an ASD were more likely than males to have cognitive impairment. For the six sites for which prevalence data were available from both 2000 and 2002, ASD prevalence was stable in four sites and increased in two sites (17% in Georgia and 39% in West Virginia).\n\n\nINTERPRETATION\nResults from the second report of a U.S. multisite collaboration to monitor ASD prevalence demonstrated consistency of prevalence in the majority of sites, with variation in two sites. Prevalence was stable in the majority of sites for which 2 years of data were available, but an increase in West Virginia and a trend toward an increase in Georgia indicate the need for ongoing monitoring of ASD prevalence.\n\n\nPUBLIC HEALTH ACTIONS\nThese ASD prevalence data provide the most complete information on the prevalence of the ASDs in the United States to date. The data confirm that ASD prevalence is a continuing urgent public health concern affecting an approximate average of one child in every 150 and that efforts are needed to improve early identification of ASDs.", "title": "" }, { "docid": "eab514f5951a9e2d3752002c7ba799d8", "text": "In industrial fabric productions, automated real time systems are needed to find out the minor defects. It will save the cost by not transporting defected products and also would help in making compmay image of quality fabrics by sending out only undefected products. A real time fabric defect detection system (FDDS), implementd on an embedded DSP platform is presented here. Textural features of fabric image are extracted based on gray level co-occurrence matrix (GLCM). A sliding window technique is used for defect detection where window moves over the whole image computing a textural energy from the GLCM of the fabric image. The energy values are compared to a reference and the deviations beyond a threshold are reported as defects and also visually represented by a window. The implementation is carried out on a TI TMS320DM642 platform and programmed using code composer studio software. The real time output of this implementation was shown on a monitor. KeywordsFabric Defects, Texture, Grey Level Co-occurrence Matrix, DSP Kit, Energy Computation, Sliding Window, FDDS", "title": "" }, { "docid": "fc32e7b46094c1cfe878c8324b91fcf2", "text": "The recent increase in information technologies dedicated to optimal design, associated with the progress of the numerical tools for predicting ship hydrodynamic performances, allows significant improvement in ship design. A consortium of fourteen European partners – bringing together ship yards, model basins, consultants, research centres and universities – has therefore conducted a three years European R&D project (FANTASTIC) with the goal to improve the functional design of ship hull shapes. The following key issues were thus considered: parametric shape modelling was worked on through several complementary approaches, CFD tools and associated interfaces were enhanced to meet efficiency and robustness requirements, appropriate design space exploration and optimisation techniques were investigated. The resulting procedures where then implemented, for practical assessment purposes, in some end-users design environments, and a number of applications were undertaken.. Significant gains can be expected from this approach in design, in term of time used for performance analysis and explored range of design variations.", "title": "" }, { "docid": "1772d22c19635b6636e42f8bb1b1a674", "text": "• MacArthur Fellowship, 2010 • Guggenheim Fellowship, 2010 • Li Ka Shing Foundation Women in Science Distinguished Lectu re Series Award, 2010 • MIT Technology Review TR-35 Award (recognizing the world’s top innovators under the age of 35), 2009. • Okawa Foundation Research Award, 2008. • Sloan Research Fellow, 2007. • Best Paper Award, 2007 USENIX Security Symposium. • George Tallman Ladd Research Award, Carnegie Mellon Univer sity, 2007. • Highest ranked paper, 2006 IEEE Security and Privacy Sympos ium; paper invited to a special issue of the IEEE Transactions on Dependable and Secure Computing. • NSF CAREER Award on “Exterminating Large Scale Internet Att acks”, 2005. • IBM Faculty Award, 2005. • Highest ranked paper, 1999 IEEE Computer Security Foundati on Workshop; paper invited to a special issue of Journal of Computer Security.", "title": "" }, { "docid": "9b0ed9c60666c36f8cf33631f791687d", "text": "The central notion of Role-Based Access Control (RBAC) is that users do not have discretionary access to enterprise objects. Instead, access permissions are administratively associated with roles, and users are administratively made members of appropriate roles. This idea greatly simplifies management of authorization while providing an opportunity for great flexibility in specifying and enforcing enterprisespecific protection policies. Users can be made members of roles as determined by their responsibilities and qualifications and can be easily reassigned from one role to another without modifying the underlying access structure. Roles can be granted new permissions as new applications and actions are incorporated, and permissions can be revoked from roles as needed. Some users and vendors have recognized the potential benefits of RBAC without a precise definition of what RBAC constitutes. Some RBAC features have been implemented in commercial products without a frame of reference as to the functional makeup and virtues of RBAC [1]. This lack of definition makes it difficult for consumers to compare products and for vendors to get credit for the effectiveness of their products in addressing known security problems. To correct these deficiencies, a number of government sponsored research efforts are underway to define RBAC precisely in terms of its features and the benefits it affords. This research includes: surveys to better understand the security needs of commercial and government users [2], the development of a formal RBAC model, architecture, prototype, and demonstrations to validate its use and feasibility. As a result of these efforts, RBAC systems are now beginning to emerge. The purpose of this paper is to provide additional insight as to the motivations and functionality that might go behind the official RBAC name.", "title": "" }, { "docid": "ac57fab046cfd02efa1ece262b07492f", "text": "Interactive Narrative is an approach to interactive entertainment that enables the player to make decisions that directly affect the direction and/or outcome of the narrative experience being delivered by the computer system. Interactive narrative requires two seemingly conflicting requirements: coherent narrative and user agency. We present an interactive narrative system that uses a combination of narrative control and autonomous believable character agents to augment a story world simulation in which the user has a high degree of agency with narrative plot control. A drama manager called the Automated Story Director gives plot-based guidance to believable agents. The believable agents are endowed with the autonomy necessary to carry out directives in the most believable fashion possible. Agents also handle interaction with the user. When the user performs actions that change the world in such a way that the Automated Story Director can no longer drive the intended narrative forward, it is able to adapt the plot to incorporate the user’s changes and still achieve", "title": "" }, { "docid": "3370a138771566427fde6208dac759b7", "text": "Communication protocols determine how network components interact with each other. Therefore, the ability to derive a speci cation of a protocol can be useful in various contexts, such as to support deeper black-box testing or e ective defense mechanisms. Unfortunately, it is often hard to obtain the speci cation because systems implement closed (i.e., undocumented) protocols, or because a time consuming translation has to be performed, from the textual description of the protocol to a format readable by the tools. To address these issues, we propose a new methodology to automatically infer a speci cation of a protocol from network traces, which generates automata for the protocol language and state machine. Since our solution only resorts to interaction samples of the protocol, it is well-suited to uncover the message formats and protocol states of closed protocols and also to automate most of the process of specifying open protocols. The approach was implemented in ReverX and experimentally evaluated with publicly available FTP traces. Our results show that the inferred speci cation is a good approximation of the reference speci cation, exhibiting a high level of precision and recall.", "title": "" }, { "docid": "9b9a2a9695f90a6a9a0d800192dd76f6", "text": "Due to high competition in today's business and the need for satisfactory communication with customers, companies understand the inevitable necessity to focus not only on preventing customer churn but also on predicting their needs and providing the best services for them. The purpose of this article is to predict future services needed by wireless users, with data mining techniques. For this purpose, the database of customers of an ISP in Shiraz, which logs the customer usage of wireless internet connections, is utilized. Since internet service has three main factors to define (Time, Speed, Traffics) we predict each separately. First, future service demand is predicted by implementing a simple Recency, Frequency, Monetary (RFM) as a basic model. Other factors such as duration from first use, slope of customer's usage curve, percentage of activation, Bytes In, Bytes Out and the number of retries to establish a connection and also customer lifetime value are considered and added to RFM model. Then each one of R, F, M criteria is alternately omitted and the result is evaluated. Assessment is done through analysis node which determines the accuracy of evaluated data among partitioned data. The result shows that CART and C5.0 are the best algorithms to predict future services in this case. As for the features, depending upon output of each features, duration and transfer Bytes are the most important after RFM. An ISP may use the model discussed in this article to meet customers' demands and ensure their loyalty and satisfaction.", "title": "" }, { "docid": "96fceea1d65c319a40aefef58577859f", "text": "PURPOSE\nTo evaluate the diagnostic utility of scaphoid dorsal subluxation on magnetic resonance imaging (MRI) as a predictor of scapholunate interosseous ligament (SLIL) tears and compare this with radiographic findings.\n\n\nMETHODS\nThirty-six MRIs were retrospectively reviewed: 18 with known operative findings of complete Geissler IV SLIL tears that were surgically repaired, and 18 MRIs performed for ulnar-sided wrist pain but no SLIL tear. Dorsal subluxation of the scaphoid was measured on the sagittal MRI cut, which demonstrated the maximum subluxation. Independent samples t tests were used to compare radiographic measurements of scapholunate (SL) gap, SL angle, and capitolunate/third metacarpal-lunate angles between the SLIL tear and the control groups and to compare radiographic measurements between wrists that had dorsal subluxation of the scaphoid and wrists that did not have dorsal subluxation. Interrater reliability of subluxation measurements on lateral radiographs and on MRI were calculated using kappa coefficients.\n\n\nRESULTS\nThirteen of 18 wrists with complete SLIL tears had greater than 10% dorsal subluxation of the scaphoid relative to the scaphoid facet. Average subluxation in this group was 34%. Four of 18 wrists with known SLIL tears had no subluxation. No wrists without SLIL tears (control group) had dorsal subluxation. The SL angle, capitolunate/third metacarpal-lunate angle and SL gap were greater in wrists that had dorsal subluxation of the scaphoid on MRI. Interrater reliability of measurements of dorsal subluxation of the scaphoid was superior on MRI than on lateral x-ray.\n\n\nCONCLUSIONS\nAn MRI demonstration of dorsal subluxation of the scaphoid, of as little as 10%, as a predictor of SLIL tear had a sensitivity of 72% and a specificity of 100%. The high positive predictive value indicates that the presence of dorsal subluxation accurately predicts SLIL tear.\n\n\nTYPE OF STUDY/LEVEL OF EVIDENCE\nDiagnostic II.", "title": "" } ]
scidocsrr
380c9689d9a0f32cb3f0ac9a496105f2
Quick Training of Probabilistic Neural Nets by Importance Sampling
[ { "docid": "5fe5fd5d74517282956137169e36743d", "text": "This paper presents an attempt at using the syntactic structure in natural language for improved language models for speech recognition. The structured language model merges techniques in automatic parsing and language modeling using an original probabilistic parameterization of a shift-reduce parser. A maximum likelihood re-estimation procedure belonging to the class of expectation-maximization algorithms is employed for training the model. Experiments on theWall Street JournalandSwitchboardcorpora show improvement in both perplexity and word error rate—word lattice rescoring—over the standard 3-gram language model. c © 2000 Academic Press", "title": "" }, { "docid": "062c970a14ac0715ccf96cee464a4fec", "text": "A goal of statistical language modeling is to learn the joint probability function of sequences of words in a language. This is intrinsically difficult because of the curse of dimensionality: a word sequence on which the model will be tested is likely to be different from all the word sequences seen during training. Traditional but very successful approaches based on n-grams obtain generalization by concatenating very short overlapping sequences seen in the training set. We propose to fight the curse of dimensionality by learning a distributed representation for words which allows each training sentence to inform the model about an exponential number of semantically neighboring sentences. The model learns simultaneously (1) a distributed representation for each word along with (2) the probability function for word sequences, expressed in terms of these representations. Generalization is obtained because a sequence of words that has never been seen before gets high probability if it is made of words that are similar (in the sense of having a nearby representation) to words forming an already seen sentence. Training such large models (with millions of parameters) within a reasonable time is itself a significant challenge. We report on experiments using neural networks for the probability function, showing on two text corpora that the proposed approach significantly improves on state-of-the-art n-gram models, and that the proposed approach allows to take advantage of longer contexts.", "title": "" } ]
[ { "docid": "d8d17aa5e709ebd4dda676eadb531ef3", "text": "The combination of global and partial features has been an essential solution to improve discriminative performances in person re-identification (Re-ID) tasks. Previous part-based methods mainly focus on locating regions with specific pre-defined semantics to learn local representations, which increases learning difficulty but not efficient or robust to scenarios with large variances. In this paper, we propose an end-to-end feature learning strategy integrating discriminative information with various granularities. We carefully design the Multiple Granularity Network (MGN), a multi-branch deep network architecture consisting of one branch for global feature representations and two branches for local feature representations. Instead of learning on semantic regions, we uniformly partition the images into several stripes, and vary the number of parts in different local branches to obtain local feature representations with multiple granularities. Comprehensive experiments implemented on the mainstream evaluation datasets including Market-1501, DukeMTMC-reid and CUHK03 indicate that our method robustly achieves state-of-the-art performances and outperforms any existing approaches by a large margin. For example, on Market-1501 dataset in single query mode, we obtain a top result of Rank-1/mAP=96.6%/94.2% with this method after re-ranking.", "title": "" }, { "docid": "55063694f2b4582d423c0764e5758fe2", "text": "The mean-variance principle of Markowitz (1952) for portfolio selection gives disappointing results once the mean and variance are replaced by their sample counterparts. The problem is ampli…ed when the number of assets is large and the sample covariance is singular or nearly singular. In this paper, we investigate four regularization techniques to stabilize the inverse of the covariance matrix: the ridge, spectral cut-o¤, Landweber-Fridman and LARS Lasso. These four methods involve a tuning parameter that needs to be selected. The main contribution is to derive a data-driven method for selecting the tuning parameter in an optimal way, i.e. in order to minimize a quadratic loss function measuring the distance between the estimated allocation and the optimal one. The cross-validation type criterion takes a similar form for the four regularization methods. Preliminary simulations show that regularizing yields a higher out-of-sample performance than the sample based Markowitz portfolio and often outperforms the 1 over N equal weights portfolio. We thank Raymond Kan, Bruce Hansen, and Marc Henry for their helpful comments.", "title": "" }, { "docid": "8a2985df82dd324492b9cc4f843a6c00", "text": "This paper addresses the problem of finding sparse solutions to linear systems. Although this problem involves two competing cost function terms (measurement error and a sparsity-inducing term), previous approaches combine these into a single cost term and solve the problem using conventional numerical optimization methods. In contrast, the main contribution of this paper is to use a multiobjective approach. The paper begins by investigating the sparse reconstruction problem, and presents data to show that knee regions do exist on the Pareto front (PF) for this problem and that optimal solutions can be found in these knee regions. Another contribution of the paper, a new soft-thresholding evolutionary multiobjective algorithm (StEMO), is then presented, which uses a soft-thresholding technique to incorporate two additional heuristics: one with greater chance to increase speed of convergence toward the PF, and another with higher probability to improve the spread of solutions along the PF, enabling an optimal solution to be found in the knee region. Experiments are presented, which show that StEMO significantly outperforms five other well known techniques that are commonly used for sparse reconstruction. Practical applications are also demonstrated to fundamental problems of recovering signals and images from noisy data.", "title": "" }, { "docid": "71fd5cd95c13df2f80a3659d1e010b14", "text": "Large-scale graph processing is gaining increasing attentions in many domains. Meanwhile, FPGA provides a power-efficient and highly parallel platform for many applications, and has been applied to custom computing in many domains. In this paper, we describe FPGP (FPGA Graph Processing), a streamlined vertex-centric graph processing framework on FPGA, based on the interval-shard structure. FPGP is adaptable to different graph algorithms and users do not need to change the whole implementation on the FPGA. In our implementation, an on-chip parallel graph processor is proposed to both maximize the off-chip bandwidth of graph data and fully utilize the parallelism of graph processing. Meanwhile, we analyze the performance of FPGP and show the scalability of FPGP when the bandwidth of data path increases. FPGP is more power-efficient than single machine systems and scalable to larger graphs compared with other FPGA-based graph systems.", "title": "" }, { "docid": "3fe9dfb8334111ea56d40010ff7a70fa", "text": "1 Summary. The paper presents the LINK application, which is a decision-support system dedicated for operational and investigational activities of homeland security services. The paper briefly discusses issues of criminal analysis, possibilities of utilizing spatial (geographical) information together with crime mapping and spatial analyses. LINK – ŚRODOWISKO ANALIZ KRYMINALNYCH WYKORZYSTUJĄCE NARZĘRZIA ANALIZ GEOPRZESTRZENNYCH Streszczenie. Artykuł prezentuje system LINK będący zintegrowanym środowi-skiem wspomagania analizy kryminalnej przeznaczonym do działań operacyjnych i śledczych służb bezpieczeństwa wewnętrznego. W artykule omówiono problemy analizy kryminalnej, możliwość wykorzystania informacji o charakterze przestrzen-nym oraz narzędzia i metody analiz geoprzestrzennych.", "title": "" }, { "docid": "6af7479d44717a58216dfd986f7f56e5", "text": "Mobile payment systems can be divided into five categories including mobile payment at the POS, mobile payment as the POS, mobile payment platform, independent mobile payment system, and direct carrier billing. Although mobile payment has gained its popularity in many regions due to its convenience, it also faces many threats and security challenges. In this paper, we present a mobile payment processing model and introduce each type of mobile payment systems. We summarize the security services desired in mobile payment systems and also the security mechanisms which are currently in place. We further identify and discuss three security threats, i.e., malware, SSL/TLS vulnerabilities, and data breaches, and four security challenges, i.e., malware detection, multi-factor authentication, data breach prevention, and fraud detection and prevention, in mobile payment systems.", "title": "" }, { "docid": "0569bcd89de031431e755ad827cc6828", "text": "In his enigmatic death bed letter to Hardy, written in January 1920, Ramanujan introduced the notion of a mock theta function. Despite many works, very little was known about the role that these functions play within the theory of automorphic and modular forms until 2002. In that year Sander Zwegers (in his Ph.D. thesis) established that these functions are “holomorphic parts” of harmonic Maass forms. This realization has resulted in many applications in a wide variety of areas: arithmetic geometry, combinatorics, modular forms, and mathematical physics. Here we outline the general facets of the theory, and we give several applications to number theory: partitions and q-series, modular forms, singular moduli, Borcherds products, extensions of theorems of Kohnen-Zagier and Waldspurger on modular L-functions, and the work of Bruinier and Yang on Gross-Zagier formulae. Following our discussion of these works on harmonic Maass forms, we shall then study the emerging new theory of quantum modular forms. Don Zagier introduced the notion of a quantum modular form in his 2010 Clay lecture, and it turns out that a beautiful part of this theory lives at the interface of classical modular forms and harmonic Maass forms.", "title": "" }, { "docid": "8ba7438bb5def91fb7d0c1d59e4bb7c4", "text": "In the almost twenty years since Vasarhelyi and Halper (1991) reported on their pioneering implementation of what has come to be known as Continuous Auditing (CA), the concept has increasingly moved from theory into practice. A 2006 survey by PricewaterhouseCoopers shows that half of all responding firms use some sort of CA techniques, and the majority of the rest plan to do so in the near future. CA not only has an increasing impact on auditing practice, but is also one of the rare instances in which such a significant change was led by the researchers. In this paper we survey the state of CA after two decades of research into continuous auditing theory and practice, and draw out the lessons learned by us in recent pilot CA projects at two major firms, to examine where this unique partnership between academics and auditors will take CA in the future.", "title": "" }, { "docid": "19a1a5d69037f0072f67c785031b0881", "text": "In recent years, advances in the design of convolutional neural networks have resulted in signi€cant improvements on the image classi€cation and object detection problems. One of the advances is networks built by stacking complex cells, seen in such networks as InceptionNet and NasNet. Œese cells are either constructed by hand, generated by generative networks or discovered by search. Unlike conventional networks (where layers consist of a convolution block, sampling and non linear unit), the new cells feature more complex designs consisting of several €lters and other operators connected in series and parallel. Recently, several cells have been proposed or generated that are supersets of previously proposed custom or generated cells. Inƒuenced by this, we introduce a network construction method based on EnvelopeNets. An EnvelopeNet is a deep convolutional neural network of stacked EnvelopeCells. EnvelopeCells are supersets (or envelopes) of previously proposed handcra‰ed and generated cells. We propose a method to construct improved network architectures by restructuring EnvelopeNets. Œe algorithm restructures an EnvelopeNet by rearranging blocks in the network. It identi€es blocks to be restructured using metrics derived from the featuremaps collected during a partial training run of the EnvelopeNet. Œe method requires less computation resources to generate an architecture than an optimized architecture search over the entire search space of blocks. Œe restructured networks have higher accuracy on the image classi€cation problem on a representative dataset than both the generating EnvelopeNet and an equivalent arbitrary network.", "title": "" }, { "docid": "78115381712dc06cdaeb91ef506e5e37", "text": "Integration is a key step in utilizing advances in GaN technologies and enabling efficient switched-mode power conversion at very high frequencies (VHF). This paper addresses design and implementation of monolithic GaN half-bridge power stages with integrated gate drivers optimized for pulsewidth-modulated (PWM) dc-dc converters operating at 100 MHz switching frequency. Three gate-driver circuit topologies are considered for integration with half-bridge power stages in a 0.15-μm depletion-mode GaN-on-SiC process: an active pull-up driver, a bootstrapped driver, and a novel modified active pull-up driver. An analytical loss model is developed and used to optimize the monolithic GaN chips, which are then used to construct 20 V, 5 W, 100 MHz synchronous buck converter prototypes. With the bootstrapped and the modified pull-up gate-driver circuits, power stage efficiencies above 91% and total efficiencies close to 88% are demonstrated. The modified active pull-up driver, which offers 80% reduction in the driver area, is found to be the best-performing approach in the depletion-mode GaN process. These results demonstrate feasibility of high-efficiency VHF PWM dc-dc converters based on high levels of integration in GaN processes.", "title": "" }, { "docid": "1e929868d6d36aa6399d6fa79bd98d7f", "text": "The Prolog programmer’s needs have always been the focus for guiding the development of the SWI-Prolog system. This article accompanies an invited talk about how the SWI-Prolog environment helps the Prolog programmer solve common problems. It describes the central parts of the graphical development environment as well as the command line tools which we see as vital to the success of the system. We hope this comprehensive overview of particularly useful features will both inspire other Prolog developers, and help SWI-Prolog users to make more productive use of the system.", "title": "" }, { "docid": "28c3e990b40b62069010e0a7f94adb11", "text": "Steep sub-threshold transistors are promising candidates to replace the traditional MOSFETs for sub-threshold leakage reduction. In this paper, we explore the use of Inter-Band Tunnel Field Effect Transistors (TFETs) in SRAMs at ultra low supply voltages. The uni-directional current conducting TFETs limit the viability of 6T SRAM cells. To overcome this limitation, 7T SRAM designs were proposed earlier at the cost of extra silicon area. In this paper, we propose a novel 6T SRAM design using Si-TFETs for reliable operation with low leakage at ultra low voltages. We also demonstrate that a functional 6T TFET SRAM design with comparable stability margins and faster performances at low voltages can be realized using proposed design when compared with the 7T TFET SRAM cell. We achieve a leakage reduction improvement of 700X and 1600X over traditional CMOS SRAM designs at VDD of 0.3V and 0.5V respectively which makes it suitable for use at ultra-low power applications.", "title": "" }, { "docid": "7beb0fa9fa3519d291aa3d224bfc1b74", "text": "In comparisons among Chicago neighbourhoods, homicide rates in 1988-93 varied more than 100-fold, while male life expectancy at birth ranged from 54 to 77 years, even with effects of homicide mortality removed. This \"cause deleted\" life expectancy was highly correlated with homicide rates; a measure of economic inequality added significant additional prediction, whereas median household income did not. Deaths from internal causes (diseases) show similar age patterns, despite different absolute levels, in the best and worst neighbourhoods, whereas deaths from external causes (homicide, accident, suicide) do not. As life expectancy declines across neighbourhoods, women reproduce earlier; by age 30, however, neighbourhood no longer affects age specific fertility. These results support the hypothesis that life expectancy itself may be a psychologically salient determinant of risk taking and the timing of life transitions.", "title": "" }, { "docid": "00068e4dc90e9bb9f3b8ca7f8e09f679", "text": "In the semiconductor industry, many manufacturing processes, such as CVD or dry etching, are performed in vacuum condition. The electrostatic wafer chuck is the most preferable handling method under such circumstances. It enables retention of a wafer flat and enhanced heat transfer through the whole surface area because the wafer can firmly contact with the chuck. We have investigated the fundamental study of an electrostatic chuck with comb type electrodes and a thin dielectric film. In order to remove the air gap between them, silicone oil is used as a filler to prevent breakdown. The experimental results proved the potential to use the electrostatic chuck for silicon wafer handling. There, however, is a problem which comes from using silicone oil as an insulating filler. The thin dielectric film is easily deformed by tension when the object starts moving. In this report experimental results of the electrostatic wafer chuck are shown when insulating sealant, instead of silicone oil, is used. The electrostatic force acting on the 4 inch silicon wafer is examined with several types of sealant and dielectric films. The electrostatic force increased with the square of the applied voltage for lower voltage and gradually saturated at higher voltage, and the maximum force obtained was approximately 30 N.", "title": "" }, { "docid": "5a416fb88c3f5980989f7556fb19755c", "text": "Cloud computing helps to share data and provide many resources to users. Users pay only for those resources as much they used. Cloud computing stores the data and distributed resources in the open environment. The amount of data storage increases quickly in open environment. So, load balancing is a main challenge in cloud environment. Load balancing is helped to distribute the dynamic workload across multiple nodes to ensure that no single node is overloaded. It helps in proper utilization of resources .It also improve the performance of the system. Many existing algorithms provide load balancing and better resource utilization. There are various types load are possible in cloud computing like memory, CPU and network load. Load balancing is the process of finding overloaded nodes and then transferring the extra load to other nodes.", "title": "" }, { "docid": "7aa3aa25923108f266a7855f4b238a78", "text": "Collection of multiple annotations from the crowd workers is useful for diverse applications. In this paper, the problem of obtaining the final judgment from such crowd-based annotations has been addressed in an unsupervised way using a biclustering-based approach. Results on multiple datasets show that the proposed approach is competitively better than others, without even using the entire dataset.", "title": "" }, { "docid": "5b75356c6fc7e277158210f0b4640e41", "text": "A central methodological problem of historical studies, in linguistics as in other disciplines, is that data are limited to what happens to have survived the vicissitudes of time. In particular, we cannot perform experiments to broaden the range of facts available for analysis, to compensate for sampling biases in the preservation of data or to test the validity of hypotheses. In historical syntax, the domain of this study, the problem is particularly acute, since grammatical analysis depends on negative evidence, the knowledge that certain sentence types are unacceptable. When we study living languages, we obtain such information experimentally, usually by elicitation of judgments of acceptability from informants. Though the methodological difficulties inherent in the experimental method of contemporary syntactic investigation may be substantial (Labov, 1975b), the information it provides forms the necessary basis of grammatical analysis. Hence, syntacticians who wish to interrogate historical material find themselves in difficulty. The difficulty will be mitigated if two reasonable assumptions are made (see, for example, Adams, 1987b; Santorini, 1989): 1) The past is like the present and general principles derived from the study of living languages in the present will hold of archaic ones as well. This assumption allows the historical syntactician to, in the words of Labov, \"use the present to explain the past (Labov, 1975a).\" 2) For reasonably simple sentences, if a certain type does not occur in a substantial corpus, then it is not grammatically possible in the language of that corpus. Here the assumption is, of course, problematic since non-occurrence in a corpus may always be due to non-grammatical, contextual factors or even to chance. Still, for structurally simple cases, including those we will be considering in this paper, it is unlikely to lead us far astray.", "title": "" }, { "docid": "cf9e2a3b1903b6addd0679cea2c9d564", "text": "The anatomic basis for the jowl has not been fully described. A formal analysis was performed of the sub-superficial musculoaponeurotic system (SMAS) areolar tissue layer, which overlies the lower part of the masseter. For this research, facial dissections were performed on 16 fresh cadavers ages 12 to 89 years, and detailed anatomic observations were made during the course of several hundred rhytidectomy procedures. Tissue samples from varying age groups were examined histologically. The areolar cleavage plane overlying the lower masseter has specific boundaries and is a true space named the “premasseter space.” This space is rhomboidal in shape, lined by membrane, and reinforced by retaining ligaments. The masseter fascia lines the floor, and branches of the facial nerve pass under its deep surface. Histologically, the floor is formed by a thin layer of dense connective tissue, which undergoes minor deterioration in architectural arrangement with age. The roof, lined by a thin transparent and adherent membrane on the underside of the platysma, has a less dense collagen network and contains more elastin. With age, there is a significant reduction in the collagen density of the roof. Expansion of the space with aging, secondary to weakness of the anterior and inferior boundaries, results in formation of the jowl. Medial to the premasseter space is the buccal fat in the masticator space, which descends with aging and contributes to the labiomandibular fold and jowl. Application of the premasseter space in surgery provides significant benefits. The SMAS incision should be forward of the traditional preauricular location to be over the space, not behind. Because the space is a naturally occurring cleavage plane, dissection is bloodless and safe, as all facial nerve branches are outside. The premasseter space should be considered as the preferred dissection plane for lower (cervicofacial) facelifts.", "title": "" }, { "docid": "5d4797cffc06cbde079bf4019dc196db", "text": "Automatically generating natural language descriptions of videos plays a fundamental challenge for computer vision community. Most recent progress in this problem has been achieved through employing 2-D and/or 3-D Convolutional Neural Networks (CNNs) to encode video content and Recurrent Neural Networks (RNNs) to decode a sentence. In this paper, we present Long Short-Term Memory with Transferred Semantic Attributes (LSTM-TSA)&#x2014;a novel deep architecture that incorporates the transferred semantic attributes learnt from images and videos into the CNN plus RNN framework, by training them in an end-to-end manner. The design of LSTM-TSA is highly inspired by the facts that 1) semantic attributes play a significant contribution to captioning, and 2) images and videos carry complementary semantics and thus can reinforce each other for captioning. To boost video captioning, we propose a novel transfer unit to model the mutually correlated attributes learnt from images and videos. Extensive experiments are conducted on three public datasets, i.e., MSVD, M-VAD and MPII-MD. Our proposed LSTM-TSA achieves to-date the best published performance in sentence generation on MSVD: 52.8% and 74.0% in terms of BLEU@4 and CIDEr-D. Superior results are also reported on M-VAD and MPII-MD when compared to state-of-the-art methods.", "title": "" }, { "docid": "7b552767a37a7d63591471195b2e002b", "text": "Point-of-interest (POI) recommendation, which helps mobile users explore new places, has become an important location-based service. Existing approaches for POI recommendation have been mainly focused on exploiting the information about user preferences, social influence, and geographical influence. However, these approaches cannot handle the scenario where users are expecting to have POI recommendation for a specific time period. To this end, in this paper, we propose a unified recommender system, named the 'Where and When to gO' (WWO) recommender system, to integrate the user interests and their evolving sequential preferences with temporal interval assessment. As a result, the WWO system can make recommendations dynamically for a specific time period and the traditional POI recommender system can be treated as the special case of the WWO system by setting this time period long enough. Specifically, to quantify users' sequential preferences, we consider the distributions of the temporal intervals between dependent POIs in the historical check-in sequences. Then, to estimate the distributions with only sparse observations, we develop the low-rank graph construction model, which identifies a set of bi-weighted graph bases so as to learn the static user preferences and the dynamic sequential preferences in a coherent way. Finally, we evaluate the proposed approach using real-world data sets from several location-based social networks (LBSNs). The experimental results show that our method outperforms the state-of-the-art approaches for POI recommendation in terms of various metrics, such as F-measure and NDCG, with a significant margin.", "title": "" } ]
scidocsrr
1edd1ffbef283d1cebfa1a3ce9e8a1ac
LabelRankT: incremental community detection in dynamic networks via label propagation
[ { "docid": "a50ec2ab9d5d313253c6656049d608b3", "text": "A cluster algorithm for graphs called the Markov Cluster algorithm (MCL algorithm) is introduced. The algorithm provides basically an interface to an algebraic process de ned on stochastic matrices, called the MCL process. The graphs may be both weighted (with nonnegative weight) and directed. Let G be such a graph. The MCL algorithm simulates ow in G by rst identifying G in a canonical way with a Markov graph G1. Flow is then alternatingly expanded and contracted, leading to a row of Markov Graphs G(i). Flow expansion corresponds with taking the k power of a stochastic matrix, where k 2 IN . Flow contraction corresponds with a parametrized operator r, r 0, which maps the set of (column) stochastic matrices onto itself. The image rM is obtained by raising each entry in M to the r th power and rescaling each column to have sum 1 again. The heuristic underlying this approach is the expectation that ow between dense regions which are sparsely connected will evaporate. The invariant limits of the process are easily derived and in practice the process converges very fast to such a limit, the structure of which has a generic interpretation as an overlapping clustering of the graph G. Overlap is limited to cases where the input graph has a symmetric structure inducing it. The contraction and expansion parameters of the MCL process in uence the granularity of the output. The algorithm is space and time e cient and lends itself to drastic scaling. This report describes the MCL algorithm and process, convergence towards equilibrium states, interpretation of the states as clusterings, and implementation and scalability. The algorithm is introduced by rst considering several related proposals towards graph clustering, of both combinatorial and probabilistic nature. 2000 Mathematics Subject Classi cation: 05B20, 15A48, 15A51, 62H30, 68R10, 68T10, 90C35.", "title": "" }, { "docid": "f96bf84a4dfddc8300bb91227f78b3af", "text": "Membership diversity is a characteristic aspect of social networks in which a person may belong to more than one social group. For this reason, discovering overlapping structures is necessary for realistic social analysis. In this paper, we present a fast algorithm, called SLPA, for overlapping community detection in large-scale networks. SLPA spreads labels according to dynamic interaction rules. It can be applied to both unipartite and bipartite networks. It is also able to uncover overlapping nested hierarchy. The time complexity of SLPA scales linearly with the number of edges in the network. Experiments in both synthetic and realworld networks show that SLPA has an excellent performance in identifying both node and community level overlapping structures.", "title": "" } ]
[ { "docid": "dde5083017c2db3ffdd90668e28bab4b", "text": "Current industry standards for describing Web Services focus on ensuring interoperability across diverse platforms, but do not provide a good foundation for automating the use of Web Services. Representational techniques being developed for the Semantic Web can be used to augment these standards. The resulting Web Service specifications enable the development of software programs that can interpret descriptions of unfamiliar Web Services and then employ those services to satisfy user goals. OWL-S (“OWL for Services”) is a set of notations for expressing such specifications, based on the Semantic Web ontology language OWL. It consists of three interrelated parts: a profile ontology, used to describe what the service does; a process ontology and corresponding presentation syntax, used to describe how the service is used; and a grounding ontology, used to describe how to interact with the service. OWL-S can be used to automate a variety of service-related activities involving service discovery, interoperation, and composition. A large body of research on OWL-S has led to the creation of many open-source tools for developing, reasoning about, and dynamically utilizing Web Services.", "title": "" }, { "docid": "5d624fadc5502ef0b65c227d4dd47a9a", "text": "In this work, highly selective filters based on periodic arrays of electrically small resonators are pointed out. The high-pass filters are implemented in microstrip technology by etching complementary split ring resonators (CSRRs), or complementary spiral resonators (CSRs), in the ground plane, and series capacitive gaps, or interdigital capacitors, in the signal strip. The structure exhibits a composite right/left handed (CRLH) behavior and, by properly tuning the geometry of the elements, a high pass response with a sharp transition band is obtained. The low-pass filters, also implemented in microstrip technology, are designed by cascading open complementary split ring resonators (OCSRRs) in the signal strip. These low pass filters do also exhibit a narrow transition band. The high selectivity of these microwave filters is due to the presence of a transmission zero. Since the resonant elements are small, filter dimensions are compact. Several prototype device examples are reported in this paper.", "title": "" }, { "docid": "eaa6daff2f28ea7f02861e8c67b9c72b", "text": "The demand of fused magnesium furnaces (FMFs) refers to the average value of the power of the FMFs over a fixed period of time before the current time. The demand is an indicator of the electricity consumption of high energy-consuming FMFs. When the demand exceeds the limit of the Peak Demand (a predetermined maximum demand), the power supply of some FMF will be cut off to ensure that the demand is no more than Peak Demand. But the power cutoff will destroy the heat balance, reduce the quality and yield of the product. The composition change of magnesite in FMFs will cause demand spike occasionally, which a sudden increase in demand exceeds the limit and then drops below the limit. As a result, demand spike cause the power cutoff. In order to avoid the power cutoff at the moment of demand spike, the demand of FMFs needs to be forecasted. This paper analyzes the dynamic model of the demand of FMFs, using the power data, presents a data-driven demand forecasting method. This method consists of the following: PACF based decision module for the number of the input variables of the forecasting model, RBF neural network (RBFNN) based power variation rate forecasting model and demand forecasting model. Simulations based on actual data and industrial experiments at a fused magnesia plant show the effectiveness of the proposed method.", "title": "" }, { "docid": "323abed1a623e49db50bed383ab26a92", "text": "Robust object detection is a critical skill for robotic applications in complex environments like homes and offices. In this paper we propose a method for using multiple cameras to simultaneously view an object from multiple angles and at high resolutions. We show that our probabilistic method for combining the camera views, which can be used with many choices of single-image object detector, can significantly improve accuracy for detecting objects from many viewpoints. We also present our own single-image object detection method that uses large synthetic datasets for training. Using a distributed, parallel learning algorithm, we train from very large datasets (up to 100 million image patches). The resulting object detector achieves high performance on its own, but also benefits substantially from using multiple camera views. Our experimental results validate our system in realistic conditions and demonstrates significant performance gains over using standard single-image classifiers, raising accuracy from 0.86 area-under-curve to 0.97.", "title": "" }, { "docid": "9ffd665d6fe680fc4e7b9e57df48510c", "text": "BACKGROUND\nIn light of the increasing rate of dengue infections throughout the world despite vector-control measures, several dengue vaccine candidates are in development.\n\n\nMETHODS\nIn a phase 3 efficacy trial of a tetravalent dengue vaccine in five Latin American countries where dengue is endemic, we randomly assigned healthy children between the ages of 9 and 16 years in a 2:1 ratio to receive three injections of recombinant, live, attenuated, tetravalent dengue vaccine (CYD-TDV) or placebo at months 0, 6, and 12 under blinded conditions. The children were then followed for 25 months. The primary outcome was vaccine efficacy against symptomatic, virologically confirmed dengue (VCD), regardless of disease severity or serotype, occurring more than 28 days after the third injection.\n\n\nRESULTS\nA total of 20,869 healthy children received either vaccine or placebo. At baseline, 79.4% of an immunogenicity subgroup of 1944 children had seropositive status for one or more dengue serotypes. In the per-protocol population, there were 176 VCD cases (with 11,793 person-years at risk) in the vaccine group and 221 VCD cases (with 5809 person-years at risk) in the control group, for a vaccine efficacy of 60.8% (95% confidence interval [CI], 52.0 to 68.0). In the intention-to-treat population (those who received at least one injection), vaccine efficacy was 64.7% (95% CI, 58.7 to 69.8). Serotype-specific vaccine efficacy was 50.3% for serotype 1, 42.3% for serotype 2, 74.0% for serotype 3, and 77.7% for serotype 4. Among the severe VCD cases, 1 of 12 was in the vaccine group, for an intention-to-treat vaccine efficacy of 95.5%. Vaccine efficacy against hospitalization for dengue was 80.3%. The safety profile for the CYD-TDV vaccine was similar to that for placebo, with no marked difference in rates of adverse events.\n\n\nCONCLUSIONS\nThe CYD-TDV dengue vaccine was efficacious against VCD and severe VCD and led to fewer hospitalizations for VCD in five Latin American countries where dengue is endemic. (Funded by Sanofi Pasteur; ClinicalTrials.gov number, NCT01374516.).", "title": "" }, { "docid": "c3c7c392b4e7afedb269aa39e2b4680a", "text": "The temporal-difference (TD) algorithm from reinforcement learning provides a simple method for incrementally learning predictions of upcoming events. Applied to classical conditioning, TD models suppose that animals learn a real-time prediction of the unconditioned stimulus (US) on the basis of all available conditioned stimuli (CSs). In the TD model, similar to other error-correction models, learning is driven by prediction errors--the difference between the change in US prediction and the actual US. With the TD model, however, learning occurs continuously from moment to moment and is not artificially constrained to occur in trials. Accordingly, a key feature of any TD model is the assumption about the representation of a CS on a moment-to-moment basis. Here, we evaluate the performance of the TD model with a heretofore unexplored range of classical conditioning tasks. To do so, we consider three stimulus representations that vary in their degree of temporal generalization and evaluate how the representation influences the performance of the TD model on these conditioning tasks.", "title": "" }, { "docid": "907b8a8a8529b09114ae60e401bec1bd", "text": "Studies of information seeking and workplace collaboration often find that social relationships are a strong factor in determining who collaborates with whom. Social networks provide one means of visualizing existing and potential interaction in organizational settings. Groupware designers are using social networks to make systems more sensitive to social situations and guide users toward effective collaborations. Yet, the implications of embedding social networks in systems have not been systematically studied. This paper details an evaluation of two different social networks used in a system to recommend individuals for possible collaboration. The system matches people looking for expertise with individuals likely to have expertise. The effectiveness of social networks for matching individuals is evaluated and compared. One finding is that social networks embedded into systems do not match individuals' perceptions of their personal social network. This finding and others raise issues for the use of social networks in groupware. Based on the evaluation results, several design considerations are discussed.", "title": "" }, { "docid": "39351cdf91466aa12576d9eb475fb558", "text": "Fault tolerance is a remarkable feature of biological systems and their self-repair capability influence modern electronic systems. In this paper, we propose a novel plastic neural network model, which establishes homeostasis in a spiking neural network. Combined with this plasticity and the inspiration from inhibitory interneurons, we develop a fault-resilient robotic controller implemented on an FPGA establishing obstacle avoidance task. We demonstrate the proposed methodology on a spiking neural network implemented on Xilinx Artix-7 FPGA. The system is able to maintain stable firing (tolerance ±10%) with a loss of up to 75% of the original synaptic inputs to a neuron. Our repair mechanism has minimal hardware overhead with a tuning circuit (repair unit) which consumes only three slices/neuron for implementing a threshold voltage-based homeostatic fault-tolerant unit. The overall architecture has a minimal impact on power consumption and, therefore, supports scalable implementations. This paper opens a novel way of implementing the behavior of natural fault tolerant system in hardware establishing homeostatic self-repair behavior.", "title": "" }, { "docid": "8d02b303ad5fc96a082880d703682de4", "text": "Feature engineering remains a major bottleneck when creating predictive systems from electronic medical records. At present, an important missing element is detecting predictive <italic>regular clinical motifs</italic> from <italic> irregular episodic records</italic>. We present <inline-formula><tex-math notation=\"LaTeX\">$\\mathtt {Deepr}$</tex-math> </inline-formula> (short for <italic>Deep</italic> <italic>r</italic>ecord), a new <italic>end-to-end</italic> deep learning system that learns to extract features from medical records and predicts future risk automatically. <inline-formula><tex-math notation=\"LaTeX\">$\\mathtt {Deepr}$</tex-math></inline-formula> transforms a record into a sequence of discrete elements separated by coded time gaps and hospital transfers. On top of the sequence is a convolutional neural net that detects and combines predictive local clinical motifs to stratify the risk. <inline-formula><tex-math notation=\"LaTeX\">$\\mathtt {Deepr}$</tex-math></inline-formula> permits transparent inspection and visualization of its inner working. We validate <inline-formula><tex-math notation=\"LaTeX\">$\\mathtt {Deepr}$ </tex-math></inline-formula> on hospital data to predict unplanned readmission after discharge. <inline-formula> <tex-math notation=\"LaTeX\">$\\mathtt {Deepr}$</tex-math></inline-formula> achieves superior accuracy compared to traditional techniques, detects meaningful clinical motifs, and uncovers the underlying structure of the disease and intervention space.", "title": "" }, { "docid": "ca8c262513466709a9d1eee198c804cc", "text": "Theories of language production have long been expressed as connectionist models. We outline the issues and challenges that must be addressed by connectionist models of lexical access and grammatical encoding, and review three recent models. The models illustrate the value of an interactive activation approach to lexical access in production, the need for sequential output in both phonological and grammatical encoding, and the potential for accounting for structural effects on errors and structural priming from learning.", "title": "" }, { "docid": "38d650cb945dc50d97762186585659a4", "text": "Sustainable biofuels, biomaterials, and fine chemicals production is a critical matter that research teams around the globe are focusing on nowadays. Polyhydroxyalkanoates represent one of the biomaterials of the future due to their physicochemical properties, biodegradability, and biocompatibility. Designing efficient and economic bioprocesses, combined with the respective social and environmental benefits, has brought together scientists from different backgrounds highlighting the multidisciplinary character of such a venture. In the current review, challenges and opportunities regarding polyhydroxyalkanoate production are presented and discussed, covering key steps of their overall production process by applying pure and mixed culture biotechnology, from raw bioprocess development to downstream processing.", "title": "" }, { "docid": "f923a3a18e8000e4094d4a6d6e69b18f", "text": "We describe the functional and architectural breakdown of a monocular pedestrian detection system. We describe in detail our approach for single-frame classification based on a novel scheme of breaking down the class variability by repeatedly training a set of relatively simple classifiers on clusters of the training set. Single-frame classification performance results and system level performance figures for daytime conditions are presented with a discussion about the remaining gap to meet a daytime normal weather condition production system.", "title": "" }, { "docid": "b4b66392aec0c4e00eb6b1cabbe22499", "text": "ADJ: Adjectives that occur with the NP CMC: Orthographic features of the NP CPL: Phrases that occur with the NP VERB: Verbs that appear with the NP Task: Predict whether a noun phrase (NP) belongs to a category (e.g. “city”) Category # Examples animal 20,733 beverage 18,932 bird 19,263 bodypart 21,840 city 21,778 disease 21,827 drug 20,452 fish 19,162 food 19,566 fruit 18,911 muscle 21,606 person 21,700 protein 21,811 river 21,723 vegetable 18,826", "title": "" }, { "docid": "4a6dc591d385d0fb02a98067d8a42f33", "text": "A new field has emerged to investigate the cognitive neuroscience of social behaviour, the popularity of which is attested by recent conferences, special issues of journals and by books. But the theoretical underpinnings of this new field derive from an uneasy marriage of two different approaches to social behaviour: sociobiology and evolutionary psychology on the one hand, and social psychology on the other. The first approach treats the study of social behaviour as a topic in ethology, continuous with studies of motivated behaviour in other animals. The second approach has often emphasized the uniqueness of human behaviour, and the uniqueness of the individual person, their environment and their social surroundings. These two different emphases do not need to conflict with one another. In fact, neuroscience might offer a reconciliation between biological and psychological approaches to social behaviour in the realization that its neural regulation reflects both innate, automatic and COGNITIVELY IMPENETRABLE mechanisms, as well as acquired, contextual and volitional aspects that include SELF-REGULATION. We share the first category of features with other species, and we might be distinguished from them partly by elaborations on the second category of features. In a way, an acknowledgement of such an architecture simply provides detail to the way in which social cognition is complex — it is complex because it is not monolithic, but rather it consists of several tracks of information processing that can be variously recruited depending on the circumstances. Specifying those tracks, the conditions under which they are engaged, how they interact, and how they must ultimately be coordinated to regulate social behaviour in an adaptive fashion, is the task faced by a neuroscientific approach to social cognition.", "title": "" }, { "docid": "95395c693b4cdfad722ae0c3545f45ef", "text": "Aiming at automatic, convenient and non-instrusive motion capture, this paper presents a new generation markerless motion capture technique, the FlyCap system, to capture surface motions of moving characters using multiple autonomous flying cameras (autonomous unmanned aerial vehicles(UAVs) each integrated with an RGBD video camera). During data capture, three cooperative flying cameras automatically track and follow the moving target who performs large-scale motions in a wide space. We propose a novel non-rigid surface registration method to track and fuse the depth of the three flying cameras for surface motion tracking of the moving target, and simultaneously calculate the pose of each flying camera. We leverage the using of visual-odometry information provided by the UAV platform, and formulate the surface tracking problem in a non-linear objective function that can be linearized and effectively minimized through a Gaussian-Newton method. Quantitative and qualitative experimental results demonstrate the plausible surface and motion reconstruction results.", "title": "" }, { "docid": "175229c7b756a2ce40f86e27efe28d53", "text": "This paper describes a comparative study of the envelope extraction algorithms for the cardiac sound signal segmentation. In order to extract the envelope curves based on the time elapses of the first and the second heart sounds of cardiac sound signals, three representative algorithms such as the normalized average Shannon energy, the envelope information of Hilbert transform, and the cardiac sound characteristic waveform (CSCW) are introduced. Performance comparison of the envelope extraction algorithms, and the advantages and disadvantages of the methods are examined by some parameters. 2006 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "5d80bf63f19f3aa271c0d16e179c90d6", "text": "3D meshes are deployed in a wide range of application processes (e.g., transmission, compression, simplification, watermarking and so on) which inevitably introduce geometric distortions that may alter the visual quality of the rendered data. Hence, efficient model-based perceptual metrics, operating on the geometry of the meshes being compared, have been recently introduced to control and predict these visual artifacts. However, since the 3D models are ultimately visualized on 2D screens, it seems legitimate to use images of the models (i.e., snapshots from different viewpoints) to evaluate their visual fidelity. In this work we investigate the use of image metrics to assess the visual quality of 3D models. For this goal, we conduct a wide-ranging study involving several 2D metrics, rendering algorithms, lighting conditions and pooling algorithms, as well as several mean opinion score databases. The collected data allow (1) to determine the best set of parameters to use for this image-based quality assessment approach and (2) to compare this approach to the best performing model-based metrics and determine for which use-case they are respectively adapted. We conclude by exploring several applications that illustrate the benefits of image-based quality assessment.", "title": "" }, { "docid": "19a28d8bbb1f09c56f5c85be003a9586", "text": "ABSTRACT: Five questionnaires for assessing the usability of a website were compared in a study with 123 participants. The questionnaires studied were SUS, QUIS, CSUQ, a variant of Microsoft’s Product Reaction Cards, and one that we have used in our Usability Lab for several years. Each participant performed two tasks on each of two websites: finance.yahoo.com and kiplinger.com. All five questionnaires revealed that one site was significantly preferred over the other. The data were analyzed to determine what the results would have been at different sample sizes from 6 to 14. At a sample size of 6, only 30-40% of the samples would have identified that one of the sites was significantly preferred. Most of the data reach an apparent asymptote at a sample size of 12, where two of the questionnaires (SUS and CSUQ) yielded the same conclusion as the full dataset at least 90% of the time.", "title": "" }, { "docid": "bd9064905ba4ed166ad1e9c41eca7b34", "text": "Governments worldwide are encouraging public agencies to join e-Government initiatives in order to provide better services to their citizens and businesses; hence, methods of evaluating the readiness of individual public agencies to execute specific e-Government programs and directives are a key ingredient in the successful expansion of e-Government. To satisfy this need, a model called the eGovernment Maturity Model (eGov-MM) was developed, integrating the assessment of technological, organizational, operational, and human capital capabilities, under a multi-dimensional, holistic, and evolutionary approach. The model is strongly supported by international best practices, and provides tuning mechanisms to enable its alignment with nation-wide directives on e-Government. This article describes how the model was conceived, designed, developed, field tested by expert public officials from several government agencies, and finally applied to a selection of 30 public agencies in Chile, generating the first formal measurements, assessments, and rankings of their readiness for eGovernment. The implementation of the model also provided several recommendations to policymakers at the national and agency levels.", "title": "" }, { "docid": "e36e318dd134fd5840d5a5340eb6e265", "text": "Business Intelligence (BI) promises a range of technologies for using information to ensure compliance to strategic and tactical objectives, as well as government laws and regulations. These technologies can be used in conjunction with conceptual models of business objectives, processes and situations (aka business schemas) to drive strategic decision-making about opportunities and threats etc. This paper focuses on three key concepts for strategic business models -situation, influence and indicator -and how they are used for strategic analysis. The semantics of these concepts are defined using a state-ofthe-art upper ontology (DOLCE+). We also propose a method for building a business schema, and demonstrate alternative ways of formal analysis of the schema based on existing tools for goal and probabilistic reasoning.", "title": "" } ]
scidocsrr
9e772c3fe6b03ee01c4d088fc6e18d19
The Alexa Meaning Representation Language
[ { "docid": "7161122eaa9c9766e9914ba0f2ee66ef", "text": "Cross-linguistically consistent annotation is necessary for sound comparative evaluation and cross-lingual learning experiments. It is also useful for multilingual system development and comparative linguistic studies. Universal Dependencies is an open community effort to create cross-linguistically consistent treebank annotation for many languages within a dependency-based lexicalist framework. In this paper, we describe v1 of the universal guidelines, the underlying design principles, and the currently available treebanks for 33 languages.", "title": "" } ]
[ { "docid": "7959204dbaa087fc7c37e4157e057efc", "text": "OBJECTIVE\nThe primary objective of this study was to compare the effectiveness of a water flosser plus sonic toothbrush to a sonic toothbrush alone on the reduction of bleeding, gingivitis, and plaque. The secondary objective was to compare the effectiveness of different sonic toothbrushes on bleeding, gingivitis, and plaque.\n\n\nMETHODS\nOne-hundred and thirty-nine subjects completed this randomized, four-week, single-masked, parallel clinical study. Subjects were assigned to one of four groups: Waterpik Complete Care, which is a combination of a water flosser plus power toothbrush (WFS); Sensonic Professional Plus Toothbrush (SPP); Sonicare FlexCare toothbrush (SF); or an Oral-B Indicator manual toothbrush (MT). Subjects were provided written and verbal instructions for all power products at baseline, and instructions were reviewed at the two-week visit. Data were evaluated for whole mouth, facial, and lingual surfaces for bleeding on probing (BOP) and gingivitis (MGI). Plaque data were evaluated for whole mouth, lingual, facial, approximal, and marginal areas of the tooth using the Rustogi Modification of the Navy Plaque Index (RMNPI). Data were recorded at baseline (BL), two weeks (W2), and four weeks (W4).\n\n\nRESULTS\nAll groups showed a significant reduction from BL in BOP, MGI, and RMNPI for all areas measured at the W2 and W4 visits (p < 0.001). The reduction of BOP was significantly higher for the WFS group than the other three groups at W2 and W4 for all areas measured (p < 0.001 for all, except p = 0.007 at W2 and p = 0.008 for W4 lingual comparison to SPP). The WFS group was 34% more effective than the SPP group, 70% more effective than the SF group, and 1.59 times more effective than the MT group for whole mouth bleeding scores (p < 0.001) at W4. The reduction of MGI was significantly higher for the WFS group; 23% more effective than SPP, 48% more effective than SF, and 1.35 times more effective than MT for whole mouth (p <0.001) at W4. The reduction of MGI was significantly higher for WFS than the SF and MT for facial and lingual surfaces, and more effective than the SPP for facial surfaces (p < 0.001) at W4. The WFS group showed significantly better reductions for plaque than the SF and MT groups for whole mouth, facial, lingual, approximal, and marginal areas at W4 (p < 0.001; SF facial p = 0.025). For plaque reduction, the WFS was significantly better than the SPP for whole mouth (p = 0.003) and comparable for all other areas and surfaces at W4. The WFS was 52% more effective for whole mouth, 31% for facial, 77% for lingual, 1.22 times for approximal, and 1.67 times for marginal areas compared to the SF for reducing plaque scores at W4 (p < 0.001; SF facial p = 0.025). The SPP had significantly higher reductions than the SF for whole mouth and lingual BOP and MGI scores, and whole mouth, approximal, marginal, and lingual areas for plaque at W4.\n\n\nCONCLUSION\nThe Waterpik Complete Care is significantly more effective than the Sonicare FlexCare toothbrush for reducing gingival bleeding, gingivitis, and plaque. The Sensonic Professional Plus Toothbrush is significantly more effective than the Sonicare Flex-Care for reducing gingival bleeding, gingivitis, and plaque.", "title": "" }, { "docid": "2f0769d0f3a1c29a3b794f964a2a560c", "text": "We propose a statistical method based on graphical Gaussian models for estimating large gene networks from DNA microarray data. In estimating large gene networks, the number of genes is larger than the number of samples, we need to consider some restrictions for model building. We propose weighted lasso estimation for the graphical Gaussian models as a model of large gene networks. In the proposed method, the structural learning for gene networks is equivalent to the selection of the regularization parameters included in the weighted lasso estimation. We investigate this problem from a Bayes approach and derive an empirical Bayesian information criterion for choosing them. Unlike Bayesian network approach, our method can find the optimal network structure and does not require to use heuristic structural learning algorithm. We conduct Monte Carlo simulation to show the effectiveness of the proposed method. We also analyze Arabidopsis thaliana microarray data and estimate gene networks.", "title": "" }, { "docid": "c10adaa38fd3f832767daf5e0baf07f5", "text": "Cellular senescence entails essentially irreversible replicative arrest, apoptosis resistance, and frequently acquisition of a pro-inflammatory, tissue-destructive senescence-associated secretory phenotype (SASP). Senescent cells accumulate in various tissues with aging and at sites of pathogenesis in many chronic diseases and conditions. The SASP can contribute to senescence-related inflammation, metabolic dysregulation, stem cell dysfunction, aging phenotypes, chronic diseases, geriatric syndromes, and loss of resilience. Delaying senescent cell accumulation or reducing senescent cell burden is associated with delay, prevention, or alleviation of multiple senescence-associated conditions. We used a hypothesis-driven approach to discover pro-survival Senescent Cell Anti-apoptotic Pathways (SCAPs) and, based on these SCAPs, the first senolytic agents, drugs that cause senescent cells to become susceptible to their own pro-apoptotic microenvironment. Several senolytic agents, which appear to alleviate multiple senescence-related phenotypes in pre-clinical models, are beginning the process of being translated into clinical interventions that could be transformative.", "title": "" }, { "docid": "60664c058868f08a67d14172d87a4756", "text": "The design of legged robots is often inspired by animals evolved to excel at different tasks. However, while mimicking morphological features seen in nature can be very powerful, robots may need to perform motor tasks that their living counterparts do not. In the absence of designs that can be mimicked, an alternative is to resort to mathematical models that allow the relationship between a robot's form and function to be explored. In this paper, we propose such a model to co-design the motion and leg configurations of a robot such that a measure of performance is optimized. The framework begins by planning trajectories for a simplified model consisting of the center of mass and feet. The framework then optimizes the length of each leg link while solving for associated full-body motions. Our model was successfully used to find optimized designs for legged robots performing tasks that include jumping, walking, and climbing up a step. Although our results are preliminary and our analysis makes a number of simplifying assumptions, our findings indicate that the cost function, the sum of squared joint torques over the duration of a task, varies substantially as the design parameters change.", "title": "" }, { "docid": "504fcb97010d71fd07aca8bc9543af8b", "text": "The presence of raindrop induced distortion can have a significant negative impact on computer vision applications. Here we address the problem of visual raindrop distortion in standard colour video imagery for use in non-static, automotive computer vision applications where the scene can be observed to be changing over subsequent consecutive frames. We utilise current state of the art research conducted into the investigation of salience mapping as means of initial detection of potential raindrop candidates. We further expand on this prior state of the art work to construct a combined feature rich descriptor of shape information (Hu moments), isolation of raindrops pixel information from context, and texture (saliency derived) within an improved visual bag of words verification framework. Support Vector Machine and Random Forest classification were utilised for verification of potential candidates, and the effects of increasing discrete cluster centre counts on detection rates were studied. This novel approach of utilising extended shape information, isolation of context, and texture, along with increasing cluster counts, achieves a notable 13% increase in precision (92%) and 10% increase in recall (86%) against prior state of the art. False positive rates were also observed to decrease with a minimal false positive rate of 14% observed. iv ACKNOWLEDGEMENTS I wish to thank Dr Toby Breckon for his time and commitment during my project, and for the help given in patiently explaining things for me. I also wish to thank Dr Mark Stillwell for his never tiring commitment to proofreading and getting up to speed with my project. Without them, this thesis would never have come together in the way it did. I wish to thank my partner, Dr Victoria Gortowski for allowing me to go back to university, supporting me and having faith that I could do it, without which, I do not think I would have. And last but not least, Lara and Mitsy. Thank you.", "title": "" }, { "docid": "71428f1d968a25eb7df33f55557eb424", "text": "BACKGROUND\nThe 'Choose and Book' system provides an online booking service which primary care professionals can book in real time or soon after a patient's consultation. It aims to offer patients choice and improve outpatient clinic attendance rates.\n\n\nOBJECTIVE\nAn audit comparing attendance rates of new patients booked into the Audiological Medicine Clinic using the 'Choose and Book' system with that of those whose bookings were made through the traditional booking system.\n\n\nMETHODS\nData accrued between 1 April 2008 and 31 October 2008 were retrospectively analysed for new patient attendance at the department, and the age and sex of the patients, method of appointment booking used and attendance record were collected. Patients were grouped according to booking system used - 'Choose and Book' or the traditional system. The mean ages of the groups were compared by a t test. The standard error of the difference between proportions was used to compare the data from the two groups. A P value of < or = 0.05 was considered to be significant.\n\n\nRESULTS\n'Choose and Book' patients had a significantly better rate of attendance than traditional appointment patients, P < 0.01 (95% CI 4.3, 20.5%). There was no significant difference between the two groups in terms of sex, P > 0.1 (95% CI-3.0, 16.2%). The 'Choose and Book' patients, however, were significantly older than the traditional appointment patients, P < 0.001 (95% CI 4.35, 12.95%).\n\n\nCONCLUSION\nThis audit suggests that when primary care agents book outpatient clinic appointments online it improves outpatient attendance.", "title": "" }, { "docid": "e5ef0f63e08d4f70d086a212f185cf97", "text": "Software defined network (SDN) can effectively improve the performance of traffic engineering and will be widely used in backbone networks. Therefore, new energy-saving schemes must take SDN into consideration; this action is extremely important owing to the rapidly increasing energy consumption in telecom and Internet service provider (ISP) networks. Meanwhile, the introduction of SDN in current networks must be incremental in most cases, for technical and economic reasons. During this period, operators must manage hybrid networks in which SDN and traditional protocols coexist. In this study, we investigate the energy-efficient traffic engineering problem in hybrid SDN/Internet protocol (IP) networks. First, we formulate the mathematical optimization model considering the SDN/IP hybrid routing mode. The problem is NP-hard; therefore, we propose a fast heuristic algorithm named hybrid energy-aware traffic engineering (HEATE) as a solution. In our proposed HEATE algorithm, the IP routers perform shortest-path routing by using distributed open shortest path first (OSPF) link weight optimization. The SDNs perform multi-path routing with traffic-flow splitting managed by the global SDN controller. The HEATE algorithm determines the optimal setting for the OSPF link weight and the splitting ratio of SDNs. Thus, the traffic flow is aggregated onto partial links, and the underutilized links can be turned off to save energy. Based on computer simulation results, we demonstrate that our algorithm achieves a significant improvement in energy efficiency in hybrid SDN/IP networks.", "title": "" }, { "docid": "b7b2f1c59dfc00ab6776c6178aff929c", "text": "Over the past four years, the Big Data and Exascale Computing (BDEC) project organized a series of five international workshops that aimed to explore the ways in which the new forms of data-centric discovery introduced by the ongoing revolution in high-end data analysis (HDA) might be integrated with the established, simulation-centric paradigm of the high-performance computing (HPC) community. Based on those meetings, we argue that the rapid proliferation of digital data generators, the unprecedented growth in the volume and diversity of the data they generate, and the intense evolution of the methods for analyzing and using that data are radically reshaping the landscape of scientific computing. The most critical problems involve the logistics of wide-area, multistage workflows that will move back and forth across the computing continuum, between the multitude of distributed sensors, instruments and other devices at the networks edge, and the centralized resources of commercial clouds and HPC centers. We suggest that the prospects for the future integration of technological infrastructures and research ecosystems need to be considered at three different levels. First, we discuss the convergence of research applications and workflows that establish a research paradigm that combines both HPC and HDA, where ongoing progress is already motivating efforts at the other two levels. Second, we offer an account of some of the problems involved with creating a converged infrastructure for peripheral environments, that is, a shared infrastructure that can be deployed throughout the network in a scalable manner to meet the highly diverse requirements for processing, communication, and buffering/storage of massive data workflows of many different scientific domains. Third, we focus on some opportunities for software ecosystem convergence in big, logically centralized facilities that execute large-scale simulations and models and/or perform large-scale data analytics. We close by offering some conclusions and recommendations for future investment and policy review.", "title": "" }, { "docid": "885764d7e71711b8f9a086d43c6e4f9a", "text": "In Indian economy, Agriculture is the most important branch and 70 percentage of rural population livelihood depends on agricultural work. Farming is the one of the important part of Agriculture. Crop yield depends on environment’s factors like precipitation, temperature, evapotranspiration, etc. Generally farmers cultivate crop, based on previous experience. But nowadays, the uncertainty increased in environment. So, accurate analysis of historic data of environment parameters should be done for successful farming. To get more harvest, we should also do the analysis of previous cultivation data. The Prediction of crop yield can be done based on historic crop cultivation data and weather data using data mining methods. This paper describes the role of data mining in Agriculture and crop yield prediction. This paper also describes Groundnut crop yield prediction analysis and Naive Bayes Method.", "title": "" }, { "docid": "1a35d97c2160c2d8e3aef95b6b427c48", "text": "We presented a comparison between several feature ranking methods used on two real datasets. We considered six ranking methods that can be divided into two broad categories: statistical and entropy-based. Four supervised learning algorithms are adopted to build models, namely, IB1, Naive Bayes, C4.5 decision tree and the RBF network. We showed that the selection of ranking methods could be important for classification accuracy. In our experiments, ranking methods with different supervised learning algorithms give quite different results for balanced accuracy. Our cases confirm that, in order to be sure that a subset of features giving the highest accuracy has been selected, the use of many different indices is recommended.", "title": "" }, { "docid": "f2fc6440b95c9ed93f5925672798ae2d", "text": "This paper presents a standalone 5.6 nV/√Hz chopper op-amp that operates from a 2.1-5.5 V supply. Frequency compensation is achieved in a power-and area-efficient manner by using a current attenuator and a dummy differential output. As a result, the overall op-amp only consumes 1.4 mA supply current and 1.26 mm2 die area. Up-modulated chopper ripple is suppressed by a local feedback technique, called auto correction feedback (ACFB). The charge injection of the input chopping switches can cause residual offset voltages, especially with the wider switches needed to reduce thermal noise. By employing an adaptive clock boosting technique with NMOS input switches, the amount of charge injection is minimized and kept constant as the input common-mode voltage changes. This results in a 0.5 μV maximum offset and 0.015 μV/°C maximum drift over the amplifier's entire rail-to-rail input common-mode range and from -40 °C to 125 °C. The design is implemented in a 0.35 μm CMOS process augmented by 5 V CMOS transistors.", "title": "" }, { "docid": "f1bc297544e333f08387cfd410e1dc75", "text": "Cascades are ubiquitous in various network environments. How to predict these cascades is highly nontrivial in several vital applications, such as viral marketing, epidemic prevention and traffic management. Most previous works mainly focus on predicting the final cascade sizes. As cascades are typical dynamic processes, it is always interesting and important to predict the cascade size at any time, or predict the time when a cascade will reach a certain size (e.g. an threshold for outbreak). In this paper, we unify all these tasks into a fundamental problem: cascading process prediction. That is, given the early stage of a cascade, how to predict its cumulative cascade size of any later time? For such a challenging problem, how to understand the micro mechanism that drives and generates the macro phenomena (i.e. cascading process) is essential. Here we introduce behavioral dynamics as the micro mechanism to describe the dynamic process of a node's neighbors getting infected by a cascade after this node getting infected (i.e. one-hop subcascades). Through data-driven analysis, we find out the common principles and patterns lying in behavioral dynamics and propose a novel Networked Weibull Regression model for behavioral dynamics modeling. After that we propose a novel method for predicting cascading processes by effectively aggregating behavioral dynamics, and present a scalable solution to approximate the cascading process with a theoretical guarantee. We extensively evaluate the proposed method on a large scale social network dataset. The results demonstrate that the proposed method can significantly outperform other state-of-the-art baselines in multiple tasks including cascade size prediction, outbreak time prediction and cascading process prediction.", "title": "" }, { "docid": "024cbb734053b256fd7b20b1a757d780", "text": "The IETF is currently working on service differentiation in the Internet. However, in wireless environments where bandwidth is scarce and channel conditions are variable, IP differentiated services are suboptimal without lower layers’ support. In this paper we present three service differentiation schemes for IEEE 802.11. The first one is based on scaling the contention window according to the priority of each flow or user. The second one assigns different inter frame spacings to different users. Finally, the last one uses different maximum frame lengths for different users. We simulate and analyze the performance of each scheme with TCP and UDP flows. Keywords—QoS, DiffServ, TCP, UDP, CBR, Wireless communications.", "title": "" }, { "docid": "584645a035454682222a26870377703c", "text": "Conventionally, the sum and difference signals of a tracking system are fixed up by sum and difference network and the network is often composed of four or more magic tees whose arms direct at four different directions, which give inconveniences to assemble. In this paper, a waveguide side-wall slot directional coupler and a double dielectric slab filled waveguide phase shifter is used to form a planar magic tee with four arms in the same H-plane. Four planar magic tees can be used to construct the W-band planar monopulse comparator. The planar magic tee is analyzed exactly with Ansoft HFSS software, and is optimized by genetic algorithm. Simulation results are presented, which show good performance.", "title": "" }, { "docid": "54bcaafa495d6d778bddbbb5d5cf906e", "text": "Low-shot visual learning—the ability to recognize novel object categories from very few examples—is a hallmark of human visual intelligence. Existing machine learning approaches fail to generalize in the same way. To make progress on this foundational problem, we present a novel protocol to evaluate low-shot learning on complex images where the learner is permitted to first build a feature representation. Then, we propose and evaluate representation regularization techniques that improve the effectiveness of convolutional networks at the task of low-shot learning, leading to a 2x reduction in the amount of training data required at equal accuracy rates on the challenging ImageNet dataset.", "title": "" }, { "docid": "6c411f36e88a39684eb9779462117e6b", "text": "Number of people who use internet and websites for various purposes is increasing at an astonishing rate. More and more people rely on online sites for purchasing songs, apparels, books, rented movies etc. The competition between the online sites forced the web site owners to provide personalized services to their customers. So the recommender systems came into existence. Recommender systems are active information filtering systems that attempt to present to the user, information items in which the user is interested in. The websites implement recommender system feature using collaborative filtering, content based or hybrid approaches. The recommender systems also suffer from issues like cold start, sparsity and over specialization. Cold start problem is that the recommenders cannot draw inferences for users or items for which it does not have sufficient information. This paper attempts to propose a solution to the cold start problem by combining association rules and clustering technique. Comparison is done between the performance of the recommender system when association rule technique is used and the performance when association rule and clustering is combined. The experiments with the implemented system proved that accuracy can be improved when association rules and clustering is combined. An accuracy improvement of 36% was achieved by using the combination technique over the association rule technique.", "title": "" }, { "docid": "78fe279ca9a3e355726ffacb09302be5", "text": "In present, dynamically developing organizations, that often realize business tasks using the project-based approach, effective project management is of paramount importance. Numerous reports and scientific papers present lists of critical success factors in project management, and communication management is usually at the very top of the list. But even though the communication practices are found to be associated with most of the success dimensions, they are not given enough attention and the communication processes and practices formalized in the company's project management methodology are neither followed nor prioritized by project managers. This paper aims at supporting project managers and teams in more effective implementation of best practices in communication management by proposing a set of communication management patterns, which promote a context-problem-solution approach to communication management in projects.", "title": "" }, { "docid": "c796bc689e9b3e2b8d03525e5cd5908c", "text": "As they grapple with increasingly large data sets, biologists and computer scientists uncork new bottlenecks. B iologists are joining the big-data club. With the advent of high-throughput genomics, life scientists are starting to grapple with massive data sets, encountering challenges with handling, processing and moving information that were once the domain of astronomers and high-energy physicists 1. With every passing year, they turn more often to big data to probe everything from the regulation of genes and the evolution of genomes to why coastal algae bloom, what microbes dwell where in human body cavities and how the genetic make-up of different cancers influences how cancer patients fare 2. The European Bioinformatics Institute (EBI) in Hinxton, UK, part of the European Molecular Biology Laboratory and one of the world's largest biology-data repositories, currently stores 20 petabytes (1 petabyte is 10 15 bytes) of data and backups about genes, proteins and small molecules. Genomic data account for 2 peta-bytes of that, a number that more than doubles every year 3 (see 'Data explosion'). This data pile is just one-tenth the size of the data store at CERN, Europe's particle-physics laboratory near Geneva, Switzerland. Every year, particle-collision events in CERN's Large Hadron Collider generate around 15 petabytes of data — the equivalent of about 4 million high-definition feature-length films. But the EBI and institutes like it face similar data-wrangling challenges to those at CERN, says Ewan Birney, associate director of the EBI. He and his colleagues now regularly meet with organizations such as CERN and the European Space Agency (ESA) in Paris to swap lessons about data storage, analysis and sharing. All labs need to manipulate data to yield research answers. As prices drop for high-throughput instruments such as automated Extremely powerful computers are needed to help biologists to handle big-data traffic jams.", "title": "" }, { "docid": "7e5b18a0356a89a0285f80a2224d8b12", "text": "Machine recognition of a handwritten mathematical expression (HME) is challenging due to the ambiguities of handwritten symbols and the two-dimensional structure of mathematical expressions. Inspired by recent work in deep learning, we present Watch, Attend and Parse (WAP), a novel end-to-end approach based on neural network that learns to recognize HMEs in a two-dimensional layout and outputs them as one-dimensional character sequences in LaTeX format. Inherently unlike traditional methods, our proposed model avoids problems that stem from symbol segmentation, and it does not require a predefined expression grammar. Meanwhile, the problems of symbol recognition and structural analysis are handled, respectively, using a watcher and a parser. We employ a convolutional neural network encoder that takes HME images as input as the watcher and employ a recurrent neural network decoder equipped with an attention mechanism as the parser to generate LaTeX sequences. Moreover, the correspondence between the input expressions and the output LaTeX sequences is learned automatically by the attention mechanism. We validate the proposed approach on a benchmark published by the CROHME international competition. Using the official training dataset, WAP significantly outperformed the state-of-the-art method with an expression recognition accuracy of 46.55% on CROHME 2014 and 44.55% on CROHME 2016. © 2017 Elsevier Ltd. All rights reserved.", "title": "" } ]
scidocsrr
9fc8731e7b2f7d8c4f17816f1d3b0626
Clickstream Analytics: An Experimental Analysis of the Amazon Users' Simulated Monthly Traffic
[ { "docid": "3429145583d25ba1d603b5ade11f4312", "text": "Sequential pattern mining is an important data mining problem with broad applications. It is challenging since one may need to examine a combinatorially explosive number of possible subsequence patterns. Most of the previously developed sequential pattern mining methods follow the methodology of which may substantially reduce the number of combinations to be examined. However, still encounters problems when a sequence database is large and/or when sequential patterns to be mined are numerous and/or long. In this paper, we propose a novel sequential pattern mining method, called PrefixSpan (i.e., Prefix-projected Sequential pattern mining), which explores prefixprojection in sequential pattern mining. PrefixSpan mines the complete set of patterns but greatly reduces the efforts of candidate subsequence generation. Moreover, prefix-projection substantially reduces the size of projected databases and leads to efficient processing. Our performance study shows that PrefixSpan outperforms both the -based GSP algorithm and another recently proposed method, FreeSpan, in mining large sequence", "title": "" } ]
[ { "docid": "12680d4fcf57a8a18d9c2e2b1107bf2d", "text": "Recent advances in computer and technology resulted into ever increasing set of documents. The need is to classify the set of documents according to the type. Laying related documents together is expedient for decision making. Researchers who perform interdisciplinary research acquire repositories on different topics. Classifying the repositories according to the topic is a real need to analyze the research papers. Experiments are tried on different real and artificial datasets such as NEWS 20, Reuters, emails, research papers on different topics. Term Frequency-Inverse Document Frequency algorithm is used along with fuzzy K-means and hierarchical algorithm. Initially experiment is being carried out on small dataset and performed cluster analysis. The best algorithm is applied on the extended dataset. Along with different clusters of the related documents the resulted silhouette coefficient, entropy and F-measure trend are presented to show algorithm behavior for each data set.", "title": "" }, { "docid": "db53ffe2196586d570ad636decbf67de", "text": "We present PredRNN++, a recurrent network for spatiotemporal predictive learning. In pursuit of a great modeling capability for short-term video dynamics, we make our network deeper in time by leveraging a new recurrent structure named Causal LSTM with cascaded dual memories. To alleviate the gradient propagation difficulties in deep predictive models, we propose a Gradient Highway Unit, which provides alternative quick routes for the gradient flows from outputs back to long-range previous inputs. The gradient highway units work seamlessly with the causal LSTMs, enabling our model to capture the short-term and the long-term video dependencies adaptively. Our model achieves state-of-the-art prediction results on both synthetic and real video datasets, showing its power in modeling entangled motions.", "title": "" }, { "docid": "1d0c9c8c439f5fa41fee964caed7c2b1", "text": "As interactive voice response systems become more prevalent and provide increasingly more complex functionality, it becomes clear that the challenges facing such systems are not solely in their synthesis and recognition capabilities. Issues such as the coordination of turn exchanges between system and user also play an important role in system usability. In particular, both systems and users have difficulty determining when the other is taking or relinquishing the turn. In this paper, we seek to identify turn-taking cues correlated with human–human turn exchanges which are automatically computable. We compare the presence of potential prosodic, acoustic, and lexico-syntactic turn-yielding cues in prosodic phrases preceding turn changes (smooth switches) vs. turn retentions (holds) vs. backchannels in the Columbia Games Corpus, a large corpus of task-oriented dialogues, to determine which features reliably distinguish between these three. We identify seven turn-yielding cues, all of which can be extracted automatically, for future use in turn generation and recognition in interactive voice response (IVR) systems. Testing Duncan’s (1972) hypothesis that these turn-yielding cues are linearly correlated with the occurrence of turn-taking attempts, we further demonstrate that, the greater the number of turn-yielding cues that are present, the greater the likelihood that a turn change will occur. We also identify six cues that precede backchannels, which will also be useful for IVR backchannel generation and recognition; these cues correlate with backchannel occurrence in a quadratic manner. We find similar results for overlapping and for non-overlapping speech. © 2010 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "1b0ebf54bc1d534affc758ced7aef8de", "text": "We report our study of a silica-water interface using reactive molecular dynamics. This first-of-its-kind simulation achieves length and time scales required to investigate the detailed chemistry of the system. Our molecular dynamics approach is based on the ReaxFF force field of van Duin et al. [J. Phys. Chem. A 107, 3803 (2003)]. The specific ReaxFF implementation (SERIALREAX) and force fields are first validated on structural properties of pure silica and water systems. Chemical reactions between reactive water and dangling bonds on a freshly cut silica surface are analyzed by studying changing chemical composition at the interface. In our simulations, reactions involving silanol groups reach chemical equilibrium in approximately 250 ps. It is observed that water molecules penetrate a silica film through a proton-transfer process we call \"hydrogen hopping,\" which is similar to the Grotthuss mechanism. In this process, hydrogen atoms pass through the film by associating and dissociating with oxygen atoms within bulk silica, as opposed to diffusion of intact water molecules. The effective diffusion constant for this process, taken to be that of hydrogen atoms within silica, is calculated to be 1.68 x 10(-6) cm(2)/s. Polarization of water molecules in proximity of the silica surface is also observed. The subsequent alignment of dipoles leads to an electric potential difference of approximately 10.5 V between the silica slab and water.", "title": "" }, { "docid": "1db72cafa214f41b5b6faa3a3c0c8be0", "text": "Multiple-antenna receivers offer numerous advantages over single-antenna receivers, including sensitivity improvement, ability to reject interferers spatially and enhancement of data-rate or link reliability via MIMO. In the recent past, RF/analog phased-array receivers have been investigated [1-4]. On the other hand, digital beamforming offers far greater flexibility, including ability to form multiple simultaneous beams, ease of digital array calibration and support for MIMO. However, ADC dynamic range is challenged due to the absence of spatial interference rejection at RF/analog.", "title": "" }, { "docid": "74ccb28a31d5a861bea1adfaab2e9bf1", "text": "For many decades CMOS devices have been successfully scaled down to achieve higher speed and increased performance of integrated circuits at lower cost. Today’s charge-based CMOS electronics encounters two major challenges: power dissipation and variability. Spintronics is a rapidly evolving research and development field, which offers a potential solution to these issues by introducing novel ‘more than Moore’ devices. Spin-based magnetoresistive random-access memory (MRAM) is already recognized as one of the most promising candidates for future universal memory. Magnetic tunnel junctions, the main elements of MRAM cells, can also be used to build logic-in-memory circuits with non-volatile storage elements on top of CMOS logic circuits, as well as versatile compact on-chip oscillators with low power consumption. We give an overview of CMOS-compatible spintronics applications. First, we present a brief introduction to the physical background considering such effects as magnetoresistance, spin-transfer torque (STT), spin Hall effect, and magnetoelectric effects. We continue with a comprehensive review of the state-of-the-art spintronic devices for memory applications (STT-MRAM, domain wallmotion MRAM, and spin–orbit torque MRAM), oscillators (spin torque oscillators and spin Hall nano-oscillators), logic (logic-in-memory, all-spin logic, and buffered magnetic logic gate grid), sensors, and random number generators. Devices with different types of resistivity switching are analyzed and compared, with their advantages highlighted and challenges revealed. CMOScompatible spintronic devices are demonstrated beginning with predictive simulations, proceeding to their experimental confirmation and realization, and finalized by the current status of application in modern integrated systems and circuits. We conclude the review with an outlook, where we share our vision on the future applications of the prospective devices in the area.", "title": "" }, { "docid": "285587e0e608d8bafa0962b5cf561205", "text": "BACKGROUND\nGeneralized Additive Model (GAM) provides a flexible and effective technique for modelling nonlinear time-series in studies of the health effects of environmental factors. However, GAM assumes that errors are mutually independent, while time series can be correlated in adjacent time points. Here, a GAM with Autoregressive terms (GAMAR) is introduced to fill this gap.\n\n\nMETHODS\nParameters in GAMAR are estimated by maximum partial likelihood using modified Newton's method, and the difference between GAM and GAMAR is demonstrated using two simulation studies and a real data example. GAMM is also compared to GAMAR in simulation study 1.\n\n\nRESULTS\nIn the simulation studies, the bias of the mean estimates from GAM and GAMAR are similar but GAMAR has better coverage and smaller relative error. While the results from GAMM are similar to GAMAR, the estimation procedure of GAMM is much slower than GAMAR. In the case study, the Pearson residuals from the GAM are correlated, while those from GAMAR are quite close to white noise. In addition, the estimates of the temperature effects are different between GAM and GAMAR.\n\n\nCONCLUSIONS\nGAMAR incorporates both explanatory variables and AR terms so it can quantify the nonlinear impact of environmental factors on health outcome as well as the serial correlation between the observations. It can be a useful tool in environmental epidemiological studies.", "title": "" }, { "docid": "19f8ae070aa161ca1399b21b6a9c4678", "text": "Wireless Sensor Network (WSN) is a large scale network with from dozens to thousands tiny devices. Using fields of WSNs (military, health, smart home e.g.) has a large-scale and its usage areas increasing day by day. Secure issue of WSNs is an important research area and applications of WSN have some big security deficiencies. Intrusion Detection System is a second-line of the security mechanism for networks, and it is very important to integrity, confidentiality and availability. Intrusion Detection in WSNs is somewhat different from wired and non-energy constraint wireless network because WSN has some constraints influencing cyber security approaches and attack types. This paper is a survey describing attack types of WSNs intrusion detection approaches being against to this attack types.", "title": "" }, { "docid": "3753bd82d038b2b2b7f03812480fdacd", "text": "BACKGROUND\nDuring the last few years, an increasing number of unstable thoracolumbar fractures, especially in elderly patients, has been treated by dorsal instrumentation combined with a balloon kyphoplasty. This combination provides additional stabilization to the anterior spinal column without any need for a second ventral approach.\n\n\nCASE PRESENTATION\nWe report the case of a 97-year-old male patient with a lumbar burst fracture (type A3-1.1 according to the AO Classification) who presented prolonged neurological deficits of the lower limbs - grade C according to the modified Frankel/ASIA score. After a posterior realignment of the fractured vertebra with an internal screw fixation and after an augmentation with non-absorbable cement in combination with a balloon kyphoplasty, the patient regained his mobility without any neurological restrictions.\n\n\nCONCLUSION\nEspecially in older patients, the presented technique of PMMA-augmented pedicle screw instrumentation combined with balloon-assisted kyphoplasty could be an option to address unstable vertebral fractures in \"a minor-invasive way\". The standard procedure of a two-step dorsoventral approach could be reduced to a one-step procedure.", "title": "" }, { "docid": "0ad47e79e9bea44a76029e1f24f0a16c", "text": "The requirements for OLTP database systems are becoming ever more demanding. New OLTP applications require high degrees of scalability with controlled transaction latencies in in-memory databases. Deployments of these applications require low-level control of database system overhead and program-to-data affinity to maximize resource utilization in modern machines. Unfortunately, current solutions fail to meet these requirements. First, existing database solutions fail to expose a high-level programming abstraction in which latency of transactions can be reasoned about by application developers. Second, these solutions limit infrastructure engineers in exercising low-level control on the deployment of the system on a target infrastructure, further impacting performance. In this paper, we propose a relational actor programming model for in-memory databases. Conceptually, relational actors, or reactors for short, are application-defined, isolated logical actors encapsulating relations that process function calls asynchronously. Reactors ease reasoning about correctness by guaranteeing serializability of application-level function calls. In contrast to classic transactional models, however, reactors allow developers to take advantage of intra-transaction parallelism to reduce latency and improve performance. Moreover, reactors enable a new degree of flexibility in database deployment. We present REACTDB, a novel system design exposing reactors that allows for flexible virtualization of database architecture between the extremes of shared-nothing and shared-everything without changes to application code. Our experiments with REACTDB illustrate performance predictability, multi-core scalability, and low overhead in OLTP benchmarks.", "title": "" }, { "docid": "e12d800b09f2f8f19a138b25d8a8d363", "text": "This paper proposes a corpus-based approach for answering why-questions. Conventional systems use hand-crafted patterns to extract and evaluate answer candidates. However, such hand-crafted patterns are likely to have low coverage of causal expressions, and it is also difficult to assign suitable weights to the patterns by hand. In our approach, causal expressions are automatically collected from corpora tagged with semantic relations. From the collected expressions, features are created to train an answer candidate ranker that maximizes the QA performance with regards to the corpus of why-questions and answers. NAZEQA, a Japanese why-QA system based on our approach, clearly outperforms a baseline that uses hand-crafted patterns with a Mean Reciprocal Rank (top-5) of 0.305, making it presumably the best-performing fully implemented why-QA system.", "title": "" }, { "docid": "dd1a7e3493b9164af4321db944b4950c", "text": "The emerging optical/wireless topology reconfiguration technologies have shown great potential in improving the performance of data center networks. However, it also poses a big challenge on how to find the best topology configurations to support the dynamic traffic demands. In this work, we present xWeaver, a traffic-driven deep learning solution to infer the high-performance network topology online. xWeaver supports a powerful network model that enables the topology optimization over different performance metrics and network architectures. With the design of properly-structured neural networks, it can automatically derive the critical traffic patterns from data traces and learn the underlying mapping between the traffic patterns and topology configurations specific to the target data center. After offline training, xWeaver generates the optimized (or near-optimal) topology configuration online, and can also smoothly update its model parameters for new traffic patterns. We build an optical-circuit-switch-based testbed to demonstrate the function and transmission efficiency of our proposed solution. We further perform extensive simulations to show the significant performance gain of xWeaver, in supporting higher network throughput and smaller flow completion time.", "title": "" }, { "docid": "5aa219f23d4be5d18ace0aa0b0b51b76", "text": "An improved bandgap reference with high power supply rejection (PSR) is presented. The proposed circuit consists of a simple voltage subtractor circuit incorporated into the conventional Brokaw bandgap reference. Essentially, the subtractor feeds the supply noise directly into the feedback loop of the bandgap circuit which could help to suppress supply noise. The simulation results have been shown to conform well with the theoretical evaluation. The proposed circuit has also shown robust performance across temperature and process variations. where PSRRl is the power supply rejection ratio of opamp and is given by PSRRl = A 1 / A d d l . Also, gmQI . P 2 = gmQz , and A I and A d d l are the PI = g m Q , + R , + R 2 gn~Q2+~3 open-loop differential gain and power gain of amplifier respectively.", "title": "" }, { "docid": "3a21628b7ca55d2910da220f0c866bea", "text": "BACKGROUND\nType 2 diabetes is associated with a substantially increased risk of cardiovascular disease, but the role of lipid-lowering therapy with statins for the primary prevention of cardiovascular disease in diabetes is inadequately defined. We aimed to assess the effectiveness of atorvastatin 10 mg daily for primary prevention of major cardiovascular events in patients with type 2 diabetes without high concentrations of LDL-cholesterol.\n\n\nMETHODS\n2838 patients aged 40-75 years in 132 centres in the UK and Ireland were randomised to placebo (n=1410) or atorvastatin 10 mg daily (n=1428). Study entrants had no documented previous history of cardiovascular disease, an LDL-cholesterol concentration of 4.14 mmol/L or lower, a fasting triglyceride amount of 6.78 mmol/L or less, and at least one of the following: retinopathy, albuminuria, current smoking, or hypertension. The primary endpoint was time to first occurrence of the following: acute coronary heart disease events, coronary revascularisation, or stroke. Analysis was by intention to treat.\n\n\nFINDINGS\nThe trial was terminated 2 years earlier than expected because the prespecified early stopping rule for efficacy had been met. Median duration of follow-up was 3.9 years (IQR 3.0-4.7). 127 patients allocated placebo (2.46 per 100 person-years at risk) and 83 allocated atorvastatin (1.54 per 100 person-years at risk) had at least one major cardiovascular event (rate reduction 37% [95% CI -52 to -17], p=0.001). Treatment would be expected to prevent at least 37 major vascular events per 1000 such people treated for 4 years. Assessed separately, acute coronary heart disease events were reduced by 36% (-55 to -9), coronary revascularisations by 31% (-59 to 16), and rate of stroke by 48% (-69 to -11). Atorvastatin reduced the death rate by 27% (-48 to 1, p=0.059). No excess of adverse events was noted in the atorvastatin group.\n\n\nINTERPRETATION\nAtorvastatin 10 mg daily is safe and efficacious in reducing the risk of first cardiovascular disease events, including stroke, in patients with type 2 diabetes without high LDL-cholesterol. No justification is available for having a particular threshold level of LDL-cholesterol as the sole arbiter of which patients with type 2 diabetes should receive statins. The debate about whether all people with this disorder warrant statin treatment should now focus on whether any patients are at sufficiently low risk for this treatment to be withheld.", "title": "" }, { "docid": "a99b1a9409ea1241695590814e685828", "text": "A two-phase heat spreader has been developed for cooling high heat flux sources in high-power lasers, high-intensity light-emitting diodes (LEDs), and semiconductor power devices. The heat spreader uses a passive mechanism to cool heat sources with fluxes as high as 5 W/mm2 without requiring any active power consumption for the thermal solution. The prototype is similar to a vapor chamber in which water is injected into an evacuated, air-tight shell. The shell consists of an evaporator plate, a condenser plate and an adiabatic section. The heat source is made from aluminum nitride, patterned with platinum. The heat source contains a temperature sensor and is soldered to a copper substrate that serves as the evaporator. Tests were performed with several different evaporator microstructures at different heat loads. A screen mesh was able to dissipate heat loads of 2 W/mm2, but at unacceptably high evaporator temperatures. For sintered copper powder with a 50 µm particle diameter, a heat load of 8.5 W/mm2 was supported, without the occurrence of dryout. A sintered copper powder surface coated with multi-walled carbon nanotubes (CNT) that were rendered hydrophilic showed a lowered thermal resistance for the device.", "title": "" }, { "docid": "a274e05ba07259455d0e1fef57f2c613", "text": "Steganography is the art of hiding the very presence of communication by embedding secret messages into innocuous looking cover images. The Least Significant Bit (LSB) steganography that replaces the least significant bits of the host medium is a widely used technique with low computational complexity and high insertion capacity. Although it has good perceptual transparency, it is vulnerable to steganalysis which is based on histogram analysis. In all the existing schemes detection of a secret message in a cover image can be easily detected from the histogram analysis and statistical analysis. Therefore developing new LSB steganography algorithms against statistical and histogram analysis is the prime requirement.", "title": "" }, { "docid": "37a47bd2561b534d5734d250d16ff1c2", "text": "Many chronic eye diseases can be conveniently investigated by observing structural changes in retinal blood vessel diameters. However, detecting changes in an accurate manner in face of interfering pathologies is a challenging task. The task is generally performed through an automatic computerized process. The literature shows that powerful methods have already been proposed to identify vessels in retinal images. Though a significant progress has been achieved toward methods to separate blood vessels from the uneven background, the methods still lack the necessary sensitivity to segment fine vessels. Recently, a multi-scale line-detector method proved its worth in segmenting thin vessels. This paper presents modifications to boost the sensitivity of this multi-scale line detector. First, a varying window size with line-detector mask is suggested to detect small vessels. Second, external orientations are fed to steer the multi-scale line detectors into alignment with flow directions. Third, optimal weights are suggested for weighted linear combinations of individual line-detector responses. Fourth, instead of using one global threshold, a hysteresis threshold is proposed to find a connected vessel tree. The overall impact of these modifications is a large improvement in noise removal capability of the conventional multi-scale line-detector method while finding more of the thin vessels. The contrast-sensitive steps are validated using a publicly available database and show considerable promise for the suggested strategy.", "title": "" }, { "docid": "3b62ccd8e989d81f86b557e8d35a8742", "text": "The ability to accurately judge the similarity between natural language sentences is critical to the performance of several applications such as text mining, question answering, and text summarization. Given two sentences, an effective similarity measure should be able to determine whether the sentences are semantically equivalent or not, taking into account the variability of natural language expression. That is, the correct similarity judgment should be made even if the sentences do not share similar surface form. In this work, we evaluate fourteen existing text similarity measures which have been used to calculate similarity score between sentences in many text applications. The evaluation is conducted on three different data sets, TREC9 question variants, Microsoft Research paraphrase corpus, and the third recognizing textual entailment data set.", "title": "" }, { "docid": "c43ad751dade7d0a5a396f95cc904030", "text": "The electric grid is radically evolving and transforming into the smart grid, which is characterized by improved energy efficiency and manageability of available resources. Energy management (EM) systems, often integrated with home automation systems, play an important role in the control of home energy consumption and enable increased consumer participation. These systems provide consumers with information about their energy consumption patterns and help them adopt energy-efficient behavior. The new generation EM systems leverage advanced analytics and communication technologies to offer consumers actionable information and control features, while ensuring ease of use, availability, security, and privacy. In this article, we present a survey of the state of the art in EM systems, applications, and frameworks. We define a set of requirements for EM systems and evaluate several EM systems in this context. We also discuss emerging trends in this area.", "title": "" }, { "docid": "a7fa5171308a566a19da39ee6d7b74f6", "text": "Machine learning approaches to coreference resolution vary greatly in the modeling of the problem: while early approaches operated on the mention pair level, current research focuses on ranking architectures and antecedent trees. We propose a unified representation of different approaches to coreference resolution in terms of the structure they operate on. We represent several coreference resolution approaches proposed in the literature in our framework and evaluate their performance. Finally, we conduct a systematic analysis of the output of these approaches, highlighting differences and similarities.", "title": "" } ]
scidocsrr
0bb2d15ddb0edefeb8222803e245b457
Bidirectional LSTM-RNN with Bi-attention for reading comprehension (
[ { "docid": "9387c02974103731846062b549022819", "text": "Machine comprehension of text is an important problem in natural language processing. A recently released dataset, the Stanford Question Answering Dataset (SQuAD), offers a large number of real questions and their answers created by humans through crowdsourcing. SQuAD provides a challenging testbed for evaluating machine comprehension algorithms, partly because compared with previous datasets, in SQuAD the answers do not come from a small set of candidate answers and they have variable lengths. We propose an end-to-end neural architecture for the task. The architecture is based on match-LSTM, a model we proposed previously for textual entailment, and Pointer Net, a sequence-to-sequence model proposed by Vinyals et al. (2015) to constrain the output tokens to be from the input sequences. We propose two ways of using Pointer Net for our task. Our experiments show that both of our two models substantially outperform the best results obtained by Rajpurkar et al. (2016) using logistic regression and manually crafted features.", "title": "" }, { "docid": "d8eee79312660f4da03a29372fc87d7e", "text": "Previous work combines word-level and character-level representations using concatenation or scalar weighting, which is suboptimal for high-level tasks like reading comprehension. We present a fine-grained gating mechanism to dynamically combine word-level and character-level representations based on properties of the words. We also extend the idea of fine-grained gating to modeling the interaction between questions and paragraphs for reading comprehension. Experiments show that our approach can improve the performance on reading comprehension tasks, achieving new state-of-the-art results on the Children’s Book Test and Who Did What datasets. To demonstrate the generality of our gating mechanism, we also show improved results on a social media tag prediction task.1", "title": "" }, { "docid": "0201a5f0da2430ec392284938d4c8833", "text": "Natural language sentence matching is a fundamental technology for a variety of tasks. Previous approaches either match sentences from a single direction or only apply single granular (wordby-word or sentence-by-sentence) matching. In this work, we propose a bilateral multi-perspective matching (BiMPM) model. Given two sentences P and Q, our model first encodes them with a BiLSTM encoder. Next, we match the two encoded sentences in two directions P against Q and Q against P . In each matching direction, each time step of one sentence is matched against all timesteps of the other sentence from multiple perspectives. Then, another BiLSTM layer is utilized to aggregate the matching results into a fixed-length matching vector. Finally, based on the matching vector, a decision is made through a fully connected layer. We evaluate our model on three tasks: paraphrase identification, natural language inference and answer sentence selection. Experimental results on standard benchmark datasets show that our model achieves the state-of-the-art performance on all tasks.", "title": "" }, { "docid": "a0e4080652269445c6e36b76d5c8cd09", "text": "Enabling a computer to understand a document so that it can answer comprehension questions is a central, yet unsolved goal of NLP. A key factor impeding its solution by machine learned systems is the limited availability of human-annotated data. Hermann et al. (2015) seek to solve this problem by creating over a million training examples by pairing CNN and Daily Mail news articles with their summarized bullet points, and show that a neural network can then be trained to give good performance on this task. In this paper, we conduct a thorough examination of this new reading comprehension task. Our primary aim is to understand what depth of language understanding is required to do well on this task. We approach this from one side by doing a careful hand-analysis of a small subset of the problems and from the other by showing that simple, carefully designed systems can obtain accuracies of 72.4% and 75.8% on these two datasets, exceeding current state-of-the-art results by over 5% and approaching what we believe is the ceiling for performance on this task.1", "title": "" } ]
[ { "docid": "402da2b20476e5a6303fba4337e33350", "text": "Current advances in neuromorphic engineering have made it possible to emulate complex neuronal ion channel and intracellular ionic dynamics in real time using highly compact and power-efficient complementary metal-oxide-semiconductor (CMOS) analog very-large-scale-integrated circuit technology. Recently, there has been growing interest in the neuromorphic emulation of the spike-timing-dependent plasticity (STDP) Hebbian learning rule by phenomenological modeling using CMOS, memristor or other analog devices. Here, we propose a CMOS circuit implementation of a biophysically grounded neuromorphic (iono-neuromorphic) model of synaptic plasticity that is capable of capturing both the spike rate-dependent plasticity (SRDP, of the Bienenstock-Cooper-Munro or BCM type) and STDP rules. The iono-neuromorphic model reproduces bidirectional synaptic changes with NMDA receptor-dependent and intracellular calcium-mediated long-term potentiation or long-term depression assuming retrograde endocannabinoid signaling as a second coincidence detector. Changes in excitatory or inhibitory synaptic weights are registered and stored in a nonvolatile and compact digital format analogous to the discrete insertion and removal of AMPA or GABA receptor channels. The versatile Hebbian synapse device is applicable to a variety of neuroprosthesis, brain-machine interface, neurorobotics, neuromimetic computation, machine learning, and neural-inspired adaptive control problems.", "title": "" }, { "docid": "a6114f7353b2aa17f8cf4a31b57aac2c", "text": "Rejection of Internet banking is one of the most important problems that faces banks in developing countries. So far, very few academic studies have been conducted on Internet banking adoption in Arab countries. Hence, this research aims to investigate factors that influence the intention to use Internet banking in Yemen. Cross-sectional data were collected from 1286 respondents through a survey. Structural equation modeling was employed to analyze data. The findings supported the research hypotheses and confirmed that perceived relative advantages, perceived ease of use, trust of the Internet banking all impact attitude toward the intention of adopting Internet banking. This paper makes a contribution to Internet banking literature. It sheds light on the factors that affect Internet banking adoption. The findings made a contribution in terms of understanding the factors that can contribute to the adoption of Internet banking by Yemeni consumers..", "title": "" }, { "docid": "dcab641c170b60e9b834b27e2048a457", "text": "Over the past few years, we have been developing techniques for high-speed 3D shape measurement using digital fringe projection and phase-shifting techniques: various algorithms have been developed to improve the phase computation speed, parallel programming has been employed to further increase the processing speed, and advanced hardware technologies have been adopted to boost the speed of coordinate calculations and 3D geometry rendering. We have successfully achieved simultaneous 3D absolute shape acquisition, reconstruction, and display at a speed of 30 frames/s with 300 K points per frame. This paper presents the principles of the real-time 3D shape measurement techniques that we developed, summarizes the most recent progresses that have been made in this field, and discusses the challenges for advancing this technology further. & 2009 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "0b68335ce69cbb270d22c97137a92318", "text": "II Preface The final section of the Masters study program at Delft University of Technology consists of an individual thesis on a subject related to the student's specialization. This report is an overview of the results of an investigation on the thesis subject: New concept LNG Marine terminal; Hydrodynamics of a LNG carrier behind a detached breakwater. The research objective is the development of a simulation model that predicts the response of a moored LNG carrier in an exposed LNG marine terminal, as a function of the breakwater configuration and coast. During this investigation a graduation committee, consisting of the following persons, supervised all stages of the thesis work, for which I am very grateful; Prof.ir. H. Ligteringen (head of the committee), Dr.ir. Especially Wim van der Molen I would like to thank for his daily supervision and support during the past months. Due to his clear explanations on the subject and our coorporation, this thesis has been a very constructive and educational process. I also would like to thank Prof.dr.ir. J.A. Pinkster for the DELFRAC simulation results. Besides the graduation committee I would like to thank all those who have donated their time, energy and have given me advice, my family, and friends. Abstract As the worldwide gas market continues to grow and environmental concerns with respect to in-port unloading of gas have increased, there has been a boom of interest in new liquefied natural gas (LNG) import terminals in the past five years. For these terminals, which are more and more located in areas with hostile sea conditions, dedicated provisions are required to create sufficient shelter for the carriers. Proposals have been made to construct a marginal low crested breakwater parallel to the coast protecting a ship moored at a jetty close to the shore. For an optimal economic design of such an LNG marine terminal, the dimensions and orientation of the detached breakwater have to be optimized as a function of the weather related downtime of the moored LNG carrier. Doing so requires adequate simulation tools. However, for the combination of wave and ship motion, a link between an efficient wave simulation tool and a program for ship response calculations is not available at present. The research on ship behaviour has resulted in the development of various so-called six degrees of freedom (SDF) computer programs. These programs solve the equations of motion of a moored vessel for …", "title": "" }, { "docid": "14cd8975303f4d21d31a63ff57a1dfed", "text": "BACKGROUNDS\nInternet addiction (IA) has become a major public health issue worldwide and is closely linked to psychiatric disorders and suicide. The present study aimed to investigate the prevalence of IA and its associated psychosocial and psychopathological determinants among internet users across different age groups.\n\n\nMETHODS\nThe study was a cross-sectional survey initiated by the Taiwan Suicide Prevention Center. The participants were recruited from the general public who responded to the online questionnaire. They completed a series of self-reported measures, including Chen Internet Addiction Scale-revised (CIAS-R), Five-item Brief Symptom Rating Scale (BSRS-5), Maudsley Personality Inventory (MPI), and questions about suicide and internet use habits.\n\n\nRESULTS\nWe enrolled 1100 respondents with a preponderance of female subjects (85.8%). Based on an optimal cutoff for CIAS-R (67/68), the prevalence rate of IA was 10.6%. People with higher scores of CIAS-R were characterized as: male, single, students, high neuroticism, life impairment due to internet use, time for internet use, online gaming, presence of psychiatric morbidity, recent suicide ideation and past suicide attempts. Multiple regression on IA showed that age, gender, neuroticism, life impairment, internet use time, and BSRS-5 score accounted for 31% of variance for CIAS-R score. Further, logistic regression showed that neuroticism, life impairment and internet use time were three main predictors for IA. Compared to those without IA, the internet addicts had higher rates of psychiatric morbidity (65.0%), suicide ideation in a week (47.0%), lifetime suicide attempts (23.1%), and suicide attempt in a year (5.1%).\n\n\nCONCLUSION\nNeurotic personality traits, psychopathology, time for internet use and its subsequent life impairment were important predictors for IA. Individuals with IA may have higher rates of psychiatric morbidity and suicide risks. The findings provide important information for further investigation and prevention of IA.", "title": "" }, { "docid": "4c1b42e12fd4f19870b5fc9e2f9a5f07", "text": "Similar to face-to-face communication in daily life, more and more evidence suggests that human emotions also spread in online social media through virtual interactions. However, the mechanism underlying the emotion contagion, like whether different feelings spread unlikely or how the spread is coupled with the social network, is rarely investigated. Indeed, due to the costly expense and spatio-temporal limitations, it is challenging for conventional questionnaires or controlled experiments. While given the instinct of collecting natural affective responses of massive connected individuals, online social media offer an ideal proxy to tackle this issue from the perspective of computational social science. In this paper, based on the analysis of millions of tweets in Weibo, a Twitter-like service in China, we surprisingly find that anger is more contagious than joy, indicating that it can sparkle more angry follow-up tweets; and anger prefers weaker ties than joy for the dissemination in social network, indicating that it can penetrate different communities and break local traps by more sharings between strangers. Through a simple diffusion model, it is unraveled that easier contagion and weaker ties function cooperatively in speeding up anger’s spread, which is further testified by the diffusion of realistic bursty events with different dominant emotions. To our best knowledge, for the first time we quantificationally provide the long-term evidence to disclose the difference between joy and anger in dissemination mechanism and our findings would shed lights on personal anger management in human communication and collective outrage control in cyber space.", "title": "" }, { "docid": "687ecd0aadd3c29d641827f7c43e91cd", "text": "When different stakeholders share a common resource, such as the case in spectrum sharing, security and enforcement become critical considerations that affect the welfare of all stakeholders. Recent advances in radio spectrum access technologies, such as cognitive radios, have made spectrum sharing a viable option for significantly improving spectrum utilization efficiency. However, those technologies have also contributed to exacerbating the difficult problems of security and enforcement. In this paper, we review some of the critical security and privacy threats that impact spectrum sharing. We propose a taxonomy for classifying the various threats, and describe representative examples for each threat category. We also discuss threat countermeasures and enforcement techniques, which are discussed in the context of two different approaches: ex ante (preventive) and ex post (punitive) enforcement.", "title": "" }, { "docid": "9eae7dded031b37956ceea6e68f1076c", "text": "One of the core principles of the SAP HANA database system is the comprehensive support of distributed query facility. Supporting scale-out scenarios was one of the major design principles of the system from the very beginning. Within this paper, we first give an overview of the overall functionality with respect to data allocation, metadata caching and query routing. We then dive into some level of detail for specific topics and explain features and methods not common in traditional disk-based database systems. In summary, the paper provides a comprehensive overview of distributed query processing in SAP HANA database to achieve scalability to handle large databases and heterogeneous types of workloads.", "title": "" }, { "docid": "1925162dafab9fb0522f625782b7e7a3", "text": "Breast cancer is the most frequently diagnosed malignancy and the second leading cause of mortality in women . In the last decade, ultrasound along with digital mammography has come to be regarded as the gold standard for breast cancer diagnosis. Automatically detecting tumors and extracting lesion boundaries in ultrasound images is difficult due to their specular nature and the variance in shape and appearance of sonographic lesions. Past work on automated ultrasonic breast lesion segmentation has not addressed important issues such as shadowing artifacts or dealing with similar tumor like structures in the sonogram. Algorithms that claim to automatically classify ultrasonic breast lesions, rely on manual delineation of the tumor boundaries. In this paper, we present a novel technique to automatically find lesion margins in ultrasound images, by combining intensity and texture with empirical domain specific knowledge along with directional gradient and a deformable shape-based model. The images are first filtered to remove speckle noise and then contrast enhanced to emphasize the tumor regions. For the first time, a mathematical formulation of the empirical rules used by radiologists in detecting ultrasonic breast lesions, popularly known as the \"Stavros Criteria\" is presented in this paper. We have applied this formulation to automatically determine a seed point within the image. Probabilistic classification of image pixels based on intensity and texture is followed by region growing using the automatically determined seed point to obtain an initial segmentation of the lesion. Boundary points are found on the directional gradient of the image. Outliers are removed by a process of recursive refinement. These boundary points are then supplied as an initial estimate to a deformable model. Incorporating empirical domain specific knowledge along with low and high-level knowledge makes it possible to avoid shadowing artifacts and lowers the chance of confusing similar tumor like structures for the lesion. The system was validated on a database of breast sonograms for 42 patients. The average mean boundary error between manual and automated segmentation was 6.6 pixels and the normalized true positive area overlap was 75.1%. The algorithm was found to be robust to 1) variations in system parameters, 2) number of training samples used, and 3) the position of the seed point within the tumor. Running time for segmenting a single sonogram was 18 s on a 1.8-GHz Pentium machine.", "title": "" }, { "docid": "a13788dcda6ba9caa99e3b6b5dab73f9", "text": "Our research examines a predictive machine learning approach for financial news articles analysis using several different textual representations: bag of words, noun phrases, and named entities. Through this approach, we investigated 9,211 financial news articles and 10,259,042 stock quotes covering the S&P 500 stocks during a five week period. We applied our analysis to estimate a discrete stock price twenty minutes after a news article was released. Using a support vector machine (SVM) derivative specially tailored for discrete numeric prediction and models containing different stock-specific variables, we show that the model containing both article terms and stock price at the time of article release had the best performance in closeness to the actual future stock price (MSE 0.04261), the same direction of price movement as the future price (57.1% directional accuracy) and the highest return using a simulated trading engine (2.06% return). We further investigated the different textual representations and found that a Proper Noun scheme performs better than the de facto standard of Bag of Words in all three metrics.", "title": "" }, { "docid": "584de328ade02c34e36e2006f3e66332", "text": "The HP-ASD technology has experienced a huge development in the last decade. This can be appreciated by the large number of recently introduced drive configurations on the market. In addition, many industrial applications are reaching MV operation and megawatt range or have experienced changes in requirements on efficiency, performance, and power quality, making the use of HP-ASDs more attractive. It can be concluded that, HP-ASDs is an enabling technology ready to continue powering the future of industry for the decades to come.", "title": "" }, { "docid": "67105cf59b4f454c57bcaea2626bad84", "text": "We introduce a new subclass of Allen's interval algebra we call “ORD-Horn subclass,” which is a strict superset of the “pointisable subclass.” We prove that reasoning in the ORD-Horn subclass is a polynomial-time problem and show that the path-consistency method is sufficient for deciding satisfiability. Further, using an extensive machine-generated case analysis, we show that the ORD-Horn subclass is a maximal tractable subclass of the full algebra (assuming P <inline-equation> <f> ≠</f> </inline-equation> NP). In fact, it is the unique greatest tractable subclass amongst the subclasses that contain all basic relations.", "title": "" }, { "docid": "45ab148524a2e67bef4ec00f8546b12e", "text": "Software Science is a discipline that studies the theoretical framework of software as instructive and behavioral information, which can be embodied and executed by generic computers in order to create expected system behaviors and machine intelligence. Intelligence science is a discipline that studies the mechanisms and theories of abstract intelligence and its paradigms such as natural, artificial, machinable, and computational intelligence. The convergence of software and intelligent sciences forms the transdisciplinary field of computational intelligence, which provides a coherent set of fundamental theories, contemporary denotational mathematics, and engineering applications. This editorial addresses the objectives of the International Journal of Software Science and Computational Intelligence (IJSSCI), and explores the domain of the emerging discipline. The historical evolvement of software and intelligence sciences and their theoretical foundations are elucidated. The coverage of this inaugural issue and recent advances in software and intelligence sciences are reviewed. This editorial demonstrates that the investigation into software and intelligence sciences will result in fundamental findings toward the development of future generation computing theories, methodologies, and technologies, as well as novel mathematical structures.", "title": "" }, { "docid": "61d506905286fc3297622d1ac39534f0", "text": "In this paper we present the setup of an extensive Wizard-of-Oz environment used for the data collection and the development of a dialogue system. The envisioned Perception and Interaction Assistant will act as an independent dialogue partner. Passively observing the dialogue between the two human users with respect to a limited domain, the system should take the initiative and get meaningfully involved in the communication process when required by the conversational situation. The data collection described here involves audio and video data. We aim at building a rich multi-media data corpus to be used as a basis for our research which includes, inter alia, speech and gaze direction recognition, dialogue modelling and proactivity of the system. We further aspire to obtain data with emotional content to perfom research on emotion recognition, psychopysiological and usability analysis.", "title": "" }, { "docid": "02f62ec1ea8b7dba6d3a5d4ea08abe2d", "text": "MicroRNAs (miRNAs) are short, 22–25 nucleotide long transcripts that may suppress entire signaling pathways by interacting with the 3’-untranslated region (3’-UTR) of coding mRNA targets, interrupting translation and inducing degradation of these targets. The long 3’-UTRs of brain transcripts compared to other tissues predict important roles for brain miRNAs. Supporting this notion, we found that brain miRNAs co-evolved with their target transcripts, that non-coding pseudogenes with miRNA recognition elements compete with brain coding mRNAs on their miRNA interactions, and that Single Nucleotide Polymorphisms (SNPs) on such pseudogenes are enriched in mental diseases including autism and schizophrenia, but not Alzheimer’s disease (AD). Focusing on evolutionarily conserved and primate-specifi c miRNA controllers of cholinergic signaling (‘CholinomiRs’), we fi nd modifi ed CholinomiR levels in the brain and/or nucleated blood cells of patients with AD and Parkinson’s disease, with treatment-related diff erences in their levels and prominent impact on the cognitive and anti-infl ammatory consequences of cholinergic signals. Examples include the acetylcholinesterase (AChE)-targeted evolutionarily conserved miR-132, whose levels decline drastically in the AD brain. Furthermore, we found that interruption of AChE mRNA’s interaction with the primatespecifi c CholinomiR-608 in carriers of a SNP in the AChE’s miR-608 binding site induces domino-like eff ects that reduce the levels of many other miR-608 targets. Young, healthy carriers of this SNP express 40% higher brain AChE activity than others, potentially aff ecting the responsiveness to AD’s anti-AChE therapeutics, and show elevated trait anxiety, infl ammation and hypertension. Non-coding regions aff ecting miRNA-target interactions in neurodegenerative brains thus merit special attention.", "title": "" }, { "docid": "471579f955f8b68a357c8780a7775cc9", "text": "In addition to practitioners who care for male patients, with the increased use of high-resolution anoscopy, practitioners who care for women are seeing more men in their practices as well. Some diseases affecting the penis can impact on their sexual partners. Many of the lesions and neoplasms of the penis occur on the vulva as well. In addition, there are common and rare lesions unique to the penis. A review of the scope of penile lesions and neoplasms that may present in a primary care setting is presented to assist in developing a differential diagnosis if such a patient is encountered, as well as for practitioners who care for their sexual partners. A familiarity will assist with recognition, as well as when consultation is needed.", "title": "" }, { "docid": "dde5155ce92464a8584afc866c324bc2", "text": "Prior work in human trust of autonomous robots suggests the timing of reliability drops impact trust and control allocation strategies. However, trust is traditionally measured post-run, thereby masking the real-time changes in trust, reducing sensitivity to factors like inertia, and subjecting the measure to biases like the primacy-recency effect. Likewise, little is known on how feedback of robot confidence interacts in real-time with trust and control allocation strategies. An experiment to examine these issues showed trust loss due to early reliability drops is masked in traditional post-run measures, trust demonstrates inertia, and feedback alters allocation strategies independent of trust. The implications of specific findings on development of trust models and robot design are also discussed.", "title": "" }, { "docid": "a40b8e1bad22921a317c290e17478689", "text": "Two novel adaptive nonlinear filter structures are proposed which are based on linear combinations of order statistics. These adaptive schemes are modifications of the standard LMS algorithm and have the ability to incorporate constraints imposed on coefficients in order to permit location-invariant and unbiased estimation of a constant signal in the presence of additive white noise. The convergence in the mean and in the mean square of the proposed adaptive nonlinear filters is studied. The rate of convergence is also considered. It is verified by simulations that the independence theory provides useful bounds on the rate of convergence. The extreme eigenvalues of the matrix which controls the performance of the location-invariant adaptive LMS L-filter are related to the extreme eigenvalues of the correlation matrix of the ordered noise samples which controls the performance of other adaptive LMS L-filters proposed elsewhere. The proposed filters can adapt well to a variety of noise probability distributions ranging from the short-tailed ones (e.g. uniform distribution) to long-tailed ones (e.g. Laplacian distribution). Zusammenfassung. Es werden zwei neue adaptive nichtlineare Filterstrukturen vorgeschlagen, die auf Linearkombinationen yon Order-Statistik beruhen. Diese adaptiven Strukturen sind Modifikationen des iiblichen LMS-Algorithmus und erlauben die Einbringung yon Bedingungen bezfiglich der Koeffizienten, um ortsinvariante und erwartungstreue Schfitzungen konstanter Signale unter additivem, weiBem Rauschen zu erm6glichen. Die Konvergenz bez/iglich des Mittelwertes und des quadratischen Mittelwertes wird fiir die vorgeschlagenen nichtlinearen Filter untersucht. Weiterhin wird die Konvergenzgeschwindigkeit betrachtet. Durch Simulationen wird gezeigt, dab die Independence-Theorie brauchbare Grenzen ffir die Konvergenzrate liefert. Die extremen Eigenwerte der Matrix, die das Verhalten des ortsinvarianten adaptiven LMS L-Filters bestimmt, werden den Eigenwerten der Korrelationsmatrix der geordneten Rauschabtastwerte gegeniibergestellt, die das Verhalten anderer adaptiver LMS L-Filter bestimmt. Die vorgeschlagenen Filter stellen sich sehr gut auf eine Vielzahl verschiedener Verteilungsdichten des Rauschens ein, angefangen von schmalen Verteilungen (z.B. Gleichverteilung) bis hin zu langsam abfallenden (z.B. Laplace). R6sum+. Nous proposons deux structures de filtre non-lin~aire originales, structures bastes sur des combinaisons lin6aires de statistiques d'ordre. Ces techniques adaptatives sont des modifications de I'algorithme LMS standard et ont la capacit6 d'incorporer des contraintes impos+es sur les coefficients afin de permettre une estimation ne variant pas selon la localisation et non biais6e d 'un signal constant en pr6sence de bruit blanc additif. Nous 6tudions la convergence en moyenne et en moyenne quadratique des filtres non-lin6aires adaptatifs propos6s. Nous consid~rons 6galement le taux de convergence. Nous v+rifions par des simulations que l'hypoth+se d'ind6pendance fournit des bornes utiles sur le taux de convergence. Nous relions les valeurs propres extremes de la matrice qui contr61e les performances du L-filtre LMS adaptatif ne variant pas selon la localisation aux valeurs propres extremes de la matrice de correlation des 6chantillons de bruit ordonn+s qui contr61e les performances d'autres L-filtres LMS proposes ailleurs. Les filtres propos6s peuvent s 'adapter ais+ment 5. une vari6te de distributions de densit6 de bruit allant de celles 5. queue courte (p.e. la distribution uniforme) 5. celles 5. queue longue (p.e. la distribution de Laplace).", "title": "" }, { "docid": "ae454338771f068e2b8a1f475855de11", "text": "For powder-bed electron beam additive manufacturing (EBAM), support structures are required when fabricating an overhang to prevent defects such as curling, which is due to the complex thermomechanical process in EBAM. In this study, finite element modeling is developed to simulate the thermomechanical process in EBAM in building overhang part. Thermomechanical characteristics such as thermal gradients and thermal stresses around the overhang build are evaluated and analyzed. The model is applied to evaluate process parameter effects on the severity of thermal stresses. The major results are summarized as follows. For a uniform set of process parameters, the overhang areas have a higher maximum temperature, a higher tensile stress, and a larger distortion than the areas above a solid substrate. A higher energy density input, e.g., a lower beam speed or a higher beam current may cause more severe curling at the overhang area.", "title": "" } ]
scidocsrr
c68908e6ee2bb178d3dd3da0db3ec66c
SCOPE AND LIMITATION OF ELECTRONIC VOTING SYSTEM
[ { "docid": "3293e4e0d7dd2e29505db0af6fbb13d1", "text": "A new heuristic approach for minimizing possibly nonlinear and non-differentiable continuous space functions is presented. By means of an extensive testbed it is demonstrated that the new method converges faster and with more certainty than many other acclaimed global optimization methods. The new method requires few control variables, is robust, easy to use, and lends itself very well to parallel computation.", "title": "" } ]
[ { "docid": "c9e1c4b2a043ba43fbd07b05e8742e41", "text": "BACKGROUND\nThere has been research on the use of offline video games for therapeutic purposes but online video game therapy is still fairly under-researched. Online therapeutic interventions have only recently included a gaming component. Hence, this review represents a timely first step toward taking advantage of these recent technological and cultural innovations, particularly for the treatment of special-needs groups such as the young, the elderly and people with various conditions such as ADHD, anxiety and autism spectrum disorders.\n\n\nMATERIAL\nA review integrating research findings on two technological advances was conducted: the home computer boom of the 1980s, which triggered a flood of research on therapeutic video games for the treatment of various mental health conditions; and the rise of the internet in the 1990s, which caused computers to be seen as conduits for therapeutic interaction rather than replacements for the therapist.\n\n\nDISCUSSION\nWe discuss how video games and the internet can now be combined in therapeutic interventions, as attested by a consideration of pioneering studies.\n\n\nCONCLUSION\nFuture research into online video game therapy for mental health concerns might focus on two broad types of game: simple society games, which are accessible and enjoyable to players of all ages, and online worlds, which offer a unique opportunity for narrative content and immersive remote interaction with therapists and fellow patients. Both genres might be used for assessment and training purposes, and provide an unlimited platform for social interaction. The mental health community can benefit from more collaborative efforts between therapists and engineers, making such innovations a reality.", "title": "" }, { "docid": "f248f5bfb4d4aa8b1d90fcdcc19c3b7d", "text": "As telecommunication networks evolve rapidly in terms of scalability, complexity, and heterogeneity, the efficiency of fault localization procedures and the accuracy in the detection of anomalous behaviors are becoming important factors that largely influence the decision making process in large management companies. For this reason, telecommunication companies are doing a big effort investing in new technologies and projects aimed at finding efficient management solutions. One of the challenging issues for network and system management operators is that of dealing with the huge amount of alerts generated by the managed systems and networks. In order to discover anomalous behaviors and speed up fault localization processes, alert correlation is one of the most popular resources. Although many different alert correlation techniques have been investigated, it is still an active research field. In this paper, a survey of the state of the art in alert correlation techniques is presented. Unlike other authors, we consider that the correlation process is a common problem for different fields in the industry. Thus, we focus on showing the broad influence of this problem. Additionally, we suggest an alert correlation architecture capable of modeling current and prospective proposals. Finally, we also review some of the most important commercial products currently available. 2013 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "64cf7bd992bc6fea358273497d962619", "text": "Magnetic skyrmions are promising candidates for next-generation information carriers, owing to their small size, topological stability, and ultralow depinning current density. A wide variety of skyrmionic device concepts and prototypes have recently been proposed, highlighting their potential applications. Furthermore, the intrinsic properties of skyrmions enable new functionalities that may be inaccessible to conventional electronic devices. Here, we report on a skyrmion-based artificial synapse device for neuromorphic systems. The synaptic weight of the proposed device can be strengthened/weakened by positive/negative stimuli, mimicking the potentiation/depression process of a biological synapse. Both short-term plasticity and long-term potentiation functionalities have been demonstrated with micromagnetic simulations. This proposal suggests new possibilities for synaptic devices in neuromorphic systems with adaptive learning function.", "title": "" }, { "docid": "32874ff6ff0a4556950281fb300198ed", "text": "In the multi-armed bandit problem, a gambler must decide which arm ofKnon-identical slot machines to play in a sequence of trials so as to maximize his reward. This classical problem has received much attention because of the simple model it provides of the trade-off between exploration (trying out each arm to find the best one) and exploitation (playing the arm believed to give the best payoff). Past solutions for the bandit problem have almost always relied on assumptions about the statistics of the slot machines. In this work, we make no statistical assumptions whatsoever about the nature of the process generating the payoffs of the slot machines. We give a solution to the bandit problem in which an adversary, rather than a well-behaved stochastic process, has complete control over the payoffs. In a sequence of T plays, we prove that the expected per-round payoff of our algorithm approaches that of the best arm at the rate", "title": "" }, { "docid": "da9ffb00398f6aad726c247e3d1f2450", "text": "We propose noWorkflow, a tool that transparently captures provenance of scripts and enables reproducibility. Unlike existing approaches, noWorkflow is non-intrusive and does not require users to change the way they work – users need not wrap their experiments in scientific workflow systems, install version control systems, or instrument their scripts. The tool leverages Software Engineering techniques, such as abstract syntax tree analysis, reflection, and profiling, to collect different types of provenance, including detailed information about the underlying libraries. We describe how noWorkflow captures multiple kinds of provenance and the different classes of analyses it supports: graph-based visualization; differencing over provenance trails; and inference queries.", "title": "" }, { "docid": "a4a6501af9edda1f7ede81d85a0f370b", "text": "This paper discusses the development of new winding configuration for six-phase permanent-magnet (PM) machines with 18 slots and 8 poles, which eliminates and/or reduces undesirable space harmonics in the stator magnetomotive force. The proposed configuration improves power/torque density and efficiency with a reduction in eddy-current losses in the rotor permanent magnets and copper losses in end windings. To improve drive train availability for applications in electric vehicles (EVs), this paper proposes the design of a six-phase PM machine as two independent three-phase windings. A number of possible phase shifts between two sets of three-phase windings due to their slot-pole combination and winding configuration are investigated, and the optimum phase shift is selected by analyzing the harmonic distributions and their effect on machine performance, including the rotor eddy-current losses. The machine design is optimized for a given set of specifications for EVs, under electrical, thermal and volumetric constraints, and demonstrated by the experimental measurements on a prototype machine.", "title": "" }, { "docid": "7f0023af2f3df688aa58ae3317286727", "text": "Time-parameterized queries (TP queries for short) retrieve (i) the actual result at the time that the query is issued, (ii) the validity period of the result given the current motion of the query and the database objects, and (iii) the change that causes the expiration of the result. Due to the highly dynamic nature of several spatio-temporal applications, TP queries are important both as standalone methods, as well as building blocks of more complex operations. However, little work has been done towards their efficient processing. In this paper, we propose a general framework that covers time-parameterized variations of the most common spatial queries, namely window queries, k-nearest neighbors and spatial joins. In particular, each of these TP queries is reduced to nearest neighbor search where the distance functions are defined according to the query type. This reduction allows the application and extension of well-known branch and bound techniques to the current problem. The proposed methods can be applied with mobile queries, mobile objects or both, given a suitable indexing method. Our experimental evaluation is based on R-trees and their extensions for dynamic objects.", "title": "" }, { "docid": "b42c9db51f55299545588a1ee3f7102f", "text": "With the increasing development of Web 2.0, such as social media and online businesses, the need for perception of opinions, attitudes, and emotions grows rapidly. Sentiment analysis, the topic studying such subjective feelings expressed in text, has attracted significant attention from both the research community and industry. Although we have known sentiment analysis as a task of mining opinions expressed in text and analyzing the entailed sentiments and emotions, so far the task is still vaguely defined in the research literature because it involves many overlapping concepts and sub-tasks. Because this is an important area of scientific research, the field needs to clear this vagueness and define various directions and aspects in detail, especially for students, scholars, and developers new to the field. In fact, the field includes numerous natural language processing tasks with different aims (such as sentiment classification, opinion information extraction, opinion summarization, sentiment retrieval, etc.) and these have multiple solution paths. Bing Liu has done a great job in this book in providing a thorough exploration and an anatomy of the sentiment analysis problem and conveyed a wealth of knowledge about different aspects of the field.", "title": "" }, { "docid": "95602759411f04ccbc29f96901addba4", "text": "Low-level feature extraction is the first step in any image analysis procedure and is essential for the performance of stereo vision and object recognition systems. Research concerning the detection of corners, blobs and circular or point like features is particularly rich and many procedures have been proposed in the literature. In this paper, several frequently used methods and some novel ideas are tested and compared. We measure the performance of the detectors under the criteria of their detection and repeatability rate as well as the localization accuracy. We present a short review of the major interest point detectors, propose some improvements and describe the experimental setup used for our comparison. Finally, we determine which detector leads to the best results and show that it satisfies the criteria specified above.", "title": "" }, { "docid": "ee7710bc2db66c00ff046c08a0f52718", "text": "This paper presents a new idea to determine a set of optimal design parameters of a linear delta robot (LDR) whose workspace is as close as possible of being equal to a prescribed cuboid dexterous workspace (PCDW). The optimal design procedure on the basis of three algorithms is introduced in this paper. The kinematic problem is analyzed in brief to determine the design parameters and their relation. Two algorithms are designed to determine the reachable, rectangular dexterous workspace, and the maximal inscribed rectangle of dexterous workspace in the O-xy plane. Another algorithm is used to solve the optimal problem. As applying example, the results of four cases PCDW to LDR are presented. And the design result is compared with a new concept of the distance between the best state of the LDR and the requirement of the operation task. The method and result of this paper are very useful for the design and comparison of the parallel robot.", "title": "" }, { "docid": "26813ea092f8bbedd3f970010a8a6fe6", "text": "Lane-border detection is one of the best-developed modules in vision-based driver assistance systems today. However, there is still a need for further improvement for challenging road and traffic situations, and a need to design tools for quantitative performance evaluation. This paper discusses and refines a previously published method to generate ground truth for lane markings from recorded video, applies two lanedetection methods to such video data, and then illustrates the proposed performance evaluation by comparing calculated ground truth with detected lane positions. This paper also proposes appropriate performance measures that are required to evaluate the proposed method.", "title": "" }, { "docid": "9f5dbb6aa2351d8a36368be88f35236e", "text": "Extraction-transformation-loading (ETL) tools are pieces of software responsible for the extraction of data from several sources, their cleansing, customization, and insertion into a data warehouse. In this paper, we derive into the logical optimization of ETL processes, modeling it as a state-space search problem. We consider each ETL workflow as a state and fabricate the state space through a set of correct state transitions. Moreover, we provide an exhaustive and two heuristic algorithms toward the minimization of the execution cost of an ETL workflow. The heuristic algorithm with greedy characteristics significantly outperforms the other two algorithms for a large set of experimental cases.", "title": "" }, { "docid": "a2d7fc045b1c8706dbfe3772a8f6ef70", "text": "This paper is concerned with the problem of domain adaptation with multiple sources from a causal point of view. In particular, we use causal models to represent the relationship between the features X and class label Y , and consider possible situations where different modules of the causal model change with the domain. In each situation, we investigate what knowledge is appropriate to transfer and find the optimal target-domain hypothesis. This gives an intuitive interpretation of the assumptions underlying certain previous methods and motivates new ones. We finally focus on the case where Y is the cause for X with changing PY and PX|Y , that is, PY and PX|Y change independently across domains. Under appropriate assumptions, the availability of multiple source domains allows a natural way to reconstruct the conditional distribution on the target domain; we propose to model PX|Y (the process to generate effect X from cause Y ) on the target domain as a linear mixture of those on source domains, and estimate all involved parameters by matching the target-domain feature distribution. Experimental results on both synthetic and real-world data verify our theoretical results. Traditional machine learning relies on the assumption that both training and test data are from the same distribution. In practice, however, training and test data are probably sampled under different conditions, thus violating this assumption, and the problem of domain adaptation (DA) arises. Consider remote sensing image classification as an example. Suppose we already have several data sets on which the class labels are known; they are called source domains here. For a new data set, or a target domain, it is usually difficult to find the ground truth reference labels, and we aim to determine the labels by making use of the information from the source domains. Note that those domains are usually obtained in different areas and time periods, and that the corresponding data distribution various due to the change in illumination conditions, physical factors related to ground (e.g., different soil moisture or composition), vegetation, and atmospheric conditions. Other well-known instances of this situation include sentiment data analysis (Blitzer, Dredze, and Pereira 2007) and flow cytometry data analysis (Blanchard, Lee, and Scott 2011). DA approaches have Copyright c © 2015, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. many applications in varies areas including natural language processing, computer vision, and biology. For surveys on DA, see, e.g., (Jiang 2008; Pan and Yang 2010; Candela et al. 2009). In this paper, we consider the situation with n source domains on which both the features X and label Y are given, i.e., we are given (x,y) = (x k , y (i) k ) mi k=1, where i = 1, ..., n, and mi is the sample size of the ith source domain. Our goal is to find the classifier for the target domain, on which only the features x = (xk) m k=1 are available. Here we are concerned with a difficult scenario where no labeled point is available in the target domain, known as unsupervised domain adaptation. Since PXY changes across domains, we have to find what knowledge in the source domains should be transferred to the target one. Previous work in domain adaptation has usually assumed that PX changes but PY |X remain the same, i.e., the covariate shift situation; see, e.g., (Shimodaira 2000; Huang et al. 2007; Sugiyama et al. 2008; Ben-David, Shalev-Shwartz, and Urner 2012). It is also known as sample selection bias (particularly on the features X) in (Zadrozny 2004). In practice it is very often that both PX and PY |X change simultaneously across domains. For instance, both of them are likely to change over time and location for a satellite image classification system. If the data distribution changes arbitrarily across domains, clearly knowledge from the sources may not help in predicting Y on the target domain (Rosenstein et al. 2005). One has to find what type of information should be transferred from sources to the target. One possibility is to assume the change in both PX and PY |X is due to the change in PY , while PX|Y remains the same, as known as prior probability shift (Storkey 2009; Plessis and Sugiyama 2012) or target shift (Zhang et al. 2013). The latter further models the change in PX|Y caused by a location-scale (LS) transformation of the features for each class. The constraint of the LS transformation renders PX|Y on the target domain, denoted by P t X|Y , identifiable; however, it might be too restrictive. Fortunately, the availability of multiple source domains provides more hints as to find P t X|Y , as well as P t Y |X . Several algorithms have been proposed to combine knowledge from multiple source domains. For instance, (Mansour, Mohri, and Rostamizadeh 2008) proposed to form the target hypothesis by combining source hypotheses with a distribution weighted rule. (Gao et al. 2008), (Duan et al. 2009), and (Chattopadhyay et al. 2011) combine the predictions made by the source hypotheses, with the weights determined in different ways. An intuitive interpretation of the assumptions underlying those algorithms would facilitate choosing or developing DA methods for the problem at hand. To the best of our knowledge, however, it is still missing in the literature. One of our contributions in this paper is to provide such an interpretation. This paper studies the multi-source DA problem from a causal point of view where we consider the underlying data generating process behind the observed domains. We are particularly interested in what types of information stay the same, what types of information change, and how they change across domains. This enables us to construct the optimal hypothesis for the target domain in various situations. To this end, we use causal models to represent the relationship between X and Y , because they provide a compact description of the properties of the change in the data distribution.1 They, for instance, help characterize transportability of experimental findings (Pearl and Bareinboim 2011) or recoverability from selection bias (Bareinboim, Tian, and Pearl 2014). As another contribution, we further focus on a typical DA scenario where both PY and PX|Y (or the causal mechanism to generate effect X from cause Y ) change across domains, but their changes are independent from each other, as implied by the causal model Y → X . We assume that the source domains contains rich information such that for each class, P t X|Y can be approximated by a linear mixture of PX|Y on source domains. Together with other mild conditions on PX|Y , we then show that P t X|Y , as well as P t Y , is identifiable (or can be uniquely recovered). We present a computationally efficient method to estimate the involved parameters based on kernel mean distribution embedding (Smola et al. 2007; Gretton et al. 2007), followed by several approaches to constructing the target classifier using those parameters. One might wonder how to find the causal information underlying the data to facilitate domain adaptation. We note that in practice, background causal knowledge is usually available, helping formulating how to transfer the knowledge from source domains to the target. Even if this is not the case, multiple source domains with different data distributions may allow one to identify the causal structure, since the causal knowledge can be seen from the change in data distributions; see e.g., (Tian and Pearl 2001). 1 Possible DA Situations and Their Solutions DA can be considered as a learning problem in nonstationary environments (Sugiyama and Kawanabe 2012). It is helpful to find how the data distribution changes; it provides the clues as to find the learning machine for the target domain. The causal model also describes how the components of the joint distribution are related to each other, which, for instance, gives a causal explanation of the behavior of semi-supervised learning (Schölkopf et al. 2012). Table 1: Notation used in this paper. X , Y random variables X , Y domains", "title": "" }, { "docid": "8161c7e946d7fdeb22ebd6eb1b245e1e", "text": "A novel compact wideband four-way waveguide power divider has been developed for millimeter-wave/THz array application. The power divider was realized by interconnecting three novel H-plane T-junction structures. By properly choosing the length of the interconnecting rectangular waveguide, the bandwidth of the proposed four-way power divider can be broadened. Good phase and amplitude balance of all output ports are guaranteed by its symmetrical structure. According to EM simulations, the simulated -20dB return loss bandwidth is from 74.9GHz to 98.3GHz, and good amplitude and phase balance are got in the operating band. The proposed structure has the characteristics of wideband, compact structure, and high power capacity.", "title": "" }, { "docid": "6141b0cb5d5b2f24336714453a29b03f", "text": "We present the Extended Paraphrase Typology (EPT) and the Extended Typology Paraphrase Corpus (ETPC). The EPT typology addresses several practical limitations of existing paraphrase typologies: it is the first typology that copes with the non-paraphrase pairs in the paraphrase identification corpora and distinguishes between contextual and habitual paraphrase types. ETPC is the largest corpus to date annotated with atomic paraphrase types. It is the first corpus with detailed annotation of both the paraphrase and the non-paraphrase pairs and the first corpus annotated with paraphrase and negation. Both new resources contribute to better understanding the paraphrase phenomenon, and allow for studying the relationship between paraphrasing and negation. To the developers of Paraphrase Identification systems ETPC corpus offers better means for evaluation and error analysis. Furthermore, the EPT typology and ETPC corpus emphasize the relationship with other areas of NLP such as Semantic Similarity, Textual Entailment, Summarization and Simplification.", "title": "" }, { "docid": "29d9137c5fdc7e96e140f19acd6dee80", "text": "Given a snapshot of a social network, can we infer which new interactions among its members are likely to occur in the near future? We formalize this question as the link prediction problem, and develop approaches to link prediction based on measures the \"proximity\" of nodes in a network. Experiments on large co-authorship networks suggest that information about future interactions can be extracted from network topology alone, and that fairly subtle measures for detecting node proximity can outperform more direct measures.", "title": "" }, { "docid": "31ccfd3694ac87cf42f9ca9bc74cc0f4", "text": "This paper presents a highly accurate and efficient method for crack detection using percolation-based image processing. The detection of cracks in concrete surfaces during the maintenance and diagnosis of concrete structures is important to ensure the safety of these structures. Recently, the image-based crack detection method has attracted considerable attention due to its low cost and objectivity. However, there are several problems in the practical application of image processing for crack detection since real concrete surface images have noises such as concrete blebs, stains, and shadings of several sizes. In order to resolve these problems, our proposed method focuses on the number of pixels in a crack and the connectivity of the pixels. Our method employs a percolation model for crack detection in order to consider the features of the cracks. Through experiments using real concrete surface images, we demonstrate the accuracy and efficiency of our method.", "title": "" }, { "docid": "b19aab238e0eafef52974a87300750a3", "text": "This paper introduces a method to detect a fault associated with critical components/subsystems of an engineered system. It is required, in this case, to detect the fault condition as early as possible, with specified degree of confidence and a prescribed false alarm rate. Innovative features of the enabling technologies include a Bayesian estimation algorithm called particle filtering, which employs features or condition indicators derived from sensor data in combination with simple models of the system's degrading state to detect a deviation or discrepancy between a baseline (no-fault) distribution and its current counterpart. The scheme requires a fault progression model describing the degrading state of the system in the operation. A generic model based on fatigue analysis is provided and its parameters adaptation is discussed in detail. The scheme provides the probability of abnormal condition and the presence of a fault is confirmed for a given confidence level. The efficacy of the proposed approach is illustrated with data acquired from bearings typically found on aircraft and monitored via a properly instrumented test rig.", "title": "" }, { "docid": "15f6b6be4eec813fb08cb3dd8b9c97f2", "text": "ACKNOWLEDGEMENTS First, I would like to thank my supervisor Professor H. Levent Akın for his guidance. This thesis would not have been possible without his encouragement and enthusiastic support. I would also like to thank all the staff at the Artificial Intelligence Laboratory for their encouragement throughout the year. Their success in RoboCup is always a good motivation. Sharing their precious ideas during the weekly seminars have always guided me to the right direction. Finally I am deeply grateful to my family and to my wife Derya. They always give me endless love and support, which has helped me to overcome the various challenges along the way. Thank you for your patience... The field of Intelligent Transport Systems (ITS) is improving rapidly in the world. Ultimate aim of such systems is to realize fully autonomous vehicle. The researches in the field offer the potential for significant enhancements in safety and operational efficiency. Lane tracking is an important topic in autonomous navigation because the navigable region usually stands between the lanes, especially in urban environments. Several approaches have been proposed, but Hough transform seems to be the dominant among all. A robust lane tracking method is also required for reducing the effect of the noise and achieving the required processing time. In this study, we present a new lane tracking method which uses a partitioning technique for obtaining Multiresolution Hough Transform (MHT) of the acquired vision data. After the detection process, a Hidden Markov Model (HMM) based method is proposed for tracking the detected lanes. Traffic signs are important instruments to indicate the rules on roads. This makes them an essential part of the ITS researches. It is clear that leaving traffic signs out of concern will cause serious consequences. Although the car manufacturers have started to deploy intelligent sign detection systems on their latest models, the road conditions and variations of actual signs on the roads require much more robust and fast detection and tracking methods. Localization of such systems is also necessary because traffic signs differ slightly between countries. This study also presents a fast and robust sign detection and tracking method based on geometric transformation and genetic algorithms (GA). Detection is done by a genetic algorithm (GA) approach supported by a radial symmetry check so that false alerts are considerably reduced. Classification v is achieved by a combination of SURF features with NN or SVM classifiers. A heuristic …", "title": "" } ]
scidocsrr
a0c281343b8afd00803dc4432ba47d58
Instance-Level Salient Object Segmentation
[ { "docid": "7e40c98b9760e1f47a0140afae567b7f", "text": "Low-level saliency cues or priors do not produce good enough saliency detection results especially when the salient object presents in a low-contrast background with confusing visual appearance. This issue raises a serious problem for conventional approaches. In this paper, we tackle this problem by proposing a multi-context deep learning framework for salient object detection. We employ deep Convolutional Neural Networks to model saliency of objects in images. Global context and local context are both taken into account, and are jointly modeled in a unified multi-context deep learning framework. To provide a better initialization for training the deep neural networks, we investigate different pre-training strategies, and a task-specific pre-training scheme is designed to make the multi-context modeling suited for saliency detection. Furthermore, recently proposed contemporary deep models in the ImageNet Image Classification Challenge are tested, and their effectiveness in saliency detection are investigated. Our approach is extensively evaluated on five public datasets, and experimental results show significant and consistent improvements over the state-of-the-art methods.", "title": "" } ]
[ { "docid": "115d3bc01e9b7fe41bdd9fc987c8676c", "text": "A novel switching median filter incorporating with a powerful impulse noise detection method, called the boundary discriminative noise detection (BDND), is proposed in this paper for effectively denoising extremely corrupted images. To determine whether the current pixel is corrupted, the proposed BDND algorithm first classifies the pixels of a localized window, centering on the current pixel, into three groups-lower intensity impulse noise, uncorrupted pixels, and higher intensity impulse noise. The center pixel will then be considered as \"uncorrupted,\" provided that it belongs to the \"uncorrupted\" pixel group, or \"corrupted.\" For that, two boundaries that discriminate these three groups require to be accurately determined for yielding a very high noise detection accuracy-in our case, achieving zero miss-detection rate while maintaining a fairly low false-alarm rate, even up to 70% noise corruption. Four noise models are considered for performance evaluation. Extensive simulation results conducted on both monochrome and color images under a wide range (from 10% to 90%) of noise corruption clearly show that our proposed switching median filter substantially outperforms all existing median-based filters, in terms of suppressing impulse noise while preserving image details, and yet, the proposed BDND is algorithmically simple, suitable for real-time implementation and application.", "title": "" }, { "docid": "69a3676fad6416927cb59d818b999002", "text": "Good medical leadership is vital in delivering high-quality healthcare, and yet medical career progression has traditionally seen leadership lack credence in comparison with technical and academic ability. Individual standards have varied, leading to variations in the quality of medical leadership between different organisations and, on occasions, catastrophic lapses in the standard of care provided to patients. These high-profile events, plus increasing evidence linking clinical leadership to performance of units, has led recently to more focus on leadership development for all doctors, starting earlier and continuing throughout their careers. There is also an increased drive to see doctors take on more significant leadership roles throughout the healthcare system. The achievement of these aims will require doctors to develop strong personal and professional values, a range of non-technical skills that allow them to lead across professional boundaries, and an understanding of the increasingly complex environment in which 21st century healthcare is delivered. Developing these attributes will require dedicated resources and the sophisticated application of a variety of different learning methodologies such as mentoring, coaching, action learning and networking.", "title": "" }, { "docid": "ba4385bfbf82afd36e188279b9fbc660", "text": "Here, we update our 1990 Annual Review of Neuroscience article, \"The Attention System of the Human Brain.\" The framework presented in the original article has helped to integrate behavioral, systems, cellular, and molecular approaches to common problems in attention research. Our framework has been both elaborated and expanded in subsequent years. Research on orienting and executive functions has supported the addition of new networks of brain regions. Developmental studies have shown important changes in control systems between infancy and childhood. In some cases, evidence has supported the role of specific genetic variations, often in conjunction with experience, that account for some of the individual differences in the efficiency of attentional networks. The findings have led to increased understanding of aspects of pathology and to some new interventions.", "title": "" }, { "docid": "541545bc30c887560541ba456cdfc595", "text": "Since their inception, captchas have been widely used for preventing fraudsters from performing illicit actions. Nevertheless, economic incentives have resulted in an arms race, where fraudsters develop automated solvers and, in turn, captcha services tweak their design to break the solvers. Recent work, however, presented a generic attack that can be applied to any text-based captcha scheme. Fittingly, Google recently unveiled the latest version of reCaptcha. The goal of their new system is twofold, to minimize the effort for legitimate users, while requiring tasks that are more challenging to computers than text recognition. ReCaptcha is driven by an \"advanced risk analysis system\" that evaluates requests and selects the difficulty of the captcha that will be returned. Users may be required to click in a checkbox, or solve a challenge by identifying images with similar content. In this paper, we conduct a comprehensive study of reCaptcha, and explore how the risk analysis process is influenced by each aspect of the request. Through extensive experimentation, we identify flaws that allow adversaries to effortlessly influence the risk analysis, bypass restrictions, and deploy large-scale attacks. Subsequently, we design a novel low-cost attack that leverages deep learning technologies for the semantic annotation of images. Our system is extremely effective, automatically solving 70.78% of the image reCaptcha challenges, while requiring only 19 seconds per challenge. We also apply our attack to the Facebook image captcha and achieve an accuracy of 83.5%. Based on our experimental findings, we propose a series of safeguards and modifications for impacting the scalability and accuracy of our attacks. Overall, while our study focuses on reCaptcha, our findings have wide implications, as the semantic information conveyed via images is increasingly within the realm of automated reasoning, the future of captchas relies on the exploration of novel directions.", "title": "" }, { "docid": "3f43c2eaa993dc2d84d563fee3ea52a0", "text": "Finding optimal solutions to NP-Hard problems requires exponential time with respect to the size of the problem. Consequently, heuristic methods are usually utilized to obtain approximate solutions to problems of such difficulty. In this paper, a novel swarm-based nature-inspired metaheuristic algorithm for optimization is proposed. Inspired by human collective intelligence, Wisdom of Artificial Crowds (WoAC) algorithm relies on a group of simulated intelligent agents to arrive at independent solutions aggregated to produce a solution which in many cases is superior to individual solutions of all participating agents. We illustrate superior performance of WoAC by comparing it against another bio-inspired approach, the Genetic Algorithm, on one of the classical NP-Hard problems, the Travelling Salesperson Problem. On average a 3-10% improvement in quality of solutions is observed with little computational overhead.", "title": "" }, { "docid": "ebb852a082ccdbd0590deee688db4e27", "text": "Probabilistic modeling provides the capability to represent and manipulate uncertainty in data, models, predictions and decisions. We are concerned with the problem of learning probabilistic models of dynamical systems from measured data. Specifically, we consider learning of probabilistic nonlinear state-space models. There is no closed-form solution available for this problem, implying that we are forced to use approximations. In this tutorial we will provide a self-contained introduction to one of the state-of-the-art methods—the particle Metropolis–Hastings algorithm—which has proven to offer a practical approximation. This is a Monte Carlo based method, where the particle filter is used to guide a Markov chain Monte Carlo method through the parameter space. One of the key merits of the particle Metropolis–Hastings algorithm is that it is guaranteed to converge to the “true solution” under mild assumptions, despite being based on a particle filter with only a finite number of particles. We will also provide a motivating numerical example illustrating the method using a modeling language tailored for sequential Monte Carlo methods. The intention of modeling languages of this kind is to open up the power of sophisticated Monte Carlo methods—including particle Metropolis– Hastings—to a large group of users without requiring them to know all the underlying mathematical details.", "title": "" }, { "docid": "144480a9154226cf4a72f149ff6c9c56", "text": "The availability of medical imaging data from clinical archives, research literature, and clinical manuals, coupled with recent advances in computer vision offer the opportunity for image-based diagnosis, teaching, and biomedical research. However, the content and semantics of an image can vary depending on its modality and as such the identification of image modality is an important preliminary step. The key challenge for automatically classifying the modality of a medical image is due to the visual characteristics of different modalities: some are visually distinct while others may have only subtle differences. This challenge is compounded by variations in the appearance of images based on the diseases depicted and a lack of sufficient training data for some modalities. In this paper, we introduce a new method for classifying medical images that uses an ensemble of different convolutional neural network (CNN) architectures. CNNs are a state-of-the-art image classification technique that learns the optimal image features for a given classification task. We hypothesise that different CNN architectures learn different levels of semantic image representation and thus an ensemble of CNNs will enable higher quality features to be extracted. Our method develops a new feature extractor by fine-tuning CNNs that have been initialized on a large dataset of natural images. The fine-tuning process leverages the generic image features from natural images that are fundamental for all images and optimizes them for the variety of medical imaging modalities. These features are used to train numerous multiclass classifiers whose posterior probabilities are fused to predict the modalities of unseen images. Our experiments on the ImageCLEF 2016 medical image public dataset (30 modalities; 6776 training images, and 4166 test images) show that our ensemble of fine-tuned CNNs achieves a higher accuracy than established CNNs. Our ensemble also achieves a higher accuracy than methods in the literature evaluated on the same benchmark dataset and is only overtaken by those methods that source additional training data.", "title": "" }, { "docid": "28ebea841f4495f3e15e2aad94989122", "text": "This is equivalent to minimizing the sum of squares with a constraint of the form Σ |βj| s. It is similar to ridge regression, which has constraint Σjβ j t. Because of the form of the l1-penalty, the lasso does variable selection and shrinkage, whereas ridge regression, in contrast, only shrinks. If we consider a more general penalty of the form .Σpj=1β q j / 1=q, then the lasso uses q = 1 and ridge regression has q = 2. Subset selection emerges as q → 0, and the lasso uses the smallest value of q (i.e. closest to subset selection) that yields a convex problem. Convexity is very attractive for computational purposes.", "title": "" }, { "docid": "f2827c4fc8ca65ee106f91f93289251c", "text": "Machine Learning algorithms have provided core functionality to many application domains - such as bioinformatics, computational linguistics, etc. However, it is difficult to detect faults in such applications because often there is no \"test oracle\" to verify the correctness of the computed outputs. To help address the software quality, in this paper we present a technique for testing the implementations of machine learning classification algorithms which support such applications. Our approach is based on the technique \"metamorphic testing\", which has been shown to be effective to alleviate the oracle problem. Also presented include a case study on a real-world machine learning application framework, and a discussion of how programmers implementing machine learning algorithms can avoid the common pitfalls discovered in our study. We also conduct mutation analysis and cross-validation, which reveal that our method has high effectiveness in killing mutants, and that observing expected cross-validation result alone is not sufficiently effective to detect faults in a supervised classification program. The effectiveness of metamorphic testing is further confirmed by the detection of real faults in a popular open-source classification program.", "title": "" }, { "docid": "28ff277338f2c8441bad7820706acaae", "text": "Topological insulators (TIs) are characterized by possessing metallic (gapless) surface states and a finite band-gap state in the bulk. As the thickness of a TI layer decreases down to a few nanometers, hybridization between the top and bottom surfaces takes place due to quantum tunneling, consequently at a critical thickness a crossover from a 3D-TI to a 2D insulator occurs. Although such a crossover is generally accessible by scanning tunneling microscopy, or by angle-resolved photoemission spectroscopy, such measurements require clean surfaces. Here, we demonstrate that a cascading nonlinear magneto-optical effect induced via strong spin-orbit coupling can examine such crossovers. The helicity dependence of the time-resolved Kerr rotation exhibits a robust change in periodicity at a critical thickness, from which it is possible to predict the formation of a Dirac cone in a film several quintuple layers thick. This method enables prediction of a Dirac cone using a fundamental nonlinear optical effect that can be applied to a wide range of TIs and related 2D materials.", "title": "" }, { "docid": "5b61b6d96b7a4af62bf30b535a18e14a", "text": "schooling were as universally endorsed as homework. Educators, parents, and policymakers of all political and pedagogical stripes insisted that homework is good and more is better—a view that was promoted most visibly in A Nation at Risk (National Commission on Excellence in Education, 1983) and What Works (U.S. Department of Education, 1986).1 Indeed, never in the history of American education was there a stronger professional and public consensus in favor of homework (see Gill & Schlossman, 1996; Gill & Schlossman, 2000). Homework has been touted for academic and character-building purposes, and for promoting America’s international competitiveness (see, e.g., Cooper, 2001; Keith, 1986; Maeroff, 1992; Maeroff, 1989; The Economist, 1995). It has been viewed as a key symbol, method, and yardstick of serious commitment to educational re-", "title": "" }, { "docid": "cd5a7ee450dbf6ec8f99ee7e5efc8c04", "text": "This paper addresses the problem of coordinating multiple spacecraft to fly in tightly controlled formations. The main contribution of the paper is to introduce a coordination architecture that subsumes leader-following, behavioral, and virtual-structure approaches to the multiagent coordination problem. The architecture is illustrated through a detailed application of the ideas to the problem of synthesizing a multiple spacecraft interferometer in deep space.", "title": "" }, { "docid": "317fd4ab4d048bcd84f2f62c7736f804", "text": "With mobile devices, users are taking ever-growing numbers of photos every day. These photos are uploaded to social sites such as Facebook and Flickr, often automatically. Yet, the portion of these uploaded photos being publicly shared is low, and on a constant decline. Deciding which photo to share takes considerable time and attention, and many users would rather forfeit the social interaction and engagement than sift through their piles of uploaded photos. In this paper, we introduce a novel task of recommending socially-engaging photos to their creators for public sharing. This will turn a tedious manual chore into a quick, software-assisted process. We provide extensive analysis over a large-scale dataset from the Flickr photo sharing website, which reveals some of the traits of photo sharing in such sites. Additionally, we present a ranking algorithm for the task that comprises three steps:(a) grouping of near-duplicate photos;(b) ranking the photos in each group by their \"shareability\"; and(c) ranking the groups by their likelihood to contain a shareable photo. A large-scale experiment allows us to evaluate our algorithm and show its benefits compared to competitive baselines and algorithmic alternatives.", "title": "" }, { "docid": "fc9e653c8958a3d08c7f190e46ee592b", "text": "In this paper, we introduce and provide a short overview of nonnegative matrix factorization (NMF). Several aspects of NMF are discussed, namely, the application in hyperspectral imaging, geometry and uniqueness of NMF solutions, complexity, algorithms, and its link with extended formulations of polyhedra. In order to put NMF into perspective, the more general problem class of constrained low-rank matrix approximation problems is first briefly introduced.", "title": "" }, { "docid": "e7c2134b446c4e0e7343ea8812673597", "text": "Lexical embeddings can serve as useful representations for words for a variety of NLP tasks, but learning embeddings for phrases can be challenging. While separate embeddings are learned for each word, this is infeasible for every phrase. We construct phrase embeddings by learning how to compose word embeddings using features that capture phrase structure and context. We propose efficient unsupervised and task-specific learning objectives that scale our model to large datasets. We demonstrate improvements on both language modeling and several phrase semantic similarity tasks with various phrase lengths. We make the implementation of our model and the datasets available for general use.", "title": "" }, { "docid": "71d1ec46c47aacab15e2c34f279a3c7a", "text": "Although additive layer manufacturing is well established for rapid prototyping the low throughput and historic costs have prevented mass-scale adoption. The recent development of the RepRap, an open source self-replicating rapid prototyper, has made low-cost 3-D printers readily available to the public at reasonable prices (<$1,000). The RepRap (Prusa Mendell variant) currently prints 3-D objects in a 200x200x140 square millimeters build envelope from acrylonitrile butadiene styrene (ABS) and polylactic acid (PLA). ABS and PLA are both thermoplastics that can be injection-molded, each with their own benefits, as ABS is rigid and durable, while PLA is plant-based and can be recycled and composted. The melting temperature of ABS and PLA enable use in low-cost 3-D printers, as these temperature are low enough to use in melt extrusion in the home, while high enough for prints to retain their shape at average use temperatures. Using 3-D printers to manufacture provides the ability to both change the fill composition by printing voids and fabricate shapes that are impossible to make using tradition methods like injection molding. This allows more complicated shapes to be created while using less material, which could reduce environmental impact. As the open source 3-D printers continue to evolve and improve in both cost and performance, the potential for economically-viable distributed manufacturing of products increases. Thus, products and components could be customized and printed on-site by individual consumers as needed, reversing the historical trend towards centrally mass-manufactured and shipped products. Distributed manufacturing reduces embodied transportation energy from the distribution of conventional centralized manufacturing, but questions remain concerning the potential for increases in the overall embodied energy of the manufacturing due to reduction in scale. In order to quantify the environmental impact of distributed manufacturing using 3-D printers, a life cycle analysis was performed on a plastic juicer. The energy consumed and emissions produced from conventional large-scale production overseas are compared to experimental measurements on a RepRap producing identical products with ABS and PLA. The results of this LCA are discussed in relation to the environmental impact of distributed manufacturing with 3-D printers and polymer selection for 3-D printing to reduce this impact. The results of this study show that distributed manufacturing uses less energy than conventional manufacturing due to the RepRap's unique ability to reduce fill composition. Distributed manufacturing also has less emissions than conventional manufacturing when using PLA and when using ABS with solar photovoltaic power. The results of this study indicate that opensource additive layer distributed manufacturing is both technically viable and beneficial from an ecological perspective. Mater. Res. Soc. Symp. Proc. Vol. 1492 © 2013 Materials Research Society DOI: 1 557/op 013 0.1 l.2 .319", "title": "" }, { "docid": "728fa0716108e3cbdbd7e52564692d3e", "text": "Green infrastructure can play a significant role in mitigating urban air", "title": "" }, { "docid": "9b4ffbbcd97e94524d2598cd862a400a", "text": "Head pose monitoring is an important task for driver assistance systems, since it is a key indicator for human attention and behavior. However, current head pose datasets either lack complexity or do not adequately represent the conditions that occur while driving. Therefore, we introduce DriveAHead, a novel dataset designed to develop and evaluate head pose monitoring algorithms in real driving conditions. We provide frame-by-frame head pose labels obtained from a motion-capture system, as well as annotations about occlusions of the driver's face. To the best of our knowledge, DriveAHead is the largest publicly available driver head pose dataset, and also the only one that provides 2D and 3D data aligned at the pixel level using the Kinect v2. Existing performance metrics are based on the mean error without any consideration of the bias towards one position or another. Here, we suggest a new performance metric, named Balanced Mean Angular Error, that addresses the bias towards the forward looking position existing in driving datasets. Finally, we present the Head Pose Network, a deep learning model that achieves better performance than current state-of-the-art algorithms, and we analyze its performance when using our dataset.", "title": "" }, { "docid": "24879c65257cb08f90954674e175128d", "text": "With the popular use of high-resolution satellite images, more and more research efforts have been placed on remote sensing scene classification/recognition. In scene classification, effective feature selection can significantly boost the final performance. In this letter, a novel deep-learning-based feature-selection method is proposed, which formulates the feature-selection problem as a feature reconstruction problem. Note that the popular deep-learning technique, i.e., the deep belief network (DBN), achieves feature abstraction by minimizing the reconstruction error over the whole feature set, and features with smaller reconstruction errors would hold more feature intrinsics for image representation. Therefore, the proposed method selects features that are more reconstructible as the discriminative features. Specifically, an iterative algorithm is developed to adapt the DBN to produce the inquired reconstruction weights. In the experiments, 2800 remote sensing scene images of seven categories are collected for performance evaluation. Experimental results demonstrate the effectiveness of the proposed method.", "title": "" }, { "docid": "f4fb632268bbbf76878472183c511b05", "text": "Mid-way through the 2007 DARPA Urban Challenge, MIT’s autonomous Land Rover LR3 ‘Talos’ and Team Cornell’s autonomous Chevrolet Tahoe ‘Skynet’ collided in a low-speed accident, one of the first well-documented collisions between two full-size autonomous vehicles. This collaborative study between MIT and Cornell examines the root causes of the collision, which are identified in both teams’ system designs. Systems-level descriptions of both autonomous vehicles are given, and additional detail is provided on sub-systems and algorithms implicated in the collision. A brief summary of robot–robot interactions during the race is presented, followed by an in-depth analysis of both robots’ behaviors leading up to and during the Skynet–Talos collision. Data logs from the vehicles are used to show the gulf between autonomous and human-driven vehicle behavior at low speeds and close proximities. Contributing factors are shown to be: (1) difficulties in sensor data association leading to phantom obstacles and an inability to detect slow moving vehicles, (2) failure to anticipate vehicle intent, and (3) an over emphasis on lane constraints versus vehicle proximity in motion planning. Eye contact between human road users is a crucial communications channel for slow-moving close encounters between vehicles. Inter-vehicle communication may play a similar role for autonomous vehicles; however, there are availability and denial-of-service issues to be addressed.", "title": "" } ]
scidocsrr
31d12694194cc94220b9f8ef1c000fdd
The PH-tree: a space-efficient storage structure and multi-dimensional index
[ { "docid": "44c0237251d54d6ccccd883bf14c6ff6", "text": "In this paper, we propose a new method for indexing large amounts of point and spatial data in highdimensional space. An analysis shows that index structures such as the R*-tree are not adequate for indexing high-dimensional data sets. The major problem of R-tree-based index structures is the overlap of the bounding boxes in the directory, which increases with growing dimension. To avoid this problem, we introduce a new organization of the directory which uses a split algorithm minimizing overlap and additionally utilizes the concept of supernodes. The basic idea of overlap-minimizing split and supernodes is to keep the directory as hierarchical as possible, and at the same time to avoid splits in the directory that would result in high overlap. Our experiments show that for high-dimensional data, the X-tree outperforms the well-known R*-tree and the TV-tree by up to two orders of magnitude.", "title": "" }, { "docid": "368a3dd36283257c5573a7e1ab94e930", "text": "This paper develops the multidimensional binary search tree (or <italic>k</italic>-d tree, where <italic>k</italic> is the dimensionality of the search space) as a data structure for storage of information to be retrieved by associative searches. The <italic>k</italic>-d tree is defined and examples are given. It is shown to be quite efficient in its storage requirements. A significant advantage of this structure is that a single data structure can handle many types of queries very efficiently. Various utility algorithms are developed; their proven average running times in an <italic>n</italic> record file are: insertion, <italic>O</italic>(log <italic>n</italic>); deletion of the root, <italic>O</italic>(<italic>n</italic><supscrpt>(<italic>k</italic>-1)/<italic>k</italic></supscrpt>); deletion of a random node, <italic>O</italic>(log <italic>n</italic>); and optimization (guarantees logarithmic performance of searches), <italic>O</italic>(<italic>n</italic> log <italic>n</italic>). Search algorithms are given for partial match queries with <italic>t</italic> keys specified [proven maximum running time of <italic>O</italic>(<italic>n</italic><supscrpt>(<italic>k</italic>-<italic>t</italic>)/<italic>k</italic></supscrpt>)] and for nearest neighbor queries [empirically observed average running time of <italic>O</italic>(log <italic>n</italic>).] These performances far surpass the best currently known algorithms for these tasks. An algorithm is presented to handle any general intersection query. The main focus of this paper is theoretical. It is felt, however, that <italic>k</italic>-d trees could be quite useful in many applications, and examples of potential uses are given.", "title": "" } ]
[ { "docid": "e78e70d347fb76a79755442cabe1fbe0", "text": "Recent advances in neural variational inference have facilitated efficient training of powerful directed graphical models with continuous latent variables, such as variational autoencoders. However, these models usually assume simple, unimodal priors — such as the multivariate Gaussian distribution — yet many realworld data distributions are highly complex and multi-modal. Examples of complex and multi-modal distributions range from topics in newswire text to conversational dialogue responses. When such latent variable models are applied to these domains, the restriction of the simple, uni-modal prior hinders the overall expressivity of the learned model as it cannot possibly capture more complex aspects of the data distribution. To overcome this critical restriction, we propose a flexible, simple prior distribution which can be learned efficiently and potentially capture an exponential number of modes of a target distribution. We develop the multi-modal variational encoder-decoder framework and investigate the effectiveness of the proposed prior in several natural language processing modeling tasks, including document modeling and dialogue modeling.", "title": "" }, { "docid": "4b988535edefeb3ff7df89bcb900dd1c", "text": "Context: As a result of automated software testing, large amounts of software test code (script) are usually developed by software teams. Automated test scripts provide many benefits, such as repeatable, predictable, and efficient test executions. However, just like any software development activity, development of test scripts is tedious and error prone. We refer, in this study, to all activities that should be conducted during the entire lifecycle of test-code as Software Test-Code Engineering (STCE). Objective: As the STCE research area has matured and the number of related studies has increased, it is important to systematically categorize the current state-of-the-art and to provide an overview of the trends in this field. Such summarized and categorized results provide many benefits to the broader community. For example, they are valuable resources for new researchers (e.g., PhD students) aiming to conduct additional secondary studies. Method: In this work, we systematically classify the body of knowledge related to STCE through a systematic mapping (SM) study. As part of this study, we pose a set of research questions, define selection and exclusion criteria, and systematically develop and refine a systematic map. Results: Our study pool includes a set of 60 studies published in the area of STCE between 1999 and 2012. Our mapping data is available through an online publicly-accessible repository. We derive the trends for various aspects of STCE. Among our results are the following: (1) There is an acceptable mix of papers with respect to different contribution facets in the field of STCE and the top two leading facets are tool (68%) and method (65%). The studies that presented new processes, however, had a low rate (3%), which denotes the need for more process-related studies in this area. (2) Results of investigation about research facet of studies and comparing our result to other SM studies shows that, similar to other fields in software engineering, STCE is moving towards more rigorous validation approaches. (3) A good mixture of STCE activities has been presented in the primary studies. Among them, the two leading activities are quality assessment and co-maintenance of test-code with production code. The highest growth rate for co-maintenance activities in recent years shows the importance and challenges involved in this activity. (4) There are two main categories of quality assessment activity: detection of test smells and oracle assertion adequacy. (5) JUnit is the leading test framework which has been used in about 50% of the studies. (6) There is a good mixture of SUT types used in the studies: academic experimental systems (or simple code examples), real open-source and commercial systems. (7) Among 41 tools that are proposed for STCE, less than half of the tools (45%) were available for download. It is good to have this percentile of tools to be available, although not perfect, since the availability of tools can lead to higher impact on research community and industry. Conclusion: We discuss the emerging trends in STCE, and discuss the implications for researchers and practitioners in this area. The results of our systematic mapping can help researchers to obtain an overview of existing STCE approaches and spot areas in the field that require more attention from the", "title": "" }, { "docid": "5e182532bfd10dee3f8d57f14d1f4455", "text": "Camera calibrating is a crucial problem for further metric scene measurement. Many techniques and some studies concerning calibration have been presented in the last few years. However, it is still di1cult to go into details of a determined calibrating technique and compare its accuracy with respect to other methods. Principally, this problem emerges from the lack of a standardized notation and the existence of various methods of accuracy evaluation to choose from. This article presents a detailed review of some of the most used calibrating techniques in which the principal idea has been to present them all with the same notation. Furthermore, the techniques surveyed have been tested and their accuracy evaluated. Comparative results are shown and discussed in the article. Moreover, code and results are available in internet. ? 2002 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved.", "title": "" }, { "docid": "1be94a76c9e0835873f8d60f36b38b17", "text": "DevOps has been identified as an important aspect in the continuous deployment paradigm in practitioner communities and academic research circles. However, little has been presented to describe and formalize what it constitutes. The absence of such understanding means that the phenomenon will not be effectively communicated and its impact not understood in those two communities. This study investigates the elements that characterize the DevOps phenomenon using a literature survey and interviews with practitioners actively involved in the DevOps movement. Four main dimensions of DevOps are identified: collaboration, automation, measurement and monitoring. An initial conceptual framework is developed to communicate the phenomenon to practitioners and the scientific community as well as to facilitate input for future research.", "title": "" }, { "docid": "d91e433a23545cac171006c40c2c2006", "text": "In this paper, we revisit the impact of skilled emigration on human capital accumulation using new panel data covering 147 countries on the period 1975-2000. We derive testable predictions from a stylized theoretical model and test them in dynamic regression models. Our empirical analysis predicts conditional convergence of human capital indicators. Our …ndings also reveal that skilled migration prospects foster human capital accumulation in low-income countries. In these countries, a net brain gain can be obtained if the skilled emigration rate is not too large (i.e. does not exceed 20 to 30 percent depending on other country characteristics). On the contrary, we …nd no evidence of a signi…cant incentive mechanism in middle-income and, unsuprisingly, in high-income countries. JEL Classi…cations: O15-O40-F22-F43 Keywords: human capital, convergence, brain drain We thank anonymous referees for their helpful comments. Suggestions from Barry Chiswick, Hubert Jayet, Joel Hellier and Fatemeh Shadman-Mehta were also appreciated. This article bene…ted from comments received at the SIUTE seminar (Lille, January 2006), the CReAM conference on ”Immigration: Impacts, Integration and Intergenerational Issues (London, March 2006), the Spring Meeting of Young Economists (Sevilla, May 2006), the XIV Villa Mondragone International Economic Seminar (Rome, July 2006) and the ESPE meeting (Chicago, 2007). The third author is grateful for the …nancial support from the Belgian French-speaking Community’s programme ”Action de recherches concertées” (ARC 03/08 -302) and from the Belgian Federal Government (PAI grant P6/07 Economic Policy and Finance in the Global Equilibrium Analysis and Social Evaluation). The usual disclaimers apply. Corresponding author: Michel Beine (michel.beine@uni.lu), University of Luxembourg, 162a av. de la Faiencerie, L-1511 Luxembourg.", "title": "" }, { "docid": "bb4541462806313d314d1de5882c6dde", "text": "Over the past decade, the genus Aeromonas has undergone a number of significant changes of practical importance to clinical microbiologists and scientists alike. In parallel with the molecular revolution in microbiology, several new species have been identified on a phylogenetic basis, and the genome of the type species, A. hydrophila ATCC 7966, has been sequenced. In addition to established disease associations, Aeromonas has been shown to be a significant cause of infections associated with natural disasters (hurricanes, tsunamis, and earthquakes) and has been linked to emerging or new illnesses, including near-drowning events, prostatitis, and hemolytic-uremic syndrome. Despite these achievements, issues still remain regarding the role that Aeromonas plays in bacterial gastroenteritis, the extent to which species identification should be attempted in the clinical laboratory, and laboratory reporting of test results from contaminated body sites containing aeromonads. This article provides an extensive review of these topics, in addition to others, such as taxonomic issues, microbial pathogenicity, and antimicrobial resistance markers.", "title": "" }, { "docid": "03869f2ac07c13bbce6af743ea5d2551", "text": "In this paper we present a novel vehicle detection method in traffic surveillance scenarios. This work is distinguished by three key contributions. First, a feature fusion backbone network is proposed to extract vehicle features which has the capability of modeling geometric transformations. Second, a vehicle proposal sub-network is applied to generate candidate vehicle proposals based on multi-level semantic feature maps. Finally, a head network is used to refine the categories and locations of these proposals. Benefits from the above cues, vehicles with large variation in occlusion and lighting conditions can be detected with high accuracy. Furthermore, the method also demonstrates robustness in the case of motion blur caused by rapid movement of vehicles. We test our network on DETRAC[21] benchmark detection challenge and it shows the state-of-theart performance. Specifically, the proposed method gets the best performances not only at 4 different level: overall, easy, medium and hard, but also in sunny, cloudy and night conditions.", "title": "" }, { "docid": "a28e939124e77b4ce35db8e693f2963f", "text": "Both similarity-based and popularity-based document ranking functions have been successfully applied to information retrieval (IR) in general. However, the dimension of semantic granularity also should be considered for effective retrieval. In this article, we propose a semantic granularity-based IR model that takes into account the three dimensions, namely similarity, popularity, and semantic granularity, to improve domain-specific search. In particular, a concept-based computational model is developed to estimate the semantic granularity of documents with reference to a domain ontology. Semantic granularity refers to the levels of semantic detail carried by an information item. The results of our benchmark experiments confirm that the proposed semantic granularity based IR model performs significantly better than the similarity-based baseline in both a bio-medical and an agricultural domain. In addition, a series of user-oriented studies reveal that the proposed document ranking functions resemble the implicit ranking functions exercised by humans. The perceived relevance of the documents delivered by the granularity-based IR system is significantly higher than that produced by a popular search engine for a number of domain-specific search tasks. To the best of our knowledge, this is the first study regarding the application of semantic granularity to enhance domain-specific IR.", "title": "" }, { "docid": "d5007c061227ec76a4e8ea795471db00", "text": "The ramp loss is a robust but non-convex loss for classification. Compared with other non-convex losses, a local minimum of the ramp loss can be effectively found. The effectiveness of local search comes from the piecewise linearity of the ramp loss. Motivated by the fact that the `1-penalty is piecewise linear as well, the `1-penalty is applied for the ramp loss, resulting in a ramp loss linear programming support vector machine (rampLPSVM). The proposed ramp-LPSVM is a piecewise linear minimization problem and the related optimization techniques are applicable. Moreover, the `1-penalty can enhance the sparsity. In this paper, the corresponding misclassification error and convergence behavior are discussed. Generally, the ramp loss is a truncated hinge loss. Therefore ramp-LPSVM possesses some similar properties as hinge loss SVMs. A local minimization algorithm and a global search strategy are discussed. The good optimization capability of the proposed algorithms makes ramp-LPSVM perform well in numerical experiments: the result of rampLPSVM is more robust than that of hinge SVMs and is sparser than that of ramp-SVM, which consists of the ‖ · ‖K-penalty and the ramp loss.", "title": "" }, { "docid": "e066761ecb7d8b7468756fb4be6b8fcb", "text": "The surest way to increase the system capacity of a wireless link is by getting the transmitter and receiver closer to each other, which creates the dual benefits of higher-quality links and more spatial reuse. In a network with nomadic users, this inevitably involves deploying more infrastructure, typically in the form of microcells, hot spots, distributed antennas, or relays. A less expensive alternative is the recent concept of femtocells - also called home base stations - which are data access points installed by home users to get better indoor voice and data coverage. In this article we overview the technical and business arguments for femtocells and describe the state of the art on each front. We also describe the technical challenges facing femtocell networks and give some preliminary ideas for how to overcome them.", "title": "" }, { "docid": "5d5a882b80b99e7b3ced072711e7a359", "text": "E-Government has been hype for the last 2 decades and still several implementations do not reach the intended success. Different definitions and consequently different models of operations and assessment were developed. This required the formulation of various frameworks describing the different perceptions and understandings of e-Government. The different frameworks proposed tend to agree on a set of elements, but each framework seems to have one or few different elements, depending on the perception of the framework founder. Also, entire categories (or dimensions) of elements seem to be left out. Through a literature review and field survey, the authors identified challenges of an e-Government initiative, categorized in five dimensions: technical, adoption, organizational, strategy and cultural. Not all categories were covered in any of the existing government frameworks. This would prove to be awkward in the formulation of new government initiatives or in the assessment of existing ones and evolution plan. In an effort to represent the majority of the factors and elements involved in most e-Government initiatives, the authors present a proposed seven-layer-framework for e-government. The layers included are: 1) end user access layer, 2) e-government layer, 3) organization layer, 4) national infrastructure layer, 5) strategic layer, 6) social cultural layer, and 7) national execution layer. The proposed model is compared with existing models and demonstrates that it covers all the aforementioned dimensions. Keywords—E-government; framework; e-government; challenges, decision support system (DSS)", "title": "" }, { "docid": "1ec395dbe807ff883dab413419ceef56", "text": "\"The Seventh Report of the Joint National Committee on Prevention, Detection, Evaluation, and Treatment of High Blood Pressure\" provides a new guideline for hypertension prevention and management. The following are the key messages(1) In persons older than 50 years, systolic blood pressure (BP) of more than 140 mm Hg is a much more important cardiovascular disease (CVD) risk factor than diastolic BP; (2) The risk of CVD, beginning at 115/75 mm Hg, doubles with each increment of 20/10 mm Hg; individuals who are normotensive at 55 years of age have a 90% lifetime risk for developing hypertension; (3) Individuals with a systolic BP of 120 to 139 mm Hg or a diastolic BP of 80 to 89 mm Hg should be considered as prehypertensive and require health-promoting lifestyle modifications to prevent CVD; (4) Thiazide-type diuretics should be used in drug treatment for most patients with uncomplicated hypertension, either alone or combined with drugs from other classes. Certain high-risk conditions are compelling indications for the initial use of other antihypertensive drug classes (angiotensin-converting enzyme inhibitors, angiotensin-receptor blockers, beta-blockers, calcium channel blockers); (5) Most patients with hypertension will require 2 or more antihypertensive medications to achieve goal BP (<140/90 mm Hg, or <130/80 mm Hg for patients with diabetes or chronic kidney disease); (6) If BP is more than 20/10 mm Hg above goal BP, consideration should be given to initiating therapy with 2 agents, 1 of which usually should be a thiazide-type diuretic; and (7) The most effective therapy prescribed by the most careful clinician will control hypertension only if patients are motivated. Motivation improves when patients have positive experiences with and trust in the clinician. Empathy builds trust and is a potent motivator. Finally, in presenting these guidelines, the committee recognizes that the responsible physician's judgment remains paramount.", "title": "" }, { "docid": "ee21b2744b26a11647c72d09025a6e11", "text": "This paper presents the design of microstrip-ridge gap waveguide using via-holes in printed circuit boards, a solution for high-frequency circuits. The study includes how to define the numerical ports, pin sensitivity, losses, and also a comparison with performance of normal microstrip lines and inverted microstrip lines. The results are produced using commercially available electromagnetic simulators. A WR-15 to microstrip-ridge gap waveguide transition was also designed. The results are verified with measurements on microstrip-ridge gap waveguides with WR15 transitions at both ends.", "title": "" }, { "docid": "e041d7f54e1298d4aa55edbfcbda71ad", "text": "Charts are common graphic representation for scientific data in technical and business papers. We present a robust system for detecting and recognizing bar charts. The system includes three stages, preprocessing, detection and recognition. The kernel algorithm in detection is newly developed Modified Probabilistic Hough Transform algorithm for parallel lines clusters detection. The main algorithms in recognition are bar pattern reconstruction and text primitives grouping in the Hough space which are also original. The Experiments show the system can also recognize slant bar charts, or even hand-drawn charts.", "title": "" }, { "docid": "aa3178c1b4d7ae8f9e3e97fabea3d6a1", "text": "This study continues landmark research, by Katz in 1984 and Hartland and Londoner in 1997, on characteristics of effective teaching by nurse anesthesia clinical instructors. Based on the literature review, there is a highlighted gap in research evaluating current teaching characteristics of clinical nurse anesthesia instructors that are valuable and effective from an instructor's and student's point of view. This study used a descriptive, quantitative research approach to assess (1) the importance of 24 characteristics (22 effective clinical teaching characteristics identified by Katz, and 2 items added for this study) of student registered nurse anesthetists (SRNAs) and clinical preceptors, who are Certified Registered Nurse Anesthetists, and (2) the congruence between the student and preceptor perceptions. A Likert-scale survey was used to assess the importance of each characteristic. The study was conducted at a large Midwestern hospital. The findings of this study did not support the results found by Hartland and Londoner based on the Friedman 2-way analysis. The rankings of the 24 characteristics by the students and the clinical preceptors in the current research were not significantly congruent based on the Kendall coefficient analysis. The results can help clinical preceptors increase their teaching effectiveness and generate effective learning environments for SRNAs.", "title": "" }, { "docid": "f81ea919846bce6bae4298d8780f9123", "text": "AIMS AND OBJECTIVES\nTo evaluate the effectiveness of an accessibility-enhanced multimedia informational educational programme in reducing anxiety and increasing satisfaction with the information and materials received by patients undergoing cardiac catheterisation.\n\n\nBACKGROUND\nCardiac catheterisation is one of the most anxiety-provoking invasive procedures for patients. However, informational education using multimedia to inform patients undergoing cardiac catheterisation has not been extensively explored.\n\n\nDESIGN\nA randomised experimental design with three-cohort prospective comparisons.\n\n\nMETHODS\nIn total, 123 consecutive patients were randomly assigned to one of three groups: regular education; (group 1), accessibility-enhanced multimedia informational education (group 2) and instructional digital videodisc education (group 3). Anxiety was measured with Spielberger's State Anxiety Inventory, which was administered at four time intervals: before education (T0), immediately after education (T1), before cardiac catheterisation (T2) and one day after cardiac catheterisation (T3). A satisfaction questionnaire was administrated one day after cardiac catheterisation. Data were collected from May 2009-September 2010 and analysed using descriptive statistics, chi-squared tests, one-way analysis of variance, Scheffe's post hoc test and generalised estimating equations.\n\n\nRESULTS\nAll patients experienced moderate anxiety at T0 to low anxiety at T3. Accessibility-enhanced multimedia informational education patients had significantly lower anxiety levels and felt the most satisfied with the information and materials received compared with patients in groups 1 and 3. A statistically significant difference in anxiety levels was only found at T2 among the three groups (p = 0·004).\n\n\nCONCLUSIONS\nThe findings demonstrate that the accessibility-enhanced multimedia informational education was the most effective informational educational module for informing patients about their upcoming cardiac catheterisation, to reduce anxiety and improve satisfaction with the information and materials received compared with the regular education and instructional digital videodisc education.\n\n\nRELEVANCE TO CLINICAL PRACTICE\nAs the accessibility-enhanced multimedia informational education reduced patient anxiety and improved satisfaction with the information and materials received, it can be adapted to complement patient education in future regular cardiac care.", "title": "" }, { "docid": "0ce82ead0954b99d811b9f50eee76abc", "text": "Convolutional Neural Networks (CNNs) dominate various computer vision tasks since Alex Krizhevsky showed that they can be trained effectively and reduced the top-5 error from 26.2 % to 15.3 % on the ImageNet large scale visual recognition challenge. Many aspects of CNNs are examined in various publications, but literature about the analysis and construction of neural network architectures is rare. This work is one step to close this gap. A comprehensive overview over existing techniques for CNN analysis and topology construction is provided. A novel way to visualize classification errors with confusion matrices was developed. Based on this method, hierarchical classifiers are described and evaluated. Additionally, some results are confirmed and quantified for CIFAR-100. For example, the positive impact of smaller batch sizes, averaging ensembles, data augmentation and test-time transformations on the accuracy. Other results, such as the positive impact of learned color transformation on the test accuracy could not be confirmed. A model which has only one million learned parameters for an input size of 32× 32× 3 and 100 classes and which beats the state of the art on the benchmark dataset Asirra, GTSRB, HASYv2 and STL-10 was developed.", "title": "" }, { "docid": "2ba78aa333d2239b8069f45180946a21", "text": "Face frontalization refers to the process of synthesizing the frontal view of a face from a given profile. Due to self-occlusion and appearance distortion in the wild, it is extremely challenging to recover faithful results and preserve texture details in a high-resolution. This paper proposes a High Fidelity Pose Invariant Model (HF-PIM) to produce photographic and identity-preserving results. HF-PIM frontalizes the profiles through a novel texture warping procedure and leverages a dense correspondence field to bind the 2D and 3D surface spaces. We decompose the prerequisite of warping into dense correspondence field estimation and facial texture map recovering, which are both well addressed by deep networks. Different from those reconstruction methods relying on 3D data, we also propose Adversarial Residual Dictionary Learning (ARDL) to supervise facial texture map recovering with only monocular images. Exhaustive experiments on both controlled and uncontrolled environments demonstrate that the proposed method not only boosts the performance of pose-invariant face recognition but also dramatically improves high-resolution frontalization appearances.", "title": "" }, { "docid": "1f976185517cf009b23a2600400af938", "text": "We present a study of the effects of disk and memory corruption on file system data integrity. Our analysis focuses on Sun’s ZFS, a modern commercial offering with numerous reliability mechanisms. Through careful and thorough fault injection, we show that ZFS is robust to a wide range of disk faults. We further demonstrate that ZFS is less resilient to memory corruption, which can lead to corrupt data being returned to applications or system crashes. Our analysis reveals the importance of considering both memory and disk in the construction of truly robust file and storage systems.", "title": "" } ]
scidocsrr
f5abffa5b9526f85df481cab3a6bc537
Canonical Genetic Signatures of the Adult Human Brain
[ { "docid": "8159b022ee9252d2320e8c2bf7b582f6", "text": "The Human Connectome Project consortium led by Washington University, University of Minnesota, and Oxford University is undertaking a systematic effort to map macroscopic human brain circuits and their relationship to behavior in a large population of healthy adults. This overview article focuses on progress made during the first half of the 5-year project in refining the methods for data acquisition and analysis. Preliminary analyses based on a finalized set of acquisition and preprocessing protocols demonstrate the exceptionally high quality of the data from each modality. The first quarterly release of imaging and behavioral data via the ConnectomeDB database demonstrates the commitment to making HCP datasets freely accessible. Altogether, the progress to date provides grounds for optimism that the HCP datasets and associated methods and software will become increasingly valuable resources for characterizing human brain connectivity and function, their relationship to behavior, and their heritability and genetic underpinnings.", "title": "" } ]
[ { "docid": "5d21df36697616719bcc3e0ee22a08bd", "text": "In spite of the significant recent progress, the incorporation of haptics into virtual environments is still in its infancy due to limitations in the hardware, the cost of development, as well as the level of reality they provide. Nonetheless, we believe that the field will one day be one of the groundbreaking media of the future. It has its current holdups but the promise of the future is worth the wait. The technology is becoming cheaper and applications are becoming more forthcoming and apparent. If we can survive this infancy, it will promise to be an amazing revolution in the way we interact with computers and the virtual world. The researchers organize the rapidly increasing multidisciplinary research of haptics into four subareas: human haptics, machine haptics, computer haptics, and multimedia haptics", "title": "" }, { "docid": "be86e50e71e8d8ede9e3c64ae510f1d0", "text": "The subscription covering optimization, whereby a general subscription quenches the forwarding of more specific ones, is a common technique to reduce network traffic and routing state in content-based routing networks. Such optimizations, however, leave the system vulnerable to unsubscriptions that trigger the immediate forwarding of all the subscriptions they had previously quenched. These subscription bursts can severely congest the network, and destabilize the system. This paper presents techniques to retain much of the benefits of subscription covering while avoiding bursty subscription traffic. Heuristics are used to estimate the similarity among subscriptions, and a distributed algorithm determines the portions of a subscription propagation tree that should be preserved. Evaluations show that these mechanisms avoid subscription bursts while maintaining relatively compact routing tables.", "title": "" }, { "docid": "8cdf1b78bdf379e9355228a07f8b2016", "text": "OBJECTIVE AND BACKGROUND\nAutism is characterized by repetitive behaviors and impaired socialization and communication. Preliminary evidence showed possible language benefits in autism from the β-adrenergic antagonist propranolol. Earlier studies in other populations suggested propranolol might benefit performance on tasks involving a search of semantic and associative networks under certain conditions. Therefore, we wished to determine whether this benefit of propranolol includes an effect on semantic fluency in autism.\n\n\nMETHODS\nA sample of 14 high-functioning adolescent and adult participants with autism and 14 matched controls were given letter and category word fluency tasks on 2 separate testing sessions; 1 test was given 60 minutes after the administration of 40 mg propranolol orally, and 1 test was given after placebo, administered in a double-blinded, counterbalanced manner.\n\n\nRESULTS\nParticipants with autism were significantly impaired compared with controls on both fluency tasks. Propranolol significantly improved performance on category fluency, but not letter fluency among autism participants. No drug effect was observed among controls. Expected drug effects on heart rate and blood pressure were observed in both the groups.\n\n\nCONCLUSIONS\nResults are consistent with a selective beneficial effect of propranolol on flexibility of access to semantic and associative networks in autism, with no observed effect on phonological networks. Further study will be necessary to understand potential clinical implications of this finding.", "title": "" }, { "docid": "0f0305afce53933df1153af6a31c09fb", "text": "In the study of indoor simultaneous localization and mapping (SLAM) problems using a stereo camera, two types of primary features-point and line segments-have been widely used to calculate the pose of the camera. However, many feature-based SLAM systems are not robust when the camera moves sharply or turns too quickly. In this paper, an improved indoor visual SLAM method to better utilize the advantages of point and line segment features and achieve robust results in difficult environments is proposed. First, point and line segment features are automatically extracted and matched to build two kinds of projection models. Subsequently, for the optimization problem of line segment features, we add minimization of angle observation in addition to the traditional re-projection error of endpoints. Finally, our model of motion estimation, which is adaptive to the motion state of the camera, is applied to build a new combinational Hessian matrix and gradient vector for iterated pose estimation. Furthermore, our proposal has been tested on EuRoC MAV datasets and sequence images captured with our stereo camera. The experimental results demonstrate the effectiveness of our improved point-line feature based visual SLAM method in improving localization accuracy when the camera moves with rapid rotation or violent fluctuation.", "title": "" }, { "docid": "18f13858b5f9e9a8e123d80b159c4d72", "text": "Cryptocurrency, and its underlying technologies, has been gaining popularity for transaction management beyond financial transactions. Transaction information is maintained in the blockchain, which can be used to audit the integrity of the transaction. The focus on this paper is the potential availability of block-chain technology of other transactional uses. Block-chain is one of the most stable open ledgers that preserves transaction information, and is difficult to forge. Since the information stored in block-chain is not related to personally identifiable information, it has the characteristics of anonymity. Also, the block-chain allows for transparent transaction verification since all information in the block-chain is open to the public. These characteristics are the same as the requirements for a voting system. That is, strong robustness, anonymity, and transparency. In this paper, we propose an electronic voting system as an application of blockchain, and describe block-chain based voting at a national level through examples.", "title": "" }, { "docid": "b13c9597f8de229fb7fec3e23c0694d1", "text": "Using capture-recapture analysis we estimate the effective size of the active Amazon Mechanical Turk (MTurk) population that a typical laboratory can access to be about 7,300 workers. We also estimate that the time taken for half of the workers to leave the MTurk pool and be replaced is about 7 months. Each laboratory has its own population pool which overlaps, often extensively, with the hundreds of other laboratories using MTurk. Our estimate is based on a sample of 114,460 completed sessions from 33,408 unique participants and 689 sessions across seven laboratories in the US, Europe, and Australia from January 2012 to March 2015.", "title": "" }, { "docid": "bd7f571534a9aa49cd875adf3615e2be", "text": "Built on an analogy between the visual and auditory systems, the following dual stream model for language processing was suggested recently: a dorsal stream is involved in mapping sound to articulation, and a ventral stream in mapping sound to meaning. The goal of the study presented here was to test the neuroanatomical basis of this model. Combining functional magnetic resonance imaging (fMRI) with a novel diffusion tensor imaging (DTI)-based tractography method we were able to identify the most probable anatomical pathways connecting brain regions activated during two prototypical language tasks. Sublexical repetition of speech is subserved by a dorsal pathway, connecting the superior temporal lobe and premotor cortices in the frontal lobe via the arcuate and superior longitudinal fascicle. In contrast, higher-level language comprehension is mediated by a ventral pathway connecting the middle temporal lobe and the ventrolateral prefrontal cortex via the extreme capsule. Thus, according to our findings, the function of the dorsal route, traditionally considered to be the major language pathway, is mainly restricted to sensory-motor mapping of sound to articulation, whereas linguistic processing of sound to meaning requires temporofrontal interaction transmitted via the ventral route.", "title": "" }, { "docid": "8bda505118b1731e778b41203520b3b8", "text": "Image search and retrieval systems depend heavily on availability of descriptive textual annotations with images, to match them with textual queries of users. In most cases, such systems have to rely on users to provide tags or keywords with images. Users may add insufficient or noisy tags. A system to automatically generate descriptive tags for images can be extremely helpful for search and retrieval systems. Automatic image annotation has been explored widely in both image and text processing research communities. In this paper, we present a novel approach to tackle this problem by incorporating contextual information provided by scene analysis of image. Image can be represented by features which indicate type of scene shown in the image, instead of representing individual objects or local characteristics of that image. We have used such features to provide context in the process of predicting tags for images.", "title": "" }, { "docid": "261af8bb868e629b0020bb4c2a63d867", "text": "A double-layer TFT NAND-type flash memory is demonstrated, ushering into the era of three-dimensional (3D) flash memory. A TFT device using bandgap engineered SONOS (BE-SONOS) (Lue et al., 2005, Lai et al., 2006) with fully-depleted (FD) poly silicon (60 nm) channel and tri-gate P+-poly gate is integrated into a NAND array. Small devices (L/W=0.2/0.09 mum) with excellent performance and reliability properties are achieved. The bottom layer shows no sign of reliability degradation compared to the top layer, indicating the potential for further multi-layer stacking. The present work illustrates the feasibility of 3D flash memory", "title": "" }, { "docid": "93bc875cf2145dfdcd8a2ce44049aa0d", "text": "We construct a counterfactual statement when we reason conjecturally about an event which did or did not occur in the past: If an event had occurred, what would have happened? Would it be relevant? Real world examples, as studied by Byrne, Rescher and many others, show that these conditionals involve a complex reasoning process. An intuitive and elegant approach to evaluate counterfactuals, without deep revision mechanisms, is proposed by Pearl. His Do-Calculus identifies causal relations in a Bayesian network resorting to counterfactuals. Though leaving out probabilities, we adopt Pearl’s stance, and its prior epistemological justification to counterfactuals in causal Bayesian networks, but for programs. Logic programming seems a suitable environment for several reasons. First, its inferential arrow is adept at expressing causal direction and conditional reasoning. Secondly, together with its other functionalities such as abduction, integrity constraints, revision, updating and debugging (a form of counterfactual reasoning), it proffers a wide range of expressibility itself. We show here how programs under the weak completion semantics in an abductive framework, comprising the integrity constraints, can smoothly and uniformly capture well-known and off-the-shelf counterfactual problems and conundrums, taken from the psychological and philosophical literature. Our approach is adroitly reconstructable in other three-valued LP semantics, or restricted to two-valued ones.", "title": "" }, { "docid": "daf63012a3603e5fd2fda4bdd693d010", "text": "Vertical selection is the task of predicting relevant verticals for a Web query so as to enrich the Web search results with complementary vertical results. We investigate a novel variant of this task, where the goal is to detect queries with a question intent. Specifically, we address queries for which the user would like an answer with a human touch. We call these CQA-intent queries, since answers to them are typically found in community question answering (CQA) sites. A typical approach in vertical selection is using a vertical’s specific language model of relevant queries and computing the query-likelihood for each vertical as a selective criterion. This works quite well for many domains like Shopping, Local and Travel. Yet, we claim that queries with CQA intent are harder to distinguish by modeling content alone, since they cover many different topics. We propose to also take the structure of queries into consideration, reasoning that queries with question intent have quite a different structure than other queries. We present a supervised classification scheme, random forest over word-clusters for variable length texts, which can model the query structure. Our experiments show that it substantially improves classification performance in the CQA-intent selection task compared to content-oriented based classification, especially as query length grows.", "title": "" }, { "docid": "bb88a929b1ac6565c7d31abb65813b29", "text": "Esophagitis dissecans superficialis and eosinophilic esophagitis are distinct esophageal pathologies with characteristic clinical and histologic findings. Esophagitis dissecans superficialis is a rare finding on endoscopy consisting of the peeling of large fragments of esophageal mucosa. Histology shows sloughing of the epithelium and parakeratosis. Eosinophilic esophagitis is an allergic disease of the esophagus characterized by eosinophilic inflammation of the epithelium and symptoms of esophageal dysfunction. Both of these esophageal processes have been associated with other diseases, but there is no known association between them. We describe a case of esophagitis dissecans superficialis and eosinophilic esophagitis in an adolescent patient. To our knowledge, this is the first case describing an association between esophageal dissecans superficialis and eosinophilic esophagitis. Citation: Guerra MR, Vahabnezhad E, Swanson E, Naini BV, Wozniak LJ (2015) Esophagitis dissecans associated with eosinophilic esophagitis in an adolescent. Adv Pediatr Res 2:8. doi:10.12715/apr.2015.2.8 Received: January 27, 2015; Accepted: February 19, 2015; Published: March 19, 2015 Copyright: © 2015 Guerra et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Competing interests: The authors have declared that no competing interests exist. * Email: marjorieanneguerra@mednet.ucla.edu", "title": "" }, { "docid": "e6f28d4bd8cbbc67acdbb06cc84a8c40", "text": "• Regularization: To force the label embedding as the anchor points for each classes, we regularize the learned label embeddings to be on its corresponding manifold Model Yahoo DBPedia AGNews Yelp P. Yelp F. Bag-ofwords 68.9 96.6 88.8 92.2 58 CNN 70.94 98.28 91.45 95.11 59.48 LSTM 70.84 98.55 86.06 94.74 58.17 Deep CNN 73.43 98.71 91.27 95.72 64.26 SWEM 73.53 98.42 92.24 93.76 61.11 fastText 72.3 98.6 92.5 95.7 63.9 HAN 75.8 Bi-BloSAN 76.28 98.77 93.32 94.56 62.13 LEAM 77.42 99.02 92.45 95.31 64.09 Test Accuracy on document classification tasks, in percentage", "title": "" }, { "docid": "b3874f8390e284c119635e7619e7d952", "text": "Since a vehicle logo is the clearest indicator of a vehicle manufacturer, most vehicle manufacturer recognition (VMR) methods are based on vehicle logo recognition. Logo recognition can be still a challenge due to difficulties in precisely segmenting the vehicle logo in an image and the requirement for robustness against various imaging situations simultaneously. In this paper, a convolutional neural network (CNN) system has been proposed for VMR that removes the requirement for precise logo detection and segmentation. In addition, an efficient pretraining strategy has been introduced to reduce the high computational cost of kernel training in CNN-based systems to enable improved real-world applications. A data set containing 11 500 logo images belonging to 10 manufacturers, with 10 000 for training and 1500 for testing, is generated and employed to assess the suitability of the proposed system. An average accuracy of 99.07% is obtained, demonstrating the high classification potential and robustness against various poor imaging situations.", "title": "" }, { "docid": "70f35b19ba583de3b9942d88c94b9148", "text": "ARCHEOGUIDE (Augmented Reality-based Cultural Heritage On-site GUIDE) is an IST project, funded by the EU, aiming at providing a personalized Virtual Reality guide and tour assistant to archaeological site visitors and a multimedia repository and information system for archaeologists and site curators. The system provides monument reconstructions, ancient life simulation, and database tools for creating and archiving archaeological multimedia material.", "title": "" }, { "docid": "830588b6ff02a05b4d76b58a3e4e7c44", "text": "The integration of GIS and multicriteria decision analysis has attracted significant interest over the last 15 years or so. This paper surveys the GISbased multicriteria decision analysis (GIS-MCDA) approaches using a literature review and classification of articles from 1990 to 2004. An electronic search indicated that over 300 articles appeared in refereed journals. The paper provides taxonomy of those articles and identifies trends and developments in GISMCDA.", "title": "" }, { "docid": "0790fd5a24e8a683fde04f3c8976ba9e", "text": "In a sophisticated and coordinated cyber-attack $100 million has been stolen from Bangladesh's account. Attackers introduced malicious code remotely into the Bangladesh Bank's server, which allowed them to process and authorize the transactions. Advanced attack techniques poses threats to all web application systems. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF) are two vulnerabilities which have techniques that are similar to those of the Bangladesh Bank heist. XSS and CSRF are third and eighth of the top ten web application vulnerabilities on OWASP list from 2013 till now. Both these attacks violate the users trust for the websites and web browsers. Because of the severity of these vulnerabilities, security specialists have always shared their concern and warned the web developers. Yet Bangladesh government's and developers' reluctance to address the severity of the attacks resulted in Bangladesh Bank heist. In this paper, we aim to study and conduct an investigation of the vulnerabilities of similar attacks as these of the Bangladesh Bank heist on web applications of Bangladesh. We would focus on XSS and CSRF vulnerabilities due to their high ranking on the OWASP list. We analyze the data collected during the investigation and provide a summary of the current state and a guideline for the future web developers.", "title": "" }, { "docid": "8c800687e0f091cfd1edbd7e125cfed4", "text": "Semantic Annotation is required to add machine-readable content to natural language text. A global initiative such as the Semantic Web directly depends on the annotation of massive amounts of textual Web resources. However, considering the amount of those resources, a manual semantic annotation of their contents is neither feasible nor scalable. In this paper we introduce a methodology to partially annotate textual content of Web resources in an automatic and unsupervised way. It uses several well-established learning techniques and heuristics to discover relevant entities in text and to associate them to classes of an input ontology by means of linguistic patterns. It also relies on the Web information distribution to assess the degree of semantic co-relation between entities and classes of the input domain ontology. Special efforts have been put in minimizing the amount of Web accesses required to evaluate entities in order to ensure the scalability of the approach. A manual evaluation has been carried out to test the methodology for several domains showing promising results.", "title": "" }, { "docid": "88c5a6fca072ae849d300e6f30d15c40", "text": "Models such as feed-forward neural networks and certain other structures investigated in the computer science literature are not amenable to closed-form Bayesian analysis. The paper reviews the various approaches taken to overcome this difficulty, involving the use of Gaussian approximations, Markov chain Monte Carlo simulation routines and a class of non-Gaussian but “deterministic” approximations called variational approximations.", "title": "" } ]
scidocsrr
ccadca059db5421939420141d0282375
Assistive grasping with an augmented reality user interface
[ { "docid": "c01f4b10c9d29e66c9132928e36e15b4", "text": "In shared autonomy, user input and robot autonomy are combined to control a robot to achieve a goal. Often, the robot does not know a priori which goal the user wants to achieve, and must both predict the user's intended goal, and assist in achieving that goal. We formulate the problem of shared autonomy as a Partially Observable Markov Decision Process with uncertainty over the user's goal. We utilize maximum entropy inverse optimal control to estimate a distribution over the user's goal based on the history of inputs. Ideally, the robot assists the user by solving for an action which minimizes the expected cost-to-go for the (unknown) goal. As solving the POMDP to select the optimal action is intractable, we use hindsight optimization to approximate the solution. In a user study, we compare our method to a standard predict-then-blend approach. We find that our method enables users to accomplish tasks more quickly while utilizing less input. However, when asked to rate each system, users were mixed in their assessment, citing a tradeoff between maintaining control authority and accomplishing tasks quickly.", "title": "" } ]
[ { "docid": "8e2530837982c698fadacec3c01f25e0", "text": "Fuzz testing is widely used as an automatic solution for discovering vulnerabilities in binary programs that process files. Restricted by their high blindness and low code path coverage, fuzzing tests typically provide quite low efficiencies. In this paper, a novel API in-memory fuzz testing technique for eliminating the blindness of existing techniques is discussed. This technique employs dynamic taint analyses to locate the routines and instructions that belong to the target binary executables, and it consists of parsing and processing the input data. Within the testing phase, binary instrumentation is used to construct loops around such routines, in which the contained taint memory values are mutated in each loop. According to experiments using the prototype tool, this technique could effectively detect defects such as stack overflows. Comparedwith traditional fuzzing tools, this API in-memory fuzzing eliminated the bottleneck of interrupting execution paths and gained a greater than 95% enhancement in execution speed. Communicated by V. Loia. B Baojiang Cui cuibj@bupt.edu.cn Fuwei Wang fuwei.wfw@alibaba-inc.com Xiaofeng Chen xfchen@xidian.edu.cn 1 Beijing University of Posts and Telecommunications and National Engineering Laboratory for Mobile Network Security, Beijing, China 2 Security Department, Alibaba Group, Hangzhou, China 3 China Information Technology Security Evaluation Center, Beijing, China 4 School of Telecommunications Engineering, Xidian University, Xi’an, China", "title": "" }, { "docid": "f86d2e40eabe4067da73070db337d9ce", "text": "Despite tremendous efforts to develop stimuli-responsive enzyme delivery systems, their efficacy has been mostly limited to in vitro applications. Here we introduce, by using an approach of combining biomolecules with artificial compartments, a biomimetic strategy to create artificial organelles (AOs) as cellular implants, with endogenous stimuli-triggered enzymatic activity. AOs are produced by inserting protein gates in the membrane of polymersomes containing horseradish peroxidase enzymes selected as a model for natures own enzymes involved in the redox homoeostasis. The inserted protein gates are engineered by attaching molecular caps to genetically modified channel porins in order to induce redox-responsive control of the molecular flow through the membrane. AOs preserve their structure and are activated by intracellular glutathione levels in vitro. Importantly, our biomimetic AOs are functional in vivo in zebrafish embryos, which demonstrates the feasibility of using AOs as cellular implants in living organisms. This opens new perspectives for patient-oriented protein therapy. The efficacy of stimuli-responsive enzyme delivery systems is usually limited to in vitro applications. Here the authors form artificial organelles by inserting stimuli-responsive protein gates in membranes of polymersomes loaded with enzymes and obtain a triggered functionality both in vitro and in vivo.", "title": "" }, { "docid": "74c7ffaf4064218920f503a31a0f97b0", "text": "In this paper, we present a new method for the control of soft robots with elastic behavior, piloted by several actuators. The central contribution of this work is the use of the Finite Element Method (FEM), computed in real-time, in the control algorithm. The FEM based simulation computes the nonlinear deformations of the robots at interactive rates. The model is completed by Lagrange multipliers at the actuation zones and at the end-effector position. A reduced compliance matrix is built in order to deal with the necessary inversion of the model. Then, an iterative algorithm uses this compliance matrix to find the contribution of the actuators (force and/or position) that will deform the structure so that the terminal end of the robot follows a given position. Additional constraints, like rigid or deformable obstacles, or the internal characteristics of the actuators are integrated in the control algorithm. We illustrate our method using simulated examples of both serial and parallel structures and we validate it on a real 3D soft robot made of silicone.", "title": "" }, { "docid": "303548167773a86d20a3ea13209a0ef3", "text": "This paper reports empirical evidence that a neural network model is applicable to the prediction of foreign exchange rates. Time series data and technical indicators, such as moving average, are fed to neural networks to capture the underlying `rulesa of the movement in currency exchange rates. The exchange rates between American Dollar and \"ve other major currencies, Japanese Yen, Deutsch Mark, British Pound, Swiss Franc and Australian Dollar are forecast by the trained neural networks. The traditional rescaled range analysis is used to test the `e$ciencya of each market before using historical data to train the neural networks. The results presented here show that without the use of extensive market data or knowledge, useful prediction can be made and signi\"cant paper pro\"ts can be achieved for out-of-sample data with simple technical indicators. A further research on exchange rates between Swiss Franc and American Dollar is also conducted. However, the experiments show that with e$cient market it is not easy to make pro\"ts using technical indicators or time series input neural networks. This article also discusses several issues on the frequency of sampling, choice of network architecture, forecasting periods, and measures for evaluating the model's predictive power. After presenting the experimental results, a discussion on future research concludes the paper. ( 2000 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "bfd94756f73fc7f9eb81437f5d192ac3", "text": "Technological advances in upper-limb prosthetic design offer dramatically increased possibilities for powered movement. The DEKA Arm system allows users 10 powered degrees of movement. Learning to control these movements by utilizing a set of motions that, in most instances, differ from those used to obtain the desired action prior to amputation is a challenge for users. In the Department of Veterans Affairs \"Study to Optimize the DEKA Arm,\" we attempted to facilitate motor learning by using a virtual reality environment (VRE) program. This VRE program allows users to practice controlling an avatar using the controls designed to operate the DEKA Arm in the real world. In this article, we provide highlights from our experiences implementing VRE in training amputees to use the full DEKA Arm. This article discusses the use of VRE in amputee rehabilitation, describes the VRE system used with the DEKA Arm, describes VRE training, provides qualitative data from a case study of a subject, and provides recommendations for future research and implementation of VRE in amputee rehabilitation. Our experience has led us to believe that training with VRE is particularly valuable for upper-limb amputees who must master a large number of controls and for those amputees who need a structured learning environment because of cognitive deficits.", "title": "" }, { "docid": "911bc5b111e0c0454c155804e060b29e", "text": "Graphical models have become the basic framework for topic based probabilistic modeling. Especially models with latent variables have proved to be effective in capturing hidden structures in the data. In this paper, we survey an important subclass Directed Probabilistic Topic Models (DPTMs) with soft clustering abilities and their applications for knowledge discovery in text corpora. From an unsupervised learning perspective, “topics are semantically related probabilistic clusters of words in text corpora; and the process for finding these topics is called topic modeling”. In topic modeling, a document consists of different hidden topics and the topic probabilities provide an explicit representation of a document to smooth data from the semantic level. It has been an active area of research during the last decade. Many models have been proposed for handling the problems of modeling text corpora with different characteristics, for applications such as document classification, hidden association finding, expert finding, community discovery and temporal trend analysis. We give basic concepts, advantages and disadvantages in a chronological order, existing models classification into different categories, their parameter estimation and inference making algorithms with models performance evaluation measures. We also discuss their applications, open challenges and future directions in this dynamic area of research.", "title": "" }, { "docid": "d6fe99533c66075ffb85faf7c70475f0", "text": "Outlier detection has received significant attention in many applications, such as detecting credit card fraud or network intrusions. Most existing research focuses on numerical datasets, and cannot directly apply to categorical sets where there is little sense in calculating distances among data points. Furthermore, a number of outlier detection methods require quadratic time with respect to the dataset size and usually multiple dataset scans. These characteristics are undesirable for large datasets, potentially scattered over multiple distributed sites. In this paper, we introduce Attribute Value Frequency (A VF), a fast and scalable outlier detection strategy for categorical data. A VF scales linearly with the number of data points and attributes, and relies on a single data scan. AVF is compared with a list of representative outlier detection approaches that have not been contrasted against each other. Our proposed solution is experimentally shown to be significantly faster, and as effective in discovering outliers.", "title": "" }, { "docid": "3090b9b0017454dc0f0c4549a56d8407", "text": "Light-field cameras have become widely available in both consumer and industrial applications. However, most previous approaches do not model occlusions explicitly, and therefore fail to capture sharp object boundaries. A common assumption is that for a Lambertian scene, a pixel will exhibit photo-consistency, which means all viewpoints converge to a single point when focused to its depth. However, in the presence of occlusions this assumption fails to hold, making most current approaches unreliable precisely where accurate depth information is most important - at depth discontinuities. In this paper, an occlusion-aware depth estimation algorithm is developed; the method also enables identification of occlusion edges, which may be useful in other applications. It can be shown that although photo-consistency is not preserved for pixels at occlusions, it still holds in approximately half the viewpoints. Moreover, the line separating the two view regions (occluded object versus occluder) has the same orientation as that of the occlusion edge in the spatial domain. By ensuring photo-consistency in only the occluded view region, depth estimation can be improved. Occlusion predictions can also be computed and used for regularization. Experimental results show that our method outperforms current state-of-the-art light-field depth estimation algorithms, especially near occlusion boundaries.", "title": "" }, { "docid": "a38cf37fc60e1322e391680037ff6d4e", "text": "Robot-aided gait training is an emerging clinical tool for gait rehabilitation of neurological patients. This paper deals with a novel method of offering gait assistance, using an impedance controlled exoskeleton (LOPES). The provided assistance is based on a recent finding that, in the control of walking, different modules can be discerned that are associated with different subtasks. In this study, a Virtual Model Controller (VMC) for supporting one of these subtasks, namely the foot clearance, is presented and evaluated. The developed VMC provides virtual support at the ankle, to increase foot clearance. Therefore, we first developed a new method to derive reference trajectories of the ankle position. These trajectories consist of splines between key events, which are dependent on walking speed and body height. Subsequently, the VMC was evaluated in twelve healthy subjects and six chronic stroke survivors. The impedance levels, of the support, were altered between trials to investigate whether the controller allowed gradual and selective support. Additionally, an adaptive algorithm was tested, that automatically shaped the amount of support to the subjects’ needs. Catch trials were introduced to determine whether the subjects tended to rely on the support. We also assessed the additional value of providing visual feedback. With the VMC, the step height could be selectively and gradually influenced. The adaptive algorithm clearly shaped the support level to the specific needs of every stroke survivor. The provided support did not result in reliance on the support for both groups. All healthy subjects and most patients were able to utilize the visual feedback to increase their active participation. The presented approach can provide selective control on one of the essential subtasks of walking. This module is the first in a set of modules to control all subtasks. This enables the therapist to focus the support on the subtasks that are impaired, and leave the other subtasks up to the patient, encouraging him to participate more actively in the training. Additionally, the speed-dependent reference patterns provide the therapist with the tools to easily adapt the treadmill speed to the capabilities and progress of the patient.", "title": "" }, { "docid": "1e9e64a89947c08f8ce298d7e0de4183", "text": "This paper proposes a novel architecture for plug-in electric vehicles (PEVs) dc charging station at the megawatt level, through the use of a grid-tied neutral point clamped (NPC) converter. The proposed bipolar dc structure reduces the step-down effort on the dc-dc fast chargers. In addition, this paper proposes a balancing mechanism that allows handling any difference on the dc loads while keeping the midpoint voltage accurately regulated. By formally defining the unbalance operation limit, the proposed control scheme is able to provide complementary balancing capabilities by the use of an additional NPC leg acting as a bidirectional dc-dc stage, simulating the minimal load condition and allowing the modulator to keep the control on the dc voltages under any load scenario. The proposed solution enables fast charging for PEVs concentrating several charging units into a central grid-tied converter. In this paper, simulation and experimental results are presented to validate the proposed charging station architecture.", "title": "" }, { "docid": "3f268b6048d534720cac533f04c2aa7e", "text": "This paper seeks a simple, cost effective and compact gate drive circuit for bi-directional switch of matrix converter. Principals of IGBT commutation and bi-directional switch commutation in matrix converters are reviewed. Three simple IGBT gate drive circuits are presented and simulated in PSpice and simulation results are approved by experiments in the end of this paper. Paper concludes with comparative numbers of gate drive costs.", "title": "" }, { "docid": "c2fa79964579c8d7aac45985d70ae0df", "text": "This paper investigates how to parse (segment) facial components from face images which may be partially occluded. We propose a novel face parser, which recasts segmentation of face components as a cross-modality data transformation problem, i.e., transforming an image patch to a label map. Specifically, a face is represented hierarchically by parts, components, and pixel-wise labels. With this representation, our approach first detects faces at both the part- and component-levels, and then computes the pixel-wise label maps (Fig.1). Our part-based and component-based detectors are generatively trained with the deep belief network (DBN), and are discriminatively tuned by logistic regression. The segmentators transform the detected face components to label maps, which are obtained by learning a highly nonlinear mapping with the deep autoencoder. The proposed hierarchical face parsing is not only robust to partial occlusions but also provide richer information for face analysis and face synthesis compared with face keypoint detection and face alignment. The effectiveness of our algorithm is shown through several tasks on 2, 239 images selected from three datasets (e.g., LFW [12], BioID [13] and CUFSF [29]).", "title": "" }, { "docid": "cbeaacd304c0fcb1bce3decfb8e76e33", "text": "One of the main problems with virtual reality as a learning tool is that there are hardly any theories or models upon which to found and justify the application development. This paper presents a model that defends the metaphorical design of educational virtual reality systems. The goal is to build virtual worlds capable of embodying the knowledge to be taught: the metaphorical structuring of abstract concepts looks for bodily forms of expression in order to make knowledge accessible to students. The description of a case study aimed at learning scientific categorization serves to explain and implement the process of metaphorical projection. Our proposals are based on Lakoff and Johnson's theory of cognition, which defends the conception of the embodied mind, according to which most of our knowledge relies on basic metaphors derived from our bodily experience.", "title": "" }, { "docid": "8a8b33eabebb6d53d74ae97f8081bf7b", "text": "Social networks are inevitable part of modern life. A class of social networks is those with both positive (friendship or trust) and negative (enmity or distrust) links. Ranking nodes in signed networks remains a hot topic in computer science. In this manuscript, we review different ranking algorithms to rank the nodes in signed networks, and apply them to the sign prediction problem. Ranking scores are used to obtain reputation and optimism, which are used as features in the sign prediction problem. Reputation of a node shows patterns of voting towards the node and its optimism demonstrates how optimistic a node thinks about others. To assess the performance of different ranking algorithms, we apply them on three signed networks including Epinions, Slashdot and Wikipedia. In this paper, we introduce three novel ranking algorithms for signed networks and compare their ability in predicting signs of edges with already existing ones. We use logistic regression as the predictor and the reputation and optimism values for the trustee and trustor as features (that are obtained based on different ranking algorithms). We find that ranking algorithms resulting in correlated ranking scores, leads to almost the same prediction accuracy. Furthermore, our analysis identifies a number of ranking algorithms that result in higher prediction accuracy compared to others.", "title": "" }, { "docid": "9332c32039cf782d19367a9515768e42", "text": "Maternal drug use during pregnancy is associated with fetal passive addiction and neonatal withdrawal syndrome. Cigarette smoking—highly prevalent during pregnancy—is associated with addiction and withdrawal syndrome in adults. We conducted a prospective, two-group parallel study on 17 consecutive newborns of heavy-smoking mothers and 16 newborns of nonsmoking, unexposed mothers (controls). Neurologic examinations were repeated at days 1, 2, and 5. Finnegan withdrawal score was assessed every 3 h during their first 4 d. Newborns of smoking mothers had significant levels of cotinine in the cord blood (85.8 ± 3.4 ng/mL), whereas none of the controls had detectable levels. Similar findings were observed with urinary cotinine concentrations in the newborns (483.1 ± 2.5 μg/g creatinine versus 43.6 ± 1.5 μg/g creatinine; p = 0.0001). Neurologic scores were significantly lower in newborns of smokers than in control infants at days 1 (22.3 ± 2.3 versus 26.5 ± 1.1; p = 0.0001), 2 (22.4 ± 3.3 versus 26.3 ± 1.6; p = 0.0002), and 5 (24.3 ± 2.1 versus 26.5 ± 1.5; p = 0.002). Neurologic scores improved significantly from day 1 to 5 in newborns of smokers (p = 0.05), reaching values closer to control infants. Withdrawal scores were higher in newborns of smokers than in control infants at days 1 (4.5 ± 1.1 versus 3.2 ± 1.4; p = 0.05), 2 (4.7 ± 1.7 versus 3.1 ± 1.1; p = 0.002), and 4 (4.7 ± 2.1 versus 2.9 ± 1.4; p = 0.007). Significant correlations were observed between markers of nicotine exposure and neurologic-and withdrawal scores. We conclude that withdrawal symptoms occur in newborns exposed to heavy maternal smoking during pregnancy.", "title": "" }, { "docid": "4ea7fba21969fcdd2de9b4e918583af8", "text": "Due to the explosion in the size of the WWW[1,4,5] it becomes essential to make the crawling process parallel. In this paper we present an architecture for a parallel crawler that consists of multiple crawling processes called as C-procs which can run on network of workstations. The proposed crawler is scalable, is resilient against system crashes and other event. The aim of this architecture is to efficiently and effectively crawl the current set of publically indexable web pages so that we can maximize the download rate while minimizing the overhead from parallelization", "title": "" }, { "docid": "a5989c562f4c14a67e9effadad92550f", "text": "We address the problem of understanding an indoor scene from a single image in terms of recovering the room geometry (floor, ceiling, and walls) and furniture layout. A major challenge of this task arises from the fact that most indoor scenes are cluttered by furniture and decorations, whose appearances vary drastically across scenes, thus can hardly be modeled (or even hand-labeled) consistently. In this paper we tackle this problem by introducing latent variables to account for clutter, so that the observed image is jointly explained by the room and clutter layout. Model parameters are learned from a training set of images that are only labeled with the layout of the room geometry. Our approach enables taking into account and inferring indoor clutter without hand-labeling of the clutter in the training set, which is often inaccurate. Yet it outperforms the state-of-the-art method of Hedau et al. that requires clutter labels. As a latent variable based method, our approach has an interesting feature that latent variables are used in direct correspondence with a concrete visual concept (clutter in the room) and thus interpretable.", "title": "" }, { "docid": "3038a06098283ecdd7087079ee31cbd7", "text": "Hidden Quantum Markov Models (HQMMs) can be thought of as quantum probabilistic graphical models that can model sequential data. We extend previous work on HQMMs with three contributions: (1) we show how classical hidden Markov models (HMMs) can be simulated on a quantum circuit, (2) we reformulate HQMMs by relaxing the constraints for modeling HMMs on quantum circuits, and (3) we present a learning algorithm to estimate the parameters of an HQMM from data. While our algorithm requires further optimization to handle larger datasets, we are able to evaluate our algorithm using several synthetic datasets generated by valid HQMMs. We show that our algorithm learns HQMMs with the same number of hidden states and predictive accuracy as the HQMMs that generated the data, while HMMs learned with the BaumWelch algorithm require more states to match the predictive accuracy.", "title": "" }, { "docid": "d99302511e2eb17ce875d480d1bb78fc", "text": "Emojis allow us to describe objects, situations and even feelings with small images, providing a visual and quick way to communicate. In this paper, we analyse emojis used in Twitter with distributional semantic models. We retrieve 10 millions tweets posted by USA users, and we build several skip gram word embedding models by mapping in the same vectorial space both words and emojis. We test our models with semantic similarity experiments, comparing the output of our models with human assessment. We also carry out an exhaustive qualitative evaluation, showing interesting results.", "title": "" }, { "docid": "a7618e1370db3fca4262f8d36979aa91", "text": "Generative Adversarial Network (GAN) has been shown to possess the capability to learn distributions of data, given infinite capacity of models [1, 2]. Empirically, approximations with deep neural networks seem to have “sufficiently large” capacity and lead to several success in many applications, such as image generation. However, most of the results are difficult to evaluate because of the curse of dimensionality and the unknown distribution of the data. To evaluate GANs, in this paper, we consider simple one-dimensional data coming from parametric distributions circumventing the aforementioned problems. We formulate rigorous techniques for evaluation under this setting. Based on this evaluation, we find that many state-ofthe-art GANs are very difficult to train to learn the true distribution and can usually only find some of the modes. If the GAN has learned, such as MMD GAN, we observe it has some generalization capabilities.", "title": "" } ]
scidocsrr
8ac37d86ad7ea7c70031ac22ebb19981
The red one!: On learning to refer to things based on discriminative properties
[ { "docid": "08768f6cf1305884a735bbe4e7e98474", "text": "Language is sensitive to both semantic and pragmatic effects. To capture both effects, we model language use as a cooperative game between two players: a speaker, who generates an utterance, and a listener, who responds with an action. Specifically, we consider the task of generating spatial references to objects, wherein the listener must accurately identify an object described by the speaker. We show that a speaker model that acts optimally with respect to an explicit, embedded listener model substantially outperforms one that is trained to directly generate spatial descriptions.", "title": "" }, { "docid": "f6a66ea4a5e8683bae76e71912694874", "text": "We consider the task of learning visual connections between object categories using the ImageNet dataset, which is a large-scale dataset ontology containing more than 15 thousand object classes. We want to discover visual relationships between the classes that are currently missing (such as similar colors or shapes or textures). In this work we learn 20 visual attributes and use them both in a zero-shot transfer learning experiment as well as to make visual connections between semantically unrelated object categories.", "title": "" } ]
[ { "docid": "388f4a555c7aa004f081cbdc6bc0f799", "text": "We present a multi-GPU version of GPUSPH, a CUDA implementation of fluid-dynamics models based on the smoothed particle hydrodynamics (SPH) numerical method. The SPH is a well-known Lagrangian model for the simulation of free-surface fluid flows; it exposes a high degree of parallelism and has already been successfully ported to GPU. We extend the GPU-based simulator to run simulations on multiple GPUs simultaneously, to obtain a gain in speed and overcome the memory limitations of using a single device. The computational domain is spatially split with minimal overlapping and shared volume slices are updated at every iteration of the simulation. Data transfers are asynchronous with computations, thus completely covering the overhead introduced by slice exchange. A simple yet effective load balancing policy preserves the performance in case of unbalanced simulations due to asymmetric fluid topologies. The obtained speedup factor (up to 4.5x for 6 GPUs) closely follows the expected one (5x for 6 GPUs) and it is possible to run simulations with a higher number of particles than would fit on a single device. We use the Karp-Flatt metric to formally estimate the overall efficiency of the parallelization.", "title": "" }, { "docid": "d6ca38ccad91c0c2c51ba3dd5be454b2", "text": "Dirty data is a serious problem for businesses leading to incorrect decision making, inefficient daily operations, and ultimately wasting both time and money. Dirty data often arises when domain constraints and business rules, meant to preserve data consistency and accuracy, are enforced incompletely or not at all in application code. In this work, we propose a new data-driven tool that can be used within an organization’s data quality management process to suggest possible rules, and to identify conformant and non-conformant records. Data quality rules are known to be contextual, so we focus on the discovery of context-dependent rules. Specifically, we search for conditional functional dependencies (CFDs), that is, functional dependencies that hold only over a portion of the data. The output of our tool is a set of functional dependencies together with the context in which they hold (for example, a rule that states for CS graduate courses, the course number and term functionally determines the room and instructor). Since the input to our tool will likely be a dirty database, we also search for CFDs that almost hold. We return these rules together with the non-conformant records (as these are potentially dirty records). We present effective algorithms for discovering CFDs and dirty values in a data instance. Our discovery algorithm searches for minimal CFDs among the data values and prunes redundant candidates. No universal objective measures of data quality or data quality rules are known. Hence, to avoid returning an unnecessarily large number of CFDs and only those that are most interesting, we evaluate a set of interest metrics and present comparative results using real datasets. We also present an experimental study showing the scalability of our techniques.", "title": "" }, { "docid": "72cfe76ea68d5692731531aea02444d0", "text": "Primary human tumor culture models allow for individualized drug sensitivity testing and are therefore a promising technique to achieve personalized treatment for cancer patients. This would especially be of interest for patients with advanced stage head and neck cancer. They are extensively treated with surgery, usually in combination with high-dose cisplatin chemoradiation. However, adding cisplatin to radiotherapy is associated with an increase in severe acute toxicity, while conferring only a minor overall survival benefit. Hence, there is a strong need for a preclinical model to identify patients that will respond to the intended treatment regimen and to test novel drugs. One of such models is the technique of culturing primary human tumor tissue. This review discusses the feasibility and success rate of existing primary head and neck tumor culturing techniques and their corresponding chemo- and radiosensitivity assays. A comprehensive literature search was performed and success factors for culturing in vitro are debated, together with the actual value of these models as preclinical prediction assay for individual patients. With this review, we aim to fill a gap in the understanding of primary culture models from head and neck tumors, with potential importance for other tumor types as well.", "title": "" }, { "docid": "0772a2f393b1820e6fa8970cc14339a2", "text": "The internet is empowering the rise of crowd work, gig work, and other forms of on--demand labor. A large and growing body of scholarship has attempted to predict the socio--technical outcomes of this shift, especially addressing three questions: begin{inlinelist} item What are the complexity limits of on-demand work?, item How far can work be decomposed into smaller microtasks?, and item What will work and the place of work look like for workers' end {inlinelist} In this paper, we look to the historical scholarship on piecework --- a similar trend of work decomposition, distribution, and payment that was popular at the turn of the nth{20} century --- to understand how these questions might play out with modern on--demand work. We identify the mechanisms that enabled and limited piecework historically, and identify whether on--demand work faces the same pitfalls or might differentiate itself. This approach introduces theoretical grounding that can help address some of the most persistent questions in crowd work, and suggests design interventions that learn from history rather than repeat it.", "title": "" }, { "docid": "cd48180e93d25858410222fff4b1f43e", "text": "Metaphors pervade discussions of social issues like climate change, the economy, and crime. We ask how natural language metaphors shape the way people reason about such social issues. In previous work, we showed that describing crime metaphorically as a beast or a virus, led people to generate different solutions to a city's crime problem. In the current series of studies, instead of asking people to generate a solution on their own, we provided them with a selection of possible solutions and asked them to choose the best ones. We found that metaphors influenced people's reasoning even when they had a set of options available to compare and select among. These findings suggest that metaphors can influence not just what solution comes to mind first, but also which solution people think is best, even when given the opportunity to explicitly compare alternatives. Further, we tested whether participants were aware of the metaphor. We found that very few participants thought the metaphor played an important part in their decision. Further, participants who had no explicit memory of the metaphor were just as much affected by the metaphor as participants who were able to remember the metaphorical frame. These findings suggest that metaphors can act covertly in reasoning. Finally, we examined the role of political affiliation on reasoning about crime. The results confirm our previous findings that Republicans are more likely to generate enforcement and punishment solutions for dealing with crime, and are less swayed by metaphor than are Democrats or Independents.", "title": "" }, { "docid": "a478928c303153172133d805ac35c6cc", "text": "Chest X-ray is one of the most accessible medical imaging technique for diagnosis of multiple diseases. With the availability of ChestX-ray14, which is a massive dataset of chest X-ray images and provides annotations for 14 thoracic diseases; it is possible to train Deep Convolutional Neural Networks (DCNN) to build Computer Aided Diagnosis (CAD) systems. In this work, we experiment a set of deep learning models and present a cascaded deep neural network that can diagnose all 14 pathologies better than the baseline and is competitive with other published methods. Our work provides the quantitative results to answer following research questions for the dataset: 1) What loss functions to use for training DCNN from scratch on ChestXray14 dataset that demonstrates high class imbalance and label co occurrence? 2) How to use cascading to model label dependency and to improve accuracy of the deep learning model?", "title": "" }, { "docid": "8f089d55c0ce66db7bbf27476267a8e5", "text": "Planning radar sites is very important for several civilian and military applications. Depending on the security or defence issue different requirements exist regarding the radar coverage and the radar sites. QSiteAnalysis offers several functions to automate, improve and speed up this highly complex task. Wave propagation effects such as diffraction, refraction, multipath and atmospheric attenuation are considered for the radar coverage calculation. Furthermore, an automatic optimisation of the overall coverage is implemented by optimising the radar sites. To display the calculation result, the calculated coverage is visualised in 2D and 3D. Therefore, QSiteAnalysis offers several functions to improve and automate radar site studies.", "title": "" }, { "docid": "e33fa3ebbd612dbc6e76feebde52d3d9", "text": "In this paper, we introduce a general iterative human-machine collaborative method for training crowdsource workers: the classifier (i.e., the machine) selects the highest quality examples for training the crowdsource workers (i.e., the humans). Then, the latter annotate the lower quality examples such that the classifier can be re-trained with more accurate examples. This process can be iterated several times. We tested our approach on two different tasks, Relation Extraction and Community Question Answering, which are also in two different languages, English and Arabic, respectively. Our experimental results show a significant improvement for creating Gold Standard data over distant supervision or just crowdsourcing without worker training. At the same time, our method approach the performance than state-of-the-art methods using expensive Gold Standard for training workers", "title": "" }, { "docid": "34dcd712c5eae560f3d611fcc8ef9825", "text": "Do I understand the problem of P vs. NP? The answer is a simple \"no\". If I were to understand the problem, I would've solved it as well\" — This is the current state of many theoretical computer scientists around the world. Apart from a bag of laureates waiting for the person who successfully understands this most popular millennium prize riddle, this is also considered to be a game changer in both mathematics and computer science. According to Scott Aaronson, \"If P = NP, then the world would be a profoundly different place than we usually assume it to be\". The speaker intends to share the part that he understood on the problem, and about the efforts that were recently put-forth in cracking the same.", "title": "" }, { "docid": "d28d956c271189f4909ed11f0e5c342a", "text": "This article presents new oscillation criteria for the second-order delay differential equation (p(t)(x′(t))α)′ + q(t)x(t− τ) + n X i=1 qi(t)x αi (t− τ) = e(t) where τ ≥ 0, p(t) ∈ C1[0,∞), q(t), qi(t), e(t) ∈ C[0,∞), p(t) > 0, α1 > · · · > αm > α > αm+1 > · · · > αn > 0 (n > m ≥ 1), α1, . . . , αn and α are ratio of odd positive integers. Without assuming that q(t), qi(t) and e(t) are nonnegative, the results in [6, 8] have been extended and a mistake in the proof of the results in [3] is corrected.", "title": "" }, { "docid": "7ebaee3df1c8ee4bf1c82102db70f295", "text": "Small cells such as femtocells overlaying the macrocells can enhance the coverage and capacity of cellular wireless networks and increase the spectrum efficiency by reusing the frequency spectrum assigned to the macrocells in a universal frequency reuse fashion. However, management of both the cross-tier and co-tier interferences is one of the most critical issues for such a two-tier cellular network. Centralized solutions for interference management in a two-tier cellular network with orthogonal frequency-division multiple access (OFDMA), which yield optimal/near-optimal performance, are impractical due to the computational complexity. Distributed solutions, on the other hand, lack the superiority of centralized schemes. In this paper, we propose a semi-distributed (hierarchical) interference management scheme based on joint clustering and resource allocation for femtocells. The problem is formulated as a mixed integer non-linear program (MINLP). The solution is obtained by dividing the problem into two sub-problems, where the related tasks are shared between the femto gateway (FGW) and femtocells. The FGW is responsible for clustering, where correlation clustering is used as a method for femtocell grouping. In this context, a low-complexity approach for solving the clustering problem is used based on semi-definite programming (SDP). In addition, an algorithm is proposed to reduce the search range for the best cluster configuration. For a given cluster configuration, within each cluster, one femto access point (FAP) is elected as a cluster head (CH) that is responsible for resource allocation among the femtocells in that cluster. The CH performs sub-channel and power allocation in two steps iteratively, where a low-complexity heuristic is proposed for the sub-channel allocation phase. Numerical results show the performance gains due to clustering in comparison to other related schemes. Also, the proposed correlation clustering scheme offers performance, which is close to that of the optimal clustering, with a lower complexity.", "title": "" }, { "docid": "5403ebc5a8fc5789809145fb8114bb63", "text": "This paper explores why occupational therapists use arts and crafts as therapeutic modalities. Beginning with the turn-of-the-century origins of occupational therapy, the paper traces the similarities and differences in the ideas and beliefs of the founders of occupational therapy and the proponents of the arts-and-crafts movement.", "title": "" }, { "docid": "4c29f5ffaeff5911e3d5f7a85146c601", "text": "In August 2004, Duke University provided free iPods to its entire freshman class (Belanger, 2005). The next month, a Korean education firm offered free downloadable college entrance exam lectures to students who purchased an iRiver personal multimedia player (Kim, 2004). That October, a financial trading firm in Chicago was reportedly assessing the hand-eye coordination of traders’ using GameBoys (Logan, 2004). Yet while such innovative applications abound, the use of technology in education and training is far from new, a fact as true in language classrooms as it is in medical schools.", "title": "" }, { "docid": "f5352a1eee7340bf7c7e37b1210c7b99", "text": "In recent years, traditional cybersecurity safeguards have proven ineffective against insider threats. Famous cases of sensitive information leaks caused by insiders, including the WikiLeaks release of diplomatic cables and the Edward Snowden incident, have greatly harmed the U.S. government's relationship with other governments and with its own citizens. Data Leak Prevention (DLP) is a solution for detecting and preventing information leaks from within an organization's network. However, state-of-art DLP detection models are only able to detect very limited types of sensitive information, and research in the field has been hindered due to the lack of available sensitive texts. Many researchers have focused on document-based detection with artificially labeled “confidential documents” for which security labels are assigned to the entire document, when in reality only a portion of the document is sensitive. This type of whole-document based security labeling increases the chances of preventing authorized users from accessing non-sensitive information within sensitive documents. In this paper, we introduce Automated Classification Enabled by Security Similarity (ACESS), a new and innovative detection model that penetrates the complexity of big text security classification/detection. To analyze the ACESS system, we constructed a novel dataset, containing formerly classified paragraphs from diplomatic cables made public by the WikiLeaks organization. To our knowledge this paper is the first to analyze a dataset that contains actual formerly sensitive information annotated at paragraph granularity.", "title": "" }, { "docid": "68473e74e1c188d41f4ea42028728a18", "text": "The mastery of fundamental movement skills (FMS) has been purported as contributing to children's physical, cognitive and social development and is thought to provide the foundation for an active lifestyle. Commonly developed in childhood and subsequently refined into context- and sport-specific skills, they include locomotor (e.g. running and hopping), manipulative or object control (e.g. catching and throwing) and stability (e.g. balancing and twisting) skills. The rationale for promoting the development of FMS in childhood relies on the existence of evidence on the current or future benefits associated with the acquisition of FMS proficiency. The objective of this systematic review was to examine the relationship between FMS competency and potential health benefits in children and adolescents. Benefits were defined in terms of psychological, physiological and behavioural outcomes that can impact public health. A systematic search of six electronic databases (EMBASE, OVID MEDLINE, PsycINFO, PubMed, Scopus and SportDiscus®) was conducted on 22 June 2009. Included studies were cross-sectional, longitudinal or experimental studies involving healthy children or adolescents (aged 3-18 years) that quantitatively analysed the relationship between FMS competency and potential benefits. The search identified 21 articles examining the relationship between FMS competency and eight potential benefits (i.e. global self-concept, perceived physical competence, cardio-respiratory fitness [CRF], muscular fitness, weight status, flexibility, physical activity and reduced sedentary behaviour). We found strong evidence for a positive association between FMS competency and physical activity in children and adolescents. There was also a positive relationship between FMS competency and CRF and an inverse association between FMS competency and weight status. Due to an inadequate number of studies, the relationship between FMS competency and the remaining benefits was classified as uncertain. More longitudinal and intervention research examining the relationship between FMS competency and potential psychological, physiological and behavioural outcomes in children and adolescents is recommended.", "title": "" }, { "docid": "a8478fa2a7088c270f1b3370bb06d862", "text": "Sodium-ion batteries (SIBs) are prospective alternative to lithium-ion batteries for large-scale energy-storage applications, owing to the abundant resources of sodium. Metal sulfides are deemed to be promising anode materials for SIBs due to their low-cost and eco-friendliness. Herein, for the first time, series of copper sulfides (Cu2S, Cu7S4, and Cu7KS4) are controllably synthesized via a facile electrochemical route in KCl-NaCl-Na2S molten salts. The as-prepared Cu2S with micron-sized flakes structure is first investigated as anode of SIBs, which delivers a capacity of 430 mAh g-1 with a high initial Coulombic efficiency of 84.9% at a current density of 100 mA g-1. Moreover, the Cu2S anode demonstrates superior capability (337 mAh g-1 at 20 A g-1, corresponding to 50 C) and ultralong cycle performance (88.2% of capacity retention after 5000 cycles at 5 A g-1, corresponding to 0.0024% of fade rate per cycle). Meanwhile, the pseudocapacitance contribution and robust porous structure in situ formed during cycling endow the Cu2S anodes with outstanding rate capability and enhanced cyclic performance, which are revealed by kinetics analysis and ex situ characterization.", "title": "" }, { "docid": "49d714c778b820fca5946b9a587d1e17", "text": "The current Web of Data is producing increasingly large RDF datasets. Massive publication efforts of RDF data driven by initiatives like the Linked Open Data movement, and the need to exchange large datasets has unveiled the drawbacks of traditional RDF representations, inspired and designed by a documentcentric and human-readable Web. Among the main problems are high levels of verbosity/redundancy and weak machine-processable capabilities in the description of these datasets. This scenario calls for efficient formats for publication and exchange. This article presents a binary RDF representation addressing these issues. Based on a set of metrics that characterizes the skewed structure of real-world RDF data, we develop a proposal of an RDF representation that modularly partitions and efficiently represents three components of RDF datasets: Header information, a Dictionary, and the actual Triples structure (thus called HDT). Our experimental evaluation shows that datasets in HDT format can be compacted by more than fifteen times as compared to current naive representations, improving both parsing and processing while keeping a consistent publication scheme. Specific compression techniques over HDT further improve these compression rates and prove to outperform existing compression solutions for efficient RDF exchange. © 2013 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "1d1005fe036932695a7706cde950fe75", "text": "In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. Due to some unique characteristics of MANETs, prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. In general, the intrusion detection techniques for traditional wireless networks are not well suited for MANETs. In this paper, we classify the architectures for intrusion detection systems (IDS) that have been introduced for MANETs. Current IDS’s corresponding to those architectures are also reviewed and compared. We then provide some directions for future research.", "title": "" }, { "docid": "635f090bc5d0bf928640aaaaa1e16861", "text": "Event-based social networks (EBSNs) provide convenient online platforms for users to organize, attend and share social events. Understanding users’ social influences in social networks can benefit many applications, such as social recommendation and social marketing. In this paper, we focus on the problem of predicting users’ social influences on upcoming events in EBSNs. We formulate this prediction problem as the estimation of unobserved entries of the constructed user-event social influence matrix, where each entry represents the influence value of a user on an event. In particular, we define a user's social influence on a given event as the proportion of the user's friends who are influenced by him/her to attend the event. To solve this problem, we present a hybrid collaborative filtering model, namely, Matrix Factorization with Event-User Neighborhood (MF-EUN) model, by incorporating both event-based and user-based neighborhood methods into matrix factorization. Due to the fact that the constructed social influence matrix is very sparse and the overlap values in the matrix are few, it is challenging to find reliable similar neighbors using the widely adopted similarity measures (e.g., Pearson correlation and Cosine similarity). To address this challenge, we propose an additional information based neighborhood discovery (AID) method by considering both event-specific and user-specific features in EBSNs. The parameters of our MF-EUN model are determined by minimizing the associated regularized squared error function through stochastic gradient descent. We conduct a comprehensive performance evaluation on real-world datasets collected from DoubanEvent. Experimental results show that our proposed hybrid collaborative filtering model is superior than several alternatives, which provides excellent performance with RMSE and MAE reaching 0.248 and 0.1266 respectively in the 90% training data of 10 000", "title": "" }, { "docid": "c263d0c704069ecbdd9d27e9722536e3", "text": "This paper proposes a chaos-based true random number generator using image as nondeterministic entropy sources. Logistic map is applied to permute and diffuse the image to produce a random sequence after the image is divided to bit-planes. The generated random sequence passes NIST 800-22 test suite with good performance.", "title": "" } ]
scidocsrr
1253bb1881b37652b762b6d5799d3457
MoonGen: A Scriptable High-Speed Packet Generator
[ { "docid": "a7d5ba182deefef418e03725f664d68e", "text": "Network stacks currently implemented in operating systems can no longer cope with the packet rates offered by 10 Gbit Ethernet. Thus, frameworks were developed claiming to offer a faster alternative for this demand. These frameworks enable arbitrary packet processing systems to be built from commodity hardware handling a traffic rate of several 10 Gbit interfaces, entering a domain previously only available to custom-built hardware. In this paper, we survey various frameworks for high-performance packet IO. We analyze the performance of the most prominent frameworks based on representative measurements in packet forwarding scenarios. Therefore, we quantify the effects of caching and look at the tradeoff between throughput and latency. Moreover, we introduce a model to estimate and assess the performance of these packet processing frameworks.", "title": "" } ]
[ { "docid": "59f3c511765c52702b9047a688256532", "text": "Mobile robots are dependent upon a model of the environment for many of their basic functions. Locally accurate maps are critical to collision avoidance, while large-scale maps (accurate both metrically and topologically) are necessary for efficient route planning. Solutions to these problems have immediate and important applications to autonomous vehicles, precision surveying, and domestic robots. Building accurate maps can be cast as an optimization problem: find the map that is most probable given the set of observations of the environment. However, the problem rapidly becomes difficult when dealing with large maps or large numbers of observations. Sensor noise and non-linearities make the problem even more difficult— especially when using inexpensive (and therefore preferable) sensors. This thesis describes an optimization algorithm that can rapidly estimate the maximum likelihood map given a set of observations. The algorithm, which iteratively reduces map error by considering a single observation at a time, scales well to large environments with many observations. The approach is particularly robust to noise and non-linearities, quickly escaping local minima that trap current methods. Both batch and online versions of the algorithm are described. In order to build a map, however, a robot must first be able to recognize places that it has previously seen. Limitations in sensor processing algorithms, coupled with environmental ambiguity, make this difficult. Incorrect place recognitions can rapidly lead to divergence of the map. This thesis describes a place recognition algorithm that can robustly handle ambiguous data. We evaluate these algorithms on a number of challenging datasets and provide quantitative comparisons to other state-of-the-art methods, illustrating the advantages of our methods.", "title": "" }, { "docid": "9be415bd0789f77029fc99a6ac52a614", "text": "Image classification problem is one of most important research directions in image processing and has become the focus of research in many years due to its diversity and complexity of image information. In view of the existing image classification models’ failure to fully utilize the information of images, this paper proposes a novel image classification method of combining the Convolutional Neural Network (CNN) and eXtreme Gradient Boosting (XGBoost), which are two outstanding classifiers. The presented CNNXGBoost model provides more precise output by integrating CNN as a trainable feature extractor to automatically obtain features from input and XGBoost as a recognizer in the top level of the network to produce results. Experiments are implemented on the well-known MNIST and CIFAR-10 databases. The results prove that the new method performs better compared with other methods on the same databases, which verify the effectiveness of the proposed method in image classification problem.", "title": "" }, { "docid": "908e2a94523743a90a57f9419fef8d28", "text": "Heart rate variability (HRV) is generated by the interaction of multiple regulatory mechanisms that operate on different time scales. This article examines the regulation of the heart, the meaning of HRV, Thayer and Lane’s neurovisceral integration model, the sources of HRV, HRV frequency and time domain measurements, Porges’s polyvagal theory, and resonance frequency breathing. The medical implications of HRV biofeedback for cardiovascular rehabilitation and inflammatory disorders are considered.", "title": "" }, { "docid": "b281f1244dbf31c492d34f0314f8b3e2", "text": "CONTEXT\nThe National Consensus Project for Quality Palliative Care includes spiritual care as one of the eight clinical practice domains. There are very few standardized spirituality history tools.\n\n\nOBJECTIVES\nThe purpose of this pilot study was to test the feasibility for the Faith, Importance and Influence, Community, and Address (FICA) Spiritual History Tool in clinical settings. Correlates between the FICA qualitative data and quality of life (QOL) quantitative data also were examined to provide additional insight into spiritual concerns.\n\n\nMETHODS\nThe framework of the FICA tool includes Faith or belief, Importance of spirituality, individual's spiritual Community, and interventions to Address spiritual needs. Patients with solid tumors were recruited from ambulatory clinics of a comprehensive cancer center. Items assessing aspects of spirituality within the Functional Assessment of Cancer Therapy QOL tools were used, and all patients were assessed using the FICA. The sample (n=76) had a mean age of 57, and almost half were of diverse religions.\n\n\nRESULTS\nMost patients rated faith or belief as very important in their lives (mean 8.4; 0-10 scale). FICA quantitative ratings and qualitative comments were closely correlated with items from the QOL tools assessing aspects of spirituality.\n\n\nCONCLUSION\nFindings suggest that the FICA tool is a feasible tool for clinical assessment of spirituality. Addressing spiritual needs and concerns in clinical settings is critical in enhancing QOL. Additional use and evaluation by clinicians of the FICA Spiritual Assessment Tool in usual practice settings are needed.", "title": "" }, { "docid": "4480840e6dbab77e4f032268ea69bff1", "text": "This chapter provides a critical survey of emergence definitions both from a conceptual and formal standpoint. The notions of downward / backward causation and weak / strong emergence are specially discussed, for application to complex social system with cognitive agents. Particular attention is devoted to the formal definitions introduced by (Müller 2004) and (Bonabeau & Dessalles, 1997), which are operative in multi-agent frameworks and make sense from both cognitive and social point of view. A diagrammatic 4-Quadrant approach, allow us to understanding of complex phenomena along both interior/exterior and individual/collective dimension.", "title": "" }, { "docid": "db6904a5aa2196dedf37b279e04b3ea8", "text": "The use of animation and multimedia for learning is now further extended by the provision of entire Virtual Reality Learning Environments (VRLE). This highlights a shift in Web-based learning from a conventional multimedia to a more immersive, interactive, intuitive and exciting VR learning environment. VRLEs simulate the real world through the application of 3D models that initiates interaction, immersion and trigger the imagination of the learner. The question of good pedagogy and use of technology innovations comes into focus once again. Educators attempt to find theoretical guidelines or instructional principles that could assist them in developing and applying a novel VR learning environment intelligently. This paper introduces the educational use of Web-based 3D technologies and highlights in particular VR features. It then identifies constructivist learning as the pedagogical engine driving the construction of VRLE and discusses five constructivist learning approaches. Furthermore, the authors provide two case studies to investigate VRLEs for learning purposes. The authors conclude with formulating some guidelines for the effective use of VRLEs, including discussion of the limitations and implications for the future study of VRLEs. 2010 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "8e7cfad4f1709101e5790343200d1e16", "text": "Although electronic commerce experts often cite privacy concerns as barriers to consumer electronic commerce, there is a lack of understanding about how these privacy concerns impact consumers' willingness to conduct transactions online. Therefore, the goal of this study is to extend previous models of e-commerce adoption by specifically assessing the impact that consumers' concerns for information privacy (CFIP) have on their willingness to engage in online transactions. To investigate this, we conducted surveys focusing on consumers’ willingness to transact with a well-known and less well-known Web merchant. Results of the study indicate that concern for information privacy affects risk perceptions, trust, and willingness to transact for a wellknown merchant, but not for a less well-known merchant. In addition, the results indicate that merchant familiarity does not moderate the relationship between CFIP and risk perceptions or CFIP and trust. Implications for researchers and practitioners are discussed. 1 Elena Karahanna was the accepting senior editor. Kathy Stewart Schwaig and David Gefen were the reviewers. This paper was submitted on October 12, 2004, and went through 4 revisions. Information Privacy and Online Consumer Purchasing/Van Slyke et al. Journal of the Association for Information Systems Vol. 7 No. 6, pp. 415-444/June 2006 416 Introduction Although information privacy concerns have long been cited as barriers to consumer adoption of business-to-consumer (B2C) e-commerce (Hoffman et al., 1999, Sullivan, 2005), the results of studies focusing on privacy concerns have been equivocal. Some studies find that mechanisms intended to communicate information about privacy protection such as privacy seals and policies increase intentions to engage in online transactions (Miyazaki and Krishnamurthy, 2002). In contrast, others find that these mechanisms have no effect on consumer willingness to engage in online transactions (Kimery and McCord, 2002). Understanding how consumers’ concerns for information privacy (CFIP), or their concerns about how organizations use and protect personal information (Smith et al., 1996), impact consumers’ willingness to engage in online transactions is important to our knowledge of consumer-oriented e-commerce. For example, if CFIP has a strong direct impact on willingness to engage in online transactions, both researchers and practitioners may want to direct efforts at understanding how to allay some of these concerns. In contrast, if CFIP only impacts willingness to transact through other factors, then efforts may be directed at influencing these factors through both CFIP as well as through their additional antecedents. Prior research on B2C e-commerce examining consumer willingness to transact has focused primarily on the role of trust and trustworthiness either using trust theory or using acceptance, and adoption-based theories as frameworks from which to study trust. The research based on trust theories tends to focus on the structure of trust or on antecedents to trust (Bhattacherjee, 2002; Gefen, 2000; Jarvenpaa et al., 2000; McKnight et al., 2002a). Adoptionand acceptance-based research includes studies using the Technology Acceptance Model (Gefen et al., 2003) and diffusion theory (Van Slyke et al., 2004) to examine the effects of trust within well-established models. To our knowledge, studies of the effects of trust in the context of e-commerce transactions have not included CFIP as an antecedent in their models. The current research addresses this by examining the effect of CFIP on willingness to transact within a nomological network of additional antecedents (i.e., trust and risk) that we expect will be influenced by CFIP. In addition, familiarity with the Web merchant may moderate the relationship between CFIP and both trust and risk perceptions. As an individual becomes more familiar with the Web merchant and how it collects and protects personal information, perceptions may be driven more by knowledge of the merchant than by information concerns. This differential relationship between factors for more familiar (e.g. experienced) and less familiar merchants is similar to findings of previous research on user acceptance for potential and repeat users of technology (Karahanna et al., 1999) and e-commerce customers (Gefen et al., 2003). Thus, this research has two goals. The first goal is to better understand the role that consumers’ concerns for information privacy (CFIP) have on their willingness to engage in online transactions. The second goal is to investigate whether familiarity moderates the effects of CFIP on key constructs in our nomological network. Specifically, the following research questions are investigated: How do consumers’ concerns for information privacy affect their willingness to engage in online transactions? Does consumers' familiarity with a Web merchant moderate the impact of concern for information privacy on risk and on trust? Information Privacy and Online Consumer Purchasing/Van Slyke et al. Journal of the Association for Information Systems Vol. 7 No. 6, pp. 415-444/June 2006 417 This paper is organized as follows. First, we provide background information regarding the existing literature and the constructs of interest. Next, we present our research model and develop the hypotheses arising from the model. We then describe the method by which we investigated the hypotheses. This is followed by a discussion of the results of our analysis. We conclude the paper by discussing the implications and limitations of our work, along with suggestions for future research. Research Model and Hypotheses Figure 1 presents this study's research model. Given that concern for information privacy is the central focus of the study, we embed the construct within a nomological network of willingness to transact in prior research. Specifically, we include risk, familiarity with the merchant, and trust (Bhattacherjee, 2002; Gefen et al., 2003; Jarvenpaa and Tractinsky, 1999; Van Slyke et al., 2004) constructs that CFIP is posited to influence and that have been found to influence. We first discuss CFIP and then present the theoretical rationale that underlies the relationships presented in the research model. We begin our discussion of the research model by providing an overview of CFIP, focusing on this construct in the context of e-commerce.", "title": "" }, { "docid": "b6fa1ee8c2f07b34768a78591c33bbbe", "text": "We prove that there are arbitrarily long arithmetic progressions of primes. There are three major ingredients. [. . . ] [. . . ] for all x ∈ ZN (here (m0, t0, L0) = (3, 2, 1)) and E ( ν((x− y)/2)ν((x− y + h2)/2)ν(−y)ν(−y − h1)× × ν((x− y′)/2)ν((x− y′ + h2)/2)ν(−y)ν(−y − h1)× × ν(x)ν(x + h1)ν(x + h2)ν(x + h1 + h2) ∣∣∣∣ x, h1, h2, y, y′ ∈ ZN) = 1 + o(1) (0.1) (here (m0, t0, L0) = (12, 5, 2)). [. . . ] Proposition 0.1 (Generalised von Neumann). Suppose that ν is k-pseudorandom. Let f0, . . . , fk−1 ∈ L(ZN) be functions which are pointwise bounded by ν+νconst, or in other words |fj(x)| 6 ν(x) + 1 for all x ∈ ZN , 0 6 j 6 k − 1. (0.2) Let c0, . . . , ck−1 be a permutation of {0, 1, . . . , k − 1} (in practice we will take cj := j). Then E ( k−1 ∏ j=0 fj(x + cjr) ∣∣∣∣ x, r ∈ ZN) = O( inf 06j6k−1 ‖fj‖Uk−1) + o(1).", "title": "" }, { "docid": "c4e6d52d87bbf910196ddc955fd161d3", "text": "Virtual reality (VR) has recently emerged as a potentially effective way to provide general and specialty health care services, and appears poised to enter mainstream psychotherapy delivery. Because VR could be part of the future of clinical psychology, it is critical to all psychotherapists that it be defined broadly. To ensure appropriate development of VR applications, clinicians must have a clear understanding of the opportunities and challenges it will provide in professional practice. This review outlines the current state of clinical research relevant to the development of virtual environments for use in psychotherapy. In particular, the paper focuses its analysis on both actual applications of VR in clinical psychology and how different clinical perspectives can use this approach to improve the process of therapeutic change.", "title": "" }, { "docid": "b2c265eb287b95bf87ecf38a5a4aa97b", "text": "Photographs of hazy scenes typically suffer having low contrast and offer a limited visibility of the scene. This article describes a new method for single-image dehazing that relies on a generic regularity in natural images where pixels of small image patches typically exhibit a 1D distribution in RGB color space, known as color-lines. We derive a local formation model that explains the color-lines in the context of hazy scenes and use it for recovering the scene transmission based on the lines' offset from the origin. The lack of a dominant color-line inside a patch or its lack of consistency with the formation model allows us to identify and avoid false predictions. Thus, unlike existing approaches that follow their assumptions across the entire image, our algorithm validates its hypotheses and obtains more reliable estimates where possible.\n In addition, we describe a Markov random field model dedicated to producing complete and regularized transmission maps given noisy and scattered estimates. Unlike traditional field models that consist of local coupling, the new model is augmented with long-range connections between pixels of similar attributes. These connections allow our algorithm to properly resolve the transmission in isolated regions where nearby pixels do not offer relevant information.\n An extensive evaluation of our method over different types of images and its comparison to state-of-the-art methods over established benchmark images show a consistent improvement in the accuracy of the estimated scene transmission and recovered haze-free radiances.", "title": "" }, { "docid": "559be3dd29ae8f6f9a9c99951c82a8d3", "text": "This paper presents a comprehensive literature review on environment perception for intelligent vehicles. The state-of-the-art algorithms and modeling methods for intelligent vehicles are given, with a summary of their pros and cons. A special attention is paid to methods for lane and road detection, traffic sign recognition, vehicle tracking, behavior analysis, and scene understanding. In addition, we provide information about datasets, common performance analysis, and perspectives on future research directions in this area.", "title": "" }, { "docid": "5c872c3538d2f70c63bd3b39d696c2f4", "text": "Massive pulmonary embolism (PE) is characterized by systemic hypotension (defined as a systolic arterial pressure < 90 mm Hg or a drop in systolic arterial pressure of at least 40 mm Hg for at least 15 min which is not caused by new onset arrhythmias) or shock (manifested by evidence of tissue hypoperfusion and hypoxia, including an altered level of consciousness, oliguria, or cool, clammy extremities). Massive pulmonary embolism has a high mortality rate despite advances in diagnosis and therapy. A subgroup of patients with nonmassive PE who are hemodynamically stable but with right ventricular (RV) dysfunction or hypokinesis confirmed by echocardiography is classified as submassive PE. Their prognosis is different from that of others with non-massive PE and normal RV function. This article attempts to review the evidence-based risk stratification, diagnosis, initial stabilization, and management of massive and nonmassive pulmonary embolism.", "title": "" }, { "docid": "72ee3bf58497eddeda11f19488fc8e55", "text": "People can benefit from disclosing negative emotions or stigmatized facets of their identities, and psychologists have noted that imagery can be an effective medium for expressing difficult emotions. Social network sites like Instagram offer unprecedented opportunity for image-based sharing. In this paper, we investigate sensitive self-disclosures on Instagram and the responses they attract. We use visual and textual qualitative content analysis and statistical methods to analyze self-disclosures, associated comments, and relationships between them. We find that people use Instagram to engage in social exchange and story-telling about difficult experiences. We find considerable evidence of social support, a sense of community, and little aggression or support for harmful or pro-disease behaviors. Finally, we report on factors that influence engagement and the type of comments these disclosures attract. Personal narratives, food and beverage, references to illness, and self-appearance concerns are more likely to attract positive social support. Posts seeking support attract significantly more comments. CAUTION: This paper includes some detailed examples of content about eating disorders and self-injury illnesses.", "title": "" }, { "docid": "91365154a173be8be29ef14a3a76b08e", "text": "Fraud is a criminal practice for illegitimate gain of wealth or tampering information. Fraudulent activities are of critical concern because of their severe impact on organizations, communities as well as individuals. Over the last few years, various techniques from different areas such as data mining, machine learning, and statistics have been proposed to deal with fraudulent activities. Unfortunately, the conventional approaches display several limitations, which were addressed largely by advanced solutions proposed in the advent of Big Data. In this paper, we present fraud analysis approaches in the context of Big Data. Then, we study the approaches rigorously and identify their limits by exploiting Big Data analytics.", "title": "" }, { "docid": "f02587ac75edc7a7880131a4db077bb2", "text": "Single-unit recordings in monkeys have revealed neurons in the lateral prefrontal cortex that increase their firing during a delay between the presentation of information and its later use in behavior. Based on monkey lesion and neurophysiology studies, it has been proposed that a dorsal region of lateral prefrontal cortex is necessary for temporary storage of spatial information whereas a more ventral region is necessary for the maintenance of nonspatial information. Functional neuroimaging studies, however, have not clearly demonstrated such a division in humans. We present here an analysis of all reported human functional neuroimaging studies plotted onto a standardized brain. This analysis did not find evidence for a dorsal/ventral subdivision of prefrontal cortex depending on the type of material held in working memory, but a hemispheric organization was suggested (i.e., left-nonspatial; right-spatial). We also performed functional MRI studies in 16 normal subjects during two tasks designed to probe either nonspatial or spatial working memory, respectively. A group and subgroup analysis revealed similarly located activation in right middle frontal gyrus (Brodmann's area 46) in both spatial and nonspatial [working memory-control] subtractions. Based on another model of prefrontal organization [M. Petrides, Frontal lobes and behavior, Cur. Opin. Neurobiol., 4 (1994) 207-211], a reconsideration of the previous imaging literature data suggested that a dorsal/ventral subdivision of prefrontal cortex may depend upon the type of processing performed upon the information held in working memory.", "title": "" }, { "docid": "d5d44a76ddb04a34f395239341fe6081", "text": "Commercial eye-gaze trackers have the potential to be an important tool for quantifying the benefits of new visualization techniques. The expense of such trackers has made their use relatively infrequent in visualization studies. As such, it is difficult for researchers to compare multiple devices – obtaining several demonstration models is impractical in cost and time, and quantitative measures from real-world use are not readily available. In this paper, we present a sample protocol to determine the accuracy of a gaze-tacking device.", "title": "" }, { "docid": "a1fe2227bc9d6ddeda58ff8d137d660b", "text": "Vulnerability exploits remain an important mechanism for malware delivery, despite efforts to speed up the creation of patches and improvements in software updating mechanisms. Vulnerabilities in client applications (e.g., Browsers, multimedia players, document readers and editors) are often exploited in spear phishing attacks and are difficult to characterize using network vulnerability scanners. Analyzing their lifecycle requires observing the deployment of patches on hosts around the world. Using data collected over 5 years on 8.4 million hosts, available through Symantec's WINE platform, we present the first systematic study of patch deployment in client-side vulnerabilities. We analyze the patch deployment process of 1,593 vulnerabilities from 10 popular client applications, and we identify several new threats presented by multiple installations of the same program and by shared libraries distributed with several applications. For the 80 vulnerabilities in our dataset that affect code shared by two applications, the time between patch releases in the different applications is up to 118 days (with a median of 11 days). Furthermore, as the patching rates differ considerably among applications, many hosts patch the vulnerability in one application but not in the other one. We demonstrate two novel attacks that enable exploitation by invoking old versions of applications that are used infrequently, but remain installed. We also find that the median fraction of vulnerable hosts patched when exploits are released is at most 14%. Finally, we show that the patching rate is affected by user-specific and application-specific factors, for example, hosts belonging to security analysts and applications with an automated updating mechanism have significantly lower median times to patch.", "title": "" }, { "docid": "64ff9d7e0671f869b109a3426fbc4d2c", "text": "Weight stigma is pervasive, and a number of scholars argue that this profound stigma contributes to the negative effects of weight on psychological and physical health. Some lay individuals and health professionals assume that stigmatizing weight can actually motivate healthier behaviors and promote weight loss. However, as we review, weight stigma is consistently associated with poorer mental and physical health outcomes. In this article we propose a social identity threat model elucidating how weight stigma contributes to weight gain and poorer mental and physical health among overweight individuals. We propose that weight-based social identity threat increases physiological stress, undermines self-regulation, compromises psychological health, and increases the motivation to avoid stigmatizing domains (e.g., the gym) and escape the stigma by engaging in unhealthy weight loss behaviors. Given the prevalence of overweight and obesity in the US, weight stigma thus has the potential to undermine the health and wellbeing of millions of Americans.", "title": "" }, { "docid": "b7789464ca4cfd39672187935d95e2fa", "text": "MATLAB Toolbox functions and communication tools are developed, interfaced, and tested for the motion control of KUKA KR6-R900-SIXX.. This KUKA manipulator has a new controller version that uses KUKA.RobotSensorInterface s KUKA.RobotSensorInterface package to connect the KUKA controller with a remote PC via UDP/IP Ethernet connection. This toolbox includes many functions for initialization, networking, forward kinematics, inverse kinematics and homogeneous transformation.", "title": "" } ]
scidocsrr
82d049448ca6604fbf3346624cf322c3
Efficient 3D shape matching and retrieval using a concrete radialized spherical projection representation
[ { "docid": "eea54b2aba2f533113176c4e87e80a44", "text": "of the dissertation", "title": "" } ]
[ { "docid": "8e8dc6f3579cf4360118a4ce5550de7e", "text": "In the Internet-age, malware poses a serious and evolving threat to security, making the detection of malware of utmost concern. Many research efforts have been conducted on intelligent malware detection by applying data mining and machine learning techniques. Though great results have been obtained with these methods, most of them are built on shallow learning architectures, which are still somewhat unsatisfying for malware detection problems. In this paper, based on the Windows Application Programming Interface (API) calls extracted from the Portable Executable (PE) files, we study how a deep learning architecture using the stacked AutoEncoders (SAEs) model can be designed for intelligent malware detection. The SAEs model performs as a greedy layerwise training operation for unsupervised feature learning, followed by supervised parameter fine-tuning (e.g., weights and offset vectors). To the best of our knowledge, this is the first work that deep learning using the SAEs model based on Windows API calls is investigated in malware detection for real industrial application. A comprehensive experimental study on a real and large sample collection from Comodo Cloud Security Center is performed to compare various malware detection approaches. Promising experimental results demonstrate that our proposed method can further improve the overall performance in malware detection compared with traditional shallow learning methods.", "title": "" }, { "docid": "96b1688b19bf71e8f1981d9abe52fc2c", "text": "Biological processes are complex phenomena involving a series of events that are related to one another through various relationships. Systems that can understand and reason over biological processes would dramatically improve the performance of semantic applications involving inference such as question answering (QA) – specifically “How?” and “Why?” questions. In this paper, we present the task of process extraction, in which events within a process and the relations between the events are automatically extracted from text. We represent processes by graphs whose edges describe a set of temporal, causal and co-reference event-event relations, and characterize the structural properties of these graphs (e.g., the graphs are connected). Then, we present a method for extracting relations between the events, which exploits these structural properties by performing joint inference over the set of extracted relations. On a novel dataset containing 148 descriptions of biological processes (released with this paper), we show significant improvement comparing to baselines that disregard process structure.", "title": "" }, { "docid": "9eedeec21ab380c0466ed7edfe7c745d", "text": "In this paper, we study the effect of using-grams (sequences of words of length n) for text categorization. We use an efficient algorithm for gener ating suchn-gram features in two benchmark domains, the 20 newsgroups data set and 21,578 REU TERS newswire articles. Our results with the rule learning algorithm R IPPER indicate that, after the removal of stop words, word sequences of length 2 or 3 are most useful. Using l o er sequences reduces classification performance.", "title": "" }, { "docid": "b41f99ba59923c108c43577c9d08f3dd", "text": "I use daily prices collected from online retailers in five countries to study the impact of measurement bias on three common price stickiness statistics. Relative to previous results, I find that online prices have longer durations, with fewer price changes close to 0, and hazard functions that initially increase over time. I show that time-averaging and imputed prices in scanner and CPI data can fully explain the differences with the literature. I then report summary statistics for the duration and size of price changes using scraped data collected from 181 retailers in 31 countries.", "title": "" }, { "docid": "257c887438ec1fbbe93c8ae757fb3a61", "text": "Facial landmark detection has received much attention in recent years, with two detection paradigms emerging: local approaches, where each facial landmark is modeled individually and with the help of a shape model; and holistic approaches, where the face appearance and shape are modeled jointly. In recent years both of these approaches have shown great performance gains for facial landmark detection even under \"in-the-wild\" conditions of varying illumination, occlusion and image quality. However, their accuracy and robustness are very often reduced for profile faces where face alignment is more challenging (e.g., no more facial symmetry, less defined features and more variable background). In this paper, we present a new model, named Holistically Constrained Local Model (HCLM), which unifies local and holistic facial landmark detection by integrating head pose estimation, sparse-holistic landmark detection and dense-local landmark detection. We evaluate our new model on two publicly available datasets, 300-W and AFLW, as well as a newly introduced dataset, IJB-FL which includes a larger proportion of profile face poses. Our HCLM model shows state-of-the-art performance, especially with extreme head poses.", "title": "" }, { "docid": "f3c2663cb0341576d754bb6cd5f2c0f5", "text": "This article surveys deformable models, a promising and vigorously researched computer-assisted medical image analysis technique. Among model-based techniques, deformable models offer a unique and powerful approach to image analysis that combines geometry, physics and approximation theory. They have proven to be effective in segmenting, matching and tracking anatomic structures by exploiting (bottom-up) constraints derived from the image data together with (top-down) a priori knowledge about the location, size and shape of these structures. Deformable models are capable of accommodating the significant variability of biological structures over time and across different individuals. Furthermore, they support highly intuitive interaction mechanisms that, when necessary, allow medical scientists and practitioners to bring their expertise to bear on the model-based image interpretation task. This article reviews the rapidly expanding body of work on the development and application of deformable models to problems of fundamental importance in medical image analysis, including segmentation, shape representation, matching and motion tracking.", "title": "" }, { "docid": "3a17d60c2eb1df3bf491be3297cffe79", "text": "Received: 3 October 2009 Revised: 22 June 2011 Accepted: 3 July 2011 Abstract Studies claiming to use the Grounded theory methodology (GTM) have been quite prevalent in information systems (IS) literature. A cursory review of this literature reveals conflict in the understanding of GTM, with a variety of grounded theory approaches apparent. The purpose of this investigation was to establish what alternative grounded theory approaches have been employed in IS, and to what extent each has been used. In order to accomplish this goal, a comprehensive set of IS articles that claimed to have followed a grounded theory approach were reviewed. The articles chosen were those published in the widely acknowledged top eight IS-centric journals, since these journals most closely represent exemplar IS research. Articles for the period 1985-2008 were examined. The analysis revealed four main grounded theory approaches in use, namely (1) the classic grounded theory approach, (2) the evolved grounded theory approach, (3) the use of the grounded theory approach as part of a mixed methodology, and (4) the application of grounded theory techniques, typically for data analysis purposes. The latter has been the most common approach in IS research. The classic approach was the least often employed, with many studies opting for an evolved or mixed method approach. These and other findings are discussed and implications drawn. European Journal of Information Systems (2013) 22, 119–129. doi:10.1057/ejis.2011.35; published online 30 August 2011", "title": "" }, { "docid": "5f0e1c63d60a4bdd8af5994b25b6654d", "text": "The machine representation of floating point values has limited precision such that errors may be introduced during execution. These errors may get propagated and magnified by the following operations, leading to instability problems, e.g., control flow path may be undesirably altered and faulty output may be emitted. In this paper, we develop an on-the-fly efficient monitoring technique that can predict if an execution is stable. The technique does not explicitly compute errors as doing so incurs high overhead. Instead, it detects possible places where an error becomes substantially inflated regarding the corresponding value, and then tags the value with one bit to denote that it has an inflated error. It then tracks inflation bit propagation, taking care of operations that may cut off such propagation. It reports instability if any inflation bit reaches a critical execution point, such as a predicate, where the inflated error may induce substantial execution difference, such as different execution paths. Our experiment shows that with appropriate thresholds, the technique can correctly detect that over 99.999996% of the inputs of all the programs we studied are stable while a traditional technique relying solely on inflation detection mistakenly classifies majority of the inputs as unstable for some of the programs. Compared to the state of the art technique that is based on high precision computation and causes several hundred times slowdown, our technique only causes 7.91 times slowdown on average and can report all the true unstable executions with the appropriate thresholds.", "title": "" }, { "docid": "e62daef8b5273096e0f174c73e3674a8", "text": "A wide range of human-robot collaborative applications in diverse domains such as manufacturing, search-andrescue, health care, the entertainment industry, and social interactions, require an autonomous robot to follow its human companion. Different working environments and applications pose diverse challenges by adding constraints on the choice of sensors, the degree of autonomy, and dynamics of the person-following robot. Researchers have addressed these challenges in many ways and contributed to the development of a large body of literature. This paper provides a comprehensive overview of the literature by categorizing different aspects of person-following by autonomous robots. Also, the corresponding operational challenges are identified based on various design choices for ground, underwater, and aerial scenarios. In addition, state-of-the-art methods for perception, planning, control, and interaction are elaborately discussed and their applicability in varied operational scenarios are presented. Then, qualitative evaluations of some of the prominent methods are performed, corresponding practicalities are illustrated, and their feasibility is analyzed in terms of standard metrics. Furthermore, several prospective application areas are identified, and open problems are highlighted for future research.", "title": "" }, { "docid": "bcb52f8aa483a8717e9e82fb8ae3160f", "text": "This paper presents a dynamic task scheduling approach to executing dense linear algebra algorithms on multicore systems (either shared-memory or distributed-memory). We use a task-based library to replace the existing linear algebra subroutines such as PBLAS to transparently provide the same interface and computational function as the ScaLAPACK library. Linear algebra programs are written with the task-based library and executed by a dynamic runtime system. We mainly focus our runtime system design on the metric of performance scalability. We propose a distributed algorithm to solve data dependences without process cooperation. We have implemented the runtime system and applied it to three linear algebra algorithms: Cholesky, LU, and QR factorizations. Our experiments on both shared-memory machines (16, 32 cores) and distributed-memory machines (1024 cores) demonstrate that our runtime system is able to achieve good scalability. Furthermore, we provide analytical analysis to show why the tiled algorithms are scalable and the expected execution time.", "title": "" }, { "docid": "46ab85859bd3966b243db79696a236f0", "text": "The general purpose optimization method known as Particle Swarm Optimization (PSO) has received much attention in past years, with many attempts to find the variant that performs best on a wide variety of optimization problems. The focus of past research has been with making the PSO method more complex, as this is frequently believed to increase its adaptability to other optimization problems. This study takes the opposite approach and simplifies the PSO method. To compare the efficacy of the original PSO and the simplified variant here, an easy technique is presented for efficiently tuning their behavioural parameters. The technique works by employing an overlaid meta-optimizer, which is capable of simultaneously tuning parameters with regard to multiple optimization problems, whereas previous approaches to meta-optimization have tuned behavioural parameters to work well on just a single optimization problem. It is then found that the PSO method and its simplified variant not only have comparable performance for optimizing a number of Artificial Neural Network problems, but the simplified variant appears to offer a small improvement in some cases.", "title": "" }, { "docid": "8d3a65d1dcf04773839a9ac4de0014ac", "text": "This paper proposes an energy-efficient deep inmemory architecture for NAND flash (DIMA-F) to perform machine learning and inference algorithms on NAND flash memory. Algorithms for data analytics, inference, and decision-making require processing of large data volumes and are hence limited by data access costs. DIMA-F achieves energy savings and throughput improvement for such algorithms by reading and processing data in the analog domain at the periphery of NAND flash memory. This paper also provides behavioral models of DIMA-F that can be used for analysis and large scale system simulations in presence of circuit non-idealities and variations. DIMA-F is studied in the context of linear support vector machines and knearest neighbor for face detection and recognition, respectively. An estimated 8×-to-23× reduction in energy and 9×-to-15× improvement in throughput resulting in EDP gains up to 345× over the conventional NAND flash architecture incorporating an external digital ASIC for computation.", "title": "" }, { "docid": "0a63a875b57b963372640f8fb527bd5c", "text": "KEMI-TORNIO UNIVERSITY OF APPLIED SCIENCES Degree programme: Business Information Technology Writer: Guo, Shuhang Thesis title: Analysis and evaluation of similarity metrics in collaborative filtering recommender system Pages (of which appendix): 62 (1) Date: May 15, 2014 Thesis instructor: Ryabov, Vladimir This research is focused on the field of recommender systems. The general aims of this thesis are to summary the state-of-the-art in recommendation systems, evaluate the efficiency of the traditional similarity metrics with varies of data sets, and propose an ideology to model new similarity metrics. The literatures on recommender systems were studied for summarizing the current development in this filed. The implementation of the recommendation and evaluation was achieved by Apache Mahout which provides an open source platform of recommender engine. By importing data information into the project, a customized recommender engine was built. Since the recommending results of collaborative filtering recommender significantly rely on the choice of similarity metrics and the types of the data, several traditional similarity metrics provided in Apache Mahout were examined by the evaluator offered in the project with five data sets collected by some academy groups. From the evaluation, I found out that the best performance of each similarity metric was achieved by optimizing the adjustable parameters. The features of each similarity metric were obtained and analyzed with practical data sets. In addition, an ideology by combining two traditional metrics was proposed in the thesis and it was proven applicable and efficient by the metrics combination of Pearson correlation and Euclidean distance. The observation and evaluation of traditional similarity metrics with practical data is helpful to understand their features and suitability, from which new models can be created. Besides, the ideology proposed for modeling new similarity metrics can be found useful both theoretically and practically.", "title": "" }, { "docid": "5f365973899e33de3052dda238db13c1", "text": "The global threat to public health posed by emerging multidrug-resistant bacteria in the past few years necessitates the development of novel approaches to combat bacterial infections. Endolysins encoded by bacterial viruses (or phages) represent one promising avenue of investigation. These enzyme-based antibacterials efficiently kill Gram-positive bacteria upon contact by specific cell wall hydrolysis. However, a major hurdle in their exploitation as antibacterials against Gram-negative pathogens is the impermeable lipopolysaccharide layer surrounding their cell wall. Therefore, we developed and optimized an approach to engineer these enzymes as outer membrane-penetrating endolysins (Artilysins), rendering them highly bactericidal against Gram-negative pathogens, including Pseudomonas aeruginosa and Acinetobacter baumannii. Artilysins combining a polycationic nonapeptide and a modular endolysin are able to kill these (multidrug-resistant) strains in vitro with a 4 to 5 log reduction within 30 min. We show that the activity of Artilysins can be further enhanced by the presence of a linker of increasing length between the peptide and endolysin or by a combination of both polycationic and hydrophobic/amphipathic peptides. Time-lapse microscopy confirmed the mode of action of polycationic Artilysins, showing that they pass the outer membrane to degrade the peptidoglycan with subsequent cell lysis. Artilysins are effective in vitro (human keratinocytes) and in vivo (Caenorhabditis elegans). Importance: Bacterial resistance to most commonly used antibiotics is a major challenge of the 21st century. Infections that cannot be treated by first-line antibiotics lead to increasing morbidity and mortality, while millions of dollars are spent each year by health care systems in trying to control antibiotic-resistant bacteria and to prevent cross-transmission of resistance. Endolysins--enzymes derived from bacterial viruses--represent a completely novel, promising class of antibacterials based on cell wall hydrolysis. Specifically, they are active against Gram-positive species, which lack a protective outer membrane and which have a low probability of resistance development. We modified endolysins by protein engineering to create Artilysins that are able to pass the outer membrane and become active against Pseudomonas aeruginosa and Acinetobacter baumannii, two of the most hazardous drug-resistant Gram-negative pathogens.", "title": "" }, { "docid": "df4146f0b223b9bc7a983a4198589b48", "text": "Since its official introduction in 2012, the Robot Web Tools project has grown tremendously as an open-source community, enabling new levels of interoperability and portability across heterogeneous robot systems, devices, and front-end user interfaces. At the heart of Robot Web Tools is the rosbridge protocol as a general means for messaging ROS topics in a client-server paradigm suitable for wide area networks, and human-robot interaction at a global scale through modern web browsers. Building from rosbridge, this paper describes our efforts with Robot Web Tools to advance: 1) human-robot interaction through usable client and visualization libraries for more efficient development of front-end human-robot interfaces, and 2) cloud robotics through more efficient methods of transporting high-bandwidth topics (e.g., kinematic transforms, image streams, and point clouds). We further discuss the significant impact of Robot Web Tools through a diverse set of use cases that showcase the importance of a generic messaging protocol and front-end development systems for human-robot interaction.", "title": "" }, { "docid": "29cceb730e663c08e20107b6d34ced8b", "text": "Cumulative citation recommendation refers to the task of filtering a time-ordered corpus for documents that are highly relevant to a predefined set of entities. This task has been introduced at the TREC Knowledge Base Acceleration track in 2012, where two main families of approaches emerged: classification and ranking. In this paper we perform an experimental comparison of these two strategies using supervised learning with a rich feature set. Our main finding is that ranking outperforms classification on all evaluation settings and metrics. Our analysis also reveals that a ranking-based approach has more potential for future improvements.", "title": "" }, { "docid": "0b6a3b143dfccd7ca9ea09f7fa5b5e8c", "text": "Cancer has been characterized as a heterogeneous disease consisting of many different subtypes. The early diagnosis and prognosis of a cancer type have become a necessity in cancer research, as it can facilitate the subsequent clinical management of patients. The importance of classifying cancer patients into high or low risk groups has led many research teams, from the biomedical and the bioinformatics field, to study the application of machine learning (ML) methods. Therefore, these techniques have been utilized as an aim to model the progression and treatment of cancerous conditions. In addition, the ability of ML tools to detect key features from complex datasets reveals their importance. A variety of these techniques, including Artificial Neural Networks (ANNs), Bayesian Networks (BNs), Support Vector Machines (SVMs) and Decision Trees (DTs) have been widely applied in cancer research for the development of predictive models, resulting in effective and accurate decision making. Even though it is evident that the use of ML methods can improve our understanding of cancer progression, an appropriate level of validation is needed in order for these methods to be considered in the everyday clinical practice. In this work, we present a review of recent ML approaches employed in the modeling of cancer progression. The predictive models discussed here are based on various supervised ML techniques as well as on different input features and data samples. Given the growing trend on the application of ML methods in cancer research, we present here the most recent publications that employ these techniques as an aim to model cancer risk or patient outcomes.", "title": "" }, { "docid": "750a1dd126b0bb90def0bba34dc73cdd", "text": "Skinning of skeletally deformable models is extensively used for real-time animation of characters, creatures and similar objects. The standard solution, linear blend skinning, has some serious drawbacks that require artist intervention. Therefore, a number of alternatives have been proposed in recent years. All of them successfully combat some of the artifacts, but none challenge the simplicity and efficiency of linear blend skinning. As a result, linear blend skinning is still the number one choice for the majority of developers. In this article, we present a novel skinning algorithm based on linear combination of dual quaternions. Even though our proposed method is approximate, it does not exhibit any of the artifacts inherent in previous methods and still permits an efficient GPU implementation. Upgrading an existing animation system from linear to dual quaternion skinning is very easy and has a relatively minor impact on runtime performance.", "title": "" }, { "docid": "caf01ca9e0bb31bbaf3e32741637477c", "text": "Deep convolutional neural networks (DCNNs) have been used to achieve state-of-the-art performance on many computer vision tasks (e.g., object recognition, object detection, semantic segmentation) thanks to a large repository of annotated image data. Large labeled datasets for other sensor modalities, e.g., multispectral imagery (MSI), are not available due to the large cost and manpower required. In this paper, we adapt state-of-the-art DCNN frameworks in computer vision for semantic segmentation for MSI imagery. To overcome label scarcity for MSI data, we substitute real MSI for generated synthetic MSI in order to initialize a DCNN framework. We evaluate our network initialization scheme on the new RIT-18 dataset that we present in this paper. This dataset contains very-high resolution MSI collected by an unmanned aircraft system. The models initialized with synthetic imagery were less prone to over-fitting and provide a state-of-the-art baseline for future work.", "title": "" }, { "docid": "eb0d9e1ebb725c5c14bfaec29faed500", "text": "STUDY DESIGN\nMulticentered randomized controlled trial.\n\n\nOBJECTIVES\nTo determine if previously validated low back pain (LBP) subgroups respond differently to contrasting exercise prescriptions.\n\n\nSUMMARY OF BACKGROUND DATA\nThe role of \"patient-specific\" exercises in managing LBP is controversial.\n\n\nMETHODS\nA total of 312 acute, subacute, and chronic patients, including LBP-only and sciatica, underwent a standardized mechanical assessment classifying them by their pain response, specifically eliciting either a \"directional preference\" (DP) (i.e., an immediate, lasting improvement in pain from performing either repeated lumbar flexion, extension, or sideglide/rotation tests), or no DP. Only DP subjects were randomized to: 1) directional exercises \"matching\" their preferred direction (DP), 2) exercises directionally \"opposite\" their DP, or 3) \"nondirectional\" exercises. Outcome measures included pain intensity, location, disability, medication use, degree of recovery, depression, and work interference.\n\n\nRESULTS\nA DP was elicited in 74% (230) of subjects. One third of both the opposite and non-directionally treated subjects withdrew within 2 weeks because of no improvement or worsening (no matched subject withdrew). Significantly greater improvements occurred in matched subjects compared with both other treatment groups in every outcome (P values <0.001), including a threefold decrease in medication use.\n\n\nCONCLUSIONS\nConsistent with prior evidence, a standardized mechanical assessment identified a large subgroup of LBP patients with a DP. Regardless of subjects' direction of preference, the response to contrasting exercise prescriptions was significantly different: exercises matching subjects' DP significantly and rapidly decreased pain and medication use and improved in all other outcomes. If repeatable, such subgroup validation has important implications for LBP management.", "title": "" } ]
scidocsrr
a78be6c9a0927113b9fa7925014fab58
End-to-end visual speech recognition with LSTMS
[ { "docid": "6af09f57f2fcced0117dca9051917a0d", "text": "We present a novel per-dimension learning rate method for gradient descent called ADADELTA. The method dynamically adapts over time using only first order information and has minimal computational overhead beyond vanilla stochastic gradient descent. The method requires no manual tuning of a learning rate and appears robust to noisy gradient information, different model architecture choices, various data modalities and selection of hyperparameters. We show promising results compared to other methods on the MNIST digit classification task using a single machine and on a large scale voice dataset in a distributed cluster environment.", "title": "" }, { "docid": "7d78ca30853ed8a84bbb56fe82e3b9ba", "text": "Deep belief networks (DBN) have shown impressive improvements over Gaussian mixture models for automatic speech recognition. In this work we use DBNs for audio-visual speech recognition; in particular, we use deep learning from audio and visual features for noise robust speech recognition. We test two methods for using DBNs in a multimodal setting: a conventional decision fusion method that combines scores from single-modality DBNs, and a novel feature fusion method that operates on mid-level features learned by the single-modality DBNs. On a continuously spoken digit recognition task, our experiments show that these methods can reduce word error rate by as much as 21% relative over a baseline multi-stream audio-visual GMM/HMM system.", "title": "" } ]
[ { "docid": "14b48440dd0b797cec04bbc249ee9940", "text": "T cells use integrins in essentially all of their functions. They use integrins to migrate in and out of lymph nodes and, following infection, to migrate into other tissues. At the beginning of an immune response, integrins also participate in the immunological synapse formed between T cells and antigen-presenting cells. Because the ligands for integrins are widely expressed, integrin activity on T cells must be tightly controlled. Integrins become active following signalling through other membrane receptors, which cause both affinity alteration and an increase in integrin clustering. Lipid raft localization may increase integrin activity. Signalling pathways involving ADAP, Vav-1 and SKAP-55, as well as Rap1 and RAPL, cause clustering of leukocyte function-associated antigen-1 (LFA-1; integrin alphaLbeta2). T-cell integrins can also signal, and the pathways dedicated to the migratory activity of T cells have been the most investigated so far. Active LFA-1 causes T-cell attachment and lamellipodial movement induced by myosin light chain kinase at the leading edge, whereas RhoA and ROCK cause T-cell detachment at the trailing edge. Another important signalling pathway acts through CasL/Crk, which might regulate the activity of the GTPases Rac and Rap1 that have important roles in T-cell migration.", "title": "" }, { "docid": "541075ddb29dd0acdf1f0cf3784c220a", "text": "Many recent works on knowledge distillation have provided ways to transfer the knowledge of a trained network for improving the learning process of a new one, but finding a good technique for knowledge distillation is still an open problem. In this paper, we provide a new perspective based on a decision boundary, which is one of the most important component of a classifier. The generalization performance of a classifier is closely related to the adequacy of its decision boundary, so a good classifier bears a good decision boundary. Therefore, transferring information closely related to the decision boundary can be a good attempt for knowledge distillation. To realize this goal, we utilize an adversarial attack to discover samples supporting a decision boundary. Based on this idea, to transfer more accurate information about the decision boundary, the proposed algorithm trains a student classifier based on the adversarial samples supporting the decision boundary. Experiments show that the proposed method indeed improves knowledge distillation and achieves the stateof-the-arts performance. 1", "title": "" }, { "docid": "c071d5a7ff1dbfd775e9ffdee1b07662", "text": "OBJECTIVES\nComplete root coverage is the primary objective to be accomplished when treating gingival recessions in patients with aesthetic demands. Furthermore, in order to satisfy patient demands fully, root coverage should be accomplished by soft tissue, the thickness and colour of which should not be distinguishable from those of adjacent soft tissue. The aim of the present split-mouth study was to compare the treatment outcome of two surgical approaches of the bilaminar procedure in terms of (i) root coverage and (ii) aesthetic appearance of the surgically treated sites.\n\n\nMATERIAL AND METHODS\nFifteen young systemically and periodontally healthy subjects with two recession-type defects of similar depth affecting contralateral teeth in the aesthetic zone of the maxilla were enrolled in the study. All recessions fall into Miller class I or II. Randomization for test and control treatment was performed by coin toss immediately prior to surgery. All defects were treated with a bilaminar surgical technique: differences between test and control sites resided in the size, thickness and positioning of the connective tissue graft. The clinical re-evaluation was made 1 year after surgery.\n\n\nRESULTS\nThe two bilaminar techniques resulted in a high percentage of root coverage (97.3% in the test and 94.7% in the control group) and complete root coverage (gingival margin at the cemento-enamel junction (CEJ)) (86.7% in the test and 80% in the control teeth), with no statistically significant difference between them. Conversely, better aesthetic outcome and post-operative course were indicated by the patients for test compared to control sites.\n\n\nCONCLUSIONS\nThe proposed modification of the bilaminar technique improved the aesthetic outcome. The reduced size and minimal thickness of connective tissue graft, together with its positioning apical to the CEJ, facilitated graft coverage by means of the coronally advanced flap.", "title": "" }, { "docid": "ab50f458d919ba3ac3548205418eea62", "text": "Department of Microbiology, School of Life Sciences, Bharathidasan University, Tiruchirappali 620 024, Tamilnadu, India. Department of Medical Biotechnology, Sri Ramachandra University, Porur, Chennai 600 116, Tamilnadu, India. CAS Marine Biology, Annamalai University, Parangipettai 608 502, Tamilnadu, India. Department of Zoology, DDE, Annamalai University, Annamalai Nagar 608 002, Tamilnadu, India Asian Pacific Journal of Tropical Disease (2012)S291-S295", "title": "" }, { "docid": "531ac7d6500373005bae464c49715288", "text": "We have used acceleration sensors to monitor the heart motion during surgery. A three-axis accelerometer was made from two commercially available two-axis sensors, and was used to measure the heart motion in anesthetized pigs. The heart moves due to both respiration and heart beating. The heart beating was isolated from respiration by high-pass filtering at 1.0 Hz, and heart wall velocity and position were calculated by numerically integrating the filtered acceleration traces. The resulting curves reproduced the heart motion in great detail, noise was hardly visible. Events that occurred during the measurements, e.g. arrhythmias and fibrillation, were recognized in the curves, and confirmed by comparison with synchronously recorded ECG data. We conclude that acceleration sensors are able to measure heart motion with good resolution, and that such measurements can reveal patterns that may be an indication of heart circulation failure.", "title": "" }, { "docid": "b5eafe60989c0c4265fa910c79bbce41", "text": "Little research has addressed IT professionals’ script debugging strategies, or considered whether there may be gender differences in these strategies. What strategies do male and female scripters use and what kinds of mechanisms do they employ to successfully fix bugs? Also, are scripters’ debugging strategies similar to or different from those of spreadsheet debuggers? Without the answers to these questions, tool designers do not have a target to aim at for supporting how male and female scripters want to go about debugging. We conducted a think-aloud study to bridge this gap. Our results include (1) a generalized understanding of debugging strategies used by spreadsheet users and scripters, (2) identification of the multiple mechanisms scripters employed to carry out the strategies, and (3) detailed examples of how these debugging strategies were employed by males and females to successfully fix bugs.", "title": "" }, { "docid": "8505afb27c5ef73baeaa53dfe1c337ae", "text": "The Osprey (Pandion haliaetus) is one of only six bird species with an almost world-wide distribution. We aimed at clarifying its phylogeographic structure and elucidating its taxonomic status (as it is currently separated into four subspecies). We tested six biogeographical scenarios to explain how the species’ distribution and differentiation took place in the past and how such a specialized raptor was able to colonize most of the globe. Using two mitochondrial genes (cyt b and ND2), the Osprey appeared structured into four genetic groups representing quasi non-overlapping geographical regions. The group Indo-Australasia corresponds to the cristatus ssp, as well as the group Europe-Africa to the haliaetus ssp. In the Americas, we found a single lineage for both carolinensis and ridgwayi ssp, whereas in north-east Asia (Siberia and Japan), we discovered a fourth new lineage. The four lineages are well differentiated, contrasting with the low genetic variability observed within each clade. Historical demographic reconstructions suggested that three of the four lineages experienced stable trends or slight demographic increases. Molecular dating estimates the initial split between lineages at about 1.16 Ma ago, in the Early Pleistocene. Our biogeographical inference suggests a pattern of colonization from the American continent towards the Old World. Populations of the Palearctic would represent the last outcomes of this colonization. At a global scale the Osprey complex may be composed of four different Evolutionary Significant Units, which should be treated as specific management units. Our study brought essential genetic clarifications, which have implications for conservation strategies in identifying distinct lineages across which birds should not be artificially moved through exchange/reintroduction schemes.", "title": "" }, { "docid": "eb0ec729796a93f36d348e70e3fa9793", "text": "This paper proposes a novel approach to measure the object size using a regular digital camera. Nowadays, the remote object-size measurement is very crucial to many multimedia applications. Our proposed computer-aided automatic object-size measurement technique is based on a new depth-information extraction (range finding) scheme using a regular digital camera. The conventional range finders are often carried out using the passive method such as stereo cameras or the active method such as ultrasonic and infrared equipment. They either require the cumbersome set-up or deal with point targets only. The proposed approach requires only a digital camera with certain image processing techniques and relies on the basic principles of visible light. Experiments are conducted to evaluate the performance of our proposed new object-size measurement mechanism. The average error-percentage of this method is below 2%. It demonstrates the striking effectiveness of our proposed new method.", "title": "" }, { "docid": "21961041e3bf66d7e3f004c65ddc5da2", "text": "A novel high step-up converter is proposed for a front-end photovoltaic system. Through a voltage multiplier module, an asymmetrical interleaved high step-up converter obtains high step-up gain without operating at an extreme duty ratio. The voltage multiplier module is composed of a conventional boost converter and coupled inductors. An extra conventional boost converter is integrated into the first phase to achieve a considerably higher voltage conversion ratio. The two-phase configuration not only reduces the current stress through each power switch, but also constrains the input current ripple, which decreases the conduction losses of metal-oxide-semiconductor field-effect transistors (MOSFETs). In addition, the proposed converter functions as an active clamp circuit, which alleviates large voltage spikes across the power switches. Thus, the low-voltage-rated MOSFETs can be adopted for reductions of conduction losses and cost. Efficiency improves because the energy stored in leakage inductances is recycled to the output terminal. Finally, the prototype circuit with a 40-V input voltage, 380-V output, and 1000- W output power is operated to verify its performance. The highest efficiency is 96.8%.", "title": "" }, { "docid": "2a818337c472caa1e693edb05722954b", "text": "UNLABELLED\nThis study focuses on the relationship between classroom ventilation rates and academic achievement. One hundred elementary schools of two school districts in the southwest United States were included in the study. Ventilation rates were estimated from fifth-grade classrooms (one per school) using CO(2) concentrations measured during occupied school days. In addition, standardized test scores and background data related to students in the classrooms studied were obtained from the districts. Of 100 classrooms, 87 had ventilation rates below recommended guidelines based on ASHRAE Standard 62 as of 2004. There is a linear association between classroom ventilation rates and students' academic achievement within the range of 0.9-7.1 l/s per person. For every unit (1 l/s per person) increase in the ventilation rate within that range, the proportion of students passing standardized test (i.e., scoring satisfactory or above) is expected to increase by 2.9% (95%CI 0.9-4.8%) for math and 2.7% (0.5-4.9%) for reading. The linear relationship observed may level off or change direction with higher ventilation rates, but given the limited number of observations, we were unable to test this hypothesis. A larger sample size is needed for estimating the effect of classroom ventilation rates higher than 7.1 l/s per person on academic achievement.\n\n\nPRACTICAL IMPLICATIONS\nThe results of this study suggest that increasing the ventilation rates toward recommended guideline ventilation rates in classrooms should translate into improved academic achievement of students. More studies are needed to fully understand the relationships between ventilation rate, other indoor environmental quality parameters, and their effects on students' health and achievement. Achieving the recommended guidelines and pursuing better understanding of the underlying relationships would ultimately support both sustainable and productive school environments for students and personnel.", "title": "" }, { "docid": "bcab7b2f12f72c6db03446046586381e", "text": "The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by potential customers. While preventive controls for security and privacy are actively researched, there is still little focus on detective controls related to cloud accountability and audit ability. The complexity resulting from large-scale virtualization and data distribution carried out in current clouds has revealed an urgent research agenda for cloud accountability, as has the shift in focus of customer concerns from servers to data. This paper discusses key issues and challenges in achieving a trusted cloud through the use of detective controls, and presents the Trust Cloud framework, which addresses accountability in cloud computing via technical and policy-based approaches.", "title": "" }, { "docid": "8f449e62b300c4c8ff62306d02f2f820", "text": "The effects of adrenal corticosteroids on subsequent adrenocorticotropin secretion are complex. Acutely (within hours), glucocorticoids (GCs) directly inhibit further activity in the hypothalamo-pituitary-adrenal axis, but the chronic actions (across days) of these steroids on brain are directly excitatory. Chronically high concentrations of GCs act in three ways that are functionally congruent. (i) GCs increase the expression of corticotropin-releasing factor (CRF) mRNA in the central nucleus of the amygdala, a critical node in the emotional brain. CRF enables recruitment of a chronic stress-response network. (ii) GCs increase the salience of pleasurable or compulsive activities (ingesting sucrose, fat, and drugs, or wheel-running). This motivates ingestion of \"comfort food.\" (iii) GCs act systemically to increase abdominal fat depots. This allows an increased signal of abdominal energy stores to inhibit catecholamines in the brainstem and CRF expression in hypothalamic neurons regulating adrenocorticotropin. Chronic stress, together with high GC concentrations, usually decreases body weight gain in rats; by contrast, in stressed or depressed humans chronic stress induces either increased comfort food intake and body weight gain or decreased intake and body weight loss. Comfort food ingestion that produces abdominal obesity, decreases CRF mRNA in the hypothalamus of rats. Depressed people who overeat have decreased cerebrospinal CRF, catecholamine concentrations, and hypothalamo-pituitary-adrenal activity. We propose that people eat comfort food in an attempt to reduce the activity in the chronic stress-response network with its attendant anxiety. These mechanisms, determined in rats, may explain some of the epidemic of obesity occurring in our society.", "title": "" }, { "docid": "3e691cf6055eb564dedca955b816a654", "text": "Many Internet-based services have already been ported to the mobile-based environment, embracing the new services is therefore critical to deriving revenue for services providers. Based on a valence framework and trust transfer theory, we developed a trust-based customer decision-making model of the non-independent, third-party mobile payment services context. We empirically investigated whether a customer’s established trust in Internet payment services is likely to influence his or her initial trust in mobile payment services. We also examined how these trust beliefs might interact with both positive and negative valence factors and affect a customer’s adoption of mobile payment services. Our SEM analysis indicated that trust indeed had a substantial impact on the cross-environment relationship and, further, that trust in combination with the positive and negative valence determinants directly and indirectly influenced behavioral intention. In addition, the magnitudes of these effects on workers and students were significantly different from each other. 2011 Elsevier B.V. All rights reserved. * Corresponding author. Tel.: +86 27 8755 8100; fax: +86 27 8755 6437. E-mail addresses: luyb@mail.hust.edu.cn (Y. Lu), xtysq@smail.hust.edu.cn (S. Yang), Chau@business.hku.hk (Patrick Y.K. Chau), skysharecao@163.com (Y. Cao). 1 Tel.: +86 27 8755 6448. 2 Tel.: +852 2859 1025. 3 Tel.: +86 27 8755 8100.", "title": "" }, { "docid": "84a01029714dfef5d14bc4e2be78921e", "text": "Integrating frequent pattern mining with interactive visualization for temporal event sequence analysis poses many interesting research questions and challenges. We review and reflect on some of these challenges based on our experiences working on event sequence data from two domains: web analytics and application logs. These challenges can be organized using a three-stage framework: pattern mining, pattern pruning and interactive visualization.", "title": "" }, { "docid": "d0c940a651b1231c6ef4f620e7acfdcc", "text": "Harvard Business School Working Paper Number 05-016. Working papers are distributed in draft form for purposes of comment and discussion only. They may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author(s). Abstract Much recent research has pointed to the critical role of architecture in the development of a firm's products, services and technical capabilities. A common theme in these studies is the notion that specific characteristics of a product's design – for example, the degree of modularity it exhibits – can have a profound effect on among other things, its performance, the flexibility of the process used to produce it, the value captured by its producer, and the potential for value creation at the industry level. Unfortunately, this stream of work has been limited by the lack of appropriate tools, metrics and terminology for characterizing key attributes of a product's architecture in a robust fashion. As a result, there is little empirical evidence that the constructs emerging in the literature have power in predicting the phenomena with which they are associated. This paper reports data from a research project which seeks to characterize the differences in design structure between complex software products. In particular, we adopt a technique based upon Design Structure Matrices (DSMs) to map the dependencies between different elements of a design then develop metrics that allow us to compare the structures of these different DSMs. We demonstrate the power of this approach in two ways: First, we compare the design structures of two complex software products – the Linux operating system and the Mozilla web browser – that were developed via contrasting modes of organization: specifically, open source versus proprietary development. We find significant differences in their designs, consistent with an interpretation that Linux possesses a more \" modular \" architecture. We then track the evolution of Mozilla, paying particular attention to a major \" redesign \" effort that took place several months after its release as an open source product. We show that this effort resulted in a design structure that was significantly more modular than its predecessor, and indeed, more modular than that of a comparable version of Linux. Our findings demonstrate that it is possible to characterize the structure of complex product designs and draw meaningful conclusions about the precise ways in which they differ. We provide a description of a set of tools …", "title": "" }, { "docid": "0dbca0a2aec1b27542463ff80fc4f59d", "text": "An emerging research area named Learning-to-Rank (LtR) has shown that effective solutions to the ranking problem can leverage machine learning techniques applied to a large set of features capturing the relevance of a candidate document for the user query. Large-scale search systems must however answer user queries very fast, and the computation of the features for candidate documents must comply with strict back-end latency constraints. The number of features cannot thus grow beyond a given limit, and Feature Selection (FS) techniques have to be exploited to find a subset of features that both meets latency requirements and leads to high effectiveness of the trained models. In this paper, we propose three new algorithms for FS specifically designed for the LtR context where hundreds of continuous or categorical features can be involved. We present a comprehensive experimental analysis conducted on publicly available LtR datasets and we show that the proposed strategies outperform a well-known state-of-the-art competitor.", "title": "" }, { "docid": "5757d96fce3e0b3b3303983b15d0030d", "text": "Malicious applications pose a threat to the security of the Android platform. The growing amount and diversity of these applications render conventional defenses largely ineffective and thus Android smartphones often remain unprotected from novel malware. In this paper, we propose DREBIN, a lightweight method for detection of Android malware that enables identifying malicious applications directly on the smartphone. As the limited resources impede monitoring applications at run-time, DREBIN performs a broad static analysis, gathering as many features of an application as possible. These features are embedded in a joint vector space, such that typical patterns indicative for malware can be automatically identified and used for explaining the decisions of our method. In an evaluation with 123,453 applications and 5,560 malware samples DREBIN outperforms several related approaches and detects 94% of the malware with few false alarms, where the explanations provided for each detection reveal relevant properties of the detected malware. On five popular smartphones, the method requires 10 seconds for an analysis on average, rendering it suitable for checking downloaded applications directly on the device.", "title": "" }, { "docid": "3038afba11844c31fefc30a8245bc61c", "text": "Frame duplication is to duplicate a sequence of consecutive frames and insert or replace to conceal or imitate a specific event/content in the same source video. To automatically detect the duplicated frames in a manipulated video, we propose a coarse-to-fine deep convolutional neural network framework to detect and localize the frame duplications. We first run an I3D network [2] to obtain the most candidate duplicated frame sequences and selected frame sequences, and then run a Siamese network with ResNet network [6] to identify each pair of a duplicated frame and the corresponding selected frame. We also propose a heuristic strategy to formulate the video-level score. We then apply our inconsistency detector fine-tuned on the I3D network to distinguish duplicated frames from selected frames. With the experimental evaluation conducted on two video datasets, we strongly demonstrate that our proposed method outperforms the current state-of-the-art methods.", "title": "" }, { "docid": "af5fe4ecd02d320477e2772d63b775dd", "text": "Background: Blockchain technology is recently receiving a lot of attention from researchers as well as from many different industries. There are promising application areas for the logistics sector like digital document exchange and tracking of goods, but there is no existing research on these topics. This thesis aims to contribute to the research of information systems in logistics in combination with Blockchain technology. Purpose: The purpose of this research is to explore the capabilities of Blockchain technology regarding the concepts of privacy, transparency and trust. In addition, the requirements of information systems in logistics regarding the mentioned concepts are studied and brought in relation to the capabilities of Blockchain technology. The goal is to contribute to a theoretical discussion on the role of Blockchain technology in improving the flow of goods and the flow of information in logistics. Method: The research is carried out in the form of an explorative case study. Blockchain technology has not been studied previously in a logistics setting and therefore, an inductive research approach is chosen by using thematic analysis. The case study is based on a pilot test which had the goal to facilitate a Blockchain to exchange documents and track shipments. Conclusion: The findings reflect that the research on Blockchain technology is still in its infancy and that it still takes several years to facilitate the technology in a productive environment. The Blockchain has the capabilities to meet the requirements of information systems in logistics due to the ability to create trust and establish an organisation overarching platform to exchange information.", "title": "" } ]
scidocsrr
e528444b97611681ff7a631ae3d14881
From Images to Sentences through Scene Description Graphs using Commonsense Reasoning and Knowledge
[ { "docid": "a44f0cbe9675be06439197053a96c277", "text": "This paper presents a novel approach to utilizing high level knowledge for the problem of scene recognition in an active vision framework, which we call active scene recognition. In traditional approaches, high level knowledge is used in the post-processing to combine the outputs of the object detectors to achieve better classification performance. In contrast, the proposed approach employs high level knowledge actively by implementing an interaction between a reasoning module and a sensory module (Figure 1). Following this paradigm, we implemented an active scene recognizer and evaluated it with a dataset of 20 scenes and 100+ objects. We also extended it to the analysis of dynamic scenes for activity recognition with attributes. Experiments demonstrate the effectiveness of the active paradigm in introducing attention and additional constraints into the sensing process.", "title": "" }, { "docid": "86feba94dcc3e89097af2e50e5b7e908", "text": "Concerned about the Turing test’s ability to correctly evaluate if a system exhibits human-like intelligence, the Winograd Schema Challenge (WSC) has been proposed as an alternative. A Winograd Schema consists of a sentence and a question. The answers to the questions are intuitive for humans but are designed to be difficult for machines, as they require various forms of commonsense knowledge about the sentence. In this paper we demonstrate our progress towards addressing the WSC. We present an approach that identifies the knowledge needed to answer a challenge question, hunts down that knowledge from text repositories, and then reasons with them to come up with the answer. In the process we develop a semantic parser (www.kparser.org). We show that our approach works well with respect to a subset of Winograd schemas.", "title": "" } ]
[ { "docid": "123ce3cc93be3fbdfcc09e9fd20ca368", "text": "Many self-report measures of attitudes, beliefs, personality, and pathology include items whose responses can be easily manipulated or distorted, as an example in order to give a positive impression to others, to obtain financial compensation, to avoid being charged with a crime, to get a job, or else. This fact confronts both researchers and practitioners with the crucial problem of biases yielded by the usage of standard statistical models. The current paper presents three empirical applications to the issue of faking of a recent probabilistic perturbation procedure called Sample Generation by Replacement (SGR; Lombardi and Pastore, 2012). With the intent to study the behavior of some statistics under fake perturbation and data reconstruction processes, ad-hoc faking scenarios were implemented and tested. Overall, results proved that SGR could be successfully applied both in the case of research designs traditionally proposed in order to deal with faking (e.g., use of fake-detecting scales, experimentally induced faking, or contrasting applicants vs. incumbents), and in the case of ecological research settings, where no information as regards faking could be collected by the researcher or the practitioner. Implications and limitations are presented and discussed.", "title": "" }, { "docid": "9150e9dca9dfec2db0aa214406b99371", "text": "Hungarian is the stereotype of morphologically rich and free word order languages. Here, we introduce magyarlanc, a natural language toolkit developed for the linguistic preprocessing – segmentation, morphological analysis, POS-tagging and dependency parsing – of Hungarian texts. We hope that the free availability of the toolkit fosters the research not just on the Hungarian language but on all the morphologically rich languages in general. The main novelties of the tool are the application of a new harmonized morphological coding system of Hungarian, the datadriven approach and the integration of a dependency parser. The system is implemented in JAVA, hence it can be used in a platform-independent way.", "title": "" }, { "docid": "bdfc273cfec2315c26e05376345ead4c", "text": "The use of ROC (Receiver Operating Characteristics) analysis as a tool for evaluating the performance of classification models in machine learning has been increasing in the last decade. Among the most notable advances in this area are the extension of two-class ROC analysis to the multi-class case as well as the employment of ROC analysis in cost-sensitive learning. Methods now exist which take instance-varying costs into account. The purpose of our paper is to present a survey of this field with the aim of gathering important achievements in one place. In the paper, we present application areas of the ROC analysis in machine learning, describe its problems and challenges and provide a summarized list of alternative approaches to ROC analysis. In addition to presented theory, we also provide a couple of examples intended to illustrate the described approaches.", "title": "" }, { "docid": "b6715e3ee8b2876b479522c03c1d674a", "text": "Normalizing for atmospheric and land surface bidirectional reflectance distribution function (BRDF) effects is essential in satellite data processing. It is important both for a single scene when the combination of land covers, sun, and view angles create anisotropy and for multiple scenes in which the sun angle changes. As a consequence, it is important for inter-sensor calibration and comparison. Procedures based on physics-based models have been applied successfully with the Moderate Resolution Imaging Spectroradiometer (MODIS) data. For Landsat and other higher resolution data, similar options exist. However, the estimation of BRDF models using internal fitting is not available due to the smaller variation of view and solar angles and infrequent revisits. In this paper, we explore the potential for developing operational procedures to correct Landsat data using coupled physics-based atmospheric and BRDF models. The process was realized using BRDF shape functions derived from MODIS with the MODTRAN 4 radiative transfer model. The atmospheric and BRDF correction algorithm was tested for reflectance factor estimation using Landsat data for two sites with different land covers in Australia. The Landsat reflectance values had a good agreement with ground based spectroradiometer measurements. In addition, overlapping images from adjacent paths in Queensland, Australia, were also used to validate the BRDF correction. The results clearly show that the algorithm can remove most of the BRDF effect without empirical adjustment. The comparison between normalized Landsat and MODIS reflectance factor also shows a good relationship, indicating that cross calibration between the two sensors is achievable.", "title": "" }, { "docid": "de682d74b30e699d7185765f8b235e00", "text": "A key goal of research in conversational systems is to train an interactive agent to help a user with a task. Human conversation, however, is notoriously incomplete, ambiguous, and full of extraneous detail. To operate effectively, the agent must not only understand what was explicitly conveyed but also be able to reason in the presence of missing or unclear information. When unable to resolve ambiguities on its own, the agent must be able to ask the user for the necessary clarifications and incorporate the response in its reasoning. Motivated by this problem we introduce QRAQ (Query, Reason, and Answer Questions), a new synthetic domain, in which a User gives an Agent a short story and asks a challenge question. These problems are designed to test the reasoning and interaction capabilities of a learningbased Agent in a setting that requires multiple conversational turns. A good Agent should ask only non-deducible, relevant questions until it has enough information to correctly answer the User’s question. We use standard and improved reinforcement learning based memory-network architectures to solve QRAQ problems in the difficult setting where the reward signal only tells the Agent if its final answer to the challenge question is correct or not. To provide an upper-bound to the RL results we also train the same architectures using supervised information that tells the Agent during training which variables to query and the answer to the challenge question. We evaluate our architectures on four QRAQ dataset types, and scale the complexity for each along multiple dimensions.", "title": "" }, { "docid": "6adcb2f6085d70f8b3c9979da605d856", "text": "In this paper, we present a fast cyclic redundancy check (CRC) algorithm that performs CRC computation for any length of message in parallel. For a given message with any length, the algorithm first chunks the message into blocks, each of which has a fixed size equal to the degree of the generator polynomial. Then it performs CRC computation using only lookup tables among the chunked blocks in parallel and the results are combined together by XOR operations. It was feedback in the traditional implementation that makes pipelining problematic. In the proposed algorithm, we solve this problem and implement a pipelined calculation of 32-bit CRC in SMIC 0.13&#956;m CMOS technology. Our algorithm allows calculation over data that is not the full width of the input. Furthermore, the pipeline latency is very short in our algorithm, and this method allows easy scaling of the parallelism while only slightly affecting timing. The simulation results show that our proposed pipelined CRC is more efficient than the current CRC implementations.", "title": "" }, { "docid": "3059d97896f7f3239b48397856313555", "text": "Most reported spatially combined or quasioptical amplifier arrays exhibit resonant narrowband performance (<10%) and have not addressed thermal management issues. We report a waveguide-based spatial combining scheme using broadband tapered-slot transitions, capable of realizing full waveguide band coverage (40% fractional bandwidth) with good thermal properties. An X-band prototype using eight mediumpower GaAs monolithic microwave integrated circuits (MMIC’s) produced an output power of 2.4 W and 9-dB power gain at 1-dB compression, with a combining efficiency of 68% and < 1-dB gain variation over the full waveguide band (8–12 GHz).", "title": "" }, { "docid": "453191a57a9282248b0d5b8a85fa4ce0", "text": "The introduction of fast digital slide scanners that provide whole slide images has led to a revival of interest in image analysis applications in pathology. Segmentation of cells and nuclei is an important first step towards automatic analysis of digitized microscopy images. We therefore developed an automated nuclei segmentation method that works with hematoxylin and eosin (H&E) stained breast cancer histopathology images, which represent regions of whole digital slides. The procedure can be divided into four main steps: 1) pre-processing with color unmixing and morphological operators, 2) marker-controlled watershed segmentation at multiple scales and with different markers, 3) post-processing for rejection of false regions and 4) merging of the results from multiple scales. The procedure was developed on a set of 21 breast cancer cases (subset A) and tested on a separate validation set of 18 cases (subset B). The evaluation was done in terms of both detection accuracy (sensitivity and positive predictive value) and segmentation accuracy (Dice coefficient). The mean estimated sensitivity for subset A was 0.875 (±0.092) and for subset B 0.853 (±0.077). The mean estimated positive predictive value was 0.904 (±0.075) and 0.886 (±0.069) for subsets A and B, respectively. For both subsets, the distribution of the Dice coefficients had a high peak around 0.9, with the vast majority of segmentations having values larger than 0.8.", "title": "" }, { "docid": "436b64f978ab58bed4086a0a9cd97bce", "text": "Ectopic pregnancies have a negative impact on future fertility. Prompt diagnosis is paramount to preserve tubal function and reproductive potential. Expectant, medical, and surgical management of ectopic pregnancies have similar efficacy in properly selected patients. Medical management has emerged as a safe alternative to surgery and holds promise for preservation of future fertility. Laparoscopic salpingostomy or salpingectomy remains the preferred means of surgical removal of ectopic pregnancies. The most predictive factor of future fertility is the health of the contralateral tube.", "title": "" }, { "docid": "cdf313ff69ebd11b360cd5e3b3942580", "text": "This paper presents, for the first time, a novel pupil detection method for near-infrared head-mounted cameras, which relies not only on image appearance to pursue the shape and gradient variation of the pupil contour, but also on structure principle to explore the mechanism of pupil projection. There are three main characteristics in the proposed method. First, in order to complement the pupil projection information, an eyeball center calibration method is proposed to build an eye model. Second, by utilizing the deformation model of pupils under head-mounted cameras and the edge gradients of a circular pattern, we find the best fitting ellipse describing the pupil boundary. Third, an eye-model-based pupil fitting algorithm with only three parameters is proposed to fine-tune the final pupil contour. Consequently, the proposed method extracts the geometry-appearance information, effectively boosting the performance of pupil detection. Experimental results show that this method outperforms the state-of-the-art ones. On a widely used public database (LPW), our method achieves 72.62% in terms of detection rate up to an error of five pixels, which is superior to the previous best one.", "title": "" }, { "docid": "428b6cdbf1d5388482ab34be385004aa", "text": "Learning tasks on source code (i.e., formal languages) have been considered recently, but most work has tried to transfer natural language methods and does not capitalize on the unique opportunities offered by code’s known sematics. For example, long-range dependencies induced by using the same variable or function in distant locations are often not considered. We propose to use graphs to represent both the syntactic and semantic structure of code and use graph-based deep learning methods to learn to reason over program structures. In this work, we present how to construct graphs from source code and how to scale Gated Graph Neural Networks training to such large graphs. We evaluate our method on two tasks: VARNAMING, in which a network attempts to predict the name of a variable given its usage, and VARMISUSE, in which the network learns to reason about selecting the correct variable that should be used at a given program location. Our comparison to methods that use less structured program representations shows the advantages of modeling known structure, and suggests that our models learn to infer meaningful names and to solve the VARMISUSE task in many cases. Additionally, our testing showed that VARMISUSE identifies a number of bugs in mature open-source projects.", "title": "" }, { "docid": "60465268d2ede9a7d8b374ac05df0d46", "text": "Nobody likes performance reviews. Subordinates are terrified they'll hear nothing but criticism. Bosses think their direct reports will respond to even the mildest criticism with anger or tears. The result? Everyone keeps quiet. That's unfortunate, because most people need help figuring out how to improve their performance and advance their careers. This fear of feedback doesn't come into play just during annual reviews. At least half the executives with whom the authors have worked never ask for feedback. Many expect the worst: heated arguments, even threats of dismissal. So rather than seek feedback, people try to guess what their bosses are thinking. Fears and assumptions about feedback often manifest themselves in psychologically maladaptive behaviors such as procrastination, denial, brooding, jealousy, and self-sabotage. But there's hope, say the authors. Those who learn adaptive techniques can free themselves from destructive responses. They'll be able to deal with feedback better if they acknowledge negative emotions, reframe fear and criticism constructively, develop realistic goals, create support systems, and reward themselves for achievements along the way. Once you've begun to alter your maladaptive behaviors, you can begin seeking regular feedback from your boss. The authors take you through four steps for doing just that: self-assessment, external assessment, absorbing the feedback, and taking action toward change. Organizations profit when employees ask for feedback and deal well with criticism. Once people begin to know how they are doing relative to management's priorities, their work becomes better aligned with organizational goals. What's more, they begin to transform a feedback-averse environment into a more honest and open one, in turn improving performance throughout the organization.", "title": "" }, { "docid": "ef0c5454b9b7854866712e897c29a198", "text": "This paper presents a new online clustering algorithm called SAFN which is used to learn continuously evolving clusters from non-stationary data. The SAFN uses a fast adaptive learning procedure to take into account variations over time. In non-stationary and multi-class environment, the SAFN learning procedure consists of five main stages: creation, adaptation, mergence, split and elimination. Experiments are carried out in three kinds of datasets to illustrate the performance of the SAFN algorithm for online clustering. Compared with SAKM algorithm, SAFN algorithm shows better performance in accuracy of clustering and multi-class high-dimension data.", "title": "" }, { "docid": "868fe4091a136f16f6844e8739b65902", "text": "This paper uses an ant colony meta-heuristic optimization method to solve the redundancy allocation problem (RAP). The RAP is a well known NP-hard problem which has been the subject of much prior work, generally in a restricted form where each subsystem must consist of identical components in parallel to make computations tractable. Meta-heuristic methods overcome this limitation, and offer a practical way to solve large instances of the relaxed RAP where different components can be placed in parallel. The ant colony method has not yet been used in reliability design, yet it is a method that is expressly designed for combinatorial problems with a neighborhood structure, as in the case of the RAP. An ant colony optimization algorithm for the RAP is devised & tested on a well-known suite of problems from the literature. It is shown that the ant colony method performs with little variability over problem instance or random number seed. It is competitive with the best-known heuristics for redundancy allocation.", "title": "" }, { "docid": "34ab20699d12ad6cca34f67cee198cd9", "text": "Such as relational databases, most graphs databases are OLTP databases (online transaction processing) of generic use and can be used to produce a wide range of solutions. That said, they shine particularly when the solution depends, first, on our understanding of how things are connected. This is more common than one may think. And in many cases it is not only how things are connected but often one wants to know something about the different relationships in our field their names, qualities, weight and so on. Briefly, connectivity is the key. The graphs are the best abstraction one has to model and query the connectivity; databases graphs in turn give developers and the data specialists the ability to apply this abstraction to their specific problems. For this purpose, in this paper one used this approach to simulate the route planner application, capable of querying connected data. Merely having keys and values is not enough; no more having data partially connected through joins semantically poor. We need both the connectivity and contextual richness to operate these solutions. The case study herein simulates a railway network railway stations connected with one another where each connection between two stations may have some properties. And one answers the question: how to find the optimized route (path) and know whether a station is reachable from one station or not and in which depth.", "title": "" }, { "docid": "b74ee9d63787d93411a4b37e4ed6882d", "text": "We introduce Visual Sedimentation, a novel design metaphor for visualizing data streams directly inspired by the physical process of sedimentation. Visualizing data streams (e. g., Tweets, RSS, Emails) is challenging as incoming data arrive at unpredictable rates and have to remain readable. For data streams, clearly expressing chronological order while avoiding clutter, and keeping aging data visible, are important. The metaphor is drawn from the real-world sedimentation processes: objects fall due to gravity, and aggregate into strata over time. Inspired by this metaphor, data is visually depicted as falling objects using a force model to land on a surface, aggregating into strata over time. In this paper, we discuss how this metaphor addresses the specific challenge of smoothing the transition between incoming and aging data. We describe the metaphor's design space, a toolkit developed to facilitate its implementation, and example applications to a range of case studies. We then explore the generative capabilities of the design space through our toolkit. We finally illustrate creative extensions of the metaphor when applied to real streams of data.", "title": "" }, { "docid": "b1a1a155f2c9d5b7380d6a91df6b17e6", "text": "This paper introduces a novel fingerprint matching algorithm using both ridge features and the conventional minutiae feature to increase the recognition performance against nonlinear deformation in fingerprints. The proposed ridge features are composed of four elements: ridge count, ridge length, ridge curvature direction, and ridge type. These ridge features have some advantages in that they can represent the topology information in entire ridge patterns existing between two minutiae and are not changed by nonlinear deformation of the finger. For extracting ridge features, we also define the ridge-based coordinate system in a skeletonized image. With the proposed ridge features and conventional minutiae features (minutiae type, orientation, and position), we propose a novel matching scheme using a breadth-first search to detect the matched minutiae pairs incrementally. Following that, the maximum score is computed and used as the final matching score of two fingerprints. Experiments were conducted for the FVC2002 and FVC2004 databases to compare the proposed method with the conventional minutiae-based method. The proposed method achieved higher matching scores. Thus, we conclude that the proposed ridge feature gives additional information for fingerprint matching with little increment in template size and can be used in conjunction with existing minutiae features to increase the accuracy and robustness of fingerprint recognition systems.", "title": "" }, { "docid": "db677822da381d375640723704d99cbc", "text": "The important step in fingerprint matching is the reliable fingerprint recognition. Automatic fingerprint recognition system relies on the input fingerprint for feature extraction. Hence, the effectiveness of feature extraction relies heavily on the quality of input fingerprint images. In this paper adaptive filtering in frequency domain in order to enhance the fingerprint image is proposed. Enhancement of the original fingerprint image is obtained by histogram equalization of the Gabor filtered image.", "title": "" }, { "docid": "5eecfb516bfc30379a8b457c18770f26", "text": "Machine learning as a service has been widely deployed to utilize deep neural network models to provide prediction services. However, this raises privacy concerns since clients need to send sensitive information to servers. In this paper, we focus on the scenario where clients want to classify private images with a convolutional neural network model hosted in the server, while both parties keep their data private. We present FALCON, a fast and secure approach for CNN predictions based on Fourier Transform. Our solution enables linear layers of a CNN model to be evaluated simply and efficiently with fully homomorphic encryption. We also introduce the first efficient and privacy-preserving protocol for softmax function, which is an indispensable component in CNNs and has not yet been evaluated in previous works due to its high complexity. We implemented the FALCON and evaluated the performance on real-world CNN models. The experimental results show that FALCON outperforms the best known works in both computation and communication cost.", "title": "" }, { "docid": "d44c0e33727d13a28b3808783f00daee", "text": "Wick, M.R. and W.B. Thompson, Reconstructive expert system explanation, Artificial Intelligence 54 (1992) 33-70. Existing explanation facilities are typically far more appropriate for knowledge engineers engaged in system maintenance than for end-users of the system. This is because the explanation is little more than a trace of the detailed problem-solving steps. An alternative approach recognizes that an effective explanation often needs to substantially reorganize the actual line of reasoning and bring to bear additional information to support the result. Explanation itself becomes a complex problem-solving process that depends not only on the actual line of reasoning, but also on additional knowledge of the domain. This paper presents a new computational model of explanation and argues that it results in significant improvements over traditional approaches.", "title": "" } ]
scidocsrr
57ddbfb53c5c58defc299dee01f48437
A Semi-NMF-PCA Unified Framework for Data Clustering
[ { "docid": "80b173cf8dbd0bc31ba8789298bab0fa", "text": "This paper presents a novel statistical method for factor analysis of binary and count data which is closely related to a technique known as Latent Semantic Analysis. In contrast to the latter method which stems from linear algebra and performs a Singular Value Decomposition of co-occurrence tables, the proposed technique uses a generative latent class model to perform a probabilistic mixture decomposition. This results in a more principled approach with a solid foundation in statistical inference. More precisely, we propose to make use of a temperature controlled version of the Expectation Maximization algorithm for model fitting, which has shown excellent performance in practice. Probabilistic Latent Semantic Analysis has many applications, most prominently in information retrieval, natural language processing, machine learning from text, and in related areas. The paper presents perplexity results for different types of text and linguistic data collections and discusses an application in automated document indexing. The experiments indicate substantial and consistent improvements of the probabilistic method over standard Latent Semantic Analysis.", "title": "" } ]
[ { "docid": "f1052f4704b5ec55e2a131dc2f2d6afc", "text": "A simple control for a permanent motor drive is described which provides a wide speed range without the use of a shaft sensor. Two line-to-line voltages and two stator currents are sensed and processed in analog form to produce the stator flux linkage space vector. The angle of this vector is then used in a microcontroller to produce the appropriate stator current command signals for the hysteresis current controller of the inverter so that near unity power factor can be achieved over a wide range of torque and speed. A speed signal is derived from the rate of change of angle of the flux linkage. A drift compensation program is proposed to avoid calculation errors in the determination of angle position and speed. The control system has been implemented on a 5 kW motor using Nd-Fe-B magnets. The closed loop speed control has been shown to be effective down to a frequency of less than 1 Hz, thus providing a wide range of speed control. An open loop starting program is used to accelerate the motor up to this limit frequency with minimum speed oscillation.<<ETX>>", "title": "" }, { "docid": "9f6429ac22b736bd988a4d6347d8475f", "text": "The purpose of this paper is to defend the systematic introduction of formal ontological principles in the current practice of knowledge engineering, to explore the various relationships between ontology and knowledge representation, and to present the recent trends in this promising research area. According to the \"modelling view\" of knowledge acquisition proposed by Clancey, the modeling activity must establish a correspondence between a knowledge base and two separate subsystems: the agent's behavior (i.e. the problem-solving expertize) and its own environment (the problem domain). Current knowledge modelling methodologies tend to focus on the former subsystem only, viewing domain knowledge as strongly dependent on the particular task at hand: in fact, AI researchers seem to have been much more interested in the nature of reasoning rather than in the nature of the real world. Recently, however, the potential value of task-independent knowlege bases (or \"ontologies\") suitable to large scale integration has been underlined in many ways. In this paper, we compare the dichotomy between reasoning and representation to the philosophical distinction between epistemology and ontology. We introduce the notion of the ontological level, intermediate between the epistemological and the conceptual level discussed by Brachman, as a way to characterize a knowledge representation formalism taking into account the intended meaning of its primitives. We then discuss some formal ontological distinctions which may play an important role for such purpose.", "title": "" }, { "docid": "cfc2778b19d53bf2ee62f8b8cedbb9e2", "text": "Demographic information such as gender, age, ethnicity, level of education, disabilities, employment, and socio-economic status are important in the area of social science, survey and marketing. But it is difficult to obtain the demographic information from users due to reluctance of users to participate and low response rate. Through automated demographics prediction from smart phone sensor data, researchers can obtain this valuable information in a nonintrusive and cost-effective manner. We approach the problem of demographic prediction, namely, classification of gender, age group and job type, through the use of a graphical feature based framework. The framework represents information collected from sensor networks as graphs, extracts useful and relevant graphical features, and predicts demographic information. We evaluated our approach on the Nokia Mobile Phone dataset for the three classification tasks: gender, age-group and job-type. Our approach produced comparable results with most of the state of the art methods while having the additional advantage of general applicability to sensor networks without using sophisticated and application-specific feature generation techniques, background knowledge and special techniques to address class imbalance.", "title": "" }, { "docid": "b9b68f6e2fd049d588d6bdb0c4878640", "text": "Networks are a fundamental tool for understanding and modeling complex systems in physics, biology, neuroscience, engineering, and social science. Many networks are known to exhibit rich, lower-order connectivity patterns that can be captured at the level of individual nodes and edges. However, higher-order organization of complex networks -- at the level of small network subgraphs -- remains largely unknown. Here, we develop a generalized framework for clustering networks on the basis of higher-order connectivity patterns. This framework provides mathematical guarantees on the optimality of obtained clusters and scales to networks with billions of edges. The framework reveals higher-order organization in a number of networks, including information propagation units in neuronal networks and hub structure in transportation networks. Results show that networks exhibit rich higher-order organizational structures that are exposed by clustering based on higher-order connectivity patterns.\n Prediction tasks over nodes and edges in networks require careful effort in engineering features used by learning algorithms. Recent research in the broader field of representation learning has led to significant progress in automating prediction by learning the features themselves. However, present feature learning approaches are not expressive enough to capture the diversity of connectivity patterns observed in networks. Here we propose node2vec, an algorithmic framework for learning continuous feature representations for nodes in networks. In node2vec, we learn a mapping of nodes to a low-dimensional space of features that maximizes the likelihood of preserving network neighborhoods of nodes. We define a flexible notion of a node's network neighborhood and design a biased random walk procedure, which efficiently explores diverse neighborhoods. Our algorithm generalizes prior work which is based on rigid notions of network neighborhoods, and we argue that the added flexibility in exploring neighborhoods is the key to learning richer representations. We demonstrate the efficacy of node2vec over existing state-of-the-art techniques on multi-label classification and link prediction in several real-world networks from diverse domains. Taken together, our work represents a new way for efficiently learning state-of-the-art task-independent representations in complex networks.", "title": "" }, { "docid": "cf299917f1de627e5d09ea943ab92157", "text": "Discovering hyponym relations among domain-specific terms is a fundamental task in taxonomy learning and knowledge acquisition. However, the great diversity of various domain corpora and the lack of labeled training sets make this task very challenging for conventional methods that are based on text content. The hyperlink structure of Wikipedia article pages was found to contain recurring network motifs in this study, indicating the probability of a hyperlink being a hyponym hyperlink. Hence, a novel hyponym relation extraction approach based on the network motifs of Wikipedia hyperlinks was proposed. This approach automatically constructs motif-based features from the hyperlink structure of a domain; every hyperlink is mapped to a 13-dimensional feature vector based on the 13 types of three-node motifs. The approach extracts structural information from Wikipedia and heuristically creates a labeled training set. Classification models were determined from the training sets for hyponym relation extraction. Two experiments were conducted to validate our approach based on seven domain-specific datasets obtained from Wikipedia. The first experiment, which utilized manually labeled data, verified the effectiveness of the motif-based features. The second experiment, which utilized an automatically labeled training set of different domains, showed that the proposed approach performs better than the approach based on lexico-syntactic patterns and achieves comparable result to the approach based on textual features. Experimental results show the practicability and fairly good domain scalability of the proposed approach.", "title": "" }, { "docid": "7aaa9cb86b17fdd5672677eefb17bf76", "text": "Although many methods are available to forecast short-term electricity load based on small scale data sets, they may not be able to accommodate large data sets as electricity load data becomes bigger and more complex in recent years. In this paper, a novel machine learning model combining convolutional neural network with K-means clustering is proposed for short-term load forecasting with improved scalability. The large data set is clustered into subsets using K-means algorithm, then the obtained subsets are used to train the convolutional neural network. A real-world power industry data set containing more than 1.4 million of load records is used in this study and the experimental results demonstrate the effectiveness of the proposed method.", "title": "" }, { "docid": "197ada9570b5cebf54e97721f01385da", "text": "The paper focuses on the task of predicting future values of stock market index. Two indices namely CNX Nifty and S&P Bombay Stock Exchange (BSE) Sensex from Indian stock markets are selected for experimental evaluation. Experiments are based on 10 years of historical data of these two indices. The predictions are made for 1–10, 15 and 30 days in advance. The paper proposes two stage fusion approach involving Support Vector Regression (SVR) in the first stage. The second stage of the fusion approach uses Artificial Neural Network (ANN), Random Forest (RF) and SVR resulting into SVR–ANN, SVR–RF and SVR–SVR fusion prediction models. The prediction performance of these hybrid models is compared with the single stage scenarios where ANN, RF and SVR are used single-handedly. Ten technical indicators are selected as the inputs to each of the prediction models. 2014 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "e66fb8ed9e26b058a419d34d9c015a4c", "text": "Children and adolescents now communicate online to form and/or maintain relationships with friends, family, and strangers. Relationships in \"real life\" are important for children's and adolescents' psychosocial development; however, they can be difficult for those who experience feelings of loneliness and/or social anxiety. The aim of this study was to investigate differences in usage of online communication patterns between children and adolescents with and without self-reported loneliness and social anxiety. Six hundred twenty-six students ages 10 to 16 years completed a survey on the amount of time they spent communicating online, the topics they discussed, the partners they engaged with, and their purposes for communicating over the Internet. Participants were administered a shortened version of the UCLA Loneliness Scale and an abbreviated subscale of the Social Anxiety Scale for Adolescents (SAS-A). Additionally, age and gender differences in usage of the online communication patterns were examined across the entire sample. Findings revealed that children and adolescents who self-reported being lonely communicated online significantly more frequently about personal and intimate topics than did those who did not self-report being lonely. The former were motivated to use online communication significantly more frequently to compensate for their weaker social skills to meet new people. Results suggest that Internet usage allows them to fulfill critical needs of social interactions, self-disclosure, and identity exploration. Future research, however, should explore whether or not the benefits derived from online communication may also facilitate lonely children's and adolescents' offline social relationships.", "title": "" }, { "docid": "0a981597279b2fb1792b5d1a00f0c9ec", "text": "With billions of people using smartphones and the exponential growth of smartphone apps, it is prohibitive for app marketplaces, such as Google App Store, to thoroughly verify if an app is legitimate or malicious. As a result, mobile users are left to decide for themselves whether an app is safe to use. Even worse, recent studies have shown that over 70% of apps in markets request to collect data irrelevant to the main functions of the apps, which could cause leaking of private information or inefficient use of mobile resources. It is worth mentioning that since resource management mechanism of mobile devices is different from PC machines, existing security solutions in PC malware area are not quite compatible with mobile devices. Therefore, academic researchers and commercial anti-malware companies have proposed many security mechanisms to address the security issues of the Android devices. Considering the mechanisms and techniques which are different in nature and used in proposed works, they can be classified into different categories. In this survey, we discuss the existing Android security threats and existing security enforcements solutions between 2010−2015 and try to classify works and review their functionalities. We review a few works of each class. The survey also reviews the strength and weak points of the solutions.", "title": "" }, { "docid": "9c20a64fad54b5416b4716090a2e7c51", "text": "Location-Based Social Networks (LBSNs) enable their users to share with their friends the places they go to and whom they go with. Additionally, they provide users with recommendations for Points of Interest (POI) they have not visited before. This functionality is of great importance for users of LBSNs, as it allows them to discover interesting places in populous cities that are not easy to explore. For this reason, previous research has focused on providing recommendations to LBSN users. Nevertheless, while most existing work focuses on recommendations for individual users, techniques to provide recommendations to groups of users are scarce.\n In this paper, we consider the problem of recommending a list of POIs to a group of users in the areas that the group frequents. Our data consist of activity on Swarm, a social networking app by Foursquare, and our results demonstrate that our proposed Geo-Group-Recommender (GGR), a class of hybrid recommender systems that combine the group geographical preferences using Kernel Density Estimation, category and location features and group check-ins outperform a large number of other recommender systems. Moreover, we find evidence that user preferences differ both in venue category and in location between individual and group activities. We also show that combining individual recommendations using group aggregation strategies is not as good as building a profile for a group. Our experiments show that (GGR) outperforms the baselines in terms of precision and recall at different cutoffs.", "title": "" }, { "docid": "58d4b95cc0ce39126c962e88b1bd6ba1", "text": "The quality of image encryption is commonly measured by the Shannon entropy over the ciphertext image. However, this measurement does not consider to the randomness of local image blocks and is inappropriate for scrambling based image encryption methods. In this paper, a new information entropy-based randomness measurement for image encryption is introduced which, for the first time, answers the question of whether a given ciphertext image is sufficiently random-like. It measures the randomness over the ciphertext in a fairer way by calculating the averaged entropy of a series of small image blocks within the entire test image. In order to fulfill both quantitative and qualitative measurement, the expectation and the variance of this averaged block entropy for a true-random image are strictly derived and corresponding numerical reference tables are also provided. Moreover, a hypothesis test at significance α-level is given to help accept or reject the hypothesis that the test image is ideally encrypted/random-like. Simulation results show that the proposed test is able to give both effectively quantitative and qualitative results for image encryption. The same idea can also be applied to measure other digital data, like audio and video.", "title": "" }, { "docid": "b1d1196f064bce5c1f6df75a6a5f8bb2", "text": "Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the access from active nodes. These protocols are of significant importance since the wireless communication channel is inherently prone to errors and unique problems such as the hidden-terminal problem, the exposedterminal problem, and signal fading effects. Although a lot of research has been conducted on MAC protocols, the various issues involved have mostly been presented in isolation of each other. We therefore make an attempt to present a comprehensive survey of major schemes, integrating various related issues and challenges with a view to providing a big-picture outlook to this vast area. We present a classification of MAC protocols and their brief description, based on their operating principles and underlying features. In conclusion, we present a brief summary of key ideas and a general direction for future work.", "title": "" }, { "docid": "2b9c449164dce6261a8a6363b37d8c8e", "text": "Anterior component separation (ACS) with external oblique release for ventral hernia repair has a recurrence rate up to 32 %. Hernia recurrence after prior ACS represents a complex surgical challenge. In this context, we report our experience utilizing posterior component separation with transversus abdominis muscle release (PCS/TAR) and retromuscular mesh reinforcement. Patients with a history of recurrent hernia following ACS repaired with PCS/TAR were retrospectively identified from prospective databases collected at two large academic institutions. Patient demographics, hernia characteristics (using CT scan) and outcomes were evaluated. Twenty-nine patients with a history of ACS developed 22 (76 %) midline, 3 (10 %) lateral and 4 (14 %) concomitant recurrences. Contamination was present in 11 (38 %) of cases. All were repaired utilizing a PCS/TAR with retromuscular mesh placement (83 % synthetic, 17 % biologic) and fascial closure. Wound morbidity consisted of 13 (45 %) surgical site occurrences including 8 (28 %) surgical site infections. Five (17 %) patients required 90-day readmission, and two (7 %) were related to wound morbidity. One organ space infection with frank spillage of stool resulted in the only instance of mesh excision. This case also represents the only instance of recurrence (3 %) with a mean follow-up of 11 (range 3–36) months. Patients with a history of an ACS who develop a recurrence represent a challenging clinical scenario with limited options for surgical repair. A PCS/TAR hernia repair achieves acceptable outcomes and may in fact be the best approach available.", "title": "" }, { "docid": "e2132912c7e715f464f3d7f2599c2644", "text": "Data mining technology is applied to fraud detection to establish the fraud detection model, describe the process of creating the fraud detection model, then establish data model with ID3 decision tree, and establish example of fraud detection model by using this model. As e-commerce sales continue to grow, the associated online fraud remains an attractive source of revenue for fraudsters. These fraudulent activities impose a considerable financial loss to merchants, making online fraud detection a necessity. The problem of fraud detection is concerned with not only capturing the fraudulent activities, but also capturing them as quickly as possible. This timeliness is crucial to decrease financial losses.", "title": "" }, { "docid": "e12e2f0d2e190d269f426a2bfefd3545", "text": "Mordeson, J.N., Fuzzy line graphs, Pattern Recognition Letters 14 (1993) 381 384. The notion of a fuzzy line graph of a fuzzy graph is introduced. We give a necessary and sufficient condition for a fuzzy graph to be isomorphic to its corresponding fuzzy line graph. We examine when an isomorphism between two fuzzy graphs follows from an isomorphism of their corresponding fuzzy line graphs. We give a necessary and sufficient condition for a fuzzy graph to be the fuzzy line graph of some fuzzy graph.", "title": "" }, { "docid": "9be069160bed1428ec4012492b451d70", "text": "This paper presents the concept of vehicular cloud service network using IoT and Cloud together. Both these technologies (IoT and Cloud Computing) are able to solve real time problems faced by population. The tremendous growth of Internet of Thing(IoT) and Cloud Computing together have provided great solution to the increasing transportation issues. In this paper we propose, creating vehicular cloud service network using MQTT protocol. The main objective of this paper is to design a cloud vehicular service for parking purpose based on the basic communication principle of MQTT protocol. We propose an intelligent parking space services to make IoT more suitable for both small-sized and large-scale information retrieval by cloud. This paper briefs the most emerging paradigm of IoT in parking cloud services.", "title": "" }, { "docid": "3e46e094088e44d6b6a96b58fe167c46", "text": "Functional magnetic resonance imaging (fMRI) studies of the human brain have suggested that low-frequency fluctuations in resting fMRI data collected using blood oxygen level dependent (BOLD) contrast correspond to functionally relevant resting state networks (RSNs). Whether the fluctuations of resting fMRI signal in RSNs are a direct consequence of neocortical neuronal activity or are low-frequency artifacts due to other physiological processes (e.g., autonomically driven fluctuations in cerebral blood flow) is uncertain. In order to investigate further these fluctuations, we have characterized their spatial and temporal properties using probabilistic independent component analysis (PICA), a robust approach to RSN identification. Here, we provide evidence that: i. RSNs are not caused by signal artifacts due to low sampling rate (aliasing); ii. they are localized primarily to the cerebral cortex; iii. similar RSNs also can be identified in perfusion fMRI data; and iv. at least 5 distinct RSN patterns are reproducible across different subjects. The RSNs appear to reflect \"default\" interactions related to functional networks related to those recruited by specific types of cognitive processes. RSNs are a major source of non-modeled signal in BOLD fMRI data, so a full understanding of their dynamics will improve the interpretation of functional brain imaging studies more generally. Because RSNs reflect interactions in cognitively relevant functional networks, they offer a new approach to the characterization of state changes with pathology and the effects of drugs.", "title": "" }, { "docid": "f794d4a807a4d69727989254c557d2d1", "text": "The purpose of this study was to describe the operative procedures and clinical outcomes of a new three-column internal fixation system with anatomical locking plates on the tibial plateau to treat complex three-column fractures of the tibial plateau. From June 2011 to May 2015, 14 patients with complex three-column fractures of the tibial plateau were treated with reduction and internal fixation through an anterolateral approach combined with a posteromedial approach. The patients were randomly divided into two groups: a control group which included seven cases using common locking plates, and an experimental group which included seven cases with a new three-column internal fixation system with anatomical locking plates. The mean operation time of the control group was 280.7 ± 53.7 minutes, which was 215.0 ± 49.1 minutes in the experimental group. The mean intra-operative blood loss of the control group was 692.8 ± 183.5 ml, which was 471.4 ± 138.0 ml in the experimental group. The difference was statistically significant between the two groups above. The differences were not statistically significant between the following mean numbers of the two groups: Rasmussen score immediately after operation; active extension–flexion degrees of knee joint at three and 12 months post-operatively; tibial plateau varus angle (TPA) and posterior slope angle (PA) immediately after operation, at three and at 12 months post-operatively; HSS (The Hospital for Special Surgery) knee-rating score at 12 months post-operatively. All fractures healed. A three-column internal fixation system with anatomical locking plates on tibial plateau is an effective and safe tool to treat complex three-column fractures of the tibial plateau and it is more convenient than the common plate.", "title": "" }, { "docid": "4a7bd38fcdcaa91cba875cecb8b7c7bd", "text": "The aim of Search Based Software Engineering (SBSE) research is to move software engineering problems from human-based search to machine-based search, using a variety of techniques from the metaheuristic search, operations research and evolutionary computation paradigms. The idea is to exploit humans’ creativity and machines’ tenacity and reliability, rather than requiring humans to perform the more tedious, error prone and thereby costly aspects of the engineering process. SBSE can also provide insights and decision support. This tutorial will present the reader with a step-by-step guide to the application of SBSE techniques to Software Engineering. It assumes neither previous knowledge nor experience with Search Based Optimisation. The intention is that the tutorial will cover sufficient material to allow the reader to become productive in successfully applying search based optimisation to a chosen Software Engineering problem of interest.", "title": "" }, { "docid": "5743e31c84a0a532722b28705248ea3c", "text": "Injuries of the spine, and its posterior elements in particular, are a common occurrence in trauma patients, with potentially devastating consequences. Computer-aided detection (CADe) could assist in the detection and classification of spine fractures. Furthermore, CAD could help assess the stability and chronicity of fractures, as well as facilitate research into optimization of treatment paradigms. In this work, we apply deep convolutional networks (ConvNets) for the automated detection of posterior element fractures of the spine. First, the vertebra bodies of the spine with its posterior elements are segmented in spine CT using multi-atlas label fusion. Then, edge maps of the posterior elements are computed. These edge maps serve as candidate regions for predicting a set of probabilities for fractures along the image edges using ConvNets in a 2.5D fashion (three orthogonal patches in axial, coronal and sagittal planes). We explore three different methods for training the ConvNet using 2.5D patches along the edge maps of ‘positive’, i.e. fractured posterior-elements and ‘negative’, i.e. non-fractured elements. An experienced radiologist retrospectively marked the location of 55 displaced posterior-element fractures in 18 trauma patients. We randomly split the data into training and testing cases. In testing, we achieve an area-under-the-curve of 0.857. This corresponds to 71% or 81% sensitivities at 5 or 10 false-positives per patient, respectively. Analysis of our set of trauma patients demonstrates the feasibility of detecting posterior-element fractures in spine CT images using computer vision techniques such as deep convolutional networks.", "title": "" } ]
scidocsrr
ee63333981d9ea6218f5d2ead7367a60
Data Augmentation in Emotion Classification Using Generative Adversarial Networks
[ { "docid": "f4be66419d03715ca686bea9665bf734", "text": "Data augmentation is a key element in training high-dimensional models. In this approach, one synthesizes new observations by applying pre-specified transformations to the original training data; e.g. new images are formed by rotating old ones. Current augmentation schemes, however, rely on manual specification of the applied transformations, making data augmentation an implicit form of feature engineering. With an eye towards true end-to-end learning, we suggest learning the applied transformations on a per-class basis. Particularly, we align image pairs within each class under the assumption that the spatial transformation between images belongs to a large class of diffeomorphisms. We then learn a class-specific probabilistic generative models of the transformations in a Riemannian submanifold of the Lie group of diffeomorphisms. We demonstrate significant performance improvements in training deep neural nets over manually-specified augmentation schemes. Our code and augmented datasets are available online. Appearing in Proceedings of the 19 International Conference on Artificial Intelligence and Statistics (AISTATS) 2016, Cadiz, Spain. JMLR: W&CP volume 41. Copyright 2016 by the authors.", "title": "" }, { "docid": "9b9181c7efd28b3e407b5a50f999840a", "text": "As a new way of training generative models, Generative Adversarial Net (GAN) that uses a discriminative model to guide the training of the generative model has enjoyed considerable success in generating real-valued data. However, it has limitations when the goal is for generating sequences of discrete tokens. A major reason lies in that the discrete outputs from the generative model make it difficult to pass the gradient update from the discriminative model to the generative model. Also, the discriminative model can only assess a complete sequence, while for a partially generated sequence, it is nontrivial to balance its current score and the future one once the entire sequence has been generated. In this paper, we propose a sequence generation framework, called SeqGAN, to solve the problems. Modeling the data generator as a stochastic policy in reinforcement learning (RL), SeqGAN bypasses the generator differentiation problem by directly performing gradient policy update. The RL reward signal comes from the GAN discriminator judged on a complete sequence, and is passed back to the intermediate state-action steps using Monte Carlo search. Extensive experiments on synthetic data and real-world tasks demonstrate significant improvements over strong baselines. Introduction Generating sequential synthetic data that mimics the real one is an important problem in unsupervised learning. Recently, recurrent neural networks (RNNs) with long shortterm memory (LSTM) cells (Hochreiter and Schmidhuber 1997) have shown excellent performance ranging from natural language generation to handwriting generation (Wen et al. 2015; Graves 2013). The most common approach to training an RNN is to maximize the log predictive likelihood of each true token in the training sequence given the previous observed tokens (Salakhutdinov 2009). However, as argued in (Bengio et al. 2015), the maximum likelihood approaches suffer from so-called exposure bias in the inference stage: the model generates a sequence iteratively and predicts next token conditioned on its previously predicted ones that may be never observed in the training data. Such a discrepancy between training and inference can incur accumulatively along with the sequence and will become prominent ∗Weinan Zhang is the corresponding author. Copyright c © 2017, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. as the length of sequence increases. To address this problem, (Bengio et al. 2015) proposed a training strategy called scheduled sampling (SS), where the generative model is partially fed with its own synthetic data as prefix (observed tokens) rather than the true data when deciding the next token in the training stage. Nevertheless, (Huszár 2015) showed that SS is an inconsistent training strategy and fails to address the problem fundamentally. Another possible solution of the training/inference discrepancy problem is to build the loss function on the entire generated sequence instead of each transition. For instance, in the application of machine translation, a task specific sequence score/loss, bilingual evaluation understudy (BLEU) (Papineni et al. 2002), can be adopted to guide the sequence generation. However, in many other practical applications, such as poem generation (Zhang and Lapata 2014) and chatbot (Hingston 2009), a task specific loss may not be directly available to score a generated sequence accurately. General adversarial net (GAN) proposed by (Goodfellow and others 2014) is a promising framework for alleviating the above problem. Specifically, in GAN a discriminative net D learns to distinguish whether a given data instance is real or not, and a generative net G learns to confuse D by generating high quality data. This approach has been successful and been mostly applied in computer vision tasks of generating samples of natural images (Denton et al. 2015). Unfortunately, applying GAN to generating sequences has two problems. Firstly, GAN is designed for generating real-valued, continuous data but has difficulties in directly generating sequences of discrete tokens, such as texts (Huszár 2015). The reason is that in GANs, the generator starts with random sampling first and then a determistic transform, govermented by the model parameters. As such, the gradient of the loss from D w.r.t. the outputs by G is used to guide the generative model G (paramters) to slightly change the generated value to make it more realistic. If the generated data is based on discrete tokens, the “slight change” guidance from the discriminative net makes little sense because there is probably no corresponding token for such slight change in the limited dictionary space (Goodfellow 2016). Secondly, GAN can only give the score/loss for an entire sequence when it has been generated; for a partially generated sequence, it is non-trivial to balance how good as it is now and the future score as the entire sequence. ar X iv :1 60 9. 05 47 3v 6 [ cs .L G ] 2 5 A ug 2 01 7 In this paper, to address the above two issues, we follow (Bachman and Precup 2015; Bahdanau et al. 2016) and consider the sequence generation procedure as a sequential decision making process. The generative model is treated as an agent of reinforcement learning (RL); the state is the generated tokens so far and the action is the next token to be generated. Unlike the work in (Bahdanau et al. 2016) that requires a task-specific sequence score, such as BLEU in machine translation, to give the reward, we employ a discriminator to evaluate the sequence and feedback the evaluation to guide the learning of the generative model. To solve the problem that the gradient cannot pass back to the generative model when the output is discrete, we regard the generative model as a stochastic parametrized policy. In our policy gradient, we employ Monte Carlo (MC) search to approximate the state-action value. We directly train the policy (generative model) via policy gradient (Sutton et al. 1999), which naturally avoids the differentiation difficulty for discrete data in a conventional GAN. Extensive experiments based on synthetic and real data are conducted to investigate the efficacy and properties of the proposed SeqGAN. In our synthetic data environment, SeqGAN significantly outperforms the maximum likelihood methods, scheduled sampling and PG-BLEU. In three realworld tasks, i.e. poem generation, speech language generation and music generation, SeqGAN significantly outperforms the compared baselines in various metrics including human expert judgement. Related Work Deep generative models have recently drawn significant attention, and the ability of learning over large (unlabeled) data endows them with more potential and vitality (Salakhutdinov 2009; Bengio et al. 2013). (Hinton, Osindero, and Teh 2006) first proposed to use the contrastive divergence algorithm to efficiently training deep belief nets (DBN). (Bengio et al. 2013) proposed denoising autoencoder (DAE) that learns the data distribution in a supervised learning fashion. Both DBN and DAE learn a low dimensional representation (encoding) for each data instance and generate it from a decoding network. Recently, variational autoencoder (VAE) that combines deep learning with statistical inference intended to represent a data instance in a latent hidden space (Kingma and Welling 2014), while still utilizing (deep) neural networks for non-linear mapping. The inference is done via variational methods. All these generative models are trained by maximizing (the lower bound of) training data likelihood, which, as mentioned by (Goodfellow and others 2014), suffers from the difficulty of approximating intractable probabilistic computations. (Goodfellow and others 2014) proposed an alternative training methodology to generative models, i.e. GANs, where the training procedure is a minimax game between a generative model and a discriminative model. This framework bypasses the difficulty of maximum likelihood learning and has gained striking successes in natural image generation (Denton et al. 2015). However, little progress has been made in applying GANs to sequence discrete data generation problems, e.g. natural language generation (Huszár 2015). This is due to the generator network in GAN is designed to be able to adjust the output continuously, which does not work on discrete data generation (Goodfellow 2016). On the other hand, a lot of efforts have been made to generate structured sequences. Recurrent neural networks can be trained to produce sequences of tokens in many applications such as machine translation (Sutskever, Vinyals, and Le 2014; Bahdanau, Cho, and Bengio 2014). The most popular way of training RNNs is to maximize the likelihood of each token in the training data whereas (Bengio et al. 2015) pointed out that the discrepancy between training and generating makes the maximum likelihood estimation suboptimal and proposed scheduled sampling strategy (SS). Later (Huszár 2015) theorized that the objective function underneath SS is improper and explained the reason why GANs tend to generate natural-looking samples in theory. Consequently, the GANs have great potential but are not practically feasible to discrete probabilistic models currently. As pointed out by (Bachman and Precup 2015), the sequence data generation can be formulated as a sequential decision making process, which can be potentially be solved by reinforcement learning techniques. Modeling the sequence generator as a policy of picking the next token, policy gradient methods (Sutton et al. 1999) can be adopted to optimize the generator once there is an (implicit) reward function to guide the policy. For most practical sequence generation tasks, e.g. machine translation (Sutskever, Vinyals, and Le 2014), the reward signal is meaningful only for the entire sequence, for instance in the game of Go (Silver et al. 2016), the reward signal is only set at the end of the game. In", "title": "" }, { "docid": "19937d689287ba81d2d01efd9ce8f2e4", "text": "We present a fast, fully parameterizable GPU implementation of Convolutional Neural Network variants. Our feature extractors are neither carefully designed nor pre-wired, but rather learned in a supervised way. Our deep hierarchical architectures achieve the best published results on benchmarks for object classification (NORB, CIFAR10) and handwritten digit recognition (MNIST), with error rates of 2.53%, 19.51%, 0.35%, respectively. Deep nets trained by simple back-propagation perform better than more shallow ones. Learning is surprisingly rapid. NORB is completely trained within five epochs. Test error rates on MNIST drop to 2.42%, 0.97% and 0.48% after 1, 3 and 17 epochs, respectively.", "title": "" } ]
[ { "docid": "ccb4d786a29d70ccb09dee97daae5798", "text": "Liver and intestine are tightly linked through the venous system of the portal circulation. Consequently, the liver is the primary recipient of gut-derived products, most prominently dietary nutrients and microbial components. It functions as a secondary \"firewall\" and protects the body from intestinal pathogens and other microbial products that have crossed the primary barrier of the intestinal tract. Disruption of the intestinal barrier enhances microbial exposure of the liver, which can have detrimental or beneficial effects in the organ depending on the specific circumstances. Conversely, the liver also exerts influence over intestinal microbial communities via secretion of bile acids and IgA antibodies. This mini-review highlights key findings and concepts in the area of host-microbial interactions as pertinent to the bilateral communication between liver and gut and highlights the concept of the gut-liver axis.", "title": "" }, { "docid": "b104337e30aa30db3dadc4e254ed2ad4", "text": "We live in on-demand, on-command Digital universe with data prolifering by Institutions, Individuals and Machines at a very high rate. This data is categories as \"Big Data\" due to its sheer Volume, Variety and Velocity. Most of this data is unstructured, quasi structured or semi structured and it is heterogeneous in nature. The volume and the heterogeneity of data with the speed it is generated, makes it difficult for the present computing infrastructure to manage Big Data. Traditional data management, warehousing and analysis systems fall short of tools to analyze this data. Due to its specific nature of Big Data, it is stored in distributed file system architectures. Hadoop and HDFS by Apache is widely used for storing and managing Big Data. Analyzing Big Data is a challenging task as it involves large distributed file systems which should be fault tolerant, flexible and scalable. Map Reduce is widely been used for the efficient analysis of Big Data. Traditional DBMS techniques like Joins and Indexing and other techniques like graph search is used for classification and clustering of Big Data. These techniques are being adopted to be used in Map Reduce. In this paper we suggest various methods for catering to the problems in hand through Map Reduce framework over Hadoop Distributed File System (HDFS). Map Reduce is a Minimization technique which makes use of file indexing with mapping, sorting, shuffling and finally reducing. Map Reduce techniques have been studied in this paper which is implemented for Big Data analysis using HDFS.", "title": "" }, { "docid": "0b3f34656cc9ad68ac675cc4c382f9b5", "text": "Phase-contrast microscopy is one of the most common and convenient imaging modalities to observe long-term multi-cellular processes, which generates images by the interference of lights passing through transparent specimens and background medium with different retarded phases. Despite many years of study, computer-aided phase contrast microscopy analysis on cell behavior is challenged by image qualities and artifacts caused by phase contrast optics. Addressing the unsolved challenges, the authors propose (1) a phase contrast microscopy image restoration method that produces phase retardation features, which are intrinsic features of phase contrast microscopy, and (2) a semi-supervised learning based algorithm for cell segmentation, which is a fundamental task for various cell behavior analysis. Specifically, the image formation process of phase contrast microscopy images is first computationally modeled with a dictionary of diffraction patterns; as a result, each pixel of a phase contrast microscopy image is represented by a linear combination of the bases, which we call phase retardation features. Images are then partitioned into phase-homogeneous atoms by clustering neighboring pixels with similar phase retardation features. Consequently, cell segmentation is performed via a semi-supervised classification technique over the phase-homogeneous atoms. Experiments demonstrate that the proposed approach produces quality segmentation of individual cells and outperforms previous approaches.", "title": "" }, { "docid": "38a8f82247775ea51a31ea0a6e51f126", "text": "Materials with variable stiffness have the potential to provide a range of new functionalities, including system reconfiguration by tuning the location of rigid links and joints. In particular, wearable applications would benefit from variable stiffness materials in the context of active braces that may stiffen when necessary and soften when mobility is required. In this work, we present fibers capable of adjusting to provide variable stiffness in wearable fabrics. The variable stiffness fibers are made from shape memory materials, where shape memory alloy (SMA) is coated with a thin film of shape memory polymer (SMP). The fibers, which are fabricated via a continuous feed-through process, reduce in bending stiffness by an order of magnitude when the SMP goes through the glass transition. The transition between rubbery and glassy state is accomplished by direct joule heating of the embedded SMA wire. We employ a COMSOL model to relate the current input to the time required for the fibers to transition between stiffness states. Finally, we demonstrate how this device can be worn and act as a joint stability brace on human fingers.", "title": "" }, { "docid": "3efb43150881649d020a0c721dc39ae5", "text": "Six studies explore the role of goal shielding in self-regulation by examining how the activation of focal goals to which the individual is committed inhibits the accessibility of alternative goals. Consistent evidence was found for such goal shielding, and a number of its moderators were identified: Individuals' level of commitment to the focal goal, their degree of anxiety and depression, their need for cognitive closure, and differences in their goal-related tenacity. Moreover, inhibition of alternative goals was found to be more pronounced when they serve the same overarching purpose as the focal goal, but lessened when the alternative goals facilitate focal goal attainment. Finally, goal shielding was shown to have beneficial consequences for goal pursuit and attainment.", "title": "" }, { "docid": "04953f3a55a77b9a35e7cea663c6387e", "text": "-This paper presents a calibration procedure for a fish-eye lens (a high-distortion lens) mounted on a CCD TV camera. The method is designed to account for the differences in images acquired via a distortion-free lens camera setup and the images obtained by a fish-eye lens camera. The calibration procedure essentially defines a mapping between points in the world coordinate system and their corresponding point locations in the image plane. This step is important for applications in computer vision which involve quantitative measurements. The objective of this mapping is to estimate the internal parameters of the camera, including the effective focal length, one-pixel width on the image plane, image distortion center, and distortion coefficients. The number of parameters to be calibrated is reduced by using a calibration pattern with equally spaced dots and assuming a pin-hole model camera behavior for the image center, thus assuming negligible distortion at the image distortion center. Our method employs a non-finear transformation between points in the world coordinate system and their corresponding location on the image plane. A Lagrangian minimization method is used to determine the coefficients of the transformation. The validity and effectiveness of our calibration and distortion correction procedure are confirmed by application of this procedure on real images. Copyright © 1996 Pattern Recognition Society. Published by Elsevier Science Ltd. Camera calibration Lens distortion Intrinsic camera parameters Fish-eye lens Optimization", "title": "" }, { "docid": "63345cc18046fd1a931adc19db9f64c7", "text": "OBJECTIVE\nPsychometric evaluation of the Pittsburgh Sleep Quality Index (PSQI) for primary insomnia.\n\n\nMETHODS\nThe study sample consisted of 80 patients with primary insomnia (DSM-IV). The length of the test-retest interval was either 2 days or several weeks. Validity analyses were calculated for PSQI data and data from sleep diaries, as well as polysomnography. To evaluate the specificity of the PSQI, insomnia patients were compared with a control group of 45 healthy subjects.\n\n\nRESULTS\nIn primary insomnia patients, the overall PSQI global score correlation coefficient for test-retest reliability was .87. Validity analyses showed high correlations between PSQI and sleep log data and lower correlations with polysomnography data. A PSQI global score > 5 resulted in a sensitivity of 98.7 and specificity of 84.4 as a marker for sleep disturbances in insomnia patients versus controls.\n\n\nCONCLUSION\nThe PSQI has a high test-retest reliability and a good validity for patients with primary insomnia.", "title": "" }, { "docid": "ee833203c939cfa9c5ab4135a75e1559", "text": "The multiconstraint 0-1 knapsack problem is encountered when one has to decide how to use a knapsack with multiple resource constraints. Even though the single constraint version of this problem has received a lot of attention, the multiconstraint knapsack problem has been seldom addressed. This paper deals with developing an effective solution procedure for the multiconstraint knapsack problem. Various relaxations of the problem are suggested and theoretical relations between these relaxations are pointed out. Detailed computational experiments are carried out to compare bounds produced by these relaxations. New algorithms for obtaining surrogate bounds are developed and tested. Rules for reducing problem size are suggested and shown to be effective through computational tests. Different separation, branching and bounding rules are compared using an experimental branch and bound code. An efficient branch and bound procedure is developed, tested and compared with two previously developed optimal algorithms. Solution times with the new procedure are found to be considerably lower. This procedure can also be used as a heuristic for large problems by early termination of the search tree. This scheme was tested and found to be very effective.", "title": "" }, { "docid": "af4d150e993258124ba0af211fa26841", "text": "..................................................................................................................................................................... 3 RESUMÉ ........................................................................................................................................................................... 4 PREFACE ......................................................................................................................................................................... 5 TABLE OF CONTENTS ................................................................................................................................................. 6 INTRODUCTION ............................................................................................................................................................ 7 PROBLEM ANALYSIS................................................................................................................................................... 8 EXISTING METHODS ........................................................................................................................................................ 9 THE VIOLA-JONES FACE DETECTOR .................................................................................................................. 10 INTRODUCTION TO CHAPTER......................................................................................................................................... 10 METHODS ..................................................................................................................................................................... 10 The scale invariant detector .................................................................................................................................... 10 The modified AdaBoost algorithm........................................................................................................................... 12 The cascaded classifier ........................................................................................................................................... 13 IMPLEMENTATION & RESULTS...................................................................................................................................... 15 Generating positive examples ................................................................................................................................. 15 Generating negative examples ................................................................................................................................ 18 Training a stage in the cascade............................................................................................................................... 20 Training the cascade ............................................................................................................................................... 21 The final face detector............................................................................................................................................. 24 A simple comparison ............................................................................................................................................... 27 Discussion ............................................................................................................................................................... 29 FUTURE WORK ............................................................................................................................................................. 31 CONCLUSION ............................................................................................................................................................... 32 APPENDIX 1 LITERATURE LIST AND REFERENCES...................................................................................... 33 APPENDIX 2 CONTENTS OF THE ENCLOSED DVD ......................................................................................... 34 APPENDIX 3 IMAGE 2, 3 AND 4 AFTER DETECTION....................................................................................... 35", "title": "" }, { "docid": "0d5fd1dfdcb6beda733eb43f2ed834ea", "text": "In this paper, approximation techniques based on the shifted Jacobi together with spectral tau technique are presented to solve a class of initial-boundary value problems for the fractional diffusion equations with variable coefficients on a finite domain. The fractional derivatives are described in the Caputo sense. The technique is derived by expanding the required approximate solution as the elements of shifted Jacobi polynomials. Using the operational matrix of the fractional derivative, the problem can be reduced to a set of linear algebraic equations. Numerical examples are included to demonstrate the validity and applicability of the technique and a comparison is made with the existing results to show that the proposed method is easy to implement and produce accurate results.", "title": "" }, { "docid": "533c441acd7a57c11bd1b12d847f6460", "text": "Recent Pwn2Own competitions have demonstrated the continued effectiveness of control hijacking attacks despite deployed countermeasures including stack canaries and ASLR. A powerful defense called Control flow Integrity (CFI) offers a principled approach to preventing such attacks. However, prior CFI implementations use static analysis and must limit protection to remain practical. These limitations have enabled attacks against all known CFI systems, as demonstrated in recent work. This paper presents a cryptographic approach to control flow integrity (CCFI) that is both fine-grain and practical: using message authentication codes (MAC) to protect control flow elements such as return addresses, function pointers, and vtable pointers. MACs on these elements prevent even powerful attackers with random read/ write access to memory from tampering with program control flow. We implemented CCFI in Clang/LLVM, taking advantage of recently available cryptographic CPU instructions. We evaluate our system on several large software packages (including nginx, Apache and memcache) as well as all their dependencies. The cost of protection ranges from a 3–18% decrease in request rate.", "title": "" }, { "docid": "1fcbc7d6c408d00d3bd1e225e28a32cc", "text": "Active learning aims to train an accurate prediction model with minimum cost by labeling most informative instances. In this paper, we survey existing works on active learning from an instance-selection perspective and classify them into two categories with a progressive relationship: (1) active learning merely based on uncertainty of independent and identically distributed (IID) instances, and (2) active learning by further taking into account instance correlations. Using the above categorization, we summarize major approaches in the field, along with their technical strengths/weaknesses, followed by a simple runtime performance comparison, and discussion about emerging active learning applications and instance-selection challenges therein. This survey intends to provide a high-level summarization for active learning and motivates interested readers to consider instance-selection approaches for designing effective active learning solutions.", "title": "" }, { "docid": "63c6c060e398ffaf7203edd30951f574", "text": "Mycorrhizal networks, defined as a common mycorrhizal mycelium linking the roots of at least two plants, occur in all major terrestrial ecosystems. This review discusses the recent progress and challenges in our understanding of the characteristics, functions, ecology and models of mycorrhizal networks, with the goal of encouraging future research to improve our understanding of their ecology, adaptability and evolution. We focus on four themes in the recent literature: (1) the physical, physiological and molecular evidence for the existence of mycorrhizal networks, as well as the genetic characteristics and topology of networks in natural ecosystems; (2) the types, amounts and mechanisms of interplant material transfer (including carbon, nutrients, water, defence signals and allelochemicals) in autotrophic, mycoheterotrophic or partial mycoheterotrophic plants, with particular focus on carbon transfer; (3) the influence of mycorrhizal networks on plant establishment, survival and growth, and the implications for community diversity or stability in response to environmental stress; and (4) insights into emerging methods for modelling the spatial configuration and temporal dynamics of mycorrhizal networks, including the inclusion of mycorrhizal networks in conceptual models of complex adaptive systems. We suggest that mycorrhizal networks are fundamental agents of complex adaptive systems (ecosystems) because they provide avenues for feedbacks and cross-scale interactions that lead to selforganization and emergent properties in ecosystems. We have found that research in the genetics of mycorrhizal networks has accelerated rapidly in the past 5 y with increasing resolution and throughput of molecular tools, but there still remains a large gap between understanding genes and understanding the physiology, ecology and evolution of mycorrhizal networks in our changing environment. There is now enormous and exciting potential for mycorrhizal researchers to address these higher level questions and thus inform ecosystem and evolutionary research more broadly. a 2012 The British Mycological Society. Published by Elsevier Ltd. All rights reserved. 5; fax: þ1 604 822 9102. ca (S. W. Simard), kjbeiler@interchange.ubc.ca (K. J. Beiler), binghm@interchange.ubc.ca ch.co.nz (J. R. Deslippe), Leanne.Philip@SMU.CA (L. J. Philip), francois.teste@uwa.edu.au ritish Mycological Society. Published by Elsevier Ltd. All rights reserved. 40 S. W. Simard et al.", "title": "" }, { "docid": "2a021cd2e60d46963b98c06796bda183", "text": "The VIKOR method was developed to solve MCDM problems with conflicting and noncommensurable (different units) criteria, assuming that compromising is acceptable for conflict resolution, the decision maker wants a solution that is the closest to the ideal, and the alternatives are evaluated according to all established criteria. This method focuses on ranking and selecting from a set of alternatives in the presence of conflicting criteria, and on proposing compromise solution (one or more). The VIKOR method is extended with a stability analysis determining the weight stability intervals and with trade-offs analysis. The extended VIKOR method is compared with three multicriteria decision making methods: TOPSIS, PROMETHEE, and ELECTRE. A numerical example illustrates an application of the VIKOR method, and the results by all four considered methods are compared. 2006 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "7813dc93e6bcda97768d87e80f8efb2b", "text": "The inclusion of transaction costs is an essential element of any realistic portfolio optimization. In this paper, we consider an extension of the standard portfolio problem in which transaction costs are incurred to rebalance an investment portfolio. The Markowitz framework of mean-variance efficiency is used with costs modelled as a percentage of the value transacted. Each security in the portfolio is represented by a pair of continuous decision variables corresponding to the amounts bought and sold. In order to properly represent the variance of the resulting portfolio, it is necessary to rescale by the funds available after paying the transaction costs. We show that the resulting fractional quadratic programming problem can be solved as a quadratic programming problem of size comparable to the model without transaction costs. Computational results for two empirical datasets are presented.", "title": "" }, { "docid": "d1f6cde4534115d1f2db1a6294f83bf9", "text": "Siblings play a key, supportive role in the lives of many lesbian and gay adults. Yet siblings are rarely considered in the literature regarding the coming-out process (D'Augelli et al., 1998; Hilton & Szymanski, 2011; LaSala, 2010; Savin-Williams & Dubé, 1998). To fill this gap in the research literature, we carried out a comparative case study in the country of Belgium between two sets of siblings-three Romani brothers with one sibling identifying as a gay male and three White sisters with one sibling identifying as a lesbian. These two cases were pulled from a larger qualitative study (Haxhe & D'Amore, 2014) of 102 native French-speaking Belgian participants. Findings of the present study revealed that siblings offered critical socio-emotional support in the coming out of their lesbian and gay sibling, particularly with disclosing to parents and with fostering self-acceptance.", "title": "" }, { "docid": "f1bd4f301583725c492dcea6f1870d76", "text": "ISSN: 1750-984X (Print) 1750-9858 (Online) Journal homepage: http://www.tandfonline.com/loi/rirs20 20 years later: deliberate practice and the development of expertise in sport Joseph Baker & Bradley Young To cite this article: Joseph Baker & Bradley Young (2014) 20 years later: deliberate practice and the development of expertise in sport, International Review of Sport and Exercise Psychology, 7:1, 135-157, DOI: 10.1080/1750984X.2014.896024 To link to this article: http://dx.doi.org/10.1080/1750984X.2014.896024 Published online: 01 Apr 2014.", "title": "" }, { "docid": "c43532ec0c38136c3563568a73e8f3ce", "text": "BACKGROUND & AIMS\nThe asialoglycoprotein receptor on hepatocyte membranes recognizes the galactose residues of glycoproteins. We investigated the specificity, accuracy and threshold value of asialoglycoprotein receptor imaging for estimating liver reserve via scintigraphy using (111)In-hexavalent lactoside in mouse models.\n\n\nMETHODS\n(111)In-hexavalent lactoside scintigraphy for asialoglycoprotein receptor imaging was performed on groups of normal mice, orthotopic SK-HEP-1-bearing mice, subcutaneous HepG2-bearing mice, mice with 20-80% partial hepatectomy and mice with acute hepatitis induced by acetaminophen. Liver reserve was measured by relative liver uptake and compared with normal mice. Asialoglycoprotein receptor blockade was performed via an in vivo asialofetuin competitive binding assay.\n\n\nRESULTS\nA total of 73.64±7.11% of the injection dose accumulated in the normal liver tissue region, and radioactivity was barely detected in the hepatoma region. When asialoglycoprotein receptor was blocked using asialofetuin, less than 0.41±0.04% of the injection dose was detected as background in the liver. Asialoglycoprotein receptor imaging data revealed a linear correlation between (111)In-hexavalent lactoside binding and residual liver mass (R(2)=0.8548) in 20-80% of partially hepatectomized mice, demonstrating the accuracy of (111)In-hexavalent lactoside imaging for measuring the functional liver mass. Asialoglycoprotein receptor imaging data in mice with liver failure induced using 600mg/kg acetaminophen revealed 19-45% liver reserve relative to normal mice and a fatal threshold value of 25% liver reserve.\n\n\nCONCLUSION\nThe (111)In-hexavalent lactoside imaging method appears to be a good, specific, visual and quantitative predictor of functional liver reserve. The diagnostic threshold for survival was at 25% liver reserve in mice.", "title": "" }, { "docid": "e9cae2c0919834468823bb3c8ebe7778", "text": "Flies are frequently used for postmortem interval (PMI) estimations. These estimates are usually based on the age of larval or pupal specimens. However, the age defines only the minimum PMI. In order to move forensic entomology further, a method useful for the estimation of an interval preceding insect appearance on a corpse called the pre-appearance interval (PAI) is needed. Recently, it was demonstrated that the PAI of several carrion beetles is closely related to the temperature prevailing throughout this interval. Hence, it was postulated to estimate PAI from temperature. In order to check premises for using this approach with flies, a test of the relationship between adult or oviposition PAI and temperature was made for nine species of European flies. Data on PAI originated from pig carcasses decomposing under various temperatures. Adult PAI of Hydrotaea dentipes, Hydrotaea ignava, Hydrotaea similis, Phormia regina, and Stearibia nigriceps and oviposition PAI of S. nigriceps were exponentially related to temperature. Only S. nigriceps revealed a close relationship, demonstrating solid premises for PAI estimation from temperature alone. Adult and oviposition PAI of Calliphora vomitoria and adult PAI of Hydrotaea pilipes were not related to temperature. Adult and oviposition PAI of Lucilia sericata and Lucilia caesar responded similarly, with an abrupt and large increase in a narrow range of low temperatures and no response in a broad range of high temperatures. Probably, different mechanisms form the basis for the response of PAI to temperature in flies colonizing carcasses shortly after death and flies colonizing carcasses later in the decomposition process.", "title": "" }, { "docid": "02e3f296f7c0c30cc8320abb7456bc9c", "text": "Purpose – This research aims to examine the relationship between information security strategy and organization performance, with organizational capabilities as important factors influencing successful implementation of information security strategy and organization performance. Design/methodology/approach – Based on existing literature in strategic management and information security, a theoretical model was proposed and validated. A self-administered survey instrument was developed to collect empirical data. Structural equation modeling was used to test hypotheses and to fit the theoretical model. Findings – Evidence suggests that organizational capabilities, encompassing the ability to develop high-quality situational awareness of the current and future threat environment, the ability to possess appropriate means, and the ability to orchestrate the means to respond to information security threats, are positively associated with effective implementation of information security strategy, which in turn positively affects organization performance. However, there is no significant relationship between decision making and information security strategy implementation success. Research limitations/implications – The study provides a starting point for further research on the role of decision-making in information security. Practical implications – Findings are expected to yield practical value for business leaders in understanding the viable predisposition of organizational capabilities in the context of information security, thus enabling firms to focus on acquiring the ones indispensable for improving organization performance. Originality/value – This study provides the body of knowledge with an empirical analysis of organization’s information security capabilities as an aggregation of sense making, decision-making, asset availability, and operations management constructs.", "title": "" } ]
scidocsrr
6f4ab31fca22f899dedcb84ea87a7ac2
Identifying Speakers and Listeners of Quoted Speech in Literary Works
[ { "docid": "67992d0c0b5f32726127855870988b01", "text": "We present a method for extracting social networks from literature, namely, nineteenth-century British novels and serials. We derive the networks from dialogue interactions, and thus our method depends on the ability to determine when two characters are in conversation. Our approach involves character name chunking, quoted speech attribution and conversation detection given the set of quotes. We extract features from the social networks and examine their correlation with one another, as well as with metadata such as the novel’s setting. Our results provide evidence that the majority of novels in this time period do not fit two characterizations provided by literacy scholars. Instead, our results suggest an alternative explanation for differences in social networks.", "title": "" } ]
[ { "docid": "e78e70d347fb76a79755442cabe1fbe0", "text": "Recent advances in neural variational inference have facilitated efficient training of powerful directed graphical models with continuous latent variables, such as variational autoencoders. However, these models usually assume simple, unimodal priors — such as the multivariate Gaussian distribution — yet many realworld data distributions are highly complex and multi-modal. Examples of complex and multi-modal distributions range from topics in newswire text to conversational dialogue responses. When such latent variable models are applied to these domains, the restriction of the simple, uni-modal prior hinders the overall expressivity of the learned model as it cannot possibly capture more complex aspects of the data distribution. To overcome this critical restriction, we propose a flexible, simple prior distribution which can be learned efficiently and potentially capture an exponential number of modes of a target distribution. We develop the multi-modal variational encoder-decoder framework and investigate the effectiveness of the proposed prior in several natural language processing modeling tasks, including document modeling and dialogue modeling.", "title": "" }, { "docid": "005ee252d6a89d75f8200ffe1f64f2c0", "text": "Traditionally, a distinction is made between that what is as serted by uttering a sentence and that what is presupposed. Presuppositions are characte rized as those propositions which persist even if the sentence which triggers them is neg ated. Thus ‘The king of France is bald’ presupposes that there is a king of France , since this follows from both ‘The king of France is bald’ and ‘It is not the case that the kin g of France is bald’. Stalnaker (1974) put forward the idea that a presupposition of an asserted sentence is a piece of information which is assumed by the speaker to be part of the common background of the speaker and interpreter. The presuppositions as anaphors theory of Van der Sandt (1992) — currently the best theory of presuppos ition as far as empirical predictions are concerned (Beaver 1997:983)— can be seen as o e advanced realization of Stalnaker’s basic idea. The main insight of Van der Sa ndt is that there is an interesting correspondence between the behaviour of anaph oric pronouns in discourse and the projection of presuppositions (i.e., whether and ho w presuppositions survive in complex sentences). Like most research in this area, Van d er Sandt’s work concentrates on the interaction between presuppositions and the linguistic context (i.e., the preceding sentences). However, not only linguistic contex t interacts with presuppositions. Consider:", "title": "" }, { "docid": "e4d38d8ef673438e9ab231126acfda99", "text": "The trend toward physically dispersed work groups has necessitated a fresh inquiry into the role and nature of team leadership in virtual settings. To accomplish this, we assembled thirteen culturally diverse global teams from locations in Europe, Mexico, and the United States, assigning each team a project leader and task to complete. The findings suggest that effective team leaders demonstrate the capability to deal with paradox and contradiction by performing multiple leadership roles simultaneously (behavioral complexity). Specifically, we discovered that highly effective virtual team leaders act in a mentoring role and exhibit a high degree of understanding (empathy) toward other team members. At the same time, effective leaders are also able to assert their authority without being perceived as overbearing or inflexible. Finally, effective leaders are found to be extremely effective at providing regular, detailed, and prompt communication with their peers and in articulating role relationships (responsibilities) among the virtual team members. This study provides useful insights for managers interested in developing global virtual teams, as well as for academics interested in pursuing virtual team research. 8 KAYWORTH AND LEIDNER", "title": "" }, { "docid": "d1c33990b7642ea51a8a568fa348d286", "text": "Connectionist temporal classification CTC has recently shown improved performance and efficiency in automatic speech recognition. One popular decoding implementation is to use a CTC model to predict the phone posteriors at each frame and then perform Viterbi beam search on a modified WFST network. This is still within the traditional frame synchronous decoding framework. In this paper, the peaky posterior property of CTC is carefully investigated and it is found that ignoring blank frames will not introduce additional search errors. Based on this phenomenon, a novel phone synchronous decoding framework is proposed by removing tremendous search redundancy due to blank frames, which results in significant search speed up. The framework naturally leads to an extremely compact phone-level acoustic space representation: CTC lattice. With CTC lattice, efficient and effective modular speech recognition approaches, second pass rescoring for large vocabulary continuous speech recognition LVCSR, and phone-based keyword spotting KWS, are also proposed in this paper. Experiments showed that phone synchronous decoding can achieve 3-4 times search speed up without performance degradation compared to frame synchronous decoding. Modular LVCSR with CTC lattice can achieve further WER improvement. KWS with CTC lattice not only achieved significant equal error rate improvement, but also greatly reduced the KWS model size and increased the search speed.", "title": "" }, { "docid": "80244987f22f9fe3f69fddc8af5ded5b", "text": "In the online voting system, people can vote through the internet. In order to prevent voter frauds, we use two levels of security. In the first level of security, the face of the voter is captured by a web camera and sent to the database. Later, the face of the person is verified with the face present in the database and validated using Matlab. The comparison of the two faces is done using Local Binary Pattern algorithm. The scheme is based on a merging an image and assigns a value of a central pixel. These central pixels are labeled either 0 or 1. If the value is a lower pixel, a histogram of the labels is computed and used as a descriptor. LBP results are combined together to create one vector representing the entire face image. A password (OTP) is used as the second level of security, after entering the one time password generated to their mail it is verified and allow to vote. It should be noted that with this system in place, the users, in this case, shall be given an ample time during the voting period. They shall also be trained on how to vote online before the election time.", "title": "" }, { "docid": "c8911f38bfd68baa54b49b9126c2ad22", "text": "This document presents a performance comparison of three 2D SLAM techniques available in ROS: Gmapping, Hec-torSLAM and CRSM SLAM. These algorithms were evaluated using a Roomba 645 robotic platform with differential drive and a RGB-D Kinect sensor as an emulator of a scanner lasser. All tests were realized in static indoor environments. To improve the quality of the maps, some rosbag files were generated and used to build the maps in an off-line way.", "title": "" }, { "docid": "370054a58b8f50719106508b138bd095", "text": "In-network aggregation has been proposed as one method for reducing energy consumption in sensor networks. In this paper, we explore two ideas related to further reducing energy consumption in the context of in-network aggregation. The first is by influencing the construction of the routing trees for sensor networks with the goal of reducing the size of transmitted data. To this end, we propose a group-aware network configuration method that “clusters” along the same path sensor nodes that belong to the same group. The second idea involves imposing a hierarchy of output filters on the sensor network with the goal of both reducing the size of transmitted data and minimizing the number of transmitted messages. More specifically, we propose a framework to use temporal coherency tolerances in conjunction with in-network aggregation to save energy at the sensor nodes while maintaining specified quality of data. These tolerances are based on user preferences or can be dictated by the network in cases where the network cannot support the current tolerance level. Our framework, called TiNA, works on top of existing in-network aggregation schemes. We evaluate experimentally our proposed schemes in the context of existing in-network aggregation schemes. We present experimental results measuring energy consumption, response time, and quality of data for Group-By queries. Overall, our schemes provide significant energy savings with respect to communication and a negligible drop in quality of data.", "title": "" }, { "docid": "72420289372499b50e658ef0957a3ad9", "text": "A ripple current cancellation technique injects AC current into the output voltage bus of a converter that is equal and opposite to the normal converter ripple current. The output current ripple is ideally zero, leading to ultra-low noise converter output voltages. The circuit requires few additional components, no active circuits are required. Only an additional filter inductor winding, an auxiliary inductor, and small capacitor are required. The circuit utilizes leakage inductance of the modified filter inductor as all or part of the required auxiliary inductance. Ripple cancellation is independent of switching frequency, duty cycle, and other converter parameters. The circuit eliminates ripple current in both continuous conduction mode and discontinuous conduction mode. Experimental results provide better than an 80/spl times/ ripple current reduction.", "title": "" }, { "docid": "3189fa20d605bf31c404b0327d74da79", "text": "We now see an increasing number of self-tracking apps and wearable devices. Despite the vast number of available tools, however, it is still challenging for self-trackers to find apps that suit their unique tracking needs, preferences, and commitments. Furthermore, people are bounded by the tracking tools’ initial design because it is difficult to modify, extend, or mash up existing tools. In this paper, we present OmniTrack, a mobile self-tracking system, which enables self-trackers to construct their own trackers and customize tracking items to meet their individual tracking needs. To inform the OmniTrack design, we first conducted semi-structured interviews (N = 12) and analyzed existing mobile tracking apps (N = 62). We then designed and developed OmniTrack as an Android mobile app, leveraging a semi-automated tracking approach that combines manual and automated tracking methods. We evaluated OmniTrack through a usability study (N = 10) and improved its interfaces based on the feedback. Finally, we conducted a 3-week deployment study (N = 21) to assess if people can capitalize on OmniTrack’s flexible and customizable design to meet their tracking needs. From the study, we showed how participants used OmniTrack to create, revise, and appropriate trackers—ranging from a simple mood tracker to a sophisticated daily activity tracker. We discuss how OmniTrack positively influences and supports self-trackers’ tracking practices over time, and how to further improve OmniTrack by providing more appropriate visualizations and sharable templates, incorporating external contexts, and supporting researchers’ unique data collection needs.", "title": "" }, { "docid": "70358147741dda2d10fdd2d103af9b3a", "text": "Semi-structured documents (e.g. journal art,icles, electronic mail, television programs, mail order catalogs, . ..) a.re often not explicitly typed; the only available t,ype information is the implicit structure. An explicit t,ype, however, is needed in order to a.pply objectoriented technology, like type-specific methods. In this paper, we present a.n experimental vector space cla.ssifier for determining the type of semi-structured documents. Our goal was to design a. high-performa.nce classifier in t,erms of accuracy (recall and precision), speed, and extensibility.", "title": "" }, { "docid": "b22a05d39ba34d581f0d809e89850520", "text": "Due to recent financial crises and regulatory concerns, financial intermediaries' credit risk assessment is an area of renewed interest in both the academic world and the business community. In this paper, we propose a new fuzzy support vector machine to discriminate good creditors from bad ones. Because in credit scoring areas we usually cannot label one customer as absolutely good who is sure to repay in time, or absolutely bad who will default certainly, our new fuzzy support vector machine treats every sample as both positive and negative classes, but with different memberships. By this way we expect the new fuzzy support vector machine to have more generalization ability, while preserving the merit of insensitive to outliers, as the fuzzy support vector machine (SVM) proposed in previous papers. We reformulate this kind of two-group classification problem into a quadratic programming problem. Empirical tests on three public datasets show that it can have better discriminatory power than the standard support vector machine and the fuzzy support vector machine if appropriate kernel and membership generation method are chosen.", "title": "" }, { "docid": "eb32ce661a0d074ce90861793a2e4de7", "text": "A new transfer function from control voltage to duty cycle, the closed-current loop, which captures the natural sampling effect is used to design a controller for the voltage-loop of a pulsewidth modulated (PWM) dc-dc converter operating in continuous-conduction mode (CCM) with peak current-mode control (PCM). This paper derives the voltage loop gain and the closed-loop transfer function from reference voltage to output voltage. The closed-loop transfer function from the input voltage to the output voltage, or the closed-loop audio-susceptibility is derived. The closed-loop transfer function from output current to output voltage, or the closed loop output impedance is also derived. The derivation is performed using an averaged small-signal model of the example boost converter for CCM. Experimental verification is presented. The theoretical and experimental results were in good agreement, confirming the validity of the transfer functions derived.", "title": "" }, { "docid": "f670178ac943bbcc17978a0091159c7f", "text": "In this article, we present the first academic comparable corpus involving written French and French Sign Language. After explaining our initial motivation to build a parallel set of such data, especially in the context of our work on Sign Language modelling and our prospect of machine translation into Sign Language, we present the main problems posed when mixing language channels and modalities (oral, written, signed), discussing the translation-vs-interpretation narrative in particular. We describe the process followed to guarantee feature coverage and exploitable results despite a serious cost limitation, the data being collected from professional translations. We conclude with a few uses and prospects of the corpus.", "title": "" }, { "docid": "fe753c4be665700ac15509c4b831309c", "text": "Elements of Successful Digital Transformation12 New digital technologies, particularly what we refer to as SMACIT3 (social, mobile, analytics, cloud and Internet of things [IoT]) technologies, present both game-changing opportunities and existential threats to big old companies. GE’s “industrial internet” and Philips’ digital platform for personalized healthcare information represent bets made by big old companies attempting to cash", "title": "" }, { "docid": "486b140009524e48da94712191dba78e", "text": "The concept of holistic processing is a cornerstone of face-recognition research. In the study reported here, we demonstrated that holistic processing predicts face-recognition abilities on the Cambridge Face Memory Test and on a perceptual face-identification task. Our findings validate a large body of work that relies on the assumption that holistic processing is related to face recognition. These findings also reconcile the study of face recognition with the perceptual-expertise work it inspired; such work links holistic processing of objects with people's ability to individuate them. Our results differ from those of a recent study showing no link between holistic processing and face recognition. This discrepancy can be attributed to the use in prior research of a popular but flawed measure of holistic processing. Our findings salvage the central role of holistic processing in face recognition and cast doubt on a subset of the face-perception literature that relies on a problematic measure of holistic processing.", "title": "" }, { "docid": "809384abcd6e402c1b30c3d2dfa75aa1", "text": "Traditionally, psychiatry has offered clinical insights through keen behavioral observation and a deep study of emotion. With the subsequent biological revolution in psychiatry displacing psychoanalysis, some psychiatrists were concerned that the field shifted from “brainless” to “mindless.”1 Over the past 4 decades, behavioral expertise, once the strength of psychiatry, has diminished in importanceaspsychiatricresearchfocusedonpharmacology,genomics, and neuroscience, and much of psychiatric practicehasbecomeaseriesofbriefclinical interactionsfocused on medication management. In research settings, assigning a diagnosis from the Diagnostic and Statistical Manual of Mental Disorders has become a surrogate for behavioral observation. In practice, few clinicians measure emotion, cognition, or behavior with any standard, validated tools. Some recent changes in both research and practice are promising. The National Institute of Mental Health has led an effort to create a new diagnostic approach for researchers that is intended to combine biological, behavioral, and social factors to create “precision medicine for psychiatry.”2 Although this Research Domain Criteria project has been controversial, the ensuing debate has been", "title": "" }, { "docid": "404f1c68c097c74b120189af67bf00f5", "text": "In 1991, a novel robot, MIT-MANUS, was introduced to study the potential that robots might assist in and quantify the neuro-rehabilitation of motor function. MIT-MANUS proved an excellent tool for shoulder and elbow rehabilitation in stroke patients, showing in clinical trials a reduction of impairment in movements confined to the exercised joints. This successful proof of principle as to additional targeted and intensive movement treatment prompted a test of robot training examining other limb segments. This paper focuses on a robot for wrist rehabilitation designed to provide three rotational degrees-of-freedom. The first clinical trial of the device will enroll 200 stroke survivors. Ultimately 160 stroke survivors will train with both the proximal shoulder and elbow MIT-MANUS robot, as well as with the novel distal wrist robot, in addition to 40 stroke survivor controls. So far 52 stroke patients have completed the robot training (ongoing protocol). Here, we report on the initial results on 36 of these volunteers. These results demonstrate that further improvement should be expected by adding additional training to other limb segments.", "title": "" }, { "docid": "b408788cd974438f32c1858cda9ff910", "text": "Speaking as someone who has personally felt the influence of the “Chomskian Turn”, I believe that one of Chomsky’s most significant contributions to Psychology, or as it is now called, Cognitive Science was to bring back scientific realism. This may strike you as a very odd claim, for one does not usually think of science as needing to be talked into scientific realism. Science is, after all, the study of reality by the most precise instruments of measurement and analysis that humans have developed.", "title": "" }, { "docid": "90b2d777eeac2466293c60ba699ea76b", "text": "As autonomous vehicles become an every-day reality, high-accuracy pedestrian detection is of paramount practical importance. Pedestrian detection is a highly researched topic with mature methods, but most datasets (for both training and evaluation) focus on common scenes of people engaged in typical walking poses on sidewalks. But performance is most crucial for dangerous scenarios that are rarely observed, such as children playing in the street and people using bicycles/skateboards in unexpected ways. Such in-the-tail data is notoriously hard to observe, making both training and testing difficult. To analyze this problem, we have collected a novel annotated dataset of dangerous scenarios called the Precarious Pedestrian dataset. Even given a dedicated collection effort, it is relatively small by contemporary standards (&#x2248; 1000 images). To explore large-scale data-driven learning, we explore the use of synthetic data generated by a game engine. A significant challenge is selected the right priors or parameters for synthesis: we would like realistic data with realistic poses and object configurations. Inspired by Generative Adversarial Networks, we generate a massive amount of synthetic data and train a discriminative classifier to select a realistic subset (that fools the classifier), which we deem Synthetic Imposters. We demonstrate that this pipeline allows one to generate realistic (or adverserial) training data by making use of rendering/animation engines. Interestingly, we also demonstrate that such data can be used to rank algorithms, suggesting that Synthetic Imposters can also be used for in-the-tail validation at test-time, a notoriously difficult challenge for real-world deployment.", "title": "" }, { "docid": "2c4fed71ee9d658516b017a924ad6589", "text": "As the concept of Friction stir welding is relatively new, there are many areas, which need thorough investigation to optimize and make it commercially viable. In order to obtain the desired mechanical properties, certain process parameters, like rotational and translation speeds, tool tilt angle, tool geometry etc. are to be controlled. Aluminum alloys of 5xxx series and their welded joints show good resistance to corrosion in sea water. Here, a literature survey has been carried out for the friction stir welding of 5xxx series aluminum alloys.", "title": "" } ]
scidocsrr
90234aee8b4c3e185daef74842ba70dc
Torque Ripple Suppression in Flux-Switching PM Motor by Harmonic Current Injection Based on Voltage Space-Vector Modulation
[ { "docid": "629b774e179a446ac2cbaef683daef25", "text": "Flux-switching permanent magnet (FSPM) motors have a doubly salient structure, the magnets being housed in the stator and the stator winding comprising concentrated coils. They have attracted considerable interest due to their essentially sinusoidal phase back electromotive force (EMF) waveform. However, to date, the inherent nature of this desirable feature has not been investigated in detail. Thus, a typical three-phase FSPM motor with 12 stator teeth and ten rotor poles is considered. It is found that, since there is a significant difference in the magnetic flux paths associated with the coils of each phase, this results in harmonics in the coil back EMF waveforms being cancelled, resulting in essentially sinusoidal phase back EMF waveforms. In addition, the influence of the rotor pole-arc on the phase back EMF waveform is evaluated by finite-element analysis, and an optimal pole-arc for minimum harmonic content in the back EMF is obtained and verified experimentally.", "title": "" } ]
[ { "docid": "8355b67520999a30c94ac36a6a01d60c", "text": "Bitcoin is designed to protect user anonymity (or pseudonymity) in a financial transaction, and has been increasingly adopted by major ecommerce websites such as Dell, PayPal and Expedia. While the anonymity of Bitcoin transactions has been extensively studied, little attention has been paid to the security of post-transaction correspondence. In a commercial application, the merchant and the user often need to engage in follow-up correspondence after a Bitcoin transaction is completed, e.g., to acknowledge the receipt of payment, to confirm the billing address, to arrange the product delivery, to discuss refund and so on. Currently, such follow-up correspondence is typically done in plaintext via email with no guarantee on confidentiality. Obviously, leakage of sensitive data from the correspondence (e.g., billing address) can trivially compromise the anonymity of Bitcoin users. In this paper, we initiate the first study on how to realise end-to-end secure communication between Bitcoin users in a post-transaction scenario without requiring any trusted third party or additional authentication credentials. This is an important new area that has not been covered by any IEEE or ISO/IEC security standard, as none of the existing PKI-based or password-based AKE schemes are suitable for the purpose. Instead, our idea is to leverage the Bitcoin’s append-only ledger as an additional layer of authentication between previously confirmed transactions. This naturally leads to a new category of AKE protocols that bootstrap trust entirely from the block chain. We call this new category “Bitcoin-based AKE” and present two concrete protocols: one is non-interactive with no forward secrecy, while the other is interactive with additional guarantee of forward secrecy. Finally, we present proof-of-concept prototypes for both protocols with experimental results to demonstrate their practical feasibility.", "title": "" }, { "docid": "771ddd19549c46ecfb50ee96bdcc3dfa", "text": "A metamaterial 1:4 series power divider that provides equal power split to all four output ports over a large bandwidth is presented, which can be extended to an arbitrary number of output ports. The divider comprises four nonradiating metamaterial lines in series, incurring a zero insertion phase over a large bandwidth, while simultaneously maintaining a compact length of /spl lambda//sub 0//8. Compared to a series power divider employing conventional one-wavelength long meandered transmission lines to provide in-phase signals at the output ports, the metamaterial divider provides a 165% increase in the input return-loss bandwidth and a 155% and 154% increase in the through-power bandwidth to ports 3 and 4, respectively. In addition, the metamaterial divider is significantly more compact, occupying only 2.6% of the area that the transmission line divider occupies. The metamaterial and transmission line dividers exhibit comparable insertion losses.", "title": "" }, { "docid": "303d489a5f2f1cf021a1854b6c2724e0", "text": "RGB-D cameras provide both color images and per-pixel depth stimates. The richness of this data and the recent development of low-c ost sensors have combined to present an attractive opportunity for mobile robot ics research. In this paper, we describe a system for visual odometry and mapping using an RGB-D camera, and its application to autonomous flight. By leveraging resu lts from recent stateof-the-art algorithms and hardware, our system enables 3D fl ight in cluttered environments using only onboard sensor data. All computation an d se sing required for local position control are performed onboard the vehicle, r educing the dependence on unreliable wireless links. However, even with accurate 3 D sensing and position estimation, some parts of the environment have more percept ual structure than others, leading to state estimates that vary in accuracy across the environment. If the vehicle plans a path without regard to how well it can localiz e itself along that path, it runs the risk of becoming lost or worse. We show how the Belief Roadmap (BRM) algorithm (Prentice and Roy, 2009), a belief space extensio n of the Probabilistic Roadmap algorithm, can be used to plan vehicle trajectories that incorporate the sensing model of the RGB-D camera. We evaluate the effective ness of our system for controlling a quadrotor micro air vehicle, demonstrate its use for constructing detailed 3D maps of an indoor environment, and discuss its li mitations. Abraham Bachrach and Samuel Prentice contributed equally to this work. Abraham Bachrach, Samuel Prentice, Ruijie He, Albert Huang a nd Nicholas Roy Computer Science and Artificial Intelligence Laboratory, Ma ss chusetts Institute of Technology, Cambridge, MA 02139. e-mail: abachrac, ruijie, albert, prentice, nickroy@mit.ed u Peter Henry, Michael Krainin and Dieter Fox University of Washington, Department of Computer Science & Engi neering, Seattle, WA. e-mail: peter, mkrainin, fox@cs.washington.edu. Daniel Maturana The Robotics Institute, Carnegie Mellon University, Pittsbur gh, PA. e-mail: dimatura@cmu.edu", "title": "" }, { "docid": "7d0b37434699aa5c3b36de33549a2b68", "text": "In Ethiopia, malaria control has been complicated due to resistance of the parasite to the current drugs. Thus, new drugs are required against drug-resistant Plasmodium strains. Historically, many of the present antimalarial drugs were discovered from plants. This study was, therefore, conducted to document antimalarial plants utilized by Sidama people of Boricha District, Sidama Zone, South Region of Ethiopia. An ethnobotanical survey was carried out from September 2011 to February 2012. Data were collected through semistructured interview and field and market observations. Relative frequency of citation (RFC) was calculated and preference ranking exercises were conducted to estimate the importance of the reported medicinal plants in Boricha District. A total of 42 antimalarial plants belonging to 27 families were recorded in the study area. Leaf was the dominant plant part (59.0%) used in the preparation of remedies and oral (97.4%) was the major route of administration. Ajuga integrifolia scored the highest RFC value (0.80). The results of this study revealed the existence of rich knowledge on the use of medicinal plants in the study area to treat malaria. Thus, an attempt should be made to conserve and evaluate the claimed antimalarial medicinal plants with priority given to those that scored the highest RFC values.", "title": "" }, { "docid": "e44b779a299c6454e5870b02e7186a9f", "text": "Region-based convolutional neural networks (R-CNNs) have achieved great success in object detection recently. These deep models depend on region proposal algorithms to hypothesize object locations. In this paper, we combine a special region proposal algorithm with R-CNN, and apply it to pedestrian detection. The special algorithm is used to generate region proposals only for pedestrian class. It is different from the popular region proposal algorithm selective search that detects generic object locations. The experimental results prove that region proposals generated by our method are more applicable than selective search for pedestrian detection. Our method performs faster training and testing than the deep model based on, and it achieves competitive performance compared to the state-of-the-arts in pedestrian detection.", "title": "" }, { "docid": "282a8c7298dc48818fccf63125bbbc15", "text": "[1] The sensitivity of the tropospheric extratropical circulation to thermal perturbations of the polar stratosphere is examined in a dry primitive equation general circulationmodel with zonally symmetric forcing and boundary conditions. For sufficiently strong cooling of the polar winter stratosphere, the winter-hemisphere tropospheric jet shifts polewards and strengthens markedly at the surface; this is accompanied by a drop in surface pressure at high latitudes in the same hemisphere. In addition, this extratropical tropospheric response is found to be very similar to the model’s leading pattern of internal variability. These results are tested for robustness at several horizontal and vertical resolutions, and the same tropospheric response is observed at all but the lowest resolution tested. The behavior of this relatively simple model is broadly consistent with recent observational and modeling studies of trends in extratropical atmospheric variability.", "title": "" }, { "docid": "7aa8eb86ef6cedb4a5786b25f88c67e9", "text": "We present ASP Modulo ‘Space-Time’, a declarative representational and computational framework to perform commonsense reasoning about regions with both spatial and temporal components. Supported are capabilities for mixed qualitative-quantitative reasoning, consistency checking, and inferring compositions of space-time relations; these capabilities combine and synergise for applications in a range of AI application areas where the processing and interpretation of spatio-temporal data is crucial. The framework and resulting system is the only general KR-based method for declaratively reasoning about the dynamics of ‘space-time’ regions as first-class objects. We present an empirical evaluation (with scalability and robustness results), and include diverse application examples involving interpretation and control tasks.", "title": "" }, { "docid": "d5870092a3e8401654b5b9948c77cb0a", "text": "Recent research shows that there has been increased interest in investigating the role of mood and emotions in the HCI domain. Our moods, however, are complex. They are affected by many dynamic factors and can change multiple times throughout each day. Furthermore, our mood can have significant implications in terms of our experiences, our actions and most importantly on our interactions with other people. We have developed MobiMood, a proof-of-concept social mobile application that enables groups of friends to share their moods with each other. In this paper, we present the results of an exploratory field study of MobiMood, focusing on explicit mood sharing in-situ. Our results highlight that certain contextual factors had an effect on mood and the interpretation of moods. Furthermore, mood sharing and mood awareness appear to be good springboards for conversations and increased communication among users. These and other findings lead to a number of key implications in the design of mobile social awareness applications.", "title": "" }, { "docid": "e0fd648da901ed99ddbed3457bc83cfe", "text": "This clinical trial assessed the ability of Gluma Dentin Bond to inhibit dentinal sensitivity in teeth prepared to receive complete cast restorations. Twenty patients provided 76 teeth for the study. Following tooth preparation, dentinal surfaces were coated with either sterile water (control) or two 30-second applications of Gluma Dentin Bond (test) on either intact or removed smear layers. Patients were recalled after 14 days for a test of sensitivity of the prepared dentin to compressed air, osmotic stimulus (saturated CaCl2 solution), and tactile stimulation via a scratch test under controlled loads. A significantly lower number of teeth responded to the test stimuli for both Gluma groups when compared to the controls (P less than .01). No difference was noted between teeth with smear layers intact or removed prior to treatment with Gluma.", "title": "" }, { "docid": "e3010b236d32ac0ba0909e0c054849ee", "text": "We present a HMM based system for real-time gesture analysis. The system outputs continuously parameters relative to the gesture time progression and its likelihood. These parameters are computed by comparing the performed gesture with stored reference gestures. The method relies on a detailed modeling of multidimensional temporal curves. Compared to standard HMM systems, the learning procedure is simplified using prior knowledge allowing the system to use a single example for each class. Several applications have been developed using this system in the context of music education, music and dance performances and interactive installation. Typically, the estimation of the time progression allows for the synchronization of physical gestures to sound files by time stretching/compressing audio buffers or videos.", "title": "" }, { "docid": "e5c4870acea1c7315cce0561f583626c", "text": "A discussion of CMOS readout technologies for infrared (IR) imaging systems is presented. First, the description of various types of IR detector materials and structures is given. The advances of detector fabrication technology and microelectronics process technology have led to the development of large format array of IR imaging detectors. For such large IR FPA’s which is the critical component of the advanced infrared imaging system, general requirement and specifications are described. To support a good interface between FPA and downstream signal processing stage, both conventional and recently developed CMOS readout techniques are presented and discussed. Finally, future development directions including the smart focal plane concept are also introduced.", "title": "" }, { "docid": "a91f757e22bcc9a2da01d91b2ee43a07", "text": "The counterfeiting of electronic components has become a major challenge in the 21st century. The electronic component supply chain has been greatly affected by widespread counterfeit incidents. A specialized service of testing, detection, and avoidance must be created to tackle the worldwide outbreak of counterfeit integrated circuits (ICs). So far, there are standards and programs in place for outlining the testing, documenting, and reporting procedures. However, there is not yet enough research addressing the detection and avoidance of such counterfeit parts. In this paper we will present, in detail, all types of counterfeits, the defects present in them, and their detection methods. We will then describe the challenges to implementing these test methods and to their effectiveness. We will present several anti-counterfeit measures to prevent this widespread counterfeiting, and we also consider the effectiveness and limitations of these anti-counterfeiting techniques.", "title": "" }, { "docid": "886285e5e732697d956c5c70713c5acb", "text": "Falls are the leading cause of injury-related morbidity and mortality among older adults. Over 90 % of hip and wrist fractures and 60 % of traumatic brain injuries in older adults are due to falls. Another serious consequence of falls among older adults is the ‘long lie’ experienced by individuals who are unable to get up and remain on the ground for an extended period of time after a fall. Considerable research has been conducted over the past decade on the design of wearable sensor systems that can automatically detect falls and send an alert to care providers to reduce the frequency and severity of long lies. While most systems described to date incorporate threshold-based algorithms, machine learning algorithms may offer increased accuracy in detecting falls. In the current study, we compared the accuracy of these two approaches in detecting falls by conducting a comprehensive set of falling experiments with 10 young participants. Participants wore waist-mounted tri-axial accelerometers and simulated the most common causes of falls observed in older adults, along with near-falls and activities of daily living. The overall performance of five machine learning algorithms was greater than the performance of five threshold-based algorithms described in the literature, with support vector machines providing the highest combination of sensitivity and specificity.", "title": "" }, { "docid": "27f001247d02f075c9279b37acaa49b3", "text": "A Zadoff–Chu (ZC) sequence is uncorrelated with a non-zero cyclically shifted version of itself. However, this alone is insufficient to mitigate inter-code interference in LTE initial uplink synchronization. The performance of the state-of-the-art algorithms vary widely depending on the specific ZC sequences employed. We develop a systematic procedure to choose the ZC sequences that yield the optimum performance. It turns out that the procedure for ZC code selection in LTE standard is suboptimal when the carrier frequency offset is not small.", "title": "" }, { "docid": "11ce5da16cf0c0c6cfb85e0d0bbdc13e", "text": "Recently, fully-connected and convolutional neural networks have been trained to reach state-of-the-art performance on a wide variety of tasks such as speech recognition, image classification, natural language processing, and bioinformatics data. For classification tasks, much of these “deep learning” models employ the softmax activation functions to learn output labels in 1-of-K format. In this paper, we demonstrate a small but consistent advantage of replacing softmax layer with a linear support vector machine. Learning minimizes a margin-based loss instead of the cross-entropy loss. In almost all of the previous works, hidden representation of deep networks are first learned using supervised or unsupervised techniques, and then are fed into SVMs as inputs. In contrast to those models, we are proposing to train all layers of the deep networks by backpropagating gradients through the top level SVM, learning features of all layers. Our experiments show that simply replacing softmax with linear SVMs gives significant gains on datasets MNIST, CIFAR-10, and the ICML 2013 Representation Learning Workshop’s face expression recognition challenge.", "title": "" }, { "docid": "9d1dfaabd9bd3df6dfec8457fe762928", "text": "In recent research, the problem of document replacement in Web caches has received much interest. Web caches are different from system/processor caches because web caches have several additional criteria (frequency and recentness of pages, size of a document, cost of fetching a document etc.). It has been shown that, the classical LRU replacement policy performs poorly in Web caches because the above criteria decrease hit rate and increase eviction latency and access latency of Web request. Moreover, in order to implement the classical and novel schemes, one needs to maintain complex data structures and the operations of the data structures lead net traffic jam. The current randomized algorithms don't perform constantly well. We propose a randomized algorithm that avoids the need for any data structure and performs constantly well. In this paper, a new randomized algorithm approximating random replacement (RR) and least recently used (LRU) scheme is introduced for page replacement in caches. The basic version of the new proposed algorithm performs as follows: bins are logical division in cache and number of bins depends on percentage of error acceptable for approximation. When a new page is to be evicted from the cache, the algorithm randomly selects a bin containing pages (old, new, or both type of pages). After searching for an old page randomly in the selected bin, it replaces the old page, if there any, with the new page. Otherwise it selects another bin randomly and continues in the same manner. The algorithm can easily be implemented without using any complex data structure. It also reduces the response time effectively. Experiment shows that the algorithm performs better while being used in Web caches.", "title": "" }, { "docid": "138e0d07a9c22224c04bf4b983819f01", "text": "The olfactory receptor gene family is the largest in the mammalian genome (and larger than any other gene family in any other species), comprising 1% of genes. Beginning with a genetic radiation in reptiles roughly 200 million years ago, terrestrial vertebrates can detect millions of odorants. Each species has an olfactory repertoire unique to the genetic makeup of that species. The human olfactory repertoire is quite diverse. Contrary to erroneously reported estimates, humans can detect millions of airborne odorants (volatiles) in quite small concentrations. We exhibit tremendous variation in our genes that control the receptors in our olfactory epithelium, and this may relate to variation in cross-cultural perception of and preference for odors. With age, humans experience differential olfactory dysfunction, with some odors remaining strong and others becoming increasingly faint. Olfactory dysfunction has been pathologically linked to depression and quality of life issues, neurodegenerative disorders, adult and childhood obesity, and decreased nutrition in elderly females. Human pheromones, a controversial subject, seem to be a natural phenomenon, with a small number identified in clinical studies. The consumer product industry (perfumes, food and beverage, and pesticides) devotes billions of dollars each year supporting olfactory research in an effort to enhance product design and marketing. With so many intersecting areas of research, anthropology has a tremendous contribution to make to this growing body of work that crosses traditional disciplinary lines and has a clear applied component. Also, anthropology could benefit from considering the power of the olfactory system in memory, behavioral and social cues, evolutionary history, mate choice, food decisions, and overall health.", "title": "" }, { "docid": "27ed0ab08b10935d12b59b6d24bed3f1", "text": "A major stumbling block to progress in understanding basic human interactions, such as getting out of bed or opening a refrigerator, is lack of good training data. Most past efforts have gathered this data explicitly: starting with a laundry list of action labels, and then querying search engines for videos tagged with each label. In this work, we do the reverse and search implicitly: we start with a large collection of interaction-rich video data and then annotate and analyze it. We use Internet Lifestyle Vlogs as the source of surprisingly large and diverse interaction data. We show that by collecting the data first, we are able to achieve greater scale and far greater diversity in terms of actions and actors. Additionally, our data exposes biases built into common explicitly gathered data. We make sense of our data by analyzing the central component of interaction - hands. We benchmark two tasks: identifying semantic object contact at the video level and non-semantic contact state at the frame level. We additionally demonstrate future prediction of hands.", "title": "" }, { "docid": "ad8b5a47ede41c39a3ac5fa462dc8815", "text": "Because traditional electric power distribution systems have been designed assuming the primary substation is the sole source of power and short-circuit capacity, DR interconnection results in operating situations that do not occur in a conventional system. This paper discusses several system issues which may be encountered as DR penetrates into distribution systems. The voltage issues covered are the DR impact on system voltage, interaction of DR and capacitor operations, and interaction of DR and voltage regulator and LTC operations. Protection issues include fuse coordination, feeding faults after utility protection opens, impact of DR on interrupting rating of devices, faults on adjacent feeders, fault detection, ground source impacts, single phase interruption on three phase line, recloser coordination and conductor burndown. Loss of power grid is also discussed, including vulnerability and overvoltages due to islanding and coordination with reclosing. Also covered separately are system restoration and network issues.", "title": "" } ]
scidocsrr
207bd4da44b6656db722c76b14347900
Two-Phase Calibration for a Mirror Metaphor Augmented Reality System
[ { "docid": "758def2083055b147d19b99280e5c8d2", "text": "We present the Virtual Showcase, a new multiviewer augmented reality display device that has the same form factor as a real showcase traditionally used for museum exhibits.", "title": "" }, { "docid": "08b8c184ff2230b0df2c0f9b4e3f7840", "text": "We present an augmented reality magic mirror for teaching anatomy. The system uses a depth camera to track the pose of a user standing in front of a large display. A volume visualization of a CT dataset is augmented onto the user, creating the illusion that the user can look into his body. Using gestures, different slices from the CT and a photographic dataset can be selected for visualization. In addition, the system can show 3D models of organs, text information and images about anatomy. For interaction with this data we present a new interaction metaphor that makes use of the depth camera. The visibility of hands and body is modified based on the distance to a virtual interaction plane. This helps the user to understand the spatial relations between his body and the virtual interaction plane.", "title": "" } ]
[ { "docid": "f09dd9a1091eadefd89e1507590438f0", "text": "Precision skull surgery requires specialized instrumentation to satisfy demanding requirements in cochlear array implantation, deep brain stimulation electrode placement, and related applications. A miniaturized reconfigurable parallel kinematic mechanism which can be directly mounted on a patient’s skull was designed, built, and tested for precision skull surgery. A Stewart–Gough platform is attached to a patient’s skull so no optical tracking affecting the overall accuracy in keyhole surgery is required. Six bone anchors comprising the mechanism base joints are implanted at positions with sufficient skull thickness. Since no fixation frame is required, intervention planning flexibility is increased. The centers of the spherical shaped bone anchors can be localized accurately in the image space. An implicit registration to the physical space is performed by assembling the kinematics. Registration error is minimized compared to common optical tracker-based approaches. Due to the reconfigurable mechanism, an optimization of the hexapod’s configuration is needed to maximize accuracy and mechanical stability during the incision. Mathematical simulation was conducted to estimate system performance. Simulation results revealed significant improvement in accuracy and stability when exploiting the redundant degrees of freedom and the implemented reconfigurability. Inaccurate localization of base points in the image data set was identified as the main source of error. A first prototype with passive prismatic actuators, i.e. micrometer calipers, was successfully built. A head-mounted parallel kinematic device for high precision skull surgery was developed that provides submillimetric accuracy in straight-line incisions. The system offers enhanced flexibility due to the absence of a rigid fixation frame.", "title": "" }, { "docid": "328f203039ecf41028cfab6c7d700ddf", "text": "Two studies support our hypothesis that connected and interdependent self-focus evokes a generally context-dependent cognitive mode (focused on object–context relations) and provide some evidence that separate and independent self-focus evokes a generally context-independent cognitive mode (focused on objects, independent of contexts). Consistent with our predictions, experimental manipulation of interdependent self-focus influences cognitive speed/accuracy (Experiment 1) and memory (Experiment 2). When primed self-focus is congruent with the perceptual task at hand, perceptual speed increases (as shown by a significant task by prime interaction effect) and when primed, interdependent self-focus improves memory for incidentally encoded contextual information. Further research to link primed and chronic self-focus effects is called for. 2002 Elsevier Science (USA). All rights reserved.", "title": "" }, { "docid": "8fd3cf98de49be86d14647368324dd75", "text": "System administration has often been considered to be a “practice” with no theoretical underpinnings. In this thesis, we begin to define a theory of system administration, based upon two activities of system administrators: configuration management and dependency analysis. We formalize and explore the complexity of these activities, and demonstrate that they are intractable in the general case. We define the concepts of system behavior, kinds of configuration operations, a model of configuration management, a model of reproducibility, and proofs that several parts of the process are NP-complete or NP-hard. We also explore how system administrators keep these tasks tractable in practice. This is a first step toward a theory of system administration and a common language for discussing the theoretical underpinnings of the practice.", "title": "" }, { "docid": "3ae4fe9ff12535de24ca0ab01b91902c", "text": "The purpose of this paper is to design and develop a MAC Transmitter on Field Programmable Gate Arrays (FPGA) that converts 32 bit data in to 4 bit DATA for transmitter. The data which is used for transmission is UDP Packet. The entire UDP packet will go as data for MAC frame. In this paper we design the Ethernet (IEEE 802.3) connection oriented LAN Medium Access Control Transmitter (MAC). It starts by describing the behavior of MAC circuit using Verilog. A synthesized Verilog model of the chip is developed and implemented on target technology. This paper will concentrate on the testability features that increase product reliability. It focuses on the design of a MAC Transmitter chip with embedded Built-In-SelfTest (BIST) architecture using FPGA technology. Keywords—UDP,MAC, IEEE 802.3 1.INTRODUCTION : User Datagram Protocol (UDP) is a transport layer protocol that supports Network Application. It layered on just below the „Session‟ and sits above the IP(Internet Protocol) in open system interconnection model (OSI). This protocol is similar to TCP (transmission control protocol) that is used in client/ server programs like video conference systems expect UDP is connection less.Unlike TCP, UDP doesn't establish a connection before sending data, it just sends. Because of this, UDP is called \"Connectionless\". UDP packets are often called \"Datagrams. It‟s a transport layer protocol. This section will cover the UDP protocol, its header structure & the way with which it establishes the network connection. UDP is a connectionless and unreliable transport protocol. The two ports serve to identify the end points within the source and destination machines. User Datagram Protocol is used, in place of TCP, when a reliable delivery is not required. However, UDP is never used to send important data such as web-pages, database information, etc. Streaming media such as video ,audio and others use UDP because it offers speed. The reason UDP is faster than TCP is because there is no form of flow control. No error checking, error correction, or acknowledgment is done by UDP.UDP is only concerned with speed. So when, the data sent over the Internet is affected by collisions, and errors will be present. UDP packet's called as user datagrams with 8 bytes header. A format of user datagrams is shown in figure below. In the user datagrams first 8 bytes contains header information and the remaining bytes contains data. Figure: UDP Frame Format The Media Access Control (MAC) data communication protocol sub-layer, also known as the Medium Access Control, is a part of the data link layer specified in the seven-layer of OSI model (layer 2). It provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multipoint network, typically with a local area network (LAN) or metropolitan area network (MAN). A MAC protocol is not required in fullduplex point-to-point communication. In single channel point-topoint communications full-duplex can be emulated. This emulation can be considered a MAC layer. The MAC sublayer acts as an interface between the Logical Link Control sub layer and the network's physical layer. The MAC layer provides an addressing mechanism called physical address or MAC address. This is a unique serial number assignedto each network adapter, making it possible to deliver data packets to a destination within a sub network, i.e. a physical network without routers, for example an Ethernet network. FPGA area and speed optimization to implement computer network protocol is subject of research mainly due to its importance to network performance. The objective S.Nayeema,K.Jamal / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.338-342 339 | P a g e of resource utilization of field programming gate array (FPGA) is to allocate contending to embed maximum intricate functions. This approach makes design cost effective and maximizing IEEE 802.3 MAC performance. Binary exponential back off algorithm. Verilog coding to implemented synchronous counter and FSM coding style influence performance of MAC transmitter[1][3].However effective VHDL coding style optimizes FPGA resource allocation for area and speed performance of IEEE 802.3 MAC transmitter can be optimized using linear feedback shift register, one hot finite machine (FSM) state encoding style.", "title": "" }, { "docid": "7530de11afdbb1e09c363644b0866bcb", "text": "The design and correctness of a communication facility for a distributed computer system are reported on. The facility provides support for fault-tolerant process groups in the form of a family of reliable multicast protocols that can be used in both local- and wide-area networks. These protocols attain high levels of concurrency, while respecting application-specific delivery ordering constraints, and have varying cost and performance that depend on the degree of ordering desired. In particular, a protocol that enforces causal delivery orderings is introduced and shown to be a valuable alternative to conventional asynchronous communication protocols. The facility also ensures that the processes belonging to a fault-tolerant process group will observe consistent orderings of events affecting the group as a whole, including process failures, recoveries, migration, and dynamic changes to group properties like member rankings. A review of several uses for the protocols in the ISIS system, which supports fault-tolerant resilient objects and bulletin boards, illustrates the significant simplification of higher level algorithms made possible by our approach.", "title": "" }, { "docid": "0409255c0804b7ec8332c24b8a8e5806", "text": "The major aim of this research study was to explore the relationship between test anxiety and academic achievement of students at the post graduate level. A sample of 414 students was randomly selected from seven different science departments in a public sector university in Lahore, Pakistan. Data were collected by using the Test Anxiety Inventory (TAI) developed by Spielberger. Pearson correlation, multivariate statistics and regression analyses were run for data analysis. It was found that a significant negative relationship exists between test anxiety scores and students’ achievement scores. Results showed that a cognitive factor (worry) contributes more in test anxiety than affective factors (emotional). Therefore, it is concluded that test anxiety is one of the factors which are responsible for students’ underachievement and low performance but it can be managed by appropriate training of students in dealing with factors causing test anxiety.", "title": "" }, { "docid": "9feac5bf882c3e812755f87a21a59652", "text": "In 2013, George Church and his colleagues at Harvard University [2] in Cambridge, Massachusetts published \"RNA-Guided Human Genome Engineering via Cas 9,\" in which they detailed their use of RNA-guided Cas 9 to genetically modify genes [3] in human cells. Researchers use RNA-guided Cas 9 technology to modify the genetic information of organisms, DNA, by targeting specific sequences of DNA and subsequently replacing those targeted sequences with different DNA sequences. Church and his team used RNA-guided Cas 9 technology to edit the genetic information in human cells. Church and his colleagues also created a database that identified 190,000 unique guide RNAs for targeting almost half of the human genome [4] that codes for proteins. In \"RNA-Guided Human Genome Engineering via Cas 9,\" the authors demonstrated that RNA-guided Cas 9 was a robust and simple tool for genetic engineering, which has enabled scientists to more easily manipulate genomes for the study of biological processes and genetic diseases.", "title": "" }, { "docid": "ff4c16552db618c3421fcbc7e3de1b5b", "text": "Graphs are ubiquitous data structures for representing interactions between entities. With an emphasis on the use of graphs to represent chemical molecules, we explore the task of learning to generate graphs that conform to a distribution observed in training data. We propose a variational autoencoder model in which both encoder and decoder are graph-structured. Our decoder assumes a sequential ordering of graph extension steps and we discuss and analyze design choices that mitigate the potential downsides of this linearization. Experiments compare our approach with a wide range of baselines on the molecule generation task and show that our method is more successful at matching the statistics of the original dataset on semantically important metrics. Furthermore, we show that by using appropriate shaping of the latent space, our model allows us to design molecules that are (locally) optimal in desired properties.", "title": "" }, { "docid": "b4cadd9179150203638ff9b045a4145d", "text": "Interpenetrating network (IPN) hydrogel membranes of sodium alginate (SA) and poly(vinyl alcohol) (PVA) were prepared by solvent casting method for transdermal delivery of an anti-hypertensive drug, prazosin hydrochloride. The prepared membranes were thin, flexible and smooth. The X-ray diffraction studies indicated the amorphous dispersion of drug in the membranes. Differential scanning calorimetric analysis confirmed the IPN formation and suggests that the membrane stiffness increases with increased concentration of glutaraldehyde (GA) in the membranes. All the membranes were permeable to water vapors depending upon the extent of cross-linking. The in vitro drug release study was performed through excised rat abdominal skin; drug release depends on the concentrations of GA in membranes. The IPN membranes extended drug release up to 24 h, while SA and PVA membranes discharged the drug quickly. The primary skin irritation and skin histopathology study indicated that the prepared IPN membranes were less irritant and safe for skin application.", "title": "" }, { "docid": "5a63b6385068fbc24d1d79f9a6363172", "text": "Big Data Analytics and Deep Learning are two high-focus of data science. Big Data has become important as many organizations both public and private have been collecting massive amounts of domain-specific information, which can contain useful information about problems such as national intelligence, cyber security, fraud detection, marketing, and medical informatics. Companies such as Google and Microsoft are analyzing large volumes of data for business analysis and decisions, impacting existing and future technology. Deep Learning algorithms extract high-level, complex abstractions as data representations through a hierarchical learning process. Complex abstractions are learnt at a given level based on relatively simpler abstractions formulated in the preceding level in the hierarchy. A key benefit of Deep Learning is the analysis and learning of massive amounts of unsupervised data, making it a valuable tool for Big Data Analytics where raw data is largely unlabeled and un-categorized. In the present study, we explore how Deep Learning can be utilized for addressing some important problems in Big Data Analytics, including extracting complex patterns from massive volumes of data, semantic indexing, data tagging, fast information retrieval, and simplifying discriminative tasks. We also investigate some aspects of Deep Learning research that need further exploration to incorporate specific challenges introduced by Big Data Analytics, including streaming data, high-dimensional data, scalability of models, and distributed computing. We conclude by presenting insights into relevant future works by posing some questions, including defining data sampling criteria, domain adaptation modeling, defining criteria for obtaining useful data abstractions, improving semantic indexing, semi-supervised learning, and active learning.", "title": "" }, { "docid": "ff4c069ab63ced5979cf6718eec30654", "text": "Dowser is a ‘guided’ fuzzer that combines taint tracking, program analysis and symbolic execution to find buffer overflow and underflow vulnerabilities buried deep in a program’s logic. The key idea is that analysis of a program lets us pinpoint the right areas in the program code to probe and the appropriate inputs to do so. Intuitively, for typical buffer overflows, we need consider only the code that accesses an array in a loop, rather than all possible instructions in the program. After finding all such candidate sets of instructions, we rank them according to an estimation of how likely they are to contain interesting vulnerabilities. We then subject the most promising sets to further testing. Specifically, we first use taint analysis to determine which input bytes influence the array index and then execute the program symbolically, making only this set of inputs symbolic. By constantly steering the symbolic execution along branch outcomes most likely to lead to overflows, we were able to detect deep bugs in real programs (like the nginx webserver, the inspircd IRC server, and the ffmpeg videoplayer). Two of the bugs we found were previously undocumented buffer overflows in ffmpeg and the poppler PDF rendering library.", "title": "" }, { "docid": "76afcc3dfbb06f2796b61c8b5b424ad8", "text": "Predicting context-dependent and non-literal utterances like sarcastic and ironic expressions still remains a challenging task in NLP, as it goes beyond linguistic patterns, encompassing common sense and shared knowledge as crucial components. To capture complex morpho-syntactic features that can usually serve as indicators for irony or sarcasm across dynamic contexts, we propose a model that uses character-level vector representations of words, based on ELMo. We test our model on 7 different datasets derived from 3 different data sources, providing state-of-the-art performance in 6 of them, and otherwise offering competitive results.", "title": "" }, { "docid": "b266069e91c24120b1732c5576087a90", "text": "Reactions of organic molecules on Montmorillonite c lay mineral have been investigated from various asp ects. These include catalytic reactions for organic synthesis, chemical evolution, the mechanism of humus-formatio n, and environmental problems. Catalysis by clay minerals has attracted much interest recently, and many repo rts including the catalysis by synthetic or modified cl ays have been published. In this review, we will li mit the review to organic reactions using Montmorillonite clay as cat alyst.", "title": "" }, { "docid": "6af7d655d12fb276f5db634f4fc7cb74", "text": "The letter presents a compact 3-bit 90 ° phase shifter for phased-array applications at the 60 GHz ISM band (IEEE 802.11ad standard). The designed phase shifter is based on reflective-type topology using the proposed reflective loads with binary-weighted digitally-controlled varactor arrays and the transformer-type directional coupler. The measured eight output states of the implemented phase shifter in 65 nm CMOS technology, exhibit phase-resolution of 11.25 ° with an RMS phase error of 5.2 °. The insertion loss is 5.69 ± 1.22 dB at 60 GHz and the return loss is better than 12 dB over 54-66 GHz. The chip demonstrates a compact size of only 0.034 mm2.", "title": "" }, { "docid": "988503b179c3b49d60f2e9eeda6c45c2", "text": "Previous work has shown that high quality phrasal paraphrases can be extracted from bilingual parallel corpora. However, it is not clear whether bitexts are an appropriate resource for extracting more sophisticated sentential paraphrases, which are more obviously learnable from monolingual parallel corpora. We extend bilingual paraphrase extraction to syntactic paraphrases and demonstrate its ability to learn a variety of general paraphrastic transformations, including passivization, dative shift, and topicalization. We discuss how our model can be adapted to many text generation tasks by augmenting its feature set, development data, and parameter estimation routine. We illustrate this adaptation by using our paraphrase model for the task of sentence compression and achieve results competitive with state-of-the-art compression systems.", "title": "" }, { "docid": "eb2bb3518ddc95b1920c70f570fb6aa8", "text": "The scale of the Software-Defined Network (SDN) Controller design problem has become apparent with the expansion of SDN deployments. Initial SDN deployments were small-scale, single controller environments for research and usecase testing. Today, enterprise deployments requiring multiple controllers are gathering momentum e.g. Google's backbone network, Microsoft's public cloud, and NTT's edge gateway. Third-party applications are also becoming available e.g. HP SDN App Store. The increase in components and interfaces for the evolved SDN implementation increases the security challenges of the SDN controller design. In this work, the requirements of a secure, robust, and resilient SDN controller are identified, stateof- the-art open-source SDN controllers are analyzed with respect to the security of their design, and recommendations for security improvements are provided. This contribution highlights the gap between the potential security solutions for SDN controllers and the actual security level of current controller designs.", "title": "" }, { "docid": "fa826e5846cdee91192beecd1a52bb3a", "text": "ABSTRA CT Recommender systemsusepeople’ s opinionsaboutitemsin an information domainto help peoplechooseother items. Thesesystemshave succeededin domainsas diverse as movies, news articles,Web pages,andwines. The psychological literatureonconformitysuggeststhatin thecourseof helpingpeoplemake choices,thesesystemsprobablyaffect users’opinionsof the items. If opinionsare influencedby recommendations, they might be lessvaluablefor making recommendations for otherusers.Further, manipulatorswho seekto makethesystemgenerateartificially highor low recommendationsmight benefitif their efforts influenceusers to changethe opinionsthey contribute to the recommender . Westudytwo aspectsof recommender systeminterfacesthat may affect users’opinions: the rating scaleandthe display of predictionsat thetime usersrateitems.We find thatusers rate fairly consistentlyacrossrating scales. Userscan be manipulated,though,tendingto rate toward the prediction thesystemshows, whetherthepredictionis accurateor not. However, userscan detectsystemsthat manipulatepredictions. We discusshow designersof recommendersystems might reactto thesefindings.", "title": "" }, { "docid": "356684bac2e5fecd903eb428dc5455f4", "text": "Social media expose millions of users every day to information campaigns - some emerging organically from grassroots activity, others sustained by advertising or other coordinated efforts. These campaigns contribute to the shaping of collective opinions. While most information campaigns are benign, some may be deployed for nefarious purposes, including terrorist propaganda, political astroturf, and financial market manipulation. It is therefore important to be able to detect whether a meme is being artificially promoted at the very moment it becomes wildly popular. This problem has important social implications and poses numerous technical challenges. As a first step, here we focus on discriminating between trending memes that are either organic or promoted by means of advertisement. The classification is not trivial: ads cause bursts of attention that can be easily mistaken for those of organic trends. We designed a machine learning framework to classify memes that have been labeled as trending on Twitter. After trending, we can rely on a large volume of activity data. Early detection, occurring immediately at trending time, is a more challenging problem due to the minimal volume of activity data that is available prior to trending. Our supervised learning framework exploits hundreds of time-varying features to capture changing network and diffusion patterns, content and sentiment information, timing signals, and user meta-data. We explore different methods for encoding feature time series. Using millions of tweets containing trending hashtags, we achieve 75% AUC score for early detection, increasing to above 95% after trending. We evaluate the robustness of the algorithms by introducing random temporal shifts on the trend time series. Feature selection analysis reveals that content cues provide consistently useful signals; user features are more informative for early detection, while network and timing features are more helpful once more data is available.", "title": "" }, { "docid": "ad2546a681a3b6bcef689f0bb71636b5", "text": "Data and computation integrity and security are major concerns for users of cloud computing facilities. Many production-level clouds optimistically assume that all cloud nodes are equally trustworthy when dispatching jobs; jobs are dispatched based on node load, not reputation. This increases their vulnerability to attack, since compromising even one node suffices to corrupt the integrity of many distributed computations. This paper presents and evaluates Hatman: the first full-scale, data-centric, reputation-based trust management system for Hadoop clouds. Hatman dynamically assesses node integrity by comparing job replica outputs for consistency. This yields agreement feedback for a trust manager based on EigenTrust. Low overhead and high scalability is achieved by formulating both consistency-checking and trust management as secure cloud computations; thus, the cloud's distributed computing power is leveraged to strengthen its security. Experiments demonstrate that with feedback from only 100 jobs, Hatman attains over 90% accuracy when 25% of the Hadoop cloud is malicious.", "title": "" }, { "docid": "55a798fd7ec96239251fce2a340ba1ba", "text": "At EUROCRYPT’88, we introduced an interactive zero-howledge protocol ( G ~ O U and Quisquater [13]) fitted to the authentication of tamper-resistant devices (e.g. smart cads , Guillou and Ugon [14]). Each security device stores its secret authentication number, an RSA-like signature computed by an authority from the device identity. Any transaction between a tamperresistant security device and a verifier is limited to a unique interaction: the device sends its identity and a random test number; then the verifier teUs a random large question; and finally the device answers by a witness number. The transaction is successful when the test number is reconstructed from the witness number, the question and the identity according to numbers published by the authority and rules of redundancy possibly standardized. This protocol allows a cooperation between users in such a way that a group of cooperative users looks like a new entity, having a shadowed identity the product of the individual shadowed identities, while each member reveals nothing about its secret. In another scenario, the secret is partitioned between distinkt devices sharing the same identity. A group of cooperative users looks like a unique user having a larger public exponent which is the greater common multiple of each individual exponent. In this paper, additional features are introduced in order to provide: firstly, a mutual interactive authentication of both communicating entities and previously exchanged messages, and, secondly, a digital signature of messages, with a non-interactive zero-knowledge protocol. The problem of multiple signature is solved here in a very smart way due to the possibilities of cooperation between users. The only secret key is the factors of the composite number chosen by the authority delivering one authentication number to each smart card. This key is not known by the user. At the user level, such a scheme may be considered as a keyless identity-based integrity scheme. This integrity has a new and important property: it cannot be misused, i.e. derived into a confidentiality scheme.", "title": "" } ]
scidocsrr
f34c5c27c3fd420b3efea774e854d2c2
Irregular Bipolar Fuzzy Graphs
[ { "docid": "fd48614d255b7c7bc7054b4d5de69a15", "text": "Article history: Received 31 December 2007 Received in revised form 12 December 2008 Accepted 3 January 2009", "title": "" } ]
[ { "docid": "232d7e7986de374499c8ca580d055729", "text": "In this paper we provide a survey of recent contributions to robust portfolio strategies from operations research and finance to the theory of portfolio selection. Our survey covers results derived not only in terms of the standard mean-variance objective, but also in terms of two of the most popular risk measures, mean-VaR and mean-CVaR developed recently. In addition, we review optimal estimation methods and Bayesian robust approaches.", "title": "" }, { "docid": "d58c81bf22cdad5c1a669dd9b9a77fbd", "text": "The rapid increase in healthcare demand has seen novel developments in health monitoring technologies, such as the body area networks (BAN) paradigm. BAN technology envisions a network of continuously operating sensors, which measure critical physical and physiological parameters e.g., mobility, heart rate, and glucose levels. Wireless connectivity in BAN technology is key to its success as it grants portability and flexibility to the user. While radio frequency (RF) wireless technology has been successfully deployed in most BAN implementations, they consume a lot of battery power, are susceptible to electromagnetic interference and have security issues. Intrabody communication (IBC) is an alternative wireless communication technology which uses the human body as the signal propagation medium. IBC has characteristics that could naturally address the issues with RF for BAN technology. This survey examines the on-going research in this area and highlights IBC core fundamentals, current mathematical models of the human body, IBC transceiver designs, and the remaining research challenges to be addressed. IBC has exciting prospects for making BAN technologies more practical in the future.", "title": "" }, { "docid": "1d19e616477e464e00570ca741ee3734", "text": "Data Warehouses are a good source of data for downstream data mining applications. New data arrives in data warehouses during the periodic refresh cycles. Appending of data on existing data requires that all patterns discovered earlier using various data mining algorithms are updated with each refresh. In this paper, we present an incremental density based clustering algorithm. Incremental DBSCAN is an existing incremental algorithm in which data can be added/deleted to/from existing clusters, one point at a time. Our algorithm is capable of adding points in bulk to existing set of clusters. In this new algorithm, the data points to be added are first clustered using the DBSCAN algorithm and then these new clusters are merged with existing clusters, to come up with the modified set of clusters. That is, we add the clusters incrementally rather than adding points incrementally. It is found that the proposed incremental clustering algorithm produces the same clusters as obtained by Incremental DBSCAN. We have used R*-trees as the data structure to hold the multidimensional data that we need to cluster. One of the major advantages of the proposed approach is that it allows us to see the clustering patterns of the new data along with the existing clustering patterns. Moreover, we can see the merged clusters as well. The proposed algorithm is capable of considerable savings, in terms of region queries performed, as compared to incremental DBSCAN. Results are presented to support the claim.", "title": "" }, { "docid": "be82ba26b91658ee90b6075c75c5f7bd", "text": "In this paper, we propose a content-based recommendation Algorithm which extends and updates the Minkowski distance in order to address the challenge of matching people and jobs. The proposed algorithm FoDRA (Four Dimensions Recommendation Algorithm) quantifies the suitability of a job seeker for a job position in a more flexible way, using a structured form of the job and the candidate's profile, produced from a content analysis of the unstructured form of the job description and the candidate's CV. We conduct an experimental evaluation in order to check the quality and the effectiveness of FoDRA. Our primary study shows that FoDRA produces promising results and creates new prospects in the area of Job Recommender Systems (JRSs).", "title": "" }, { "docid": "b3bcf4d5962cd2995d21cfbbe9767b9d", "text": "In computer, Cloud of Things (CoT) it is a Technique came by integrated two concepts Internet of Things(IoT) and Cloud Computing. Therefore, Cloud of Things is a currently a wide area of research and development. This paper discussed the concept of Cloud of Things (CoT) in detail and explores the challenges, open research issues, and various tools that can be used with Cloud of Things (CoT). As a result, this paper gives a knowledge and platform to explore Cloud of Things (CoT), and it gives new ideas for researchers to find the open research issues and solution to challenges.", "title": "" }, { "docid": "dd545adf1fba52e794af4ee8de34fc60", "text": "We propose solving continuous parametric simulation optimizations using a deterministic nonlinear optimization algorithm and sample-path simulations. The optimization problem is written in a modeling language with a simulation module accessed with an external function call. Since we allow no changes to the simulation code at all, we propose using a quadratic approximation of the simulation function to obtain derivatives. Results on three different queueing models are presented that show our method to be effective on a variety of practical problems.", "title": "" }, { "docid": "d038c7b29701654f8ee908aad395fe8c", "text": "Vaginal fibroepithelial polyp is a rare lesion, and although benign, it can be confused with malignant connective tissue lesions. Treatment is simple excision, and recurrence is extremely uncommon. We report a case of a newborn with vaginal fibroepithelial polyp. The authors suggest that vaginal polyp must be considered in the evaluation of interlabial masses in prepubertal girls.", "title": "" }, { "docid": "b07cff84fd585f9ee88865e7c51171f5", "text": "Convolutional neural networks (CNN) are extensions to deep neural networks (DNN) which are used as alternate acoustic models with state-of-the-art performances for speech recognition. In this paper, CNNs are used as acoustic models for speech activity detection (SAD) on data collected over noisy radio communication channels. When these SAD models are tested on audio recorded from radio channels not seen during training, there is severe performance degradation. We attribute this degradation to mismatches between the two dimensional filters learnt in the initial CNN layers and the novel channel data. Using a small amount of supervised data from the novel channels, the filters can be adapted to provide significant improvements in SAD performance. In mismatched acoustic conditions, the adapted models provide significant improvements (about 10-25%) relative to conventional DNN-based SAD systems. These results illustrate that CNNs have a considerable advantage in fast adaptation for acoustic modeling in these settings.", "title": "" }, { "docid": "0ec5953981251bc48cf0afc15e4c0c31", "text": "The Product Creation Process is described in its context. A phased model for Product Creation is shown. Many organizations use a phased model as blueprint for the way of working. The operational organization of the product creation process is discussed, especially the role of the operational leader. Distribution This article or presentation is written as part of the Gaudí project. The Gaudí project philosophy is to improve by obtaining frequent feedback. Frequent feedback is pursued by an open creation process. This document is published as intermediate or nearly mature version to get feedback. Further distribution is allowed as long as the document remains complete and unchanged. All Gaudí documents are available at: http://www.gaudisite.nl/ version: 2.2 status: concept September 9, 2018", "title": "" }, { "docid": "ee3c8327cb0083c4d9e0618c21d129c8", "text": "Information retrieval is used to find a subset of relevant documents against a set of documents. Determining semantic similarity between two terms is a crucial problem in Web Mining for such applications as information retrieval systems and recommender systems. Semantic similarity refers to the sameness of two terms based on sameness of their meaning or their semantic contents. Recently many techniques have introduced measuring semantic similarity using Wikipedia, a free online encyclopedia. In this paper, a new technique of measuring semantic similarity is proposed. The proposed method uses Wikipedia as an ontology and spreading activation strategy to compute semantic similarity. The utility of the proposed system is evaluated by using the taxonomy of Wikipedia categories.", "title": "" }, { "docid": "f562bd72463945bd35d42894e4815543", "text": "Sound levels in animal shelters regularly exceed 100 dB. Noise is a physical stressor on animals that can lead to behavioral, physiological, and anatomical responses. There are currently no policies regulating noise levels in dog kennels. The objective of this study was to evaluate the noise levels dogs are exposed to in an animal shelter on a continuous basis and to determine the need, if any, for noise regulations. Noise levels at a newly constructed animal shelter were measured using a noise dosimeter in all indoor dog-holding areas. These holding areas included large dog adoptable, large dog stray, small dog adoptable, small dog stray, and front intake. The noise level was highest in the large adoptable area. Sound from the large adoptable area affected some of the noise measurements for the other rooms. Peak noise levels regularly exceeded the measuring capability of the dosimeter (118.9 dBA). Often, in new facility design, there is little attention paid to noise abatement, despite the evidence that noise causes physical and psychological stress on dogs. To meet their behavioral and physical needs, kennel design should also address optimal sound range.", "title": "" }, { "docid": "2f01161f6873cf4f6fefd18deff4425b", "text": "Stock price prediction is a challenging task owing to the complexity patterns behind time series. Autoregressive integrated moving average (ARIMA) model and back propagation neural network (BPNN) model are popular linear and nonlinear models for time series forecasting respectively. The integration of two models can effectively capture the linear and nonlinear patterns hidden in a time series and improve forecast accuracy. In this paper, a new hybrid ARIMA-BPNN model containing technical indicators is proposed to forecast four individual stocks consisting of both main board market and growth enterprise market in software and information services sector. Experiment results show that the proposed method achieves the better one-step-ahead forecasting accuracies namely 78.79%, 72.73%, 59.09% and 66.67% respectively for each series than those of ARIMA, BPNN, and Khashei and Bijari's hybrid models.", "title": "" }, { "docid": "aa2af8bd2ef74a0b5fa463a373a4c049", "text": "What modern game theorists describe as “fictitious play” is not the learning process George W. Brown defined in his 1951 paper. Brown’s original version differs in a subtle detail, namely the order of belief updating. In this note we revive Brown’s original fictitious play process and demonstrate that this seemingly innocent detail allows for an extremely simple and intuitive proof of convergence in an interesting and large class of games: nondegenerate ordinal potential games. © 2006 Elsevier Inc. All rights reserved. JEL classification: C72", "title": "" }, { "docid": "f095118c63d1531ebdbaec3565b0d91f", "text": "BACKGROUND\nSystematic reviews are most helpful if they are up-to-date. We did a systematic review of strategies and methods describing when and how to update systematic reviews.\n\n\nOBJECTIVES\nTo identify, describe and assess strategies and methods addressing: 1) when to update systematic reviews and 2) how to update systematic reviews.\n\n\nSEARCH STRATEGY\nWe searched MEDLINE (1966 to December 2005), PsycINFO, the Cochrane Methodology Register (Issue 1, 2006), and hand searched the 2005 Cochrane Colloquium proceedings.\n\n\nSELECTION CRITERIA\nWe included methodology reports, updated systematic reviews, commentaries, editorials, or other short reports describing the development, use, or comparison of strategies and methods for determining the need for updating or updating systematic reviews in healthcare.\n\n\nDATA COLLECTION AND ANALYSIS\nWe abstracted information from each included report using a 15-item questionnaire. The strategies and methods for updating systematic reviews were assessed and compared descriptively with respect to their usefulness, comprehensiveness, advantages, and disadvantages.\n\n\nMAIN RESULTS\nFour updating strategies, one technique, and two statistical methods were identified. Three strategies addressed steps for updating and one strategy presented a model for assessing the need to update. One technique discussed the use of the \"entry date\" field in bibliographic searching. Statistical methods were cumulative meta-analysis and predicting when meta-analyses are outdated.\n\n\nAUTHORS' CONCLUSIONS\nLittle research has been conducted on when and how to update systematic reviews and the feasibility and efficiency of the identified approaches is uncertain. These shortcomings should be addressed in future research.", "title": "" }, { "docid": "e4237adfc7150443c5e0e9c5f4c967a5", "text": "Besides the well known microwave radar systems mainly used in navigation, surveillance, and control applications, High-Frequency (HF) radars gain increased attention during the last decades. These HF radars are operated in the 3-30 MHz frequency range and due to ground-wave or sky-wave propagation provide over-the-horizon (OTH) capabilities. Many of these OTH radars apply frequency modulated continuous wave (FMCW) modulation for range resolution, which enables them to operate with a relatively low transmit power of a few watts only. Sometimes these types of radars are referred to as “silent radar”. This paper discusses the signal processing chain from deramping the received signal down to processing of range-Doppler-azimuth spectra. Some steps which are critical for the overall system performance are discussed in detail and a new technique to derive the structure of radio frequency interference (RFI), which is superposed to the radar echoes, is described.", "title": "" }, { "docid": "b65ead6ac95bff543a5ea690caade548", "text": "Theory and experiments show that as the per-flow product of bandwidth and latency increases, TCP becomes inefficient and prone to instability, regardless of the queuing scheme. This failing becomes increasingly important as the Internet evolves to incorporate very high-bandwidth optical links and more large-delay satellite links.To address this problem, we develop a novel approach to Internet congestion control that outperforms TCP in conventional environments, and remains efficient, fair, scalable, and stable as the bandwidth-delay product increases. This new eXplicit Control Protocol, XCP, generalizes the Explicit Congestion Notification proposal (ECN). In addition, XCP introduces the new concept of decoupling utilization control from fairness control. This allows a more flexible and analytically tractable protocol design and opens new avenues for service differentiation.Using a control theory framework, we model XCP and demonstrate it is stable and efficient regardless of the link capacity, the round trip delay, and the number of sources. Extensive packet-level simulations show that XCP outperforms TCP in both conventional and high bandwidth-delay environments. Further, XCP achieves fair bandwidth allocation, high utilization, small standing queue size, and near-zero packet drops, with both steady and highly varying traffic. Additionally, the new protocol does not maintain any per-flow state in routers and requires few CPU cycles per packet, which makes it implementable in high-speed routers.", "title": "" }, { "docid": "804b320c6f5b07f7f4d7c5be29c572e9", "text": "Softmax is the most commonly used output function for multiclass problems and is widely used in areas such as vision, natural language processing, and recommendation. A softmax model has linear costs in the number of classes which makes it too expensive for many real-world problems. A common approach to speed up training involves sampling only some of the classes at each training step. It is known that this method is biased and that the bias increases the more the sampling distribution deviates from the output distribution. Nevertheless, almost all recent work uses simple sampling distributions that require a large sample size to mitigate the bias. In this work, we propose a new class of kernel based sampling methods and develop an efficient sampling algorithm. Kernel based sampling adapts to the model as it is trained, thus resulting in low bias. It can also be easily applied to many models because it relies only on the model’s last hidden layer. We empirically study the trade-off of bias, sampling distribution and sample size and show that kernel based sampling results in low bias with few samples.", "title": "" }, { "docid": "50708eb1617b59f605b926583d9215bf", "text": "Due to filmmakers focusing on violence, traumatic events, and hallucinations when depicting characters with schizophrenia, critics have scrutinized the representation of mental disorders in contemporary films for years. This study compared previous research on schizophrenia with the fictional representation of the disease in contemporary films. Through content analysis, this study examined 10 films featuring a schizophrenic protagonist, tallying moments of violence and charting if they fell into four common stereotypes. Results showed a high frequency of violent behavior in films depicting schizophrenic characters, implying that those individuals are overwhelmingly dangerous and to be feared.", "title": "" }, { "docid": "446a7404a0e4e78156532fcb93270475", "text": "Convolutional Neural Networks (CNNs) can provide accurate object classification. They can be extended to perform object detection by iterating over dense or selected proposed object regions. However, the runtime of such detectors scales as the total number and/or area of regions to examine per image, and training such detectors may be prohibitively slow. However, for some CNN classifier topologies, it is possible to share significant work among overlapping regions to be classified. This paper presents DenseNet, an open source system that computes dense, multiscale features from the convolutional layers of a CNN based object classifier. Future work will involve training efficient object detectors with DenseNet feature descriptors.", "title": "" }, { "docid": "d6cb714b47b056e1aea8ef0682f4ae51", "text": "Arti cial neural networks are being used with increasing frequency for high dimensional problems of regression or classi cation. This article provides a tutorial overview of neural networks, focusing on back propagation networks as a method for approximating nonlinear multivariable functions. We explain, from a statistician's vantage point, why neural networks might be attractive and how they compare to other modern regression techniques.", "title": "" } ]
scidocsrr
0ef42f2067c4d122eda53304c1666fc4
cw2vec: Learning Chinese Word Embeddings with Stroke n-gram Information
[ { "docid": "f127a40480887dd9b740fec5064a45ea", "text": "Distributed word representations are very useful for capturing semantic information and have been successfully applied in a variety of NLP tasks, especially on English. In this work, we innovatively develop two component-enhanced Chinese character embedding models and their bigram extensions. Distinguished from English word embeddings, our models explore the compositions of Chinese characters, which often serve as semantic indictors inherently. The evaluations on both word similarity and text classification demonstrate the effectiveness of our models.", "title": "" }, { "docid": "09df260d26638f84ec3bd309786a8080", "text": "If we take an existing supervised NLP system, a simple and general way to improve accuracy is to use unsupervised word representations as extra word features. We evaluate Brown clusters, Collobert and Weston (2008) embeddings, and HLBL (Mnih & Hinton, 2009) embeddings of words on both NER and chunking. We use near state-of-the-art supervised baselines, and find that each of the three word representations improves the accuracy of these baselines. We find further improvements by combining different word representations. You can download our word features, for off-the-shelf use in existing NLP systems, as well as our code, here: http://metaoptimize. com/projects/wordreprs/", "title": "" }, { "docid": "66b2f59c4f46b917ff6755e2b2fbb39c", "text": "Overview • Learning flexible word representations is the first step towards learning semantics. •The best current approach to learning word embeddings involves training a neural language model to predict each word in a sentence from its neighbours. – Need to use a lot of data and high-dimensional embeddings to achieve competitive performance. – More scalable methods translate to better results. •We propose a simple and scalable approach to learning word embeddings based on training lightweight models with noise-contrastive estimation. – It is simpler, faster, and produces better results than the current state-of-the art method.", "title": "" } ]
[ { "docid": "537076966f77631a3e915eccc8223d2b", "text": "Finding domain invariant features is critical for successful domain adaptation and transfer learning. However, in the case of unsupervised adaptation, there is a significant risk of overfitting on source training data. Recently, a regularization for domain adaptation was proposed for deep models by (Ganin and Lempitsky, 2015). We build on their work by suggesting a more appropriate regularization for denoising autoencoders. Our model remains unsupervised and can be computed in a closed form. On standard text classification adaptation tasks, our approach yields the state of the art results, with an important reduction of the learning cost.", "title": "" }, { "docid": "b29d979edaf08c0dafe9864f28519a3a", "text": "We study the problem of bilingual lexicon induction (BLI) in a setting where some translation resources are available, but unknown translations are sought for certain, possibly domain-specific terminology. We frame BLI as a classification problem for which we design a neural network based classification architecture composed of recurrent long short-term memory and deep feed forward networks. The results show that wordand character-level representations each improve state-of-the-art results for BLI, and the best results are obtained by exploiting the synergy between these wordand character-level representations in the classification model.", "title": "" }, { "docid": "1d8a8f6f95a729a44486f89ffb07b63a", "text": "MicroRNAs are short, noncoding RNA transcripts that post-transcriptionally regulate gene expression. Several hundred microRNA genes have been identified in Caenorhabditis elegans, Drosophila, plants and mammals. MicroRNAs have been linked to developmental processes in C. elegans, plants and humans and to cell growth and apoptosis in Drosophila. A major impediment in the study of microRNA function is the lack of quantitative expression profiling methods. To close this technological gap, we have designed dual-channel microarrays that monitor expression levels of 124 mammalian microRNAs. Using these tools, we observed distinct patterns of expression among adult mouse tissues and embryonic stem cells. Expression profiles of staged embryos demonstrate temporal regulation of a large class of microRNAs, including members of the let-7 family. This microarray technology enables comprehensive investigation of microRNA expression, and furthers our understanding of this class of recently discovered noncoding RNAs.", "title": "" }, { "docid": "33ee29c4ccab435b8b64058b584e13cd", "text": "In this paper, we present a music recommendation system, which provides a personalized service of music recommendation. The polyphonic music objects of MIDI format are first analyzed for deriving information for music grouping. For this purpose, the representative track of each polyphonic music object is first determined, and then six features are extracted from this track for proper music grouping. Moreover, the user access histories are analyzed to derive the profiles of user interests and behaviors for user grouping. The content-based, collaborative, and statistics-based recommendation methods are proposed based on the favorite degrees of the users to the music groups, and the user groups they belong to. A series of experiments are carried out to show that our approach performs well.", "title": "" }, { "docid": "ff59e8662a2bde7d5b7bc76e6f310b16", "text": "This study examines the expectations that workers have regarding enterprise social media (ESM). Using interviews with 58 employees at an organization implementing an ESM platform, we compare workers’ views of the technology with those of existing workplace communication technologies and publicly available social media. We find individuals’ frames regarding expectations and assumptions of social media are established through activities outside work settings and influence employees’ views about the usefulness of ESM. Differences in technological frames regarding ESM were related to workers’ age and level of personal social media use, but in directions contrary to expectations expressed in the literature. Findings emphasize how interpretations of technology may shift over time and across contexts in unique ways for different individuals.", "title": "" }, { "docid": "f48e2c6509147c4ac1cfb25e47fa0dcf", "text": "The initial impetus for the current popularity of statistical methods in computational linguistics was provided in large part by the papers on part-of-speech tagging by Church [20], DeRose [25], and Garside [34]. In contradiction to common wisdom, these taggers showed that it was indeed possible to carve partof-speech disambiguation out of the apparently monolithic problem of natural language understanding, and solve it with impressive accuracy. The concensus at the time was that part-of-speech disambiguation could only be done as part of a global analysis, including syntactic analysis, discourse analysis, and even world knowledge. For instance, to correctly disambiguate help in give John helpN versus let John helpV, one apparently needs to parse the sentences, making reference to the differing subcategorization frames of give and let. Similar examples show that even world knowledge must be taken into account. For instance, off is a preposition in I turned off highway I-90, but a particle in I turned off my radio, so assigning the correct part of speech in I turned off the spectroroute depends on knowing whether spectroroute is the name of a road or the name of a device. Such examples do demonstrate that the problem of part-of-speech disambiguation cannot be solved without solving all the rest of the natural-language understanding problem. But Church, DeRose and Garside showed that, even if an exact solution is far beyond reach, a reasonable approximate solution is quite feasible. In this chapter, I would like to survey further developments in part-of-speech disambiguation (‘tagging’). I would also like to consider a question raised by the success of tagging, namely, what piece of the NL-understanding problem we can carve off next. ‘Partial parsing’ is a cover term for a range of different techniques for recovering some but not all of the information contained in a traditional syntactic analysis. Partial parsing techniques, like tagging techniques, aim for reliability and robustness in the face of the vagaries of natural text, by sacrificing completeness of analysis and accepting a low but non-zero error rate.", "title": "" }, { "docid": "49df721b5115ad7d3f91b6212dbb585e", "text": "We first present a minimal feature set for transition-based dependency parsing, continuing a recent trend started by Kiperwasser and Goldberg (2016a) and Cross and Huang (2016a) of using bi-directional LSTM features. We plug our minimal feature set into the dynamic-programming framework of Huang and Sagae (2010) and Kuhlmann et al. (2011) to produce the first implementation of worst-case Opn3q exact decoders for arc-hybrid and arceager transition systems. With our minimal features, we also present Opn3q global training methods. Finally, using ensembles including our new parsers, we achieve the best unlabeled attachment score reported (to our knowledge) on the Chinese Treebank and the “second-best-in-class” result on the English Penn Treebank. Publication venue: EMNLP 2017", "title": "" }, { "docid": "d196fad248811b1d3f7f8d4d11d3b83b", "text": "Recent developments in telecommunications have allowed drawing new paradigms, including the Internet of Everything, to provide services by the interconnection of different physical devices enabling the exchange of data to enrich and automate people’s daily activities; and Fog computing, which is an extension of the well-known Cloud computing, bringing tasks to the edge of the network exploiting characteristics such as lower latency, mobility support, and location awareness. Combining these paradigms opens a new set of possibilities for innovative services and applications; however, it also brings a new complex scenario that must be efficiently managed to properly fulfill the needs of the users. In this scenario, the Fog Orchestrator component is the key to coordinate the services in the middle of Cloud computing and Internet of Everything. In this paper, key challenges in the development of the Fog Orchestrator to support the Internet of Everything are identified, including how they affect the tasks that a Fog service Orchestrator should perform. Furthermore, different service Orchestrator architectures for the Fog are explored and analyzed in order to identify how the previously listed challenges are being tackled. Finally, a discussion about the open challenges, technological directions, and future of the research on this subject is presented.", "title": "" }, { "docid": "17cdb26d3fd4e915341b21fcf85606c8", "text": "Persistent occiput posterior (OP) is associated with increased rates of maternal and newborn morbidity. Its diagnosis by physical examination is challenging but is improved with bedside ultrasonography. Occiput posterior discovered in the active phase or early second stage of labor usually resolves spontaneously. When it does not, prophylactic manual rotation may decrease persistent OP and its associated complications. When delivery is indicated for arrest of descent in the setting of persistent OP, a pragmatic approach is suggested. Suspected fetal macrosomia, a biparietal diameter above the pelvic inlet or a maternal pelvis with android features should prompt cesarean delivery. Nonrotational operative vaginal delivery is appropriate when the maternal pelvis has a narrow anterior segment but ample room posteriorly, like with anthropoid features. When all other conditions are met and the fetal head arrests in an OP position in a patient with gynecoid pelvic features and ample room anteriorly, options include cesarean delivery, nonrotational operative vaginal delivery, and rotational procedures, either manual or with the use of rotational forceps. Recent literature suggests that maternal and fetal outcomes with rotational forceps are better than those reported in older series. Although not without significant challenges, a role remains for teaching and practicing selected rotational forceps operations in contemporary obstetrics.", "title": "" }, { "docid": "251ab6744b6517c727121ec11a11e515", "text": "This paper presents a qualitative-reasoning method for predicting the behavior of mechanisms characterized by continuous, time-varying parameters. The structure of a mechanism is described in terms of a set of parameters and the constraints that hold among them : essentially a 'qualitative differential equation'. The qualitative-behavior description consists of a discrete set of time-points, at which the values of the parameters are described in terms of ordinal relations and directions of change. The behavioral description, or envisionment, is derived by two sets of rules: propagation rules which elaborate the description of the current time-point, and prediction rules which determine what is known about the next qualitatively distinct state of the mechanism. A detailed example shows how the envisionment method can detect a previously unsuspected landmark point at which the system is in stable equilibrium.", "title": "" }, { "docid": "2049d654e8293ee3470834e3a9aeea5f", "text": "In this paper, we analyze the influence of Twitter users in sharing news articles that may affect the readers’ mood. We collected data of more than 2000 Twitter users who shared news articles from Corriere.it, a daily newspaper that provides mood metadata annotated by readers on a voluntary basis. We automatically annotated personality types and communication styles of Twitter users and analyzed the correlations between personality, communication style, Twitter metadata (such as followig and folllowers) and the type of mood associated to the articles they shared. We also run a feature selection task, to find the best predictors of positive and negative mood sharing, and a classification task. We automatically predicted positive and negative mood sharers with 61.7% F1-measure. © 2015 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "7405b1ea867fafd576e889ce17e5f13e", "text": "The objective of this study was to compare patients with obsessive-compulsive disorder (OCD) associated with pathologic skin picking (PSP) and/or trichotillomania, and patients with OCD without such comorbidities, for demographic and clinical characteristics. We assessed 901 individuals with a primary diagnosis of OCD, using the Structured Clinical Interview for Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV) Axis I disorders. Diagnoses of PSP and trichotillomania were made in 16.3% and 4.9% of the sample, respectively. After the logistic regression analysis, the following factors retained an association with OCD-PSP/trichotillomania: younger (odds ratio [OR] = 0.979; P = .047), younger at the onset of compulsive symptoms (OR = 0.941; P = .007), woman (OR = 2.538; P < .001), with a higher level of education (OR = 1.055; P = .025), and with comorbid body dysmorphic disorder (OR = 2.363; P = .004). These findings support the idea that OCD accompanied by PSP/trichotillomania characterizes a specific subgroup.", "title": "" }, { "docid": "982a30a9738571d2838ac6fc772c55a4", "text": "We are living in a new communication age, which will radically transform the way we live in our society. A world where anything will be connected to Internet is being created, generating an entirely new dynamic network - The Internet of Things (IoT) - enabling new means of communication between people, things and environment. A suitable architecture for Internet of Things (IoT) demands the implementation of several and distinct technologies that range from computing (e.g. Cloud Computing), communications (e.g. 6LowPAN, 3/4G) to semantic (e.g. data mining). Thus, it is necessary to understand very well all these technologies in order to know which of them is most suitable for a given scenario. Therefore, this paper proposes an IoT architecture for disabled people and intends to identify and describe the most relevant IoT technologies and international standards for the stack of the proposed architecture. In particular, the paper discusses the enabling IoT technologies and its feasibility for people with disabilities. At the end, it presents two use cases that are currently being deployed for this population.", "title": "" }, { "docid": "7b9bc654a170d143a64bdae4c421053e", "text": "Analysis on a developed dynamic model of the dish-Stirling (DS) system shows that maximum solar energy harness can be realized through controlling the Stirling engine speed. Toward this end, a control scheme is proposed for the doubly fed induction generator coupled to the DS system, as a means to achieve maximum power point tracking as the solar insolation level varies. Furthermore, the adopted fuzzy supervisory control technique is shown to be effective in controlling the temperature of the receiver in the DS system as the speed changes. Simulation results and experimental measurements validate the maximum energy harness ability of the proposed variable-speed DS solar-thermal system.", "title": "" }, { "docid": "d9b75ed31fefa68e5b43e803cafe286b", "text": "Flavor and color of roasted peanuts are important research areas due to their significant influence on consumer preference. The aim of the present study was to explore correlations between sensory attributes of peanuts, volatile headspace compounds and color parameters. Different raw peanuts were selected to be representative of common market types, varieties, growing locations and grades used in Europe. Peanuts were roasted by a variety of processing technologies, resulting in 134 unique samples, which were analyzed for color, volatile composition and flavor profile by expert panel. Several headspace volatile compounds which positively or negatively correlated to \"roasted peanut\", \"raw bean\", \"dark roast\" and \"sweet\" attributes were identified. Results demonstrated that the correlation of CIELAB color parameters with roast related aromas, often taken for granted by the industry, is not strong when samples of different raw materials are subjected to different processing conditions.", "title": "" }, { "docid": "6ca59955cbf84ab9dce3c444709040b7", "text": "We introduce SPHINCS-Simpira, which is a variant of the SPHINCS signature scheme with Simpira as a building block. SPHINCS was proposed by Bernstein et al. at EUROCRYPT 2015 as a hash-based signature scheme with post-quantum security. At ASIACRYPT 2016, Gueron and Mouha introduced the Simpira family of cryptographic permutations, which delivers high throughput on modern 64-bit processors by using only one building block: the AES round function. The Simpira family claims security against structural distinguishers with a complexity up to 2 using classical computers. In this document, we explain why the same claim can be made against quantum computers as well. Although Simpira follows a very conservative design strategy, our benchmarks show that SPHINCS-Simpira provides a 1.5× speed-up for key generation, a 1.4× speed-up for signing 59-byte messages, and a 2.0× speed-up for verifying 59-byte messages compared to the originally proposed SPHINCS-256.", "title": "" }, { "docid": "1d606f39d429c5f344d5d3bc6810f2f9", "text": "Cryptography is increasingly applied to the E-commerce world, especially to the untraceable payment system and the electronic voting system. Protocols for these systems strongly require the anonymous digital signature property, and thus a blind signature strategy is the answer to it. Chaum stated that every blind signature protocol should hold two fundamental properties, blindness and intractableness. All blind signature schemes proposed previously almost are based on the integer factorization problems, discrete logarithm problems, or the quadratic residues, which are shown by Lee et al. that none of the schemes is able to meet the two fundamental properties above. Therefore, an ECC-based blind signature scheme that possesses both the above properties is proposed in this paper.", "title": "" }, { "docid": "bf1d099d80d522d9c51e28d04fd8236b", "text": "With the rise of social media platforms based on the sharing of pictures and videos, the question of how such platforms should be studied arises. Previous research on social media (content) has mainly focused on text (written words) and the rather text-based social media platforms Twitter and Facebook. Drawing on research in the fields of visual, political, and business communication, we introduce a methodological framework to study the fast-growing image-sharing service Instagram. This methodological framework was developed to study political parties’ Instagram accounts and tested by means of a study of Swedish political parties during the 2014 election campaign. In this article, we adapt the framework to also study other types of organizations active on Instagram by focusing on the following main questions: Do organizations only use Instagram to share one-way information, focusing on disseminating information and self-presentation? Or is Instagram used for two-way communication to establish and cultivate organization-public relationships? We introduce and discuss the coding of variables with respect to four clusters: the perception of the posting, image management, integration, and interactivity.", "title": "" }, { "docid": "639d30056e667f3468780f5dde272515", "text": "The topic of this paper is to identify tungsten plug corrosion issue at the interface of barrier metal and W bulk in W-CMP process. Two types of nucleation layers in W-CVD deposition process - SiH<sub>4</sub> and B<sub>2</sub>H<sub>6</sub> based were studied. The B<sub>2</sub>H<sub>6</sub> based nucleation W will induce W corrosion. However, SiH<sub>4</sub> based nucleation W does not have the issue. The static etch rate, electrochemical properties and removal rate (R.R.) of two types W-CMP slurries and SiH<sub>4</sub> and B<sub>2</sub>H<sub>6</sub> based nucleation W were evaluated. It has been demonstrated that the B<sub>2</sub>H<sub>6</sub> based nucleation film has much higher intensity of static etching on various W slurries. The B<sub>2</sub>H<sub>6</sub> based nucleation layer is weak than SiH<sub>4</sub> based, and it induces corrosion during W-CMP process.", "title": "" }, { "docid": "e0490f48724e2bd8895328d6ace75ee8", "text": "Dispersion and radiation properties for bound and leaky modes supported by 1-D printed periodic structures are investigated. A new type of Brillouin diagram is presented that accounts for different types of physical leakage, namely, leakage into one or more surface waves or also simultaneously into space. This new Brillouin diagram not only provides a physical insight into the dispersive behavior of such periodic structures, but it also provides a simple and convenient way to correctly choose the integration paths that arise from a spectral-domain moment-method analysis. Numerical results illustrate the usefulness of this new Brillouin diagram in explaining the leakage and stopband behavior for these types of periodic structures.", "title": "" } ]
scidocsrr
be2cbdf4964cedad69a2a6dda6439db3
The doing of doing stuff: understanding the coordination of social group-activities
[ { "docid": "ce3d81c74ef3918222ad7d2e2408bdb0", "text": "This survey characterizes an emerging research area, sometimes called coordination theory, that focuses on the interdisciplinary study of coordination. Research in this area uses and extends ideas about coordination from disciplines such as computer science, organization theory, operations research, economics, linguistics, and psychology.\nA key insight of the framework presented here is that coordination can be seen as the process of managing dependencies among activities. Further progress, therefore, should be possible by characterizing different kinds of dependencies and identifying the coordination processes that can be used to manage them. A variety of processes are analyzed from this perspective, and commonalities across disciplines are identified. Processes analyzed include those for managing shared resources, producer/consumer relationships, simultaneity constraints, and task/subtask dependencies.\nSection 3 summarizes ways of applying a coordination perspective in three different domains:(1) understanding the effects of information technology on human organizations and markets, (2) designing cooperative work tools, and (3) designing distributed and parallel computer systems. In the final section, elements of a research agenda in this new area are briefly outlined.", "title": "" }, { "docid": "ff933c57886cfb4ab74b9cbd9e4f3a58", "text": "Many systems, applications, and features that support cooperative work share two characteristics: A significant investment has been made in their development, and their successes have consistently fallen far short of expectations. Examination of several application areas reveals a common dynamic: 1) A factor contributing to the application’s failure is the disparity between those who will benefit from an application and those who must do additional work to support it. 2) A factor contributing to the decision-making failure that leads to ill-fated development efforts is the unique lack of management intuition for CSCW applications. 3) A factor contributing to the failure to learn from experience is the extreme difficulty of evaluating these applications. These three problem areas escape adequate notice due to two natural but ultimately misleading analogies: the analogy between multi-user application programs and multi-user computer systems, and the analogy between multi-user applications and single-user applications. These analogies influence the way we think about cooperative work applications and designers and decision-makers fail to recognize their limits. Several CSCW application areas are examined in some detail. Introduction. An illustrative example: automatic meeting", "title": "" }, { "docid": "22bf1c80bb833a7cdf6dd70936b40cb7", "text": "Text messaging has become a popular form of communication with mobile phones worldwide. We present findings from a large scale text messaging study of 70 university students in the United States. We collected almost 60, 000 text messages over a period of 4 months using a custom logging tool on our participants' phones. Our re- sults suggest that students communicate with a large number of contacts for extended periods of time, engage in simultaneous conversations with as many as 9 contacts, and often use text messaging as a method to switch between a variety of communication mediums. We also explore the content of text messages, and ways text message habits have changed over the last decade as it has become more popular. Finally, we offer design suggestions for future mobile communication tools.", "title": "" } ]
[ { "docid": "61c4e955604011a9b9a50ccbd2858070", "text": "This paper presents a second-order pulsewidth modulation (PWM) feedback loop to improve power supply rejection (PSR) of any open-loop PWM class-D amplifiers (CDAs). PSR of the audio amplifier has always been a key parameter in mobile phone applications. In contrast to class-AB amplifiers, the poor PSR performance has always been the major drawback for CDAs with a half-bridge connected power stage. The proposed PWM feedback loop is fabricated using GLOBALFOUNDRIES' 0.18-μm CMOS process technology. The measured PSR is more than 80 dB and the measured total harmonic distortion is less than 0.04% with a 1-kHz input sinusoidal test tone.", "title": "" }, { "docid": "1a4119ab58993a64719065f9c3aa416c", "text": "In the OPPS we have been studying the effects of marihuana used during pregnancy since 1978. The subjects are primarily middle-class, low risk women who entered the study early in their pregnancy. Extensive demographic and life-style information was gathered several times during pregnancy and postnatally. The offspring have been assessed repeatedly during the neonatal period, at least annually until the age of 6 and less frequently thereafter. The outcome measures include a variety of age appropriate standardized global measures as well as a large battery of neuropsychological tests attempting to assess discrete functioning within particular domains including language development, memory, visual/perceptual functioning, components of reading and sustained attention. The results suggest that in the neonate, state alterations and altered visual responsiveness may be associated with in utero exposure to marihuana. Global measures, particularly between the ages of 1 and 3 years, did not reveal an association with prenatal marihuana exposure. However, this initial, apparent absence of effect during early childhood should not be interpreted as in utero marihuana exposure having only transient effects for, as the children became older, aspects of neuropsychological functioning did discriminate between marihuana and control children. Domains associated with prenatal marihuana exposure at four years of age and older included increased behavioral problems and decreased performance on visual perceptual tasks, language comprehension, sustained attention and memory. The nature and the timing of the appearance of these deficits is congruent with the notion of prenatal marihuana exposure affecting 'executive functioning'--goal directed behavior that includes planning, organized search, and impulse control. Such an interpretation would be consistent with the extant literature with animals and non-pregnant adult users suggesting that chronic marihuana use may impact upon prefrontal lobe functioning.", "title": "" }, { "docid": "5c9b0687acc2975c78e58f0c72e03b55", "text": "OBJECTIVE\nBrain-gut-microbiota interactions may play an important role in human health and behavior. Although rodent models have demonstrated effects of the gut microbiota on emotional, nociceptive, and social behaviors, there is little translational human evidence to date. In this study, we identify brain and behavioral characteristics of healthy women clustered by gut microbiota profiles.\n\n\nMETHODS\nForty women supplied fecal samples for 16S rRNA profiling. Microbial clusters were identified using Partitioning Around Medoids. Functional magnetic resonance imaging was acquired. Microbiota-based group differences were analyzed in response to affective images. Structural and diffusion tensor imaging provided gray matter metrics (volume, cortical thickness, mean curvature, surface area) as well as fiber density between regions. A sparse Partial Least Square-Discrimination Analysis was applied to discriminate microbiota clusters using white and gray matter metrics.\n\n\nRESULTS\nTwo bacterial genus-based clusters were identified, one with greater Bacteroides abundance (n = 33) and one with greater Prevotella abundance (n = 7). The Prevotella group showed less hippocampal activity viewing negative valences images. White and gray matter imaging discriminated the two clusters, with accuracy of 66.7% and 87.2%, respectively. The Prevotella cluster was associated with differences in emotional, attentional, and sensory processing regions. For gray matter, the Bacteroides cluster showed greater prominence in the cerebellum, frontal regions, and the hippocampus.\n\n\nCONCLUSIONS\nThese results support the concept of brain-gut-microbiota interactions in healthy humans. Further examination of the interaction between gut microbes, brain, and affect in humans is needed to inform preclinical reports that microbial modulation may affect mood and behavior.", "title": "" }, { "docid": "17833f9cf4eec06dbc4d7954b6cc6f3f", "text": "Automated vehicles rely on the accurate and robust detection of the drivable area, often classified into free space, road area and lane information. Most current approaches use monocular or stereo cameras to detect these. However, LiDAR sensors are becoming more common and offer unique properties for road area detection such as precision and robustness to weather conditions. We therefore propose two approaches for a pixel-wise semantic binary segmentation of the road area based on a modified U-Net Fully Convolutional Network (FCN) architecture. The first approach UView-Cam employs a single camera image, whereas the second approach UGrid-Fused incorporates a early fusion of LiDAR and camera data into a multi-dimensional occupation grid representation as FCN input. The fusion of camera and LiDAR allows for efficient and robust leverage of individual sensor properties in a single FCN. For the training of UView-Cam, multiple publicly available datasets of street environments are used, while the UGrid-Fused is trained with the KITTI dataset. In the KITTI Road/Lane Detection benchmark, the proposed networks reach a MaxF score of 94.23% and 93.81% respectively. Both approaches achieve realtime performance with a detection rate of about 10 Hz.", "title": "" }, { "docid": "cff3d568c05d2164a6bb598d7ffd916f", "text": "Text normalization is an important component in text-to-speech system and the difficulty in text normalization is to disambiguate the non-standard words (NSWs). This paper develops a taxonomy of NSWs on the basis of a large scale Chinese corpus, and proposes a two-stage NSWs disambiguation strategy, finite state automata (FSA) for initial classification and maximum entropy (ME) classifiers for subclass disambiguation. Based on the above NSWs taxonomy, the two-stage approach achieves an F-score of 98.53% in open test, 5.23% higher than that of FSA based approach. Experiments show that the NSWs taxonomy ensures FSA a high baseline performance and ME classifiers make considerable improvement, and the two-stage approach adapts well to new domains.", "title": "" }, { "docid": "910a416dc736ec3566583c57123ac87c", "text": "Internet of Things (IoT) is one of the greatest technology revolutions in the history. Due to IoT potential, daily objects will be consciously worked in harmony with optimized performances. However, today, technology is not ready to fully bring its power to our daily life because of huge data analysis requirements in instant time. On the other hand, the powerful data management of cloud computing gives IoT an opportunity to make the revolution in our life. However, the traditional cloud computing server schedulers are not ready to provide services to IoT because IoT consists of a number of heterogeneous devices and applications which are far away from standardization. Therefore, to meet the expectations of users, the traditional cloud computing server schedulers should be improved to efficiently schedule and allocate IoT requests. There are several proposed scheduling algorithms for cloud computing in the literature. However, these scheduling algorithms are limited because of considering neither heterogeneous servers nor dynamic scheduling approach for different priority requests. Our objective is to propose Husnu S. Narman husnu@ou.edu 1 Holcombe Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, 29634, USA 2 Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Zahir Raihan Rd, Dhaka, 1000, Bangladesh 3 School of Computer Science, University of Oklahoma, Norman, OK, 73019, USA dynamic dedicated server scheduling for heterogeneous and homogeneous systems to efficiently provide desired services by considering priorities of requests. Results show that the proposed scheduling algorithm improves throughput up to 40 % in heterogeneous and homogeneous cloud computing systems for IoT requests. Our proposed scheduling algorithm and related analysis will help cloud service providers build efficient server schedulers which are adaptable to homogeneous and heterogeneous environments byconsidering systemperformancemetrics, such as drop rate, throughput, and utilization in IoT.", "title": "" }, { "docid": "d513e7f66de64e90b93dcf02ae2ccfb3", "text": "The first aim of this investigation was to assemble a group of photographs of 30 male and 30 female faces representing a standardized spectrum of facial attractiveness, against which orthognathic treatment outcomes could be compared. The second aim was to investigate the influence of the relationship between ANB differences and anterior lower face height (ALFH) percentages on facial attractiveness. The initial sample comprised standardized photographs of 41 female and 35 male Caucasian subjects. From these, the photographs of two groups of 30 male and 30 female subjects were compiled. A panel of six clinicians and six non-clinicians ranked the photographs. The results showed there to be a good level of reliability for each assessor when ranking the photographs on two occasions, particularly for the clinicians (female subjects r = 0.76-0.97, male subjects r = 0.72-0.94). Agreement among individuals within each group was also high, particularly when ranking facial attractiveness in male subjects (female subjects r = 0.57-0.84, male subjects r = 0.91-0.94). Antero-posterior (AP) discrepancies, as measured by soft tissue ANB, showed minimal correlation with facial attractiveness. However, a trend emerged that would suggest that in faces where the ANB varies widely from 5 degrees, the face is considered less attractive. The ALFH percentage also showed minimal correlation with facial attractiveness. However, there was a trend that suggested that greater ALFH percentages are considered less attractive in female faces, while in males the opposite trend was seen. Either of the two series of ranked photographs as judged by clinicians and non-clinicians could be used as a standard against which facial attractiveness could be assessed, as both were in total agreement about the most attractive faces. However, to judge the outcome of orthognathic treatment, the series of ranked photographs produced by the non-clinician group should be used as the 'standard' to reflect lay opinion.", "title": "" }, { "docid": "9489ca5b460842d5a8a65504965f0bd5", "text": "This article, based on a tutorial the author presented at ITC 2008, is an overview and introduction to mixed-signal production test. The article focuses on the fundamental techniques and procedures in production test and explores key issues confronting the industry.", "title": "" }, { "docid": "aeb4de700406fb1cc90d6f61dc17b93b", "text": "This paper presents text mining using SAS® Text Miner and Megaputer PolyAnalyst® specifically applied for hotel customer survey data, and its data management. The paper reviews current literature of text mining, and discusses features of these two text mining software packages in analyzing unstructured qualitative data in the following key steps: data preparation, data analysis, and result reporting. Some screen shots are presented for web-based hotel customer survey data as well as comparisons and conclusions.", "title": "" }, { "docid": "9c01e0dff555a29cc3ffdcab1e861994", "text": "To determine whether there is any new anatomical structure present within the labia majora. A case serial study was executed on eleven consecutive fresh human female cadavers. Stratum-by-stratum dissections of the labia majora were performed. Twenty-two anatomic dissections of labia majora were completed. Eosin and Hematoxylin agents were used to stain newly discovered adipose sac’s tissues of the labia majora and the cylinder-like structures, which cover condensed adipose tissues. The histology of these two structures was compared. All dissected labia majora demonstrated the presence of the anatomic existence of the adipose sac structure. Just under the dermis of the labia majora, the adipose sac was located, which was filled with lobules containing condensed fatty tissues in the form of cylinders. The histological investigation established that the well-organized fibro-connective-adipose tissues represented the adipose sac. The absence of descriptions of the adipose sac within the labia majora in traditional anatomic and gynecologic textbooks was noted. In this study group, the newly discovered adipose sac is consistently present within the anatomical structure of the labia majora. The well-organized fibro-connective-adipose tissue represents microscopic characteristic features of the adipose sac.", "title": "" }, { "docid": "2314d6d1c294c9d3753404ebe123edd3", "text": "The magnification of mobile devices in everyday life prompts the idea that these devices will increasingly have evidential value in criminal cases. While this may have been assumed in digital forensics communities, there has been no empirical evidence to support this idea. This research investigates the extent to which mobile phones are being used in criminal proceedings in the United Kingdom thorough the examination of appeal judgments retrieved from the Westlaw, Lexis Nexis and British and Irish Legal Information Institute (BAILII) legal databases. The research identified 537 relevant appeal cases from a dataset of 12,763 criminal cases referring to mobile phones for a period ranging from 1st of January, 2006 to 31st of July, 2011. The empirical analysis indicates that mobile phone evidence is rising over time with some correlations to particular crimes.", "title": "" }, { "docid": "bd8cdb4b89f2a0e4c91798da71621c75", "text": "Anthocyanins are one of the most widespread families of natural pigments in the plant kingdom. Their health beneficial effects have been documented in many in vivo and in vitro studies. This review summarizes the most recent literature regarding the health benefits of anthocyanins and their molecular mechanisms. It appears that several signaling pathways, including mitogen-activated protein kinase, nuclear factor κB, AMP-activated protein kinase, and Wnt/β-catenin, as well as some crucial cellular processes, such as cell cycle, apoptosis, autophagy, and biochemical metabolism, are involved in these beneficial effects and may provide potential therapeutic targets and strategies for the improvement of a wide range of diseases in future. In addition, specific anthocyanin metabolites contributing to the observed in vivo biological activities, structure-activity relationships as well as additive and synergistic efficacy of anthocyanins are also discussed.", "title": "" }, { "docid": "345328749b90f990e2f67415a067957a", "text": "Astrocyte swelling represents the major factor responsible for the brain edema associated with fulminant hepatic failure (FHF). The edema may be of such magnitude as to increase intracranial pressure leading to brain herniation and death. Of the various agents implicated in the generation of astrocyte swelling, ammonia has had the greatest amount of experimental support. This article reviews mechanisms of ammonia neurotoxicity that contribute to astrocyte swelling. These include oxidative stress and the mitochondrial permeability transition (MPT). The involvement of glutamine in the production of cell swelling will be highlighted. Evidence will be provided that glutamine induces oxidative stress as well as the MPT, and that these events are critical in the development of astrocyte swelling in hyperammonemia.", "title": "" }, { "docid": "6c8e7fc9f7c21ad1ae529c3033bfe02b", "text": "In this paper, we establish a formula expressing explicitly the general term of a linear recurrent sequence, allowing us to generalize the original result of J. McLaughlin [7] concerning powers of a matrix of size 2, to the case of a square matrix of size m ≥ 2. Identities concerning Fibonacci and Stirling numbers and various combinatorial relations are derived.", "title": "" }, { "docid": "eb6f04484b832750187e7d97334f4c5f", "text": "There are in-numerous applications that deal with real scenarios where data are captured over time making them potential candidates for time series analysis. Time series contain temporal dependencies that divide different points in time into different classes. This paper aims at reviewing marriage of a concept i.e. time series modeling with an approach i.e. Machine learning in tackling real life problems. Like time series is ubiquitous and has found extensive usage in our daily life, machine learning approaches have found its applicability in dealing with complex real world scenarios where approximation, uncertainty, chaotic data are prime characteristics.", "title": "" }, { "docid": "0dd558f3094d82f55806d1170218efce", "text": "As the key supporting system of telecommunication enterprises, OSS/BSS needs to support the service steadily in the long-term running and maintenance process. The system architecture must remain steady and consistent in order to accomplish its goal, which is quite difficult when both the technique and business requirements are changing so rapidly. The framework method raised in this article can guarantee the system architecture’s steadiness and business processing’s consistence by means of describing business requirements, application and information abstractly, becoming more specific and formalized in the planning, developing and maintaining process, and getting the results needed. This article introduces firstly the concepts of framework method, then recommends its applications and superiority in OSS/BSS systems, and lastly gives the prospect of its application.", "title": "" }, { "docid": "1f0a926ac8e9d897f42c9a217e8556a9", "text": "We have previously shown that motor areas are engaged when subjects experience illusory limb movements elicited by tendon vibration. However, traditionally cytoarchitectonic area 2 is held responsible for kinesthesia. Here we use functional magnetic resonance imaging and cytoarchitectural mapping to examine whether area 2 is engaged in kinesthesia, whether it is engaged bilaterally because area 2 in non-human primates has strong callosal connections, which other areas are active members of the network for kinesthesia, and if there is a dominance for the right hemisphere in kinesthesia as has been suggested. Ten right-handed blindfolded healthy subjects participated. The tendon of the extensor carpi ulnaris muscles of the right or left hand was vibrated at 80 Hz, which elicited illusory palmar flexion in an immobile hand (illusion). As control we applied identical stimuli to the skin over the processus styloideus ulnae, which did not elicit any illusions (vibration). We found robust activations in cortical motor areas [areas 4a, 4p, 6; dorsal premotor cortex (PMD) and bilateral supplementary motor area (SMA)] and ipsilateral cerebellum during kinesthetic illusions (illusion-vibration). The illusions also activated contralateral area 2 and right area 2 was active in common irrespective of illusions of right or left hand. Right areas 44, 45, anterior part of intraparietal region (IP1) and caudo-lateral part of parietal opercular region (OP1), cortex rostral to PMD, anterior insula and superior temporal gyrus were also activated in common during illusions of right or left hand. These right-sided areas were significantly more activated than the corresponding areas in the left hemisphere. The present data, together with our previous results, suggest that human kinesthesia is associated with a network of active brain areas that consists of motor areas, cerebellum, and the right fronto-parietal areas including high-order somatosensory areas. Furthermore, our results provide evidence for a right hemisphere dominance for perception of limb movement.", "title": "" }, { "docid": "21dd193ec6849fa78ba03333708aebea", "text": "Since the inception of Bitcoin technology, its underlying data structureâĂŞ-the blockchainâĂŞ-has garnered much attention due to properties such as decentralization, transparency, and immutability. These properties make blockchains suitable for apps that require disintermediation through trustless exchange, consistent and incorruptible transaction records, and operational models beyond cryptocurrency. In particular, blockchain and its programmable smart contracts have the potential to address healthcare interoperability issues, such as enabling effective interactions between users and medical applications, delivering patient data securely to a variety of organizations and devices, and improving the overall efficiency of medical practice workflow. Despite the interest in using blockchain technology for healthcare interoperability, however, little information is available on the concrete architectural styles and recommendations for designing blockchain-based apps targeting healthcare. This paper provides an initial step in filling this gap by showing: (1) the features and implementation challenges in healthcare interoperability, (2) an end-to-end case study of a blockchain-based healthcare app that we are developing, and (3) how designing blockchain-based apps using familiar software patterns can help address healthcare specific challenges.", "title": "" }, { "docid": "9e55c0db2a56139b65205bec4ba5ec5d", "text": "Single image super-resolution (SR) algorithms based on joint dictionaries and sparse representations of image patches have received significant attention in the literature and deliver the state-of-the-art results. Recently, Gaussian mixture models (GMMs) have emerged as favored prior for natural image patches in various image restoration problems. In this paper, we approach the single image SR problem by using a joint GMM learnt from concatenated vectors of high and low resolution patches sampled from a large database of pairs of high resolution and the corresponding low resolution images. Covariance matrices of the learnt Gaussian models capture the inherent correlations between high and low resolution patches, which are utilized for inferring high resolution patches from given low resolution patches. The proposed joint GMM method can be interpreted as the GMM analogue of joint dictionary-based algorithms for single image SR. We study the performance of the proposed joint GMM method by comparing with various competing algorithms for single image SR. Our experiments on various natural images demonstrate the competitive performance obtained by the proposed method at low computational cost.", "title": "" }, { "docid": "760133d80110b5fa42c4f29291b67949", "text": "In this work, we propose a game theoretic framework to analyze the behavior of cognitive radios for distributed adaptive channel allocation. We define two different objective functions for the spectrum sharing games, which capture the utility of selfish users and cooperative users, respectively. Based on the utility definition for cooperative users, we show that the channel allocation problem can be formulated as a potential game, and thus converges to a deterministic channel allocation Nash equilibrium point. Alternatively, a no-regret learning implementation is proposed for both scenarios and it is shown to have similar performance with the potential game when cooperation is enforced, but with a higher variability across users. The no-regret learning formulation is particularly useful to accommodate selfish users. Non-cooperative learning games have the advantage of a very low overhead for information exchange in the network. We show that cooperation based spectrum sharing etiquette improves the overall network performance at the expense of an increased overhead required for information exchange", "title": "" } ]
scidocsrr
adaf2bef0dbb2e7c31e8ff663b5c63a4
Diffusion tensor imaging of the corpus callosum in Autism
[ { "docid": "908716e7683bdc78283600f63bd3a1b0", "text": "The need for a simply applied quantitative assessment of handedness is discussed and some previous forms reviewed. An inventory of 20 items with a set of instructions and responseand computational-conventions is proposed and the results obtained from a young adult population numbering some 1100 individuals are reported. The separate items are examined from the point of view of sex, cultural and socio-economic factors which might appertain to them and also of their inter-relationship to each other and to the measure computed from them all. Criteria derived from these considerations are then applied to eliminate 10 of the original 20 items and the results recomputed to provide frequency-distribution and cumulative frequency functions and a revised item-analysis. The difference of incidence of handedness between the sexes is discussed.", "title": "" }, { "docid": "891efd54485c7cf73edd690e0d9b3cfa", "text": "Quantitative-diffusion-tensor MRI consists of deriving and displaying parameters that resemble histological or physiological stains, i.e., that characterize intrinsic features of tissue microstructure and microdynamics. Specifically, these parameters are objective, and insensitive to the choice of laboratory coordinate system. Here, these two properties are used to derive intravoxel measures of diffusion isotropy and the degree of diffusion anisotropy, as well as intervoxel measures of structural similarity, and fiber-tract organization from the effective diffusion tensor, D, which is estimated in each voxel. First, D is decomposed into its isotropic and anisotropic parts, [D] I and D - [D] I, respectively (where [D] = Trace(D)/3 is the mean diffusivity, and I is the identity tensor). Then, the tensor (dot) product operator is used to generate a family of new rotationally and translationally invariant quantities. Finally, maps of these quantitative parameters are produced from high-resolution diffusion tensor images (in which D is estimated in each voxel from a series of 2D-FT spin-echo diffusion-weighted images) in living cat brain. Due to the high inherent sensitivity of these parameters to changes in tissue architecture (i.e., macromolecular, cellular, tissue, and organ structure) and in its physiologic state, their potential applications include monitoring structural changes in development, aging, and disease.", "title": "" } ]
[ { "docid": "4a741431c708cd92a250bcb91e4f1638", "text": "PURPOSE\nIn today's workplace, nurses are highly skilled professionals possessing expertise in both information technology and nursing. Nursing informatics competencies are recognized as an important capability of nurses. No established guidelines existed for nurses in Asia. This study focused on identifying the nursing informatics competencies required of nurses in Taiwan.\n\n\nMETHODS\nA modified Web-based Delphi method was used for two expert groups in nursing, educators and administrators. Experts responded to 323 items on the Nursing Informatics Competencies Questionnaire, modified from the initial work of Staggers, Gassert and Curran to include 45 additional items. Three Web-based Delphi rounds were conducted. Analysis included detailed item analysis. Competencies that met 60% or greater agreement of item importance and appropriate level of nursing practice were included.\n\n\nRESULTS\nN=32 experts agreed to participate in Round 1, 23 nursing educators and 9 administrators. The participation rates for Rounds 2 and 3=68.8%. By Round 3, 318 of 323 nursing informatics competencies achieved required consensus levels. Of the new competencies, 42 of 45 were validated. A high degree of agreement existed for specific nursing informatics competencies required for nurses in Taiwan (97.8%).\n\n\nCONCLUSIONS\nThis study provides a current master list of nursing informatics competency requirements for nurses at four levels in the U.S. and Taiwan. The results are very similar to the original work of Staggers et al. The results have international relevance because of the global importance of information technology for the nursing profession.", "title": "" }, { "docid": "07ba242cd29754cb008d225eb5663cf5", "text": "This paper summarizes the state of the real-time eld in the areas of scheduling and operating system kernels. Given the vast amount of work that has been done by both the operations research and computer science communities in the scheduling area, we discuss four paradigms underlying the scheduling approaches and present several exemplars of each. The four paradigms are: static table-driven scheduling, static priority preemptive scheduling, dynamic planning-based scheduling, and dynamic best-e ort scheduling. In the operating system context, we argue that most of the proprietary commercial kernels as well as real-time extensions to timesharing operating system kernels do not t the needs of predictable real-time systems. We discuss several research kernels that are currently being built to explicitly meet the needs of real-time applications. This material is based upon work supported by the National Science Foundation under grants CDA8922572 and IRI 9208920, and by the O ce of Naval Research under grant N00014-92-J-1048.", "title": "" }, { "docid": "0ccbb82de4b25ee10a9c8690c41232cf", "text": "Since amount of big data is extremely huge, low-delay and low-complexity signal processing devices are strongly required in big data signal processing. Digital filters are the key device for digital signal processing. Digital filters with sparse coefficients (0 coefficients) are beneficial to reduce the computational complexity. This paper proposes a design method for low-delay FIR filters with sparse coefficients. We consider the optimization of combination of selection for sparse coefficients. If the sparse coefficients are selected, the real coefficients can be computed based on the Lagrange multiplier method. We employ the branch and bound method incorporated with the Lagrange multiplier method. Also, we propose a selection method of the initial cost for high-speed search. The feature of this method is as follows: (a) The number of 0 coefficients can explicitly specify. (b) The optimality is guaranteed in the least squares sense. We present a design example in order to demonstrate the effectiveness of our method.", "title": "" }, { "docid": "456b7ad01115d9bc04ca378f1eb6d7f2", "text": "Article history: Received 13 October 2007 Received in revised form 12 June 2008 Accepted 31 July 2008", "title": "" }, { "docid": "6dfd7202e254fa8ec968c6d64b53e6ce", "text": "The Domain Name Service (DNS) provides a critical function in directing Internet traffic. Defending DNS servers from bandwidth attacks is assisted by the ability to effectively mine DNS log data for statistical patterns. Processing DNS log data can be classified as a data-intensive problem, and as such presents challenges unique to this class of problem. When problems occur in capturing log data, or when the DNS server experiences an outage (scheduled or unscheduled), the normal pattern of traffic for that server becomes clouded. Simple linear interpolation of the holes in the data does not preserve features such as peaks in traffic (which can occur during an attack, making them of particular interest). We demonstrate a method for estimating values for missing portions of time sensitive DNS log data. This method would be suitable for use with a variety of datasets containing time series values where certain portions are missing.", "title": "" }, { "docid": "e45f05e26ae6f7c1f5069bb3a3be236b", "text": "This paper presents a character-level encoder-decoder modeling method for question answering (QA) from large-scale knowledge bases (KB). This method improves the existing approach [9] from three aspects. First, long short-term memory (LSTM) structures are adopted to replace the convolutional neural networks (CNN) for encoding the candidate entities and predicates. Second, a new strategy of generating negative samples for model training is adopted. Third, a data augmentation strategy is applied to increase the size of the training set by generating factoid questions using another trained encoder-decoder model. Experimental results on the SimpleQuestions dataset and the Freebase5M KB demonstrates the effectiveness of the proposed method, which improves the state-of-the-art accuracy from 70.3% to 78.8% when augmenting the training set with 70,000 generated triple-question pairs.", "title": "" }, { "docid": "ad5005bc593b0fbddfe483732b30fe5e", "text": "Recent multi-agent extensions of Q-Learning require knowledge of other agents’ payoffs and Q-functions, and assume game-theoretic play at all times by all other agents. This paper proposes a fundamentally different approach, dubbed “Hyper-Q” Learning, in which values of mixed strategies rather than base actions are learned, and in which other agents’ strategies are estimated from observed actions via Bayesian inference. Hyper-Q may be effective against many different types of adaptive agents, even if they are persistently dynamic. Against certain broad categories of adaptation, it is argued that Hyper-Q may converge to exact optimal time-varying policies. In tests using Rock-Paper-Scissors, Hyper-Q learns to significantly exploit an Infinitesimal Gradient Ascent (IGA) player, as well as a Policy Hill Climber (PHC) player. Preliminary analysis of Hyper-Q against itself is also presented.", "title": "" }, { "docid": "8c0c2d5abd8b6e62f3184985e8e01d66", "text": "Neural networks are known to be vulnerable to adversarial examples: inputs that are close to natural inputs but classified incorrectly. In order to better understand the space of adversarial examples, we survey ten recent proposals that are designed for detection and compare their efficacy. We show that all can be defeated by constructing new loss functions. We conclude that adversarial examples are significantly harder to detect than previously appreciated, and the properties believed to be intrinsic to adversarial examples are in fact not. Finally, we propose several simple guidelines for evaluating future proposed defenses.", "title": "" }, { "docid": "c6e1c8aa6633ec4f05240de1a3793912", "text": "Medial prefrontal cortex (MPFC) is among those brain regions having the highest baseline metabolic activity at rest and one that exhibits decreases from this baseline across a wide variety of goal-directed behaviors in functional imaging studies. This high metabolic rate and this behavior suggest the existence of an organized mode of default brain function, elements of which may be either attenuated or enhanced. Extant data suggest that these MPFC regions may contribute to the neural instantiation of aspects of the multifaceted \"self.\" We explore this important concept by targeting and manipulating elements of MPFC default state activity. In this functional magnetic resonance imaging (fMRI) study, subjects made two judgments, one self-referential, the other not, in response to affectively normed pictures: pleasant vs. unpleasant (an internally cued condition, ICC) and indoors vs. outdoors (an externally cued condition, ECC). The ICC was preferentially associated with activity increases along the dorsal MPFC. These increases were accompanied by decreases in both active task conditions in ventral MPFC. These results support the view that dorsal and ventral MPFC are differentially influenced by attentiondemanding tasks and explicitly self-referential tasks. The presence of self-referential mental activity appears to be associated with increases from the baseline in dorsal MPFC. Reductions in ventral MPFC occurred consistent with the fact that attention-demanding tasks attenuate emotional processing. We posit that both self-referential mental activity and emotional processing represent elements of the default state as represented by activity in MPFC. We suggest that a useful way to explore the neurobiology of the self is to explore the nature of default state activity.", "title": "" }, { "docid": "e3557b0f064d848c5a9127a0c3d5f1db", "text": "Understanding the behaviors of a software system is very important for performing daily system maintenance tasks. In practice, one way to gain knowledge about the runtime behavior of a system is to manually analyze system logs collected during the system executions. With the increasing scale and complexity of software systems, it has become challenging for system operators to manually analyze system logs. To address these challenges, in this paper, we propose a new approach for contextual analysis of system logs for understanding a system's behaviors. In particular, we first use execution patterns to represent execution structures reflected by a sequence of system logs, and propose an algorithm to mine execution patterns from the program logs. The mined execution patterns correspond to different execution paths of the system. Based on these execution patterns, our approach further learns essential contextual factors (e.g., the occurrences of specific program logs with specific parameter values) that cause a specific branch or path to be executed by the system. The mining and learning results can help system operators to understand a software system's runtime execution logic and behaviors during various tasks such as system problem diagnosis. We demonstrate the feasibility of our approach upon two real-world software systems (Hadoop and Ethereal).", "title": "" }, { "docid": "9fb90f0d2480f212653c68f2dc334cd9", "text": "Consumer choice is influenced in a direct and meaningful way by the actions taken by others. These “actions” range from face-to-face recommendations from a friend to the passive observation of what a stranger is wearing. We refer to the set of such contexts as “social interactions” (SI). We believe that at least some of the SI effects are partially within the firm’s control and that this represents an exciting research opportunity. We present an agenda that identifies a list of unanswered questions of potential interest to both researchers and managers. In order to appreciate the firm’s choices with respect to its management of SI, it is important to first evaluate where we are in terms of understanding the phenomena themselves. We highlight five questions in this regard: (1) What are the antecedents of word of mouth (WOM)? (2) How does the transmission of positive WOM differ from that of negative WOM? (3) How does online WOM differ from offline WOM? (4) What is the impact of WOM? (5) How can we measure WOM? Finally, we identify and discuss four principal, non-mutually exclusive, roles that the firm might play: (1) observer, (2) moderator, (3) mediator, and (4) participant.", "title": "" }, { "docid": "2ddd492da2191f685daa111d5f89eedd", "text": "Given the abundance of cameras and LCDs in today's environment, there exists an untapped opportunity for using these devices for communication. Specifically, cameras can tune to nearby LCDs and use them for network access. The key feature of these LCD-camera links is that they are highly directional and hence enable a form of interference-free wireless communication. This makes them an attractive technology for dense, high contention scenarios. The main challenge however, to enable such LCD-camera links is to maximize coverage, that is to deliver multiple Mb/s over multi-meter distances, independent of the view angle. To do so, these links need to address unique types of channel distortions, such as perspective distortion and blur.\n This paper explores this novel communication medium and presents PixNet, a system for transmitting information over LCD-camera links. PixNet generalizes the popular OFDM transmission algorithms to address the unique characteristics of the LCD-camera link which include perspective distortion, blur, and sensitivity to ambient light. We have built a prototype of PixNet using off-the-shelf LCDs and cameras. An extensive evaluation shows that a single PixNet link delivers data rates of up to 12 Mb/s at a distance of 10 meters, and works with view angles as wide as 120 degree°.", "title": "" }, { "docid": "d88e8a363bbe8a00f814efd05ce6f46f", "text": "Many software applications today are written as web-based applications to be run in an Internet browser. Selenium is a set of powerful different software tools working with many browsers, operating systems, programming languages, and testing frameworks each with a different approach to supporting automation test for testing web-based applications. JMeter is used to simulate a heavy load on a server, network or object to test its strength or to analyze overall performance under different load types. JMeter operates at the protocol-level, on the other hand, Selenium works at the user-level. In this paper, authors have designed an automatic software testing framework for web applications based on the Selenium and JMeter. With the use of the software framework, we efficiently improve the extensibility and reusability of automated test. The results show that the new software framework improves software products quality and develop efficiency. This paper also illustrates how to design web-based test automation framework in details.", "title": "" }, { "docid": "1ac8e84ada32efd6f6c7c9fdfd969ec0", "text": "Spanner is Google's scalable, multi-version, globally-distributed, and synchronously-replicated database. It provides strong transactional semantics, consistent replication, and high performance reads and writes for a variety of Google's applications. I'll discuss the design and implementation of Spanner, as well as some of the lessons we have learned along the way. I'll also discuss some open challenges that we still see in building scalable distributed storage systems.", "title": "" }, { "docid": "210e22e098340e4f858b4ceab1c643e6", "text": "Dimethylsulfoxide (DMSO) controlled puff induction and repression (or non-induction) in larval polytene chromosomes of Chironomus tentans were studied for the case of the Balbiani rings (BR). A characteristic reaction pattern, involving BR 1, BR 2 and BR 3, all in salivary gland chromosome IV was found. In vivo exposure of 4th instar larvae (not prepupae) to 10% DMSO at 18° C first evokes an over-stimulation of BR 3 while DMSO-stimulation of puffing at BR 1 and BR 2 always follows that of BR 3. After removal of the drug, a rapid uniform collapse of all puffs occurs, thus more or less restoring the banding pattern of all previously decondensed chromosome segments. Recovery proceeds as BR's and other puffs reappear. By observing the restoration, one can locate the site from which a BR (puff) originates. BR 2, which is normally the most active non-ribosomal gene locus in untreated larvae, here serves as an example. As the sizes of BR 3, BR 1 and BR 2 change, so do the quantities of the transcriptional products in these gene loci (and vice versa), as estimated electron-microscopically in ultrathin sections and autoradiographically in squash preparations. In autoradiograms, the DMSO-stimulated BRs exhibit the most dense concentration of silver grains and therefore the highest rate of transcriptional activity. In DMSO-repressed BRs (and other puffs) the transcription of the locus specific genes is not completely shut off. In chromosomes from nuclei with high labelling intensities the repressed BRs (and other puffs) always exhibit a low level of 3H-uridine incorporation in vivo. The absence of cytologically visible BR (puff) formation therefore does not necessarily indicate complete transcriptional inactivity. Typically, before the stage of puff formation the 3H-uridine labelling first appears in the interband-like regions.", "title": "" }, { "docid": "b3ddcc6dbe3e118dfd0630feb42713c9", "text": "This thesis details the use of a programmable logic device to increase the playing strength of a chess program. The time–consuming task of generating chess moves is relegated to hardware in order to increase the processing speed of the search algorithm. A simpler inter–square connection protocol reduces the number of wires between chess squares, when compared to the Deep Blue design. With this interconnection scheme, special chess moves are easily resolved. Furthermore, dynamically programmable arbiters are introduced for optimal move ordering. Arbiter centrality is also shown to improve move ordering, thereby creating smaller search trees. The move generator is designed to allow the integration of crucial move ordering heuristics. With its new hardware move generator, the chess program’s playing ability is noticeably improved.", "title": "" }, { "docid": "5433a8e449bf4bf9d939e645e171f7e5", "text": "Software Testing (ST) processes attempt to verify and validate the capability of a software system to meet its required attributes and functionality. As software systems become more complex, the need for automated software testing methods emerges. Machine Learning (ML) techniques have shown to be quite useful for this automation process. Various works have been presented in the junction of ML and ST areas. The lack of general guidelines for applying appropriate learning methods for software testing purposes is our major motivation in this current paper. In this paper, we introduce a classification framework which can help to systematically review research work in the ML and ST domains. The proposed framework dimensions are defined using major characteristics of existing software testing and machine learning methods. Our framework can be used to effectively construct a concrete set of guidelines for choosing the most appropriate learning method and applying it to a distinct stage of the software testing life-cycle for automation purposes.", "title": "" }, { "docid": "cc6c485fdd8d4d61c7b68bfd94639047", "text": "Passive geolocaton of communication emitters provides great benefits to military and civilian surveillance and security operations. Time Difference of Arrival (TDOA) and Frequency Difference of Arrival (FDOA) measurement combination for stationary emitters may be obtained by sensors mounted on mobile platforms, for example on a pair of UAVs. Complex Ambiguity Function (CAF) of received complex signals can be efficiently calculated to provide required TDOA / FDOA measurement combination. TDOA and FDOA measurements are nonlinear in the sense that the emitter uncertainty given measurements in the Cartesian domain is non-Gaussian. Multiple non-linear measurements of emitter location need to be fused to provide the geolocation estimates. Gaussian Mixture Measurement (GMM) filter fuses nonlinear measurements as long as the uncertainty of each measurement in the surveillance (Cartesian) space is modeled by a Gaussian Mixture. Simulation results confirm this approach and compare it with geolocation using Bearings Only (BO) measurements.", "title": "" }, { "docid": "c7a55c0588c1cdccb5b01193a863eee0", "text": "Hypothyroidism is a very common, yet often overlooked disease. It can have a myriad of signs and symptoms, and is often nonspecific. Identification requires analysis of thyroid hormones circulating in the bloodstream, and treatment is simply replacement with exogenous hormone, usually levothyroxine (Synthroid). The deadly manifestation of hypothyroidism is myxedema coma. Similarly nonspecific and underrecognized, treatment with exogenous hormone is necessary to decrease the high mortality rate.", "title": "" }, { "docid": "d0bf34417300c70e4781ecf4cd6b5f1c", "text": "Recent advances in functional connectivity methods have made it possible to identify brain hubs - a set of highly connected regions serving as integrators of distributed neuronal activity. The integrative role of hub nodes makes these areas points of high vulnerability to dysfunction in brain disorders, and abnormal hub connectivity profiles have been described for several neuropsychiatric disorders. The identification of analogous functional connectivity hubs in preclinical species like the mouse may provide critical insight into the elusive biological underpinnings of these connectional alterations. To spatially locate functional connectivity hubs in the mouse brain, here we applied a fully-weighted network analysis to map whole-brain intrinsic functional connectivity (i.e., the functional connectome) at a high-resolution voxel-scale. Analysis of a large resting-state functional magnetic resonance imaging (rsfMRI) dataset revealed the presence of six distinct functional modules related to known large-scale functional partitions of the brain, including a default-mode network (DMN). Consistent with human studies, highly-connected functional hubs were identified in several sub-regions of the DMN, including the anterior and posterior cingulate and prefrontal cortices, in the thalamus, and in small foci within well-known integrative cortical structures such as the insular and temporal association cortices. According to their integrative role, the identified hubs exhibited mutual preferential interconnections. These findings highlight the presence of evolutionarily-conserved, mutually-interconnected functional hubs in the mouse brain, and may guide future investigations of the biological foundations of aberrant rsfMRI hub connectivity associated with brain pathological states.", "title": "" } ]
scidocsrr
b7b87b360c40464ad25019e46f4a0369
A neural model of voluntary and automatic emotion regulation: implications for understanding the pathophysiology and neurodevelopment of bipolar disorder
[ { "docid": "6e031a7dab98c28ca348d969f01787f0", "text": "Emotion regulation plays a central role in mental health and illness, but little is known about even the most basic forms of emotion regulation. To examine the acute effects of inhibiting negative and positive emotion, we asked 180 female participants to watch sad, neutral, and amusing films under 1 of 2 conditions. Suppression participants (N = 90) inhibited their expressive behavior while watching the films; no suppression participants (N = 90) simply watched the films. Suppression diminished expressive behavior in all 3 films and decreased amusement self-reports in sad and amusing films. Physiologically, suppression had no effect in the neutral film, but clear effects in both negative and positive emotional films, including increased sympathetic activation of the cardiovascular system. On the basis of these findings, we suggest several ways emotional inhibition may influence psychological functioning.", "title": "" } ]
[ { "docid": "70991373ae71f233b0facd2b5dd1a0d3", "text": "Information communications technology systems are facing an increasing number of cyber security threats, the majority of which are originated by insiders. As insiders reside behind the enterprise-level security defence mechanisms and often have privileged access to the network, detecting and preventing insider threats is a complex and challenging problem. In fact, many schemes and systems have been proposed to address insider threats from different perspectives, such as intent, type of threat, or available audit data source. This survey attempts to line up these works together with only three most common types of insider namely traitor, masquerader, and unintentional perpetrator, while reviewing the countermeasures from a data analytics perspective. Uniquely, this survey takes into account the early stage threats which may lead to a malicious insider rising up. When direct and indirect threats are put on the same page, all the relevant works can be categorised as host, network, or contextual data-based according to audit data source and each work is reviewed for its capability against insider threats, how the information is extracted from the engaged data sources, and what the decision-making algorithm is. The works are also compared and contrasted. Finally, some issues are raised based on the observations from the reviewed works and new research gaps and challenges identified.", "title": "" }, { "docid": "8326b4f0599718b3d8d3c7c8c8cd64ce", "text": "This paper introduces a neural model for concept-to-text generation that scales to large, rich domains. It generates biographical sentences from fact tables on a new dataset of biographies from Wikipedia. This set is an order of magnitude larger than existing resources with over 700k samples and a 400k vocabulary. Our model builds on conditional neural language models for text generation. To deal with the large vocabulary, we extend these models to mix a fixed vocabulary with copy actions that transfer sample-specific words from the input database to the generated output sentence. To deal with structured data, we allow the model to embed words differently depending on the data fields in which they occur. Our neural model significantly outperforms a Templated Kneser-Ney language model by nearly 15 BLEU.", "title": "" }, { "docid": "90eb392765c01b6166daa2a7a62944d1", "text": "Recent studies have demonstrated the potential for reducing energy consumption in integrated circuits by allowing errors during computation. While most proposed techniques for achieving this rely on voltage overscaling (VOS), this paper shows that Imprecise Hardware (IHW) with design-time structural parameters can achieve orthogonal energy-quality tradeoffs. Two IHW adders are improved and two IHW multipliers are introduced in this paper. In addition, a simulation-free error estimation technique is proposed to rapidly and accurately estimate the impact of IHW on output quality. Finally, a quality-aware energy minimization methodology is presented. To validate this methodology, experiments are conducted on two computational kernels: DOT-PRODUCT and L2-NORM -- used in three applications -- Leukocyte Tracker, SVM classification and K-means clustering. Results show that the Hellinger distance between estimated and simulated error distribution is within 0.05 and that the methodology enables designers to explore energy-quality tradeoffs with significant reduction in simulation complexity.", "title": "" }, { "docid": "be05abd038de9b32cc255ca221634a2c", "text": "This paper sees a smart city not as a status of how smart a city is but as a city's effort to make itself smart. The connotation of a smart city represents city innovation in management and policy as well as technology. Since the unique context of each city shapes the technological, organizational and policy aspects of that city, a smart city can be considered a contextualized interplay among technological innovation, managerial and organizational innovation, and policy innovation. However, only little research discusses innovation in management and policy while the literature of technology innovation is abundant. This paper aims to fill the research gap by building a comprehensive framework to view the smart city movement as innovation comprised of technology, management and policy. We also discuss inevitable risks from innovation, strategies to innovate while avoiding risks, and contexts underlying innovation and risks.", "title": "" }, { "docid": "e325165aa6628514015a6b467bf6c036", "text": "Wafer-scale beamforming lenses for future IEEE802.15.3c 60 GHz WPAN applications are presented. An on-wafer fabrication is of particular interest because a beamforming lens can be fabricated with sub-circuits in a single process. It means that the beamforming lens system would be compact, reliable, and cost-effective. The Rotman lens and the Rotman lens with antenna arrays were fabricated on a high-resistivity silicon (HRS) wafer in a semiconductor process, which is a preliminary research to check the feasibility of a Rotman lens for a chip scale packaging. In the case of the Rotman lens only, the efficiency is in the range from 50% to 70% depending on which beam port is excited. Assuming that the lens is coupled with ideal isotropic antennas, the synthesized beam patterns from the S-parameters shows that the beam directions are -29.3°, -15.1°, 0.2°, 15.2°, and 29.5 °, and the beam widths are 15.37°, 15.62°, 15.46°, 15.51°, and 15.63°, respectively. In the case of the Rotman lens with antenna array, the patterns were measured by using on-wafer measurement setup. It shows that the beam directions are -26.6°, -21.8°, 0°, 21.8°, and 26.6° . These results are in good agreement with the calculated results from ray-optic. Thus, it is verified that the lens antenna implemented on a wafer can be feasible for the system-in-package (SiP) and wafer-level package technologies.", "title": "" }, { "docid": "6bd9fc02c8e26e64cecb13dab1a93352", "text": "Kohlberg, who was born in 1927, grew up in Bronxville, New York, and attended the Andover Academy in Massachusetts, a private high school for bright and usually wealthy students. He did not go immediately to college, but instead went to help the Israeli cause, in which he was made the Second Engineer on an old freighter carrying refugees from parts of Europe to Israel. After this, in 1948, he enrolled at the University of Chicago, where he scored so high on admission tests that he had to take only a few courses to earn his bachelor's degree. This he did in one year. He stayed on at Chicago for graduate work in psychology, at first thinking he would become a clinical psychologist. However, he soon became interested in Piaget and began interviewing children and adolescents on moral issues. The result was his doctoral dissertation (1958a), the first rendition of his new stage theory.", "title": "" }, { "docid": "5f89dba01f03d4e7fbb2baa8877e0dff", "text": "The basic aim of a biometric identification system is to discriminate automatically between subjects in a reliable and dependable way, according to a specific-target application. Multimodal biometric identification systems aim to fuse two or more physical or behavioral traits to provide optimal False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus improving system accuracy and dependability. In this paper, an innovative multimodal biometric identification system based on iris and fingerprint traits is proposed. The paper is a state-of-the-art advancement of multibiometrics, offering an innovative perspective on features fusion. In greater detail, a frequency-based approach results in a homogeneous biometric vector, integrating iris and fingerprint data. Successively, a hamming-distance-based matching algorithm deals with the unified homogenous biometric vector. The proposed multimodal system achieves interesting results with several commonly used databases. For example, we have obtained an interesting working point with FAR = 0% and FRR = 5.71% using the entire fingerprint verification competition (FVC) 2002 DB2B database and a randomly extracted same-size subset of the BATH database. At the same time, considering the BATH database and the FVC2002 DB2A database, we have obtained a further interesting working point with FAR = 0% and FRR = 7.28% ÷ 9.7%.", "title": "" }, { "docid": "0c20ed6f2506ecb181909128796c0e5d", "text": "This paper presents a multilevel spin-orbit torque magnetic random access memory (SOT-MRAM). The conventional SOT-MRAMs enables a reliable and energy efficient write operation. However, these cells require two access transistors per cell, hence the efficiency of the SOT-MRAMs can be questioned in high-density memory application. To deal with this obstacle, we propose a multilevel cell which stores two bits per memory cell. In addition, we propose a novel sensing scheme to read out the stored data in the multilevel SOT-MRAM cell. Our simulation results show that the proposed cell can achieve 3X more energy efficient write operation in comparison with the conventional STT-MRAMs. In addition, the proposed cell store two bits without any area penalty in comparison to the conventional one bit SOT-MRAM cells.", "title": "" }, { "docid": "8c58b3da5e724888992ebf0accd2889d", "text": "This paper describes an automatic tissue segmentation method for newborn brains from magnetic resonance images (MRI). The analysis and study of newborn brain MRI is of great interest due to its potential for studying early growth patterns and morphological changes in neurodevelopmental disorders. Automatic segmentation of newborn MRI is a challenging task mainly due to the low intensity contrast and the growth process of the white matter tissue. Newborn white matter tissue undergoes a rapid myelination process, where the nerves are covered in myelin sheathes. It is necessary to identify the white matter tissue as myelinated or non-myelinated regions. The degree of myelination is a fractional voxel property that represents regional changes of white matter as a function of age. Our method makes use of a registered probabilistic brain atlas. The method first uses robust graph clustering and parameter estimation to find the initial intensity distributions. The distribution estimates are then used together with the spatial priors to perform bias correction. Finally, the method refines the segmentation using training sample pruning and non-parametric kernel density estimation. Our results demonstrate that the method is able to segment the brain tissue and identify myelinated and non-myelinated white matter regions.", "title": "" }, { "docid": "87db1c76d4c90122206a3911b36cf44a", "text": "Availability of autonomous systems can be enhanced with self-monitoring and fault-tolerance methods based on failures prediction. With each correct prediction, proactive actions may be taken to prevent or to mitigate a failure. On the other hand, incorrect predictions will introduce additional downtime associated with the overhead of a proactive action that may decrease availability. The total effect on availability will depend on the quality of prediction (measured with precision and recall), the overhead of proactive actions (penalty), and the benefit of proactive actions when prediction is correct (reward). In this paper, we quantify the impact of failure prediction and proactive actions on steady-state availability. Furthermore, we provide guidelines for optimizing failure prediction to maximize availability by selecting a proper precision and recall trade-off with respect to penalty and reward. A case study to demonstrate the approach is also presented.", "title": "" }, { "docid": "a037986af265203341286983c434f6f8", "text": "We create a new cryptocurrency scheme based on the mini-blockchain scheme and homomorphic commitments. The aim is to improve the miniblockchain by making it more private. We also make a comparison of Bitcoin and our scheme regarding their ability to resist blockchain analysis.", "title": "" }, { "docid": "e4dbca720626a29f60a31ed9d22c30aa", "text": "Text classification is the process of classifying documents into predefined categories based on their content. It is the automated assignment of natural language texts to predefined categories. Text classification is the primary requirement of text retrieval systems, which retrieve texts in response to a user query, and text understanding systems, which transform text in some way such as producing summaries, answering questions or extracting data. Existing supervised learning algorithms to automatically classify text need sufficient documents to learn accurately. This paper presents a new algorithm for text classification using data mining that requires fewer documents for training. Instead of using words, word relation i.e. association rules from these words is used to derive feature set from pre-classified text documents. The concept of Naïve Bayes classifier is then used on derived features and finally only a single concept of Genetic Algorithm has been added for final classification. A system based on the proposed algorithm has been implemented and tested. The experimental results show that the proposed system works as a successful text classifier.", "title": "" }, { "docid": "8d197bf27af825b9972a490d3cc9934c", "text": "The past decade has witnessed an increasing adoption of cloud database technology, which provides better scalability, availability, and fault-tolerance via transparent partitioning and replication, and automatic load balancing and fail-over. However, only a small number of cloud databases provide strong consistency guarantees for distributed transactions, despite decades of research on distributed transaction processing, due to practical challenges that arise in the cloud setting, where failures are the norm, and human administration is minimal. For example, dealing with locks left by transactions initiated by failed machines, and determining a multi-programming level that avoids thrashing without under-utilizing available resources, are some of the challenges that arise when using lock-based transaction processing mechanisms in the cloud context. Even in the case of optimistic concurrency control, most proposals in the literature deal with distributed validation but still require the database to acquire locks during two-phase commit when installing updates of a single transaction on multiple machines. Very little theoretical work has been done to entirely eliminate the need for locking in distributed transactions, including locks acquired during two-phase commit. In this paper, we re-design optimistic concurrency control to eliminate any need for locking even for atomic commitment, while handling the practical issues in earlier theoretical work related to this problem. We conduct an extensive experimental study to evaluate our approach against lock-based methods under various setups and workloads, and demonstrate that our approach provides many practical advantages in the cloud context.", "title": "" }, { "docid": "8087fe4979dc5c056decd31e7c1e6ee1", "text": "With over 100 million users, Duolingo is the most popular education app in the world in Android and iOS. In the first part of this talk, we will describe the motivation for creating Duolingo, its philosophy, and some of the basic techniques used to successfully teach languages and keep users engaged. The second part will focus on the machine learning and natural language processing algorithms we use to model student learning. Proceedings of the 8th International Conference on Educational Data Mining 3 Proceedings of the 8th International Conference on Educational Data Mining 4 Personal Knowledge/Learning Graph George Siemens University of Texas Arlington and Athabasca University gsiemens@gmail.com Ryan Baker Teachers College Columbia University baker2@exchange. tc.columbia.edu Dragan Gasevic Schools of Education and Informatics University of Edinburgh dragan.gasevic@ed.ac.uk", "title": "" }, { "docid": "f4c78c6f0424458cbeea67a498679344", "text": "In the United States, the office of the Medical Examiner-Coroner is responsible for investigating all sudden and unexpected deaths and deaths by violence. Its jurisdiction includes deaths during the arrest procedures and deaths in police custody. Police officers are sometimes required to subdue and restrain an individual who is violent, often irrational and resisting arrest. This procedure may cause harm to the subject and to the arresting officers. This article deals with our experiences in Los Angeles and reviews the policies and procedures for investigating and determining the cause and manner of death in such cases. We have taken a \"quality improvement approach\" to the study of these deaths due to restraint asphyxia and related officer involved deaths, Since 1999, through interagency coordination with law enforcement agencies similar to the hospital healthcare quality improvement meeting program, detailed information related to the sequence of events in these cases and ideas for improvements to prevent such deaths are discussed.", "title": "" }, { "docid": "7b8bd0a884ebcfe66eb4e7fb69bf05b2", "text": "We propose a novel monocular visual odometry (VO) system called UnDeepVO in this paper. UnDeepVO is able to estimate the 6-DoF pose of a monocular camera and the depth of its view by using deep neural networks. There are two salient features of the proposed UnDeepVo:one is the unsupervised deep learning scheme, and the other is the absolute scale recovery. Specifically, we train UnDeepVoby using stereo image pairs to recover the scale but test it by using consecutive monocular images. Thus, UnDeepVO is a monocular system. The loss function defined for training the networks is based on spatial and temporal dense information. A system overview is shown in Fig. 1. The experiments on KITTI dataset show our UnDeepVO achieves good performance in terms of pose accuracy.", "title": "" }, { "docid": "aa6502972088385f0d72d5744f43779f", "text": "We are living in a cyber space with an unprecedented rapid expansion of the space and its elements. All interactive information is processed and exchanged via this space. Clearly a well-built cyber security is vital to ensure the security of the cyber space. However the definitions and scopes of both cyber space and cyber security are still not well-defined and this makes it difficult to establish sound security models and mechanisms for protecting this space. Out of existing models, maturity models offer a manageable approach for assessing the security level of a system or organization. The paper first provides a review of various definitions of cyber space and cyber security in order to ascertain a common understanding of the space and its security. The paper investigates existing security maturity models, focusing on their defining characteristics and identifying their strengths and weaknesses. Finally, the paper discusses and suggests measures for a sound and applicable cyber security model.", "title": "" }, { "docid": "98e7492293b295200b78c99cce8824dd", "text": "Ann Campbell Burke examines the development and evolution [5] of vertebrates, in particular, turtles [6]. Her Harvard University [7] experiments, described in \"Development of the Turtle Carapace [4]: Implications for the Evolution of a Novel Bauplan,\" were published in 1989. Burke used molecular techniques to investigate the developmental mechanisms responsible for the formation of the turtle shell. Burke's work with turtle embryos has provided empirical evidence for the hypothesis that the evolutionary origins of turtle morphology [8] depend on changes in the embryonic and developmental mechanisms underpinning shell production.", "title": "" }, { "docid": "6f049f55c1b6f65284c390bd9a2d7511", "text": "Thanks to their state-of-the-art performance, deep neural networks are increasingly used for object recognition. To achieve these results, they use millions of parameters to be trained. However, when targetting embedded applications the size of these models becomes problematic. As a consequence, their usage on smartphones or other resource limited devices is prohibited. In this paper we introduce a novel compression method for deep neural networks that is performed during the learning phase. It consists in adding an extra regularization term to the cost function of fully-connected layers. We combine this method with Product Quantization (PQ) of the trained weights for higher savings in storage consumption. We evaluate our method on two data sets (MNIST and CIFAR10), on which we achieve significantly larger compression rates than state-of-the-art methods.", "title": "" }, { "docid": "6a2b9761b745f4ece1bba3fab9f5d8b1", "text": "Driven by the evolution of consumer-to-consumer (C2C) online marketplaces, we examine the role of communication tools (i.e., an instant messenger, internal message box and a feedback system), in facilitating dyadic online transactions in the Chinese C2C marketplace. Integrating the Chinese concept of guanxi with theories of social translucence and social presence, we introduce a structural model that explains how rich communication tools influence a website’s interactivity and presence, subsequently building trust and guanxi among buyers and sellers, and ultimately predicting buyers’ repurchase intentions. The data collected from 185 buyers in TaoBao, China’s leading C2C online marketplace, strongly support the proposed model. We believe that this research is the first formal study to show evidence of guanxi in online C2C marketplaces, and it is attributed to the role of communication tools to enhance a website’s interactivity and presence.", "title": "" } ]
scidocsrr
eebb92bfbac3d4927460a20e10f640e5
Navigating the Local Modes of Big Data: The Case of Topic Models
[ { "docid": "a8bd9e8470ad414c38f5616fb14d433d", "text": "Detecting hidden communities from observed interactions is a classical problem. Theoretical analysis of community detection has so far been mostly limited to models with non-overlapping communities such as the stochastic block model. In this paper, we provide guaranteed community detection for a family of probabilistic network models with overlapping communities, termed as the mixed membership Dirichlet model, first introduced in Airoldi et al. (2008). This model allows for nodes to have fractional memberships in multiple communities and assumes that the community memberships are drawn from a Dirichlet distribution. Moreover, it contains the stochastic block model as a special case. We propose a unified approach to learning communities in these models via a tensor spectral decomposition approach. Our estimator uses low-order moment tensor of the observed network, consisting of 3-star counts. Our learning method is based on simple linear algebraic operations such as singular value decomposition and tensor power iterations. We provide guaranteed recovery of community memberships and model parameters, and present a careful finite sample analysis of our learning method. Additionally, our results match the best known scaling requirements for the special case of the (homogeneous) stochastic block model.", "title": "" }, { "docid": "cce513c48e630ab3f072f334d00b67dc", "text": "We consider two algorithms for on-line prediction based on a linear model. The algorithms are the well-known gradient descent (GD) algorithm and a new algorithm, which we call EG. They both maintain a weight vector using simple updates. For the GD algorithm, the update is based on subtracting the gradient of the squared error made on a prediction. The EG algorithm uses the components of the gradient in the exponents of factors that are used in updating the weight vector multiplicatively. We present worst-case loss bounds for EG and compare them to previously known bounds for the GD algorithm. The bounds suggest that the losses of the algorithms are in general incomparable, but EG has a much smaller loss if only few components of the input are relevant for the predictions. We have performed experiments which show that our worst-case upper bounds are quite tight already on simple artificial data. ] 1997 Academic Press", "title": "" } ]
[ { "docid": "66da54da90bbd252386713751cec7c67", "text": "A cyber world (CW) is a digitized world created on cyberspaces inside computers interconnected by networks including the Internet. Following ubiquitous computers, sensors, e-tags, networks, information, services, etc., is a road towards a smart world (SW) created on both cyberspaces and real spaces. It is mainly characterized by ubiquitous intelligence or computational intelligence pervasion in the physical world filled with smart things. In recent years, many novel and imaginative researcheshave been conducted to try and experiment a variety of smart things including characteristic smart objects and specific smart spaces or environments as well as smart systems. The next research phase to emerge, we believe, is to coordinate these diverse smart objects and integrate these isolated smart spaces together into a higher level of spaces known as smart hyperspace or hyper-environments, and eventually create the smart world. In this paper, we discuss the potential trends and related challenges toward the smart world and ubiquitous intelligence from smart things to smart spaces and then to smart hyperspaces. Likewise, we show our efforts in developing a smart hyperspace of ubiquitous care for kids, called UbicKids.", "title": "" }, { "docid": "3bfeb0096c0255aee35001c23acb2057", "text": "Tensegrity structures, isolated solid rods connected by tensile cables, are of interest in the field of soft robotics due to their flexible and robust nature. This makes them suitable for uneven and unpredictable environments in which traditional robots struggle. The compliant structure also ensures that the robot will not injure humans or delicate equipment in co-robotic applications [1]. A 6-bar tensegrity structure is being used as the basis for a new generation of robotic landers and rovers for space exploration [1]. In addition to a soft tensegrity structure, we are also exploring use of soft sensors as an integral part of the compliant elements. Fig. 1 shows an example of a 6-bar tensegrity structure, with integrated liquid metalembedded hyperelastic strain sensors as the 24 tensile components. For this tensegrity, the strain sensors are primarily composed of a silicone elastomer with embedded microchannels filled with conductive liquid metal (eutectic gallium indium alloy (eGaIn), Sigma-Aldrich) (fig.2). As the sensor is elongated, the resistance of the eGaIn channel will increase due to the decreased microchannel cross-sectional area and the increased microchannel length [2]. The primary functions of this hyperelastic sensor tensegrity are model validation, feedback control, and structure analysis under payload. Feedback from the sensors can be used for experimental validation of existing models of tensegrity structures and dynamics, such as for the NASA Tensegrity Robotics Toolkit [3]. In addition, the readings from the sensors can provide distance changed between the ends of the bars, which can be used as a state estimator for UC Berkeley’s rapidly prototyped tensegrity robot to perform feedback control [1]. Furthermore, this physical model allows us to observe and record the force distribution and structure deformation with different payload conditions. Currently, we are exploring the possibility of integrating shape memory alloys into the hyperelastic sensors, which can provide the benefit of both actuation and sensing in a compact module. Preliminary tests indicate that this combination has the potential to generate enough force and displacement to achieve punctuated rolling motion for the 6-bar tensegrity structure.", "title": "" }, { "docid": "3c0cc3398139b6a558a56b934d96c641", "text": "Targeted nucleases are powerful tools for mediating genome alteration with high precision. The RNA-guided Cas9 nuclease from the microbial clustered regularly interspaced short palindromic repeats (CRISPR) adaptive immune system can be used to facilitate efficient genome engineering in eukaryotic cells by simply specifying a 20-nt targeting sequence within its guide RNA. Here we describe a set of tools for Cas9-mediated genome editing via nonhomologous end joining (NHEJ) or homology-directed repair (HDR) in mammalian cells, as well as generation of modified cell lines for downstream functional studies. To minimize off-target cleavage, we further describe a double-nicking strategy using the Cas9 nickase mutant with paired guide RNAs. This protocol provides experimentally derived guidelines for the selection of target sites, evaluation of cleavage efficiency and analysis of off-target activity. Beginning with target design, gene modifications can be achieved within as little as 1–2 weeks, and modified clonal cell lines can be derived within 2–3 weeks.", "title": "" }, { "docid": "b915033fd3f8fdea3fc7bf9e3f95146d", "text": "Software traceability is a required element in the development and certification of safety-critical software systems. However, trace links, which are created at significant cost and effort, are often underutilized in practice due primarily to the fact that project stakeholders often lack the skills needed to formulate complex trace queries. To mitigate this problem, we present a solution which transforms spoken or written natural language queries into structured query language (SQL). TiQi includes a general database query mechanism and a domain-specific model populated with trace query concepts, project-specific terminology, token disambiguators, and query transformation rules. We report results from four different experiments exploring user preferences for natural language queries, accuracy of the generated trace queries, efficacy of the underlying disambiguators, and stability of the trace query concepts. Experiments are conducted against two different datasets and show that users have a preference for written NL queries. Queries were transformed at accuracy rates ranging from 47 to 93 %.", "title": "" }, { "docid": "51da24a6bdd2b42c68c4465624d2c344", "text": "Hashing based Approximate Nearest Neighbor (ANN) search has attracted much attention due to its fast query time and drastically reduced storage. However, most of the hashing methods either use random projections or extract principal directions from the data to derive hash functions. The resulting embedding suffers from poor discrimination when compact codes are used. In this paper, we propose a novel data-dependent projection learning method such that each hash function is designed to correct the errors made by the previous one sequentially. The proposed method easily adapts to both unsupervised and semi-supervised scenarios and shows significant performance gains over the state-ofthe-art methods on two large datasets containing up to 1 million points.", "title": "" }, { "docid": "f92351eac81d6d28c3fd33ea96b75f91", "text": "There is clear evidence that investment in intelligent transportation system technologies brings major social and economic benefits. Technological advances in the area of automatic systems in particular are becoming vital for the reduction of road deaths. We here describe our approach to automation of one the riskiest autonomous manœuvres involving vehicles – overtaking. The approach is based on a stereo vision system responsible for detecting any preceding vehicle and triggering the autonomous overtaking manœuvre. To this end, a fuzzy-logic based controller was developed to emulate how humans overtake. Its input is information from the vision system and from a positioning-based system consisting of a differential global positioning system (DGPS) and an inertial measurement unit (IMU). Its output is the generation of action on the vehicle’s actuators, i.e., the steering wheel and throttle and brake pedals. The system has been incorporated into a commercial Citroën car and tested on the private driving circuit at the facilities of our research center, CAR, with different preceding vehicles – a motorbike, car, and truck – with encouraging results. 2011 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "c4d204b8ceda86e9d8e4ca56214f0ba3", "text": "This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, redistribution , reselling , loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material.", "title": "" }, { "docid": "2d0cc4c7ca6272200bb1ed1c9bba45f0", "text": "Advanced Driver Assistance Systems (ADAS) based on video camera tends to be generalized in today's automotive. However, if most of these systems perform nicely in good weather conditions, they perform very poorly under adverse weather particularly under rain. We present a novel approach that aims at detecting raindrops on a car windshield using only images from an in-vehicle camera. Based on the photometric properties of raindrops, the algorithm relies on image processing technics to highlight raindrops. Its results can be further used for image restoration and vision enhancement and hence it is a valuable tool for ADAS.", "title": "" }, { "docid": "f79167ce151d9f9c73cf307d4cff7fe7", "text": "Deep generative models trained with large amounts of unlabelled data have proven to be powerful within the domain of unsupervised learning. Many real life data sets contain a small amount of labelled data points, that are typically disregarded when training generative models. We propose the Cluster-aware Generative Model, that uses unlabelled information to infer a latent representation that models the natural clustering of the data, and additional labelled data points to refine this clustering. The generative performances of the model significantly improve when labelled information is exploited, obtaining a log-likelihood of−79.38 nats on permutation invariant MNIST, while also achieving competitive semi-supervised classification accuracies. The model can also be trained fully unsupervised, and still improve the log-likelihood performance with respect to related methods.", "title": "" }, { "docid": "081347f2376f4e4061ea5009af137ca7", "text": "The Internet of things can be defined as to make the “things” belong to the Internet. However, many wonder if the current Internet can support such a challenge. For this and other reasons, hundreds of worldwide initiatives to redesign the Internet are underway. This article discusses the perspectives, challenges and opportunities behind a future Internet that fully supports the “things”, as well as how the “things” can help in the design of a more synergistic future Internet. Keywords–Internet of things, smart things, future Internet, software-defined networking, service-centrism, informationcentrism, ID/Loc splitting, security, privacy, trust.", "title": "" }, { "docid": "0d7ce42011c48232189c791e71c289f5", "text": "RECENT WORK in virtue ethics, particularly sustained reflection on specific virtues, makes it possible to argue that the classical list of cardinal virtues (prudence, justice, temperance, and fortitude) is inadequate, and that we need to articulate the cardinal virtues more correctly. With that end in view, the first section of this article describes the challenges of espousing cardinal virtues today, the second considers the inadequacy of the classical listing of cardinal virtues, and the third makes a proposal. Since virtues, no matter how general, should always relate to concrete living, the article is framed by a case.", "title": "" }, { "docid": "b59281f7deb759c5126687ab8df13527", "text": "Despite orthogeriatric management, 12% of the elderly experienced PUs after hip fracture surgery. PUs were significantly associated with a low albumin level, history of atrial fibrillation coronary artery disease, and diabetes. The risk ratio of death at 6 months associated with pressure ulcer was 2.38 (95% CI 1.31-4.32%, p = 0.044).\n\n\nINTRODUCTION\nPressure ulcers in hip fracture patients are frequent and associated with a poor outcome. An orthogeriatric management, recommended by international guidelines in hip fracture patients and including pressure ulcer prevention and treatment, could influence causes and consequences of pressure ulcer. However, remaining factors associated with pressure ulcer occurrence and prognostic value of pressure ulcer in hip fracture patients managed in an orthogeriatric care pathway remain unknown.\n\n\nMETHODS\nFrom June 2009 to April 2015, all consecutive patients with hip fracture admitted to a unit for Post-operative geriatric care were evaluated for eligibility. Patients were included if their primary presentation was due to hip fracture and if they were ≥ 70 years of age. Patients were excluded in the presence of pathological fracture or if they were already hospitalized at the time of the fracture. In our unit, orthogeriatric principles are implemented, including a multi-component intervention to improve pressure ulcer prevention and management. Patients were followed-up until 6 months after discharge.\n\n\nRESULTS\nFive hundred sixty-seven patients were included, with an overall 14.4% 6-month mortality (95% CI 11.6-17.8%). Of these, 67 patients (12%) experienced at least one pressure ulcer. Despite orthogeriatric management, pressure ulcers were significantly associated with a low albumin level (RR 0.90, 95% CI 0.84-0.96; p = 0.003) and history of atrial fibrillation (RR 1.91, 95% CI 1.05-3.46; p = 0.033), coronary artery disease (RR 2.16, 95% CI 1.17-3.99; p = 0.014), and diabetes (RR 2.33, 95% CI 1.14-4.75; p = 0.02). A pressure ulcer was associated with 6-month mortality (RR 2.38, 95% CI 1.31-4.32, p = 0.044).\n\n\nCONCLUSION\nIn elderly patients with hip fracture managed in an orthogeriatric care pathway, pressure ulcer remained associated with poorly modifiable risk factors and long-term mortality.", "title": "" }, { "docid": "e099b35de6036539a14cf13abe98142f", "text": "Human multitasking is often the result of self-init iated interruptions in the performance of an ongoing task. These self-interruptions occur in the absence of external triggers such as electronic alerts or email notifications. Compared to externally induced interruptions, self-interr uptions have not received enough research attention. To address this gap, this paper develops a typology of self-interruptions based on the integration of Flow Theory and Self-regulation Theory . In this new typology, the two major categories stem from positive and negative feelings of task progress and prospects of goal attainment. The proposed classification is validated in an experimental multitasking environmen t with pre-defined tasks. Empirical findings indicate that negat ive feelings trigger more self-interruptions than positive feelings. In general, more self-interr uptions result in lower accuracy in all tasks. The results suggest that negative internal triggers of self-interruptions unleash a downward spiral that may degrade performance. 2013 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "d5c25d94fc0824a008d6632664669db2", "text": "The main barrier of the skin is formed by the lipids in the apical skin layer, the stratum corneum (SC). In SC mainly ceramides (CER), free fatty acids (FFA) and cholesterol (CHOL) are present. The CER are composed of at least six different fractions. CER 1 has an exceptional molecular structure as it contains a linoleic acid linked to a long-chain omega-hydroxy acid (C > 30). The SC lipids are organized in two lamellar phases with periodicities of approximately 6 and 13 nm, respectively. Recent studies revealed that ceramides isolated from pig SC mixed with cholesterol in confined ratios mimic stratum corneum lipid phase behavior closely (Bouwstra, J.A., et al. 1996. J. Lipid Res. 37: 999-1011). In this paper the role of CER 1 for the SC lipid lamellar organization was studied. For this purpose lipid phase behavior of mixtures of CHOL and total ceramide fraction was compared with that of mixtures of CHOL and a ceramide mixture lacking CER 1. These studies showed that in the absence of CER 1 almost no long periodicity phase was formed over a wide CHOL/CER molar ratio. A model is proposed for the molecular arrangement of the two lamellar phases. This model is based on the dominant role CER 1 plays in the formation of the long periodicity phase, electron density distribution calculations, and observations, such as i) the bimodal distribution of the fatty acid chain lengths of the ceramides, ii) the phase separation between long-chain ceramides and short-chain ceramides in a monolayer approach, and iii) the absence of swelling of the lamellae upon increasing the water content organization in SC. In this molecular model the short periodicity phase is composed of only two high electron density regions indicating the presence of only one bilayer, similar to that often found in phospholipid membranes. The molecular arrangement in the long periodicity phase is very exceptional. This phase most probably consists of two broad and one narrow low electron density regions. The two broad regions are formed by partly interdigitating ceramides with long-chain fatty acids of approximately 24-26 C atoms, while the narrow low-electron density region is formed by fully interdigitating ceramides with a short free fatty acid chain of approximately 16 to 18 C atoms.", "title": "" }, { "docid": "ab589fb1d97849e95da05d7e9b1d0f4f", "text": "We introduce a new speaker independent method for reducing wind noise in single-channel recordings of noisy speech. The method is based on non-negative sparse coding and relies on a wind noise dictionary which is estimated from an isolated noise recording. We estimate the parameters of the model and discuss their sensitivity. We then compare the algorithm with the classical spectral subtraction method and the Qualcomm-ICSI-OGI noise reduction method. We optimize the sound quality in terms of signal-to-noise ratio and provide results on a noisy speech recognition task.", "title": "" }, { "docid": "07eb3f5527e985c33ff7132381ee266d", "text": "Since the first application of indirect composite resins, numerous advances in adhesive dentistry have been made. Furthermore, improvements in structure, composition and polymerization techniques led to the development of a second-generation of indirect resin composites (IRCs). IRCs have optimal esthetic performance, enhanced mechanical properties and reparability. Due to these characteristics they can be used for a wide range of clinical applications. IRCs can be used for inlays, onlays, crowns’ veneering material, fixed dentures prostheses and removable prostheses (teeth and soft tissue substitution), both on teeth and implants. The purpose of this article is to review the properties of these materials and describe a case series of patients treated with different type of restorations in various indications. *Corresponding author: Aikaterini Petropoulou, Clinical Instructor, Department of Prosthodontics, School of Dentistry, National and Kapodistrian University of Athens, Greece, Tel: +306932989104; E-mail: aikatpetropoulou@gmail.com Received November 10, 2013; Accepted November 28, 2013; Published November 30, 2013 Citation: Petropoulou A, Pantzari F, Nomikos N, Chronopoulos V, Kourtis S (2013) The Use of Indirect Resin Composites in Clinical Practice: A Case Series. Dentistry 3: 173. doi:10.4172/2161-1122.1000173 Copyright: © 2013 Petropoulou A, et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.", "title": "" }, { "docid": "e79db51ac85ceafba66dddd5c038fbdf", "text": "Machine learning based anti-phishing techniques are based on various features extracted from different sources. These features differentiate a phishing website from a legitimate one. Features are taken from various sources like URL, page content, search engine, digital certificate, website traffic, etc, of a website to detect it as a phishing or non-phishing. The websites are declared as phishing sites if the heuristic design of the websites matches with the predefined rules. The accuracy of the anti-phishing solution depends on features set, training data and machine learning algorithm. This paper presents a comprehensive analysis of Phishing attacks, their exploitation, some of the recent machine learning based approaches for phishing detection and their comparative study. It provides a better understanding of the phishing problem, current solution space in machine learning domain, and scope of future research to deal with Phishing attacks efficiently using machine learning based approaches.", "title": "" }, { "docid": "5dca3981eb4c353712b51f3cc32ff3ec", "text": "We present a new classification architecture based on autoassociative neural networks that are used to learn discriminant models of each class. The proposed architecture has several interesting properties with respect to other model-based classifiers like nearest-neighbors or radial basis functions: it has a low computational complexity and uses a compact distributed representation of the models. The classifier is also well suited for the incorporation of a priori knowledge by means of a problem-specific distance measure. In particular, we will show that tangent distance (Simard, Le Cun, & Denker, 1993) can be used to achieve transformation invariance during learning and recognition. We demonstrate the application of this classifier to optical character recognition, where it has achieved state-of-the-art results on several reference databases. Relations to other models, in particular those based on principal component analysis, are also discussed.", "title": "" }, { "docid": "f83ca1c2732011e9a661f8cf9a0516ac", "text": "We provide a characterization of pseudoentropy in terms of hardness of sampling: Let (X,B) be jointly distributed random variables such that B takes values in a polynomial-sized set. We show that B is computationally indistinguishable from a random variable of higher Shannon entropy given X if and only if there is no probabilistic polynomial-time S such that (X,S(X)) has small KL divergence from (X,B). This can be viewed as an analogue of the Impagliazzo Hardcore Theorem (FOCS '95) for Shannon entropy (rather than min-entropy).\n Using this characterization, we show that if f is a one-way function, then (f(Un),Un) has \"next-bit pseudoentropy\" at least n+log n, establishing a conjecture of Haitner, Reingold, and Vadhan (STOC '10). Plugging this into the construction of Haitner et al., this yields a simpler construction of pseudorandom generators from one-way functions. In particular, the construction only performs hashing once, and only needs the hash functions that are randomness extractors (e.g. universal hash functions) rather than needing them to support \"local list-decoding\" (as in the Goldreich--Levin hardcore predicate, STOC '89).\n With an additional idea, we also show how to improve the seed length of the pseudorandom generator to ~{O}(n3), compared to O(n4) in the construction of Haitner et al.", "title": "" }, { "docid": "2777fdcc4442c3d63b51b92710f3914d", "text": "Non-invasive pressure simulators that regenerate oscillometric waveforms promise an alternative to expensive clinical trials for validating oscillometric noninvasive blood pressure devices. However, existing simulators only provide oscillometric pressure in cuff and thus have a limited accuracy. It is promising to build a physical simulator that contains a synthetic arm with a built-in brachial artery and an affiliated hydraulic model of cardiovascular system. To guide the construction of this kind of simulator, this paper presents a computer model of cardiovascular system with a relatively simple structure, where the distribution of pressures and flows in aorta root and brachial artery can be simulated, and the produced waves are accordant with the physical data. This model can be used to provide the parameters and structure that will be needed to build the new simulator.", "title": "" } ]
scidocsrr
a46d0a29c078e13ab90409bbff71c217
Affective computing in virtual reality: emotion recognition from brain and heartbeat dynamics using wearable sensors
[ { "docid": "0ee97a3afcc2471a05924a1171ac82cf", "text": "A number of researchers around the world have built machines that recognize, express, model, communicate, and respond to emotional information, instances of ‘‘affective computing.’’ This article raises and responds to several criticisms of affective computing, articulating state-of-the art research challenges, especially with respect to affect in humancomputer interaction. r 2003 Elsevier Science Ltd. All rights reserved.", "title": "" }, { "docid": "5e428061a28f7fa08656590984e6e12a", "text": "Will consumer wearable technology ever be adopted or accepted by the medical community? Patients and practitioners regularly use digital technology (e.g., thermometers and glucose monitors) to identify and discuss symptoms. In addition, a third of general practitioners in the United Kingdom report that patients arrive with suggestions for treatment based on online search results [1]. However, consumer health wearables are predicted to become the next “Dr Google.”One in six (15%) consumers in the United States currently uses wearable technology, including smartwatches or fitness bands. While 19 million fitness devices are likely to be sold this year, that number is predicted to grow to 110 million in 2018 [2]. As the line between consumer health wearables and medical devices begins to blur, it is now possible for a single wearable device to monitor a range of medical risk factors (Fig 1). Potentially, these devices could give patients direct access to personal analytics that can contribute to their health, facilitate preventive care, and aid in the management of ongoing illness. However, how this new wearable technology might best serve medicine remains unclear.", "title": "" } ]
[ { "docid": "4eead577c1b3acee6c93a62aee8a6bb5", "text": "The present study examined teacher attitudes toward dyslexia and the effects of these attitudes on teacher expectations and the academic achievement of students with dyslexia compared to students without learning disabilities. The attitudes of 30 regular education teachers toward dyslexia were determined using both an implicit measure and an explicit, self-report measure. Achievement scores for 307 students were also obtained. Implicit teacher attitudes toward dyslexia related to teacher ratings of student achievement on a writing task and also to student achievement on standardized tests of spelling but not math for those students with dyslexia. Self-reported attitudes of the teachers toward dyslexia did not relate to any of the outcome measures. Neither the implicit nor the explicit measures of teacher attitudes related to teacher expectations. The results show implicit attitude measures to be a more valuable predictor of the achievement of students with dyslexia than explicit, self-report attitude measures.", "title": "" }, { "docid": "b267bf90b86542e3032eaddcc2c3350f", "text": "Many modalities of treatment for acquired skin hyperpigmentation are available including chemical agents or physical therapies, but none are completely satisfactory. Depigmenting compounds should act selectively on hyperactivated melanocytes, without short- or long-term side-effects, and induce a permanent removal of undesired pigment. Since 1961 hydroquinone, a tyrosinase inhibitor, has been introduced and its therapeutic efficacy demonstrated, and other whitening agents specifically acting on tyrosinase by different mechanisms have been proposed. Compounds with depigmenting activity are now numerous and the classification of molecules, based on their mechanism of action, has become difficult. Systematic studies to assess both the efficacy and the safety of such molecules are necessary. Moreover, the evidence that bleaching compounds are fairly ineffective on dermal accumulation of melanin has prompted investigations on the effectiveness of physical therapies, such as lasers. This review which describes the different approaches to obtain depigmentation, suggests a classification of whitening molecules on the basis of the mechanism by which they interfere with melanogenesis, and confirms the necessity to apply standardized protocols to evaluate depigmenting treatments.", "title": "" }, { "docid": "0b587770a13ba76572a1e51df52d95a3", "text": "Current approaches to supervised learning of metaphor tend to use sophisticated features and restrict their attention to constructions and contexts where these features apply. In this paper, we describe the development of a supervised learning system to classify all content words in a running text as either being used metaphorically or not. We start by examining the performance of a simple unigram baseline that achieves surprisingly good results for some of the datasets. We then show how the recall of the system can be improved over this strong baseline.", "title": "" }, { "docid": "c72a42af9b6c69bc780c93997c6c2c5f", "text": "Water strider can slide agilely on water surface at high speed. To study its locomotion characters, movements of water strider are recorded by a high speed camera. The trajectories and angle variations of water strider leg are obtained from the photo series, and provide basic information for bionic robot design. Thus a water strider robot based on surface tension is proposed. The driving mechanism is designed to replicate the trajectory of water strider's middle leg.", "title": "" }, { "docid": "5cfaec0f198065bb925a1fb4ffb53f60", "text": "In the emerging inter-disciplinary field of art and image processing, algorithms have been developed to assist the analysis of art work. In most applications, especially brush stroke analysis, high resolution digital images of paintings are required to capture subtle patterns and details in the high frequency range of the spectrum. Algorithms have been developed to learn styles of painters from their digitized paintings to help identify authenticity of controversial paintings. However, high quality testing datasets containing both original and forgery are limited to confidential image files provided by museums, which is not publicly available, and a small sets of original/copy paintings painted by the same artist, where copies were deferred to two weeks after the originals were finished. Up to date, no synthesized painting by computers from a real painting has been used as a negative test case, mainly due to the limitation of prevailing style transfer algorithms. There are two main types of style transfer algorithms, either transferring the tone (color, contrast, saturation, etc.) of an image, preserving its patterns and details, or distorting the texture uniformly of an image to create “style”. In this paper, we are interested in a higher level of style transfer, particularly, transferring a source natural image (e.g. a photo) to a high resolution painting given a reference painting of similar object. The transferred natural image would have a similar presentation of the original object to that of the reference painting. In general, an object is painted in a different style of brush strokes than that of the background, hence the desired style transferring algorithm should be able to recognize the object in the source natural image and transfer brush stroke styles in the reference painting in a content-aware way such that the styles of the foreground and the background, and moreover different parts of the foreground in the transferred image, are consistent to that in the reference painting. Recently, an algorithm based on deep convolutional neural network has been developed to transfer artistic style from an art painting to a photo [2]. Successful as it is in transferring styles from impressionist paintings of artists such as Vincent van Gogh to photos of various scenes, the algorithm is prone to distorting the structure of the content in the source image and introducing artifacts/new", "title": "" }, { "docid": "7fb967f01038fb24c7d2b0c98df68b51", "text": "Any modern organization that is serious about security deploys a network intrusion detection system (NIDS) to monitor network traffic for signs of malicious activity. The most widely deployed NIDS system is Snort, an open source system originally released in 1998. Snort is a single threaded system that uses a set of clear text rules to instruct a base engine how to react when particular traffic patterns are detected. In 2009, the US Department of Homeland Security and a consortium of private companies provided substantial grant funding to a newly created organization known as the Open Information Security Foundation (OISF), to build a multi-threaded alternative to Snort, called Suricata. Despite many similarities between Snort and Suricata, the OISF stated it was essential to replace the older single-threaded Snort engine with a multi-threaded system that could deliver higher performance and better scalability. Key Snort developers argued that Suricata’s multi-threaded architecture would actually slow the detection process. Given these competing claims, an objective head-to-head comparison of the performance of Snort and Suricata is needed. In this paper, we present a comprehensive quantitative comparison of the two systems. We have developed a rigorous testing framework that examines the performance of both systems as we scale system resources. Our results show that a single instance of Suricata is able to deliver substantially higher performance than a corresponding single instance of Snort, but has problems scaling with a higher number of cores. We find that while Suricata needs tuning for a higher number of cores, it is still able to surpass Snort even at 1 core where we would have expected Snort to shine.", "title": "" }, { "docid": "1e27234f694ac4ac307e9088804a7444", "text": "Anomaly detection in social media refers to the detection of users’ abnormal opinions, sentiment patterns, or special temporal aspects of such patterns. Social media platforms, such as Sina Weibo or Twitter, provide a Big-data platform for information retrieval, which include user feedbacks, opinions, and information on most issues. This paper proposes a hybrid neural network model called Convolutional Neural Network-Long-Short Term Memory(CNN-LSTM), we successfully applies the model to sentiment analysis on a microblog Big-data platform and obtains significant improvements that enhance the generalization ability. Based on the sentiment of a single post in Weibo, this study also adopted the multivariate Gaussian model and the power law distribution to analyze the users’ emotion and detect abnormal emotion on microblog, the multivariate Gaussian method automatically captures the correlation between different features of the emotions and saves a certain amount of time through the batch calculation of the joint probability density of data sets. Through the measure of a joint probability density value and validation of the corpus from social network, anomaly detection accuracy of an individual user is 83.49% and that for a different month is 87.84%. The results of the distribution test show that individual user’s neutral, happy, and sad emotions obey the normal distribution but the surprised and angry emotions do not. In addition, the group-based emotions on microblogs obey the power law distribution but individual emotions do not.", "title": "" }, { "docid": "53edb03722153d091fb2e78c811d4aa5", "text": "One of the main reasons for failure in Software Process Improvement (SPI) initiatives is the lack of motivation of the professionals involved. Therefore, motivation should be encouraged throughout the software process. Gamification allows us to define mechanisms that motivate people to develop specific tasks. A gamification framework was adapted to the particularities of an organization and software professionals to encourage motivation. Thus, it permitted to facilitate the adoption of SPI improvements and a higher success rate. The objective of this research was to validate the framework presented and increase the actual implementation of gamification in organizations. To achieve this goal, a qualitative research methodology was employed through interviews that involved a total of 29 experts in gamification and SPI. The results of this study confirm the validity of the framework presented, its relevance in the field of SPI and its alignment with the standard practices of gamification implementation within organizations.", "title": "" }, { "docid": "aebdcd5b31d26ec1b4147efe842053e4", "text": "We describe a novel camera calibration algorithm for square, circle, and ring planar calibration patterns. An iterative refinement approach is proposed that utilizes the parameters obtained from traditional calibration algorithms as initialization to perform undistortion and unprojection of calibration images to a canonical fronto-parallel plane. This canonical plane is then used to localize the calibration pattern control points and recompute the camera parameters in an iterative refinement until convergence. Undistorting and unprojecting the calibration pattern to the canonical plane increases the accuracy of control point localization and consequently of camera calibration. We have conducted an extensive set of experiments with real and synthetic images for the square, circle and ring pattern, and the pixel reprojection errors obtained by our method are about 50% lower than those of the OpenCV Camera Calibration Toolbox. Increased accuracy of camera calibration directly leads to improvements in other applications; we demonstrate recovery of fine object structure for visual hull reconstruction, and recovery of precise epipolar geometry for stereo camera calibration.", "title": "" }, { "docid": "db8cd5dad5c3d3bda0f10f3369351bbd", "text": "The massive diffusion of online social media allows for the rapid and uncontrolled spreading of conspiracy theories, hoaxes, unsubstantiated claims, and false news. Such an impressive amount of misinformation can influence policy preferences and encourage behaviors strongly divergent from recommended practices. In this paper, we study the statistical properties of viral misinformation in online social media. By means of methods belonging to Extreme Value Theory, we show that the number of extremely viral posts over time follows a homogeneous Poisson process, and that the interarrival times between such posts are independent and identically distributed, following an exponential distribution. Moreover, we characterize the uncertainty around the rate parameter of the Poisson process through Bayesian methods. Finally, we are able to derive the predictive posterior probability distribution of the number of posts exceeding a certain threshold of shares over a finite interval of time.", "title": "" }, { "docid": "055a7be9623e794168b858e41bceaabd", "text": "Lexical Pragmatics is a research field that tries to give a systematic and explanatory account of pragmatic phenomena that are connected with the semantic underspecification of lexical items. Cases in point are the pragmatics of adjectives, systematic polysemy, the distribution of lexical and productive causatives, blocking phenomena, the interpretation of compounds, and many phenomena presently discussed within the framework of Cognitive Semantics. The approach combines a constrained-based semantics with a general mechanism of conversational implicature. The basic pragmatic mechanism rests on conditions of updating the common ground and allows to give a precise explication of notions as generalized conversational implicature and pragmatic anomaly. The fruitfulness of the basic account is established by its application to a variety of recalcitrant phenomena among which its precise treatment of Atlas & Levinson's Qand I-principles and the formalization of the balance between informativeness and efficiency in natural language processing (Horn's division of pragmatic labor) deserve particular mention. The basic mechanism is subsequently extended by an abductive reasoning system which is guided by subjective probability. The extended mechanism turned out to be capable of giving a principled account of lexical blocking, the pragmatics of adjectives, and systematic polysemy.", "title": "" }, { "docid": "04ed69959c28c3c4185d3af55521d864", "text": "A new differential-fed broadband antenna element with unidirectional radiation is proposed. This antenna is composed of a folded bowtie, a center-fed loop, and a box-shaped reflector. A pair of differential feeds is developed to excite the antenna and provide an ultrawideband (UWB) impedance matching. The box-shaped reflector is used for the reduction of the gain fluctuation across the operating frequency band. An antenna prototype for UWB applications is fabricated and measured, exhibiting an impedance bandwidth of 132% with standing wave ratio ≤ 2 from 2.48 to 12.12 GHz, over which the gain varies between 7.2 and 14.1 dBi at boresight. The proposed antenna radiates unidirectionally with low cross polarization and low back radiation. Furthermore, the time-domain characteristic of the proposed antenna is evaluated. In addition, a 2 × 2 element array using the proposed element is also investigated in this communication.", "title": "" }, { "docid": "5ca5cfcd0ed34d9b0033977e9cde2c74", "text": "We study the impact of regulation on competition between brand-names and generics and pharmaceutical expenditures using a unique policy experiment in Norway, where reference pricing (RP) replaced price cap regulation in 2003 for a sub-sample of o¤-patent products. First, we construct a vertical di¤erentiation model to analyze the impact of regulation on prices and market shares of brand-names and generics. Then, we exploit a detailed panel data set at product level covering several o¤-patent molecules before and after the policy reform. O¤-patent drugs not subject to RP serve as our control group. We …nd that RP signi…cantly reduces both brand-name and generic prices, and results in signi…cantly lower brand-name market shares. Finally, we show that RP has a strong negative e¤ect on average molecule prices, suggesting signi…cant cost-savings, and that patients’ copayments decrease despite the extra surcharges under RP. Key words: Pharmaceuticals; Regulation; Generic Competition JEL Classi…cations: I11; I18; L13; L65 We thank David Bardey, Øivind Anti Nilsen, Frode Steen, and two anonymous referees for valuable comments and suggestions. We also thank the Norwegian Research Council, Health Economics Bergen (HEB) for …nancial support. Corresponding author. Department of Economics and Health Economics Bergen, Norwegian School of Economics and Business Administration, Helleveien 30, N-5045 Bergen, Norway. E-mail: kurt.brekke@nhh.no. Uni Rokkan Centre, Health Economics Bergen, Nygårdsgaten 5, N-5015 Bergen, Norway. E-mail: tor.holmas@uni.no. Department of Economics/NIPE, University of Minho, Campus de Gualtar, 4710-057 Braga, Portugal; and University of Bergen (Economics), Norway. E-mail: o.r.straume@eeg.uminho.pt.", "title": "" }, { "docid": "3e2012134aa2e88b230f95518c11994d", "text": "Echo Chamber is a game that persuades players to re-examine their argumentation style and adopt new rhetorical techniques procedurally delivered through gameplay. Several games have been made addressing the environmental impacts of climate change; none have examined the gap between scientific and public discourse over climate change, and our goal was to teach players more effective communication techniques for conveying climate change in public venues. Our game provides other developers insight into persuasion through game mechanics with good design practices for similar persuasive games.", "title": "" }, { "docid": "fdcf6e60ad11b10fba077a62f7f1812d", "text": "Delivering web software as a service has grown into a powerful paradigm for deploying a wide range of Internetscale applications. However for end-users, accessing software as a service is fundamentally at odds with free software, because of the associated cost of maintaining server infrastructure. Users end up paying for the service in one way or another, often indirectly through ads or the sale of their private data. In this paper, we aim to enable a new generation of portable and free web apps by proposing an alternative model to the existing client-server web architecture. freedom.js is a platform for developing and deploying rich multi-user web apps, where application logic is pushed out from the cloud and run entirely on client-side browsers. By shifting the responsibility of where code runs, we can explore a novel incentive structure where users power applications with their own resources, gain the ability to control application behavior and manage privacy of data. For developers, we lower the barrier of writing popular web apps by removing much of the deployment cost and making applications simpler to write. We provide a set of novel abstractions that allow developers to automatically scale their application with low complexity and overhead. freedom.js apps are inherently sandboxed, multi-threaded, and composed of reusable modules. We demonstrate the flexibility of freedom.js through a number of applications that we have built on top of the platform, including a messaging application, a social file synchronization tool, and a peer-to-peer (P2P) content delivery network (CDN). Our experience shows that we can implement a P2P-CDN with 50% fewer lines of application-specific code in the freedom.js framework when compared to a standalone version. In turn, we incur an additional startup latency of 50-60ms (about 6% of the page load time) with the freedom.js version, without any noticeable impact on system throughput.", "title": "" }, { "docid": "9b75357d49ece914e02b04a6eaa927a0", "text": "Feminist criticism of health care and ofbioethics has become increasingly rich andsophisticated in the last years of thetwentieth century. Nonetheless, this body ofwork remains quite marginalized. I believe thatthere are (at least) two reasons for this.First, many people are still confused aboutfeminism. Second, many people are unconvincedthat significant sexism still exists and aretherefore unreceptive to arguments that itshould be remedied if there is no largerbenefit. In this essay I argue for a thin,``core'' conception of feminism that is easy tounderstand and difficult to reject. Corefeminism would render debate within feminismmore fruitful, clear the way for appropriaterecognition of differences among women andtheir circumstances, provide intellectuallycompelling reasons for current non-feminists toadopt a feminist outlook, and facilitatemutually beneficial cooperation betweenfeminism and other progressive socialmovements. This conception of feminism alsomakes it clear that feminism is part of alarger egalitarian moral and political agenda,and adopting it would help bioethics focus onthe most urgent moral priorities. In addition,integrating core feminism into bioethics wouldopen a gateway to the more speculative parts offeminist work where a wealth of creativethinking is occurring. Engaging with thisfeminist work would challenge and strengthenmainstream approaches; it should also motivatemainstream bioethicists to explore othercurrently marginalized parts of bioethics.", "title": "" }, { "docid": "facf85be0ae23eacb7e7b65dd5c45b33", "text": "We review evidence for partially segregated networks of brain areas that carry out different attentional functions. One system, which includes parts of the intraparietal cortex and superior frontal cortex, is involved in preparing and applying goal-directed (top-down) selection for stimuli and responses. This system is also modulated by the detection of stimuli. The other system, which includes the temporoparietal cortex and inferior frontal cortex, and is largely lateralized to the right hemisphere, is not involved in top-down selection. Instead, this system is specialized for the detection of behaviourally relevant stimuli, particularly when they are salient or unexpected. This ventral frontoparietal network works as a 'circuit breaker' for the dorsal system, directing attention to salient events. Both attentional systems interact during normal vision, and both are disrupted in unilateral spatial neglect.", "title": "" }, { "docid": "14ca9dfee206612e36cd6c3b3e0ca61e", "text": "Radio-frequency identification (RFID) technology promises to revolutionize the way we track items in supply chain, retail store, and asset management applications. The size and different characteristics of RFID data pose many interesting challenges in the current data management systems. In this paper, we provide a brief overview of RFID technology and highlight a few of the data management challenges that we believe are suitable topics for exploratory research.", "title": "" }, { "docid": "59b10765f9125e9c38858af901a39cc7", "text": "--------__------------------------------------__---------------", "title": "" }, { "docid": "dba3434c600ed7ddbb944f0a3adb1ba0", "text": "Although acoustic waves are the most versatile and widely used physical layer technology for underwater wireless communication networks (UWCNs), they are adversely affected by ambient noise, multipath propagation, and fading. The large propagation delays, low bandwidth, and high bit error rates of the underwater acoustic channel hinder communication as well. These operational limits call for complementary technologies or communication alternatives when the acoustic channel is severely degraded. Magnetic induction (MI) is a promising technique for UWCNs that is not affected by large propagation delays, multipath propagation, and fading. In this paper, the MI communication channel has been modeled. Its propagation characteristics have been compared to the electromagnetic and acoustic communication systems through theoretical analysis and numerical evaluations. The results prove the feasibility of MI communication in underwater environments. The MI waveguide technique is developed to reduce path loss. The communication range between source and destination is considerably extended to hundreds of meters in fresh water due to its superior bit error rate performance.", "title": "" } ]
scidocsrr
443b689900fc69a1a256fb30af2036e5
SYSTEMS CONTINUANCE : AN EXPECTATION-CONFIRMATION MODEL 1 By :
[ { "docid": "6c2afcf5d7db0f5d6baa9d435c203f8a", "text": "An attempt to extend current thinking on postpurchase response to include attribute satisfaction and dissatisfaction as separate determinants not fully reflected in either cognitive (i.e.. expectancy disconfirmation) or affective paradigms is presented. In separate studies of automobile satisfaction and satisfaction with course instruction, respondents provided the nature of emotional experience, disconfirmation perceptions, and separate attribute satisfaction and dissatisfaction judgments. Analysis confirmed the disconfirmation effect and tbe effects of separate dimensions of positive and negative affect and also suggested a multidimensional structure to the affect dimensions. Additionally, attribute satisfaction and dissatisfaction were significantly related to positive and negative affect, respectively, and to overall satisfaction. It is suggested that all dimensions tested are needed for a full accounting of postpurchase responses in usage.", "title": "" } ]
[ { "docid": "b3e90fdfda5346544f769b6dd7c3882b", "text": "Bromelain is a complex mixture of proteinases typically derived from pineapple stem. Similar proteinases are also present in pineapple fruit. Beneficial therapeutic effects of bromelain have been suggested or proven in several human inflammatory diseases and animal models of inflammation, including arthritis and inflammatory bowel disease. However, it is not clear how each of the proteinases within bromelain contributes to its anti-inflammatory effects in vivo. Previous in vivo studies using bromelain have been limited by the lack of assays to control for potential differences in the composition and proteolytic activity of this naturally derived proteinase mixture. In this study, we present model substrate assays and assays for cleavage of bromelain-sensitive cell surface molecules can be used to assess the activity of constituent proteinases within bromelain without the need for biochemical separation of individual components. Commercially available chemical and nutraceutical preparations of bromelain contain predominately stem bromelain. In contrast, the proteinase activity of pineapple fruit reflects its composition of fruit bromelain>ananain approximately stem bromelain. Concentrated bromelain solutions (>50 mg/ml) are more resistant to spontaneous inactivation of their proteolytic activity than are dilute solutions, with the proteinase stability in the order of stem bromelain>fruit bromelain approximately ananain. The proteolytic activity of concentrated bromelain solutions remains relatively stable for at least 1 week at room temperature, with minimal inactivation by multiple freeze-thaw cycles or exposure to the digestive enzyme trypsin. The relative stability of concentrated versus dilute bromelain solutions to inactivation under physiologically relevant conditions suggests that delivery of bromelain as a concentrated bolus would be the preferred method to maximize its proteolytic activity in vivo.", "title": "" }, { "docid": "135d451e66cdc8d47add47379c1c35f9", "text": "We present an approach to low-level vision that combines two main ideas: the use of convolutional networks as an image processing architecture and an unsupervised learning procedure that synthesizes training samples from specific noise models. We demonstrate this approach on the challenging problem of natural image denoising. Using a test set with a hundred natural images, we find that convolutional networks provide comparable and in some cases superior performance to state of the art wavelet and Markov random field (MRF) methods. Moreover, we find that a convolutional network offers similar performance in the blind denoising setting as compared to other techniques in the non-blind setting. We also show how convolutional networks are mathematically related to MRF approaches by presenting a mean field theory for an MRF specially designed for image denoising. Although these approaches are related, convolutional networks avoid computational difficulties in MRF approaches that arise from probabilistic learning and inference. This makes it possible to learn image processing architectures that have a high degree of representational power (we train models with over 15,000 parameters), but whose computational expense is significantly less than that associated with inference in MRF approaches with even hundreds of parameters.", "title": "" }, { "docid": "9a9fd442bc7353d9cd202e9ace6e6580", "text": "The idea of developmental dyspraxia has been discussed in the research literature for almost 100 years. However, there continues to be a lack of consensus regarding both the definition and description of this disorder. This paper presents a neuropsychologically based operational definition of developmental dyspraxia that emphasizes that developmental dyspraxia is a disorder of gesture. Research that has investigated the development of praxis is discussed. Further, different types of gestural disorders displayed by children and different mechanisms that underlie developmental dyspraxia are compared to and contrasted with adult acquired apraxia. The impact of perceptual-motor, language, and cognitive impairments on children's gestural development and the possible associations between these developmental disorders and developmental dyspraxia are also examined. Also, the relationship among limb, orofacial, and verbal dyspraxia is discussed. Finally, problems that exist in the neuropsychological assessment of developmental dyspraxia are discussed and recommendations concerning what should be included in such an assessment are presented.", "title": "" }, { "docid": "22285844f638715765d21bff139d1bb1", "text": "The field of Terahertz (THz) radiation, electromagnetic energy, between 0.3 to 3 THz, has seen intense interest recently, because it combines some of the best properties of IR along with those of RF. For example, THz radiation can penetrate fabrics with less attenuation than IR, while its short wavelength maintains comparable imaging capabilities. We discuss major challenges in the field: designing systems and applications which fully exploit the unique properties of THz radiation. To illustrate, we present our reflective, radar-inspired THz imaging system and results, centered on biomedical burn imaging and skin hydration, and discuss challenges and ongoing research.", "title": "" }, { "docid": "85d9b0ed2e9838811bf3b07bb31dbeb6", "text": "In recent years, the medium which has negative index of refraction is widely researched. The medium has both the negative permittivity and the negative permeability. In this paper, we have researched the frequency range widening of negative permeability using split ring resonators.", "title": "" }, { "docid": "0d2260653f223db82e2e713f211a2ba0", "text": "Smartphone usage is a hot topic in pervasive computing due to their popularity and personal aspect. We present our initial results from analyzing how individual differences, such as gender and age, affect smartphone usage. The dataset comes from a large scale longitudinal study, the Menthal project. We select a sample of 30, 677 participants, from which 16, 147 are males and 14, 523 are females, with a median age of 21 years. These have been tracked for at least 28 days and they have submitted their demographic data through a questionnaire. The ongoing experiment has been started in January 2014 and we have used our own mobile data collection and analysis framework. Females use smartphones for longer periods than males, with a daily mean of 166.78 minutes vs. 154.26 minutes. Younger participants use their phones longer and usage is directed towards entertainment and social interactions through specialized apps. Older participants use it less and mainly for getting information or using it as a classic phone.", "title": "" }, { "docid": "893942f986718d639aa46930124af679", "text": "In this work we consider the problem of controlling a team of microaerial vehicles moving quickly through a three-dimensional environment while maintaining a tight formation. The formation is specified by a shape matrix that prescribes the relative separations and bearings between the robots. Each robot plans its trajectory independently based on its local information of other robot plans and estimates of states of other robots in the team to maintain the desired shape. We explore the interaction between nonlinear decentralized controllers, the fourth-order dynamics of the individual robots, the time delays in the network, and the effects of communication failures on system performance. An experimental evaluation of our approach on a team of quadrotors suggests that suitable performance is maintained as the formation motions become increasingly aggressive and as communication degrades.", "title": "" }, { "docid": "62f5640954e5b731f82599fb52ea816f", "text": "This paper presents an energy-balance control strategy for a cascaded single-phase grid-connected H-bridge multilevel inverter linking n independent photovoltaic (PV) arrays to the grid. The control scheme is based on an energy-sampled data model of the PV system and enables the design of a voltage loop linear discrete controller for each array, ensuring the stability of the system for the whole range of PV array operating conditions. The control design is adapted to phase-shifted and level-shifted carrier pulsewidth modulations to share the control action among the cascade-connected bridges in order to concurrently synthesize a multilevel waveform and to keep each of the PV arrays at its maximum power operating point. Experimental results carried out on a seven-level inverter are included to validate the proposed approach.", "title": "" }, { "docid": "1c6a9910a51656a47a8599a98dba77bb", "text": "In real life facial expressions show mixture of emotions. This paper proposes a novel expression descriptor based expression map that can efficiently represent pure, mixture and transition of facial expressions. The expression descriptor is the integration of optic flow and image gradient values and the descriptor value is accumulated in temporal scale. The expression map is realized using self-organizing map. We develop an objective scheme to find the percentage of different prototypical pure emotions (e.g., happiness, surprise, disgust etc.) that mix up to generate a real facial expression. Experimental results show that the expression map can be used as an effective classifier for facial expressions.", "title": "" }, { "docid": "210052dbabdb5c48502079d75cdd6ce6", "text": "Sketch It, Make It (SIMI) is a modeling tool that enables non-experts to design items for fabrication with laser cutters. SIMI recognizes rough, freehand input as a user iteratively edits a structured vector drawing. The tool combines the strengths of sketch-based interaction with the power of constraint-based modeling. Several interaction techniques are combined to present a coherent system that makes it easier to make precise designs for laser cutters.", "title": "" }, { "docid": "426d3b0b74eacf4da771292abad06739", "text": "Brain tumor is considered as one of the deadliest and most common form of cancer both in children and in adults. Consequently, determining the correct type of brain tumor in early stages is of significant importance to devise a precise treatment plan and predict patient's response to the adopted treatment. In this regard, there has been a recent surge of interest in designing Convolutional Neural Networks (CNNs) for the problem of brain tumor type classification. However, CNNs typically require large amount of training data and can not properly handle input transformations. Capsule networks (referred to as CapsNets) are brand new machine learning architectures proposed very recently to overcome these shortcomings of CNNs, and posed to revolutionize deep learning solutions. Of particular interest to this work is that Capsule networks are robust to rotation and affine transformation, and require far less training data, which is the case for processing medical image datasets including brain Magnetic Resonance Imaging (MRI) images. In this paper, we focus to achieve the following four objectives: (i) Adopt and incorporate CapsNets for the problem of brain tumor classification to design an improved architecture which maximizes the accuracy of the classification problem at hand; (ii) Investigate the over-fitting problem of CapsNets based on a real set of MRI images; (iii) Explore whether or not CapsNets are capable of providing better fit for the whole brain images or just the segmented tumor, and; (iv) Develop a visualization paradigm for the output of the CapsNet to better explain the learned features. Our results show that the proposed approach can successfully overcome CNNs for the brain tumor classification problem.", "title": "" }, { "docid": "4357e361fd35bcbc5d6a7c195a87bad1", "text": "In an age of increasing technology, the possibility that typing on a keyboard will replace handwriting raises questions about the future usefulness of handwriting skills. Here we present evidence that brain activation during letter perception is influenced in different, important ways by previous handwriting of letters versus previous typing or tracing of those same letters. Preliterate, five-year old children printed, typed, or traced letters and shapes, then were shown images of these stimuli while undergoing functional MRI scanning. A previously documented \"reading circuit\" was recruited during letter perception only after handwriting-not after typing or tracing experience. These findings demonstrate that handwriting is important for the early recruitment in letter processing of brain regions known to underlie successful reading. Handwriting therefore may facilitate reading acquisition in young children.", "title": "" }, { "docid": "753f837e53a08a59392c30515481b503", "text": "Light is a powerful zeitgeber that synchronizes our endogenous circadian pacemaker with the environment and has been previously described as an agent in improving cognitive performance. With that in mind, this study was designed to explore the influence of exposure to blue-enriched white light in the morning on the performance of adolescent students. 58 High school students were recruited from four classes in two schools. In each school, one classroom was equipped with blue-enriched white lighting while the classroom next door served as a control setting. The effects of classroom lighting on cognitive performance were assessed using standardized psychological tests. Results show beneficial effects of blue-enriched white light on students' performance. In comparison to standard lighting conditions, students showed faster cognitive processing speed and better concentration. The blue-enriched white lighting seems to influence very basic information processing primarily, as no effects on short-term encoding and retrieval of memories were found. & 2014 Elsevier GmbH. All rights reserved.", "title": "" }, { "docid": "47b7ebc460ce1273941bdef5bc754d4a", "text": "When people predict their future behavior, they tend to place too much weight on their current intentions, which produces an optimistic bias for behaviors associated with currently strong intentions. More realistic self-predictions require greater sensitivity to situational barriers, such as obstacles or competing demands, that may interfere with the translation of current intentions into future behavior. We consider three reasons why people may not adjust sufficiently for such barriers. First, self-predictions may focus exclusively on current intentions, ignoring potential barriers altogether. We test this possibility, in three studies, with manipulations that draw greater attention to barriers. Second, barriers may be discounted in the self-prediction process. We test this possibility by comparing prospective and retrospective ratings of the impact of barriers on the target behavior. Neither possibility was supported in these tests, or in a further test examining whether an optimally weighted statistical model could improve on the accuracy of self-predictions by placing greater weight on anticipated situational barriers. Instead, the evidence supports a third possibility: Even when they acknowledge that situational factors can affect the likelihood of carrying out an intended behavior, people do not adequately moderate the weight placed on their current intentions when predicting their future behavior.", "title": "" }, { "docid": "9a397ca2a072d9b1f861f8a6770aa792", "text": "Computational photography systems are becoming increasingly diverse, while computational resources---for example on mobile platforms---are rapidly increasing. As diverse as these camera systems may be, slightly different variants of the underlying image processing tasks, such as demosaicking, deconvolution, denoising, inpainting, image fusion, and alignment, are shared between all of these systems. Formal optimization methods have recently been demonstrated to achieve state-of-the-art quality for many of these applications. Unfortunately, different combinations of natural image priors and optimization algorithms may be optimal for different problems, and implementing and testing each combination is currently a time-consuming and error-prone process. ProxImaL is a domain-specific language and compiler for image optimization problems that makes it easy to experiment with different problem formulations and algorithm choices. The language uses proximal operators as the fundamental building blocks of a variety of linear and nonlinear image formation models and cost functions, advanced image priors, and noise models. The compiler intelligently chooses the best way to translate a problem formulation and choice of optimization algorithm into an efficient solver implementation. In applications to the image processing pipeline, deconvolution in the presence of Poisson-distributed shot noise, and burst denoising, we show that a few lines of ProxImaL code can generate highly efficient solvers that achieve state-of-the-art results. We also show applications to the nonlinear and nonconvex problem of phase retrieval.", "title": "" }, { "docid": "9c1687323661ccb6bf2151824edc4260", "text": "In this work we present the design of a digitally controlled ring type oscillator in 0.5 μm CMOS technology for a low-cost and portable radio-frequency diathermy (RFD) device. The oscillator circuit is composed by a low frequency ring oscillator (LFRO), a voltage controlled ring oscillator (VCRO), and a logic control. The digital circuit generates an input signal for the LFO, which generates a voltage ramp that controls the oscillating output signal of the VCRO in the range of 500 KHz to 1 MHz. Simulation results show that the proposed circuit exhibits controllable output characteristics in the range of 500 KHz–1 MHz, with low power consumption and low phase noise, making it suitable for a portable RFD device.", "title": "" }, { "docid": "47faebfa7d65ebf277e57436cf7c2ca4", "text": "Steganography is a method which can put data into a media without a tangible impact on the cover media. In addition, the hidden data can be extracted with minimal differences. In this paper, twodimensional discrete wavelet transform is used for steganography in 24-bit color images. This steganography is of blind type that has no need for original images to extract the secret image. In this algorithm, by the help of a structural similarity and a two-dimensional correlation coefficient, it is tried to select part of sub-band cover image instead of embedding location. These sub-bands are obtained by 3levels of applying the DWT. Also to increase the steganography resistance against cropping or insert visible watermark, two channels of color image is used simultaneously. In order to raise the security, an encryption algorithm based on Arnold transform was also added to the steganography operation. Because diversity of chaos scenarios is limited in Arnold transform, it could be improved by its mirror in order to increase the diversity of key. Additionally, an ability is added to encryption algorithm that can still maintain its efficiency against image crop. Transparency of steganography image is measured by the peak signalto-noise ratio that indicates the adequate transparency of steganography process. Extracted image similarity is also measured by two-dimensional correlation coefficient with more than 99% similarity. Moreover, steganography resistance against increasing and decreasing brightness and contrast, lossy compression, cropping image, changing scale and adding noise is acceptable", "title": "" }, { "docid": "04435e017e720c0ed6e5c0cd29f1b4fc", "text": "Blobworld is a system for image retrieval based on finding coherent image regions which roughly correspond to objects. Each image is automatically segmented into regions (“blobs”) with associated color and texture descriptors. Querying is based on the attributes of one or two regions of interest, rather than a description of the entire image. In order to make large-scale retrieval feasible, we index the blob descriptions using a tree. Because indexing in the high-dimensional feature space is computationally prohibitive, we use a lower-rank approximation to the high-dimensional distance. Experiments show encouraging results for both querying and indexing.", "title": "" } ]
scidocsrr
96051e4c0c8d253059a992150f08bd7b
Learning Visually Grounded Sentence Representations
[ { "docid": "6a7bfed246b83517655cb79a951b1f48", "text": "Hypernymy, textual entailment, and image captioning can be seen as special cases of a single visual-semantic hierarchy over words, sentences, and images. In this paper we advocate for explicitly modeling the partial order structure of this hierarchy. Towards this goal, we introduce a general method for learning ordered representations, and show how it can be applied to a variety of tasks involving images and language. We show that the resulting representations improve performance over current approaches for hypernym prediction and image-caption retrieval.", "title": "" } ]
[ { "docid": "2827e0d197b7f66c7f6ceb846c6aaa27", "text": "The food industry is becoming more customer-oriented and needs faster response times to deal with food scandals and incidents. Good traceability systems help to minimize the production and distribution of unsafe or poor quality products, thereby minimizing the potential for bad publicity, liability, and recalls. The current food labelling system cannot guarantee that the food is authentic, good quality and safe. Therefore, traceability is applied as a tool to assist in the assurance of food safety and quality as well as to achieve consumer confidence. This paper presents comprehensive information about traceability with regards to safety and quality in the food supply chain. 2013 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "6b6f82399472a6f019c506a549f5ffe6", "text": "T. Ribot's (1881) law of retrograde amnesia states that brain damage impairs recently formed memories to a greater extent than older memories, which is generally taken to imply that memories need time to consolidate. A. Jost's (1897) law of forgetting states that if 2 memories are of the same strength but different ages, the older will decay more slowly than the younger. The main theoretical implication of this venerable law has never been worked out, but it may be the same as that implied by Ribot's law. A consolidation interpretation of Jost's law implies an interference theory of forgetting that is altogether different from the cue-overload view that has dominated thinking in the field of psychology for decades.", "title": "" }, { "docid": "73d3f51bdb913749665674ae8aea3a41", "text": "Extracting and validating emotional cues through analysis of users' facial expressions is of high importance for improving the level of interaction in man machine communication systems. Extraction of appropriate facial features and consequent recognition of the user's emotional state that can be robust to facial expression variations among different users is the topic of this paper. Facial animation parameters (FAPs) defined according to the ISO MPEG-4 standard are extracted by a robust facial analysis system, accompanied by appropriate confidence measures of the estimation accuracy. A novel neurofuzzy system is then created, based on rules that have been defined through analysis of FAP variations both at the discrete emotional space, as well as in the 2D continuous activation-evaluation one. The neurofuzzy system allows for further learning and adaptation to specific users' facial expression characteristics, measured though FAP estimation in real life application of the system, using analysis by clustering of the obtained FAP values. Experimental studies with emotionally expressive datasets, generated in the EC IST ERMIS project indicate the good performance and potential of the developed technologies.", "title": "" }, { "docid": "afcde0a6042818a2c7424a537e583ea0", "text": "While many algorithms for computing stereo correspondence have been proposed, there has been very little work on experimentally evaluating algorithm performance, especially using real (rather than synthetic) imagery. In this paper we propose an experimental comparison of several different stereo algorithms. We use real imagery, and explore two different methodologies, with different strengths and weaknesses. Our first methodology is based upon manual computation of dense ground truth. Here we make use of a two stereo pairs: one of these, from the University of Tsukuba, contains mostly fronto-parallel surfaces; while the other, which we built, is a simple scene with a slanted surface. Our second methodology uses the notion of prediction error, which is the ability of a disparity map to predict an (unseen) third image, taken from a known camera position with respect to the input pair. We present results for both correlation-style stereo algorithms and techniques based on global methods such as energy minimization. Our experiments suggest that the two methodologies give qualitatively consistent results. Source images and additional materials, such as the implementations of various algorithms, are available on the web from http://www.research.microsoft.com/ ̃szeliski/stereo.", "title": "" }, { "docid": "97d7281f14c9d9e745fe6f63044a7d91", "text": "The Long Term Evolution (LTE) is the latest mobile standard being implemented globally to provide connectivity and access to advanced services for personal mobile devices. Moreover, LTE networks are considered to be one of the main pillars for the deployment of Machine to Machine (M2M) communication systems and the spread of the Internet of Things (IoT). As an enabler for advanced communications services with a subscription count in the billions, security is of capital importance in LTE. Although legacy GSM (Global System for Mobile Communications) networks are known for being insecure and vulnerable to rogue base stations, LTE is assumed to guarantee confidentiality and strong authentication. However, LTE networks are vulnerable to security threats that tamper availability, privacy and authentication. This manuscript, which summarizes and expands the results presented by the author at ShmooCon 2016 [1], investigates the insecurity rationale behind LTE protocol exploits and LTE rogue base stations based on the analysis of real LTE radio link captures from the production network. Implementation results are discussed from the actual deployment of LTE rogue base stations, IMSI catchers and exploits that can potentially block a mobile device. A previously unknown technique to potentially track the location of mobile devices as they move from cell to cell is also discussed, with mitigations being proposed.", "title": "" }, { "docid": "2d13823a286b742e60decd420217f7ec", "text": "The biomechanics of human motion is a fascinating field. Who among us has never marveled at the graceful motions of a dancer or the rapid finger movements of a musician? From the time of Aristotle onward there have been countless books written on the topic of movement in animals and humans. Despite the great minds that have considered the topic, it is just recently that much advancement has been made experimentally. Historically, the study of human movement has been costly and very time consuming. This is because, in order to study them, movements are almost always discretized and then analyzed step by step, with the size of the steps determined by the speed of the movement (and the questions being asked). Whether it be frames of film from a movie camera or digitized samples from an electrogoniometer, most movements are recorded as series of static images that are then reassembled to provide kinematic and kinetic information. There has been a tremendous growth in the study of human movement in the past 2 decades because of the low cost of digital data acquisition systems that make possible the storage and analysis of massive amounts of data that are required to accurately characterize complex motion. This growing interest in the study of human movement is coming from five predominate groups:", "title": "" }, { "docid": "a3a373130b5c602022449919dcc81f98", "text": "We describe a method for registering and super-resolving moving vehicles from aerial surveillance video. The challenge of vehicle super-resolution lies in the fact that vehicles may be very small and thus frame-to-frame registration does not offer enough constraints to yield registration with sub-pixel accuracy. To overcome this, we first register the large-scale image backgrounds and then, relative to the background registration, register the small-scale moving vehicle over all frames simultaneously using a vehicle motion model. To solve for the vehicle motion parameters we optimize a cost function that incorporates both vehicle appearance and background appearance consistency. Once this process accurately registers a moving vehicle, it is super-resolved. We apply both a frequency domain and a spatial domain approach. The frequency domain approach can be used when the final registered vehicle motion is well approximated by shifts in the image plane. The robust regularized spatial domain approach handles all cases of vehicle motion.", "title": "" }, { "docid": "db8cd5dad5c3d3bda0f10f3369351bbd", "text": "The massive diffusion of online social media allows for the rapid and uncontrolled spreading of conspiracy theories, hoaxes, unsubstantiated claims, and false news. Such an impressive amount of misinformation can influence policy preferences and encourage behaviors strongly divergent from recommended practices. In this paper, we study the statistical properties of viral misinformation in online social media. By means of methods belonging to Extreme Value Theory, we show that the number of extremely viral posts over time follows a homogeneous Poisson process, and that the interarrival times between such posts are independent and identically distributed, following an exponential distribution. Moreover, we characterize the uncertainty around the rate parameter of the Poisson process through Bayesian methods. Finally, we are able to derive the predictive posterior probability distribution of the number of posts exceeding a certain threshold of shares over a finite interval of time.", "title": "" }, { "docid": "0b687d55b6927b5bad1ff8b7bbeda9e3", "text": "Workflow is an important way to mashup reusable software services to create value-added data analytics services. Workflow provenance is core to understand how services and workflows behaved in the past, which knowledge can be used to provide a better recommendation. Existing workflow provenance management systems handle various types of provenance separately. A typical data science exploration scenario, however, calls for an integrated view of provenance and seamless transition among different types of provenance. In this paper, a graph-based, uniform provenance model is proposed to link together design-time and run-time provenance, by combining retrospective provenance, prospective provenance, and evolution provenance. Such a unified provenance model will not only facilitate workflow mining and exploration, but also facilitate workflow interoperability. The model is formalized into colored Petri nets for verification and monitoring management. A SQL-like query language is developed, which supports basic queries, recursive queries, and cross-provenance queries. To verify the effectiveness of our model, A web-based, collaborative workflow prototyping system is developed as a proof-of-concept. Experiments have been conducted to evaluate the effectiveness of the proposed SQL-like graph query against SQL query.", "title": "" }, { "docid": "c938996e79711cae64bdcc23d7e3944b", "text": "Decreased antimicrobial efficiency has become a global public health issue. The paucity of new antibacterial drugs is evident, and the arsenal against infectious diseases needs to be improved urgently. The selection of plants as a source of prototype compounds is appropriate, since plant species naturally produce a wide range of secondary metabolites that act as a chemical line of defense against microorganisms in the environment. Although traditional approaches to combat microbial infections remain effective, targeting microbial virulence rather than survival seems to be an exciting strategy, since the modulation of virulence factors might lead to a milder evolutionary pressure for the development of resistance. Additionally, anti-infective chemotherapies may be successfully achieved by combining antivirulence and conventional antimicrobials, extending the lifespan of these drugs. This review presents an updated discussion of natural compounds isolated from plants with chemically characterized structures and activity against the major bacterial virulence factors: quorum sensing, bacterial biofilms, bacterial motility, bacterial toxins, bacterial pigments, bacterial enzymes, and bacterial surfactants. Moreover, a critical analysis of the most promising virulence factors is presented, highlighting their potential as targets to attenuate bacterial virulence. The ongoing progress in the field of antivirulence therapy may therefore help to translate this promising concept into real intervention strategies in clinical areas.", "title": "" }, { "docid": "9bb912fdb67ca8ecc45165f0d892c5af", "text": "Fast and accurate vehicle detection in unmanned aerial vehicle (UAV) images remains a challenge, due to its very high spatial resolution and very few annotations. Although numerous vehicle detection methods exist, most of them cannot achieve real-time detection for different scenes. Recently, deep learning algorithms has achieved fantastic detection performance in computer vision, especially regression based convolutional neural networks YOLOv2. It's good both at accuracy and speed, outperforming other state-of-the-art detection methods. This paper for the first time aims to investigate the use of YOLOv2 for vehicle detection in UAV images, as well as to explore the new method for data annotation. Our method starts with image annotation and data augmentation. CSK tracking method is used to help annotate vehicles in images captured from simple scenes. Subsequently, a regression based single convolutional neural network YOLOv2 is used to detect vehicles in UAV images. To evaluate our method, UAV video images were taken over several urban areas, and experiments were conducted on this dataset and Stanford Drone dataset. The experimental results have proven that our data preparation strategy is useful, and YOLOv2 is effective for real-time vehicle detection of UAV video images.", "title": "" }, { "docid": "c75967795041ef900236d71328dd7936", "text": "In order to investigate the strategies used to plan and control multijoint arm trajectories, two-degrees-of-freedom arm movements performed by normal adult humans were recorded. Only the shoulder and elbow joints were active. When a subject was told simply to move his hand from one visual target to another, the path of the hand was roughly straight, and the hand speed profile of their straight trajectories was bell-shaped. When the subject was required to produce curved hand trajectories, the path usually had a segmented appearance, as if the subject was trying to approximate a curve with low curvature elements. Hand speed profiles associated with curved trajectories contained speed valleys or inflections which were temporally associated with the local maxima in the trajectory curvature. The mean duration of curved movements was longer than the mean for straight movements. These results are discussed in terms of trajectory control theories which have originated in the fields of mechanical manipulator control and biological motor control. Three explanations for the results are offered.", "title": "" }, { "docid": "c89ca701d947ba6594be753470f152ac", "text": "The visualization of an image collection is the process of displaying a collection of images on a screen under some specific layout requirements. This paper focuses on an important problem that is not well addressed by the previous methods: visualizing image collections into arbitrary layout shapes while arranging images according to user-defined semantic or visual correlations (e.g., color or object category). To this end, we first propose a property-based tree construction scheme to organize images of a collection into a tree structure according to user-defined properties. In this way, images can be adaptively placed with the desired semantic or visual correlations in the final visualization layout. Then, we design a two-step visualization optimization scheme to further optimize image layouts. As a result, multiple layout effects including layout shape and image overlap ratio can be effectively controlled to guarantee a satisfactory visualization. Finally, we also propose a tree-transfer scheme such that visualization layouts can be adaptively changed when users select different “images of interest.” We demonstrate the effectiveness of our proposed approach through the comparisons with state-of-the-art visualization techniques.", "title": "" }, { "docid": "6d52a9877ddf18eb7e43c83000ed4da1", "text": "Cyberbullying has recently emerged as a new form of bullying and harassment. 360 adolescents (12-20 years), were surveyed to examine the nature and extent of cyberbullying in Swedish schools. Four categories of cyberbullying (by text message, email, phone call and picture/video clip) were examined in relation to age and gender, perceived impact, telling others, and perception of adults becoming aware of such bullying. There was a significant incidence of cyberbullying in lower secondary schools, less in sixth-form colleges. Gender differences were few. The impact of cyberbullying was perceived as highly negative for picture/video clip bullying. Cybervictims most often chose to either tell their friends or no one at all about the cyberbullying, so adults may not be aware of cyberbullying, and (apart from picture/video clip bullying) this is how it was perceived by pupils. Findings are discussed in relation to similarities and differences between cyberbullying and the more traditional forms of bullying.", "title": "" }, { "docid": "1c1ae295294422105ca5570f48d01fec", "text": "Neural networks have recently gained popularity as an alternative to regression models to characterize biological processes. Their decision-making capabilities can be best used in image analysis of biological products where the shape and size classi\"cation is not governed by any mathematical function. This paper reviews the technique of image analysis of agricultural products with reference to use of neural network classi\"ers for decision making. A thorough review of published literature reveals that, although many neural network classi\"ers have been used and evaluated for classifying agricultural products, multi-layer neural network classi\"ers perform the best for such tasks. ( 2000 Silsoe Research Institute", "title": "" }, { "docid": "ff59d1ec0c3eb11b3201e5708a585ca4", "text": "In this paper, we described our system for Knowledge Base Acceleration (KBA) Track at TREC 2013. The KBA Track has two tasks, CCR and SSF. Our approach consists of two major steps: selecting documents and extracting slot values. Selecting documents is to look for and save the documents that mention the entities of interest. The second step involves with generating seed patterns to extract the slot values and computing confidence score.", "title": "" }, { "docid": "f5bd155887dd2e40ad2d7a26bb5a6391", "text": "The field of research in digital humanities is undergoing a rapid transformation in recent years. A deep reflection on the current needs of the agents involved that takes into account key issues such as the inclusion of citizens in the creation and consumption of the cultural resources offered, the volume and complexity of datasets, available infrastructures, etcetera, is necessary. Present technologies make it possible to achieve projects that were impossible until recently, but the field is currently facing the challenge of proposing frameworks and systems to generalize and reproduce these proposals in other knowledge domains with similar but heterogeneous data sets. The track \"New trends in digital humanities\" of the Fourth International Conference on Technological Ecosystems for Enhancing Multiculturality (TEEM 2016), tries to set the basis of good practice in digital humanities by reflecting on models, technologies and methods to carry the transformation out.", "title": "" }, { "docid": "3f03e4cf6c360462c43f2583386db735", "text": "Owing to the limited resources of the sensor nodes, designing energy-efficient routing mechanism to prolong the overall network lifetime becomes one of the most important technologies in wireless sensor networks (WSNs). As an active branch of routing technology, cluster-based routing protocols have proven to be effective in network topology management, energy minimization, data aggregation and so on. In this paper, we present a survey of state-of-the-art routing techniques in WSNs. We first outline the clustering architecture in WSNs, and classify the proposed approaches based on their objectives and design principles. Furthermore, we highlight the challenges in clustering WSNs, including rotating the role of cluster heads, optimization of cluster size and communication mode, followed by a comprehensive survey of routing techniques. Finally, the paper concludes with possible future research areas.", "title": "" }, { "docid": "2d8f92f752bd1b4756e991a1f7e70926", "text": "We present a new method to auto-adjust camera exposure for outdoor robotics. In outdoor environments, scene dynamic range may be wider than the dynamic range of the cameras due to sunlight and skylight. This can results in failures of vision-based algorithms because important image features are missing due to under-/over-saturation. To solve the problem, we adjust camera exposure to maximize image features in the gradient domain. By exploiting the gradient domain, our method naturally determines the proper exposure needed to capture important image features in a manner that is robust against illumination conditions. The proposed method is implemented using an off-the-shelf machine vision camera and is evaluated using outdoor robotics applications. Experimental results demonstrate the effectiveness of our method, which improves the performance of robot vision algorithms.", "title": "" } ]
scidocsrr
f0c91e3460f4f830a806f3d6c5fb8296
Vision-based approach towards lane line detection and vehicle localization
[ { "docid": "b44df1268804e966734ea404b8c29360", "text": "A new night-time lane detection system and its accompanying framework are presented in this paper. The accompanying framework consists of an automated ground truth process and systematic storage of captured videos that will be used for training and testing. The proposed Advanced Lane Detector 2.0 (ALD 2.0) is an improvement over the ALD 1.0 or Layered Approach with integration of pixel remapping, outlier removal, and prediction with tracking. Additionally, a novel procedure to generate the ground truth data for lane marker locations is also proposed. The procedure consists of an original process called time slicing, which provides the user with unique visualization of the captured video and enables quick generation of ground truth information. Finally, the setup and implementation of a database hosting lane detection videos and standardized data sets for testing are also described. The ALD 2.0 is evaluated by means of the user-created annotations accompanying the videos. Finally, the planned improvements and remaining work are addressed.", "title": "" } ]
[ { "docid": "1b25721219e8919ba3366b87bc34f428", "text": "Research data and publications are usually stored in separate and structurally distinct information systems. Often, links between these resources are not explicitly available which complicates the search for previous research. In this paper, we propose a pattern induction method for the detection of study references in full texts. Since these references are not specified in a standardized way and may occur inside a variety of different contexts – i.e., captions, footnotes, or continuous text – our algorithm is required to induce very flexible patterns. To overcome the sparse distribution of training instances, we induce patterns iteratively using a bootstrapping approach. We show that our method achieves promising results for the automatic identification of data references and is a first step towards building an integrated information system.", "title": "" }, { "docid": "b9965956c3b1807b1b6e09fa2b329c71", "text": "A serial link transmitter fabricated in a large-scale integrated 0.4m CMOS process uses multilevel signaling (4PAM) and a three-tap pre-emphasis filter to reduce intersymbol interference (ISI) caused by channel low-pass effects. Due to the process-limited on-chip frequency, the transmitter output driver is designed as a 5 : 1 multiplexer to reduce the required clock frequency to one-fifth the symbol rate, or 1 GHz. At 5 Gsym/s (10 Gb/s), a data eye opening with a height >350 mV and a width >100 ps is achieved at the source. After 10 m of a copper coaxial cable (PE142LL), the eye opening is reduced to 200 mV and 90 ps with pre-emphasis, and to zero without filtering. The chip dissipates 1 W with a 3.3-V supply and occupies 1.5 2.0 mm2 of die area.", "title": "" }, { "docid": "93325e6f1c13889fb2573f4631d021a5", "text": "The difference between a computer game and a simulator can be a small one both require the same capabilities from the computer: realistic graphics, behavior consistent with the laws of physics, a variety of scenarios where difficulties can emerge, and some assessment technique to inform users of performance. Computer games are a multi-billion dollar industry in the United States, and as the production costs and complexity of games have increased, so has the effort to make their creation easier. Commercial software products have been developed to greatly simpl ify the game-making process, allowing developers to focus on content rather than on programming. This paper investigates Unity3D game creation software for making threedimensional engine-room simulators. Unity3D is arguably the best software product for game creation, and has been used for numerous popular and successful commercial games. Maritime universities could greatly benefit from making custom simulators to fit specific applications and requirements, as well as from reducing the cost of purchasing simulators. We use Unity3D to make a three-dimensional steam turbine simulator that achieves a high degree of realism. The user can walk around the turbine, open and close valves, activate pumps, and run the turbine. Turbine operating parameters such as RPM, condenser vacuum, lube oil temperature. and governor status are monitored. In addition, the program keeps a log of any errors made by the operator. We find that with the use of Unity3D, students and faculty are able to make custom three-dimensional ship and engine room simulators that can be used as training and evaluation tools.", "title": "" }, { "docid": "047db26003f71d5d4a8f21e976e6fe9e", "text": "Nanoscale field-programmable gate array (FPGA) circuits are more prone to radiation-induced effects in harsh environments because of their memory-based reconfigurable logic fabric. Consequently, for mission- or safety-critical applications, appropriate fault-tolerance techniques are widely employed. The most commonly applied technique for hardening FPGAs against radiation-induced upsets is triple modular redundancy (TMR). Voting circuits used in TMR implementations are decentralized and consensus is calculated from the redundant outputs off-chip. However, if there are an insufficient number of pins available on the chip carrier, the TMR system must be reduced to an on-chip unprotected simplex system, meaning voters used at those locations become single point of failure. In this paper, we propose a self-checking voting circuit for increased reliability consensus voting on FPGAs. Through fault injection and reliability analyses, we demonstrate that the proposed voter, which utilizes redundant voting copies, is approximately 26% more reliable than an unprotected simplex voter when reliability values of voters over normalized time are averaged.", "title": "" }, { "docid": "b2379dc57ea6ec09400a3e34e79a8d0d", "text": "We propose that a robot speaks a Hanamogera (a semantic-free speech) when the robot speaks with a person. Hanamogera is semantic-free speech and the sound of the speech is a sound of the words which consists of phonogram characters. The consisted characters can be changed freely because the Hanamogera speech does not have to have any meaning. Each sound of characters of a Hanamogera is thought to have an impression according to the contained consonant/vowel in the characters. The Hanamogera is expected to make a listener feel that the talking with a robot which speaks a Hanamogera is fun because of a sound of the Hanamogera. We conducted an experiment of talking with a NAO and an experiment of evaluating to Hanamogera speeches. The results of the experiment showed that a talking with a Hanamogera speech robot was better fun than a talking with a nodding robot.", "title": "" }, { "docid": "9db43e2773f0c617d74abab3a661e74b", "text": "It has been indicated that proton pump inhibitor (PPI) use is associated with a loss of the anti-fracture efficacy of alendronate (AD). However, there are few prospective studies that have investigated the efficacy of AD on lumbar bone mineral density (BMD) in osteoporotic patients who are using PPIs. Thus, the aim of the present study was to investigate the efficacy of alfacalcidol (AC) and AD on lumbar BMD in osteoporotic patients using PPIs. A prospective, randomized, active control study enrolled such osteoporotic patients (age, ≥50 years). The patients were randomly assigned to receive AC (1 µg/day) or AD (35 mg/week) and were followed up for one year. Patient profiles were maintained, and lumbar BMD, bone-specific alkaline-phosphatase (BAP) and collagen type-I cross-linked N-telopeptide (NTX), upper gastrointestinal endoscopy results, and the frequency scale for the symptoms of gastroesophageal reflux disease (FSSG) were evaluated. Percentage changes in lumbar BMD, NTX, BAP, and change in FSSG score from baseline to the end of one year of treatment were investigated. Sixteen patients were eligible for analysis (eight assigned to receive AC, eight assigned to receive AD). The percentage change in lumbar BMD from baseline to the end of treatment was -0.4±4.0% for the AC group vs. 6.8±6.3% for the AD group (P=0.015). No significant percentage change of BAP and NTX between the two groups was observed. Subsequent to one year of treatment, the FSSG score did not change from the baseline values for either study group, and no new bone fractures or esophagitis were observed in either group of patients. The findings demonstrated that in osteoporotic patients using concomitant PPIs, there was a greater increase in lumbar BMD after one year of treatment with AD compared with AC. However, the number of study subjects was small; thus, further, large prospective studies are required to determine the effect of AD in osteoporotic patients using concomitant PPIs.", "title": "" }, { "docid": "b7f53aa4b1e68f05bee2205dd55b975a", "text": "We study the problem of off-policy evaluation (OPE) in reinforcement learning (RL), where the goal is to estimate the performance of a policy from the data generated by another policy(ies). In particular, we focus on the doubly robust (DR) estimators that consist of an importance sampling (IS) component and a performance model, and utilize the low (or zero) bias of IS and low variance of the model at the same time. Although the accuracy of the model has a huge impact on the overall performance of DR, most of the work on using the DR estimators in OPE has been focused on improving the IS part, and not much on how to learn the model. In this paper, we propose alternative DR estimators, called more robust doubly robust (MRDR), that learn the model parameter by minimizing the variance of the DR estimator. We first present a formulation for learning the DR model in RL. We then derive formulas for the variance of the DR estimator in both contextual bandits and RL, such that their gradients w.r.t. the model parameters can be estimated from the samples, and propose methods to efficiently minimize the variance. We prove that the MRDR estimators are strongly consistent and asymptotically optimal. Finally, we evaluate MRDR in bandits and RL benchmark problems, and compare its performance with the existing methods.", "title": "" }, { "docid": "8c067af7b61fae244340e784149a9c9b", "text": "Based on EuroNCAP regulations the number of autonomous emergency braking systems for pedestrians (AEB-P) will increase over the next years. According to accident research a considerable amount of severe pedestrian accidents happen at artificial lighting, twilight or total darkness conditions. Because radar sensors are very robust in these situations, they will play an important role for future AEB-P systems. To assess and evaluate systems a pedestrian dummy with reflection characteristics as close as possible to real humans is indispensable. As an extension to existing measurements in literature this paper addresses open issues like the influence of different positions of the limbs or different clothing for both relevant automotive frequency bands. Additionally suggestions and requirements for specification of pedestrian dummies based on results of RCS measurements of humans and first experimental developed dummies are given.", "title": "" }, { "docid": "9ea9b364e2123d8917d4a2f25e69e084", "text": "Movement observation and imagery are increasingly propagandized for motor rehabilitation. Both observation and imagery are thought to improve motor function through repeated activation of mental motor representations. However, it is unknown what stimulation parameters or imagery conditions are optimal for rehabilitation purposes. A better understanding of the mechanisms underlying movement observation and imagery is essential for the optimization of functional outcome using these training conditions. This study systematically assessed the corticospinal excitability during rest, observation, imagery and execution of a simple and a complex finger-tapping sequence in healthy controls using transcranial magnetic stimulation (TMS). Observation was conducted passively (without prior instructions) as well as actively (in order to imitate). Imagery was performed visually and kinesthetically. A larger increase in corticospinal excitability was found during active observation in comparison with passive observation and visual or kinesthetic imagery. No significant difference between kinesthetic and visual imagery was found. Overall, the complex task led to a higher corticospinal excitability in comparison with the simple task. In conclusion, the corticospinal excitability was modulated during both movement observation and imagery. Specifically, active observation of a complex motor task resulted in increased corticospinal excitability. Active observation may be more effective than imagery for motor rehabilitation purposes. In addition, the activation of mental motor representations may be optimized by varying task-complexity.", "title": "" }, { "docid": "2089349f4f1dae4d07dfec8481ba748e", "text": "A signiicant limitation of neural networks is that the representations they learn are usually incomprehensible to humans. We present a novel algorithm, Trepan, for extracting comprehensible, symbolic representations from trained neural networks. Our algorithm uses queries to induce a decision tree that approximates the concept represented by a given network. Our experiments demonstrate that Trepan is able to produce decision trees that maintain a high level of delity to their respective networks while being com-prehensible and accurate. Unlike previous work in this area, our algorithm is general in its applicability and scales well to large networks and problems with high-dimensional input spaces.", "title": "" }, { "docid": "a831eb6211cac4876afc91b5a4219cce", "text": "We present a system for real-time, high-resolution, sparse voxelization of an image-based surface model. Our approach consists of a coarse-to-fine voxel representation and a collection of parallel processing steps. Voxels are stored as a list of unsigned integer triples. An oracle kernel decides, for each voxel in parallel, whether to keep or cull its voxel from the list based on an image consistency criterion of its projection across cameras. After a prefix sum scan, kept voxels are subdivided and the process repeats until projected voxels are pixel size. These voxels are drawn to a render target and shaded as a weighted combination of their projections into a set of calibrated RGB images. We apply this technique to the problem of smooth visual hull reconstruction of human subjects based on a set of live image streams. We demonstrate that human upper body shapes can be reconstructed to giga voxel resolution at greater than 30 fps on modern graphics hardware.", "title": "" }, { "docid": "4fa7ee44cdc4b0cd439723e9600131bd", "text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at http://www.jstor.org/journals/ucpress.html. Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.", "title": "" }, { "docid": "7c30c460919fbf73cb0d061ac6941cee", "text": "Gratitude practice can be a catalyzing and relational healing force, often untapped in clinical practice. In this article, we provide an overview of current thinking about gratitude's defining and beneficial properties, followed by a brief review of the research on mental health outcomes that result from gratitude practice. Following an analysis of our case study of the use of gratitude as a psychotherapeutic intervention, we present various self-strategies and techniques for consciously choosing and cultivating gratitude. We conclude by describing ways in which gratitude might be capitalized upon for beneficial outcomes in therapeutic settings.", "title": "" }, { "docid": "1f77513377899aa0d235bd3d92914168", "text": "Concept maps are graphical tools for organizing and representing knowledge. They include concepts, usually enclosed in circles or boxes of some type, and relationships between concepts indicated by a connecting line linking two concepts. Words on the line, referred to as linking words or linking phrases, specify the relationship between the two concepts. We define concept as a perceived regularity in events or objects, or records of events or objects, designated by a label. The label for most concepts is a word, although sometimes we use symbols such as + or %, and sometimes more than one word is used. Propositions are statements about some object or event in the universe, either naturally occurring or constructed. Propositions contain two or more concepts connected using linking words or phrases to form a meaningful statement. Sometimes these are called semantic units, or units of meaning. Figure 1 shows an example of a concept map that describes the structure of concept maps and illustrates the above characteristics.", "title": "" }, { "docid": "2ab126b03a9cf3dd45c7d2342786326a", "text": "Most existing techniques for spam detection on Twitter aim to identify and block users who post spam tweets. In this paper, we propose a semi-supervised spam detection (S3D) framework for spam detection at tweet-level. The proposed framework consists of two main modules: spam detection module operating in real-time mode and model update module operating in batch mode. The spam detection module consists of four lightweight detectors: 1) blacklisted domain detector to label tweets containing blacklisted URLs; 2) near-duplicate detector to label tweets that are near-duplicates of confidently prelabeled tweets; 3) reliable ham detector to label tweets that are posted by trusted users and that do not contain spammy words; and 4) multiclassifier-based detector labels the remaining tweets. The information required by the detection module is updated in batch mode based on the tweets that are labeled in the previous time window. Experiments on a large-scale data set show that the framework adaptively learns patterns of new spam activities and maintain good accuracy for spam detection in a tweet stream.", "title": "" }, { "docid": "0a326d1929ced80008a9b7cecfc38796", "text": "A low Terahertz (324 GHz) frequency generator is realized in 90 nm CMOS by linearly superimposing quadruple (N=4) phase shifted fundamental signals at one fourth of the output frequency (81 GHz). The developed technique minimizes the fundamental, second and third order harmonics without extra filtering and results in a high fundamental-to-4 th harmonic signal conversion ratio of 0.17 or -15.4 dB. The demonstrated prototype produces a calibrated -46 dBm output power when biased at 1 V and 12 mA with 4 GHz tuning range and extrapolated phase noise of -91 dBc/Hz at 10 MHz frequency offset. The linear superposition (LS) technique can be generalized for all even number cases (N=2k, where k=1,2,3,4,...,n) with different tradeoffs in output power and frequency. As CMOS continues to scale, we anticipate the LS N=4 VCO to generate signals beyond 2 Terahertz by using 22 nm CMOS and produce output power up to -1.5 dBm with 1.7% power added efficiency with an LS VCO + Class-B Power Amplifier cascaded circuit architecture.", "title": "" }, { "docid": "1e607279360f3318f3f020e19e1bd86f", "text": "Only one late period is allowed for this homework (11:59pm 2/23). Submission instructions: These questions require thought but do not require long answers. Please be as concise as possible. You should submit your answers as a writeup in PDF format via GradeScope and code via the Snap submission site. Submitting writeup: Prepare answers to the homework questions into a single PDF file and submit it via http://gradescope.com. Make sure that the answer to each question is on a separate page. On top of each page write the number of the question you are answering. Please find the cover sheet and the recommended templates located here: Not including the cover sheet in your submission will result in a 2-point penalty. It is also important to tag your answers correctly on Gradescope. We will deduct 5/N points for each incorrectly tagged subproblem (where N is the number of subproblems). This means you can lose up to 5 points for incorrect tagging. Put all the code for a single question into a single file and upload it. Warning: This problem requires substantial computing time (it can be a few hours on some systems). Don't start it at the last minute. 7 7 7 The goal of this problem is to implement the Stochastic Gradient Descent algorithm to build a Latent Factor Recommendation system. We can use it to recommend movies to users.", "title": "" }, { "docid": "64c3de6f135df88ab234068dc5d92b08", "text": "The drive to improve energy efficiency and reduce electrical loading has resulted in energy efficient lighting such as compact fluorescent lamps (CFLs) replacing conventional incandescent lamps. However, the presence of such non-linear loads has brought about the injection of voltage and current harmonics into electrical networks. As transformers are the interface between the supply and the non-linear loads, the investigation of their effects on transformer losses is of great importance. These harmonics can cause excessive loss and abnormal temperature rise in the transformers, thus reducing their operational life span. This paper investigates the impact of current and voltage harmonics of the loads on a single-phase 25kVA distribution transformer. Harmonic spectra of a range of non-linear loads including CFL, LED tube, PC and fluorescent lamp are obtained. A single-phase inverter is used for harmonic generation to simulate power supply harmonics injected into the transformer. Open circuit and short circuit tests are conducted on the transformer under the effect of harmonics, and the impacts on core loss are analyzed.", "title": "" }, { "docid": "6c2ab35deb9bb61e23e95b6510134459", "text": "ENSURING THAT ATHLETES FUNCTION OPTIMALLY THROUGHOUT TRAINING IS AN IMPORTANT FOCUS FOR THE STRENGTH AND CONDITIONING COACH. SLEEP IS AN INFLUENTIAL FACTOR THAT AFFECTS THE QUALITY OF TRAINING, GIVEN ITS IMPLICATIONS ON THE RECOVERY PROCESS. INTENSE TRAINING MAY PREDISPOSE ATHLETES TO RISK FACTORS SURROUNDING DISTURBED SLEEP PATTERNS. THESE MAY BE DUE TO INHERENT PHYSICAL EXERTION, COMMITMENT TO EXTENSIVE TRAINING SCHEDULES, THE EFFECTS OF TRAVEL, DOMESTIC OR INTERNATIONAL, AND THE PRESSURES THAT COMPETITION EVOKES. EDUCATING ATHLETES ON THE IMPLICATIONS OF SLEEP SHOULD BE IMPLEMENTED BY STRENGTH AND CONDITIONING COACHES TO OPTIMIZE ATHLETE RECOVERY, PROMOTE CONSISTENT SLEEP ROUTINES, AND SLEEP LENGTH.", "title": "" }, { "docid": "8b5a06aab3e4bc184733eb108c1706ae", "text": "Profiling data to determine metadata about a given dataset is an important and frequent activity of any IT professional and researcher and is necessary for various use-cases. It encompasses a vast array of methods to examine datasets and produce metadata. Among the simpler results are statistics, such as the number of null values and distinct values in a column, its data type, or the most frequent patterns of its data values. Metadata that are more difficult to compute involve multiple columns, namely correlations, unique column combinations, functional dependencies, and inclusion dependencies. Further techniques detect conditional properties of the dataset at hand. This survey provides a classification of data profiling tasks and comprehensively reviews the state of the art for each class. In addition, we review data profiling tools and systems from research and industry. We conclude with an outlook on the future of data profiling beyond traditional profiling tasks and beyond relational databases.", "title": "" } ]
scidocsrr
f1edb1ab3b5529a3a3954ed44e80db9e
Weakly- and Semi-Supervised Learning of a DCNN for Semantic Image Segmentation
[ { "docid": "1c90adf8ec68ff52e777b2041f8bf4c4", "text": "In many situations we have some measurement of confidence on “positiveness” for a binary label. The “positiveness” is a continuous value whose range is a bounded interval. It quantifies the affiliation of each training data to the positive class. We propose a novel learning algorithm called expectation loss SVM (eSVM) that is devoted to the problems where only the “positiveness” instead of a binary label of each training sample is available. Our e-SVM algorithm can also be readily extended to learn segment classifiers under weak supervision where the exact positiveness value of each training example is unobserved. In experiments, we show that the e-SVM algorithm can effectively address the segment proposal classification task under both strong supervision (e.g. the pixel-level annotations are available) and the weak supervision (e.g. only bounding-box annotations are available), and outperforms the alternative approaches. Besides, we further validate this method on two major tasks of computer vision: semantic segmentation and object detection. Our method achieves the state-of-the-art object detection performance on PASCAL VOC 2007 dataset.", "title": "" } ]
[ { "docid": "68cf9884548278e2b4dcec62e29d3122", "text": "BACKGROUND\nVitamin D is crucial for maintenance of musculoskeletal health, and might also have a role in extraskeletal tissues. Determinants of circulating 25-hydroxyvitamin D concentrations include sun exposure and diet, but high heritability suggests that genetic factors could also play a part. We aimed to identify common genetic variants affecting vitamin D concentrations and risk of insufficiency.\n\n\nMETHODS\nWe undertook a genome-wide association study of 25-hydroxyvitamin D concentrations in 33 996 individuals of European descent from 15 cohorts. Five epidemiological cohorts were designated as discovery cohorts (n=16 125), five as in-silico replication cohorts (n=9367), and five as de-novo replication cohorts (n=8504). 25-hydroxyvitamin D concentrations were measured by radioimmunoassay, chemiluminescent assay, ELISA, or mass spectrometry. Vitamin D insufficiency was defined as concentrations lower than 75 nmol/L or 50 nmol/L. We combined results of genome-wide analyses across cohorts using Z-score-weighted meta-analysis. Genotype scores were constructed for confirmed variants.\n\n\nFINDINGS\nVariants at three loci reached genome-wide significance in discovery cohorts for association with 25-hydroxyvitamin D concentrations, and were confirmed in replication cohorts: 4p12 (overall p=1.9x10(-109) for rs2282679, in GC); 11q12 (p=2.1x10(-27) for rs12785878, near DHCR7); and 11p15 (p=3.3x10(-20) for rs10741657, near CYP2R1). Variants at an additional locus (20q13, CYP24A1) were genome-wide significant in the pooled sample (p=6.0x10(-10) for rs6013897). Participants with a genotype score (combining the three confirmed variants) in the highest quartile were at increased risk of having 25-hydroxyvitamin D concentrations lower than 75 nmol/L (OR 2.47, 95% CI 2.20-2.78, p=2.3x10(-48)) or lower than 50 nmol/L (1.92, 1.70-2.16, p=1.0x10(-26)) compared with those in the lowest quartile.\n\n\nINTERPRETATION\nVariants near genes involved in cholesterol synthesis, hydroxylation, and vitamin D transport affect vitamin D status. Genetic variation at these loci identifies individuals who have substantially raised risk of vitamin D insufficiency.\n\n\nFUNDING\nFull funding sources listed at end of paper (see Acknowledgments).", "title": "" }, { "docid": "65cc38c04bbc2a14f6af919a8a98e527", "text": "This paper introduces quantum neural networks (QNNs), a class of feedforward neural networks (FFNNs) inherently capable of estimating the structure of a feature space in the form of fuzzy sets. The hidden units of these networks develop quantized representations of the sample information provided by the training data set in various graded levels of certainty. Unlike other approaches attempting to merge fuzzy logic and neural networks, QNNs can be used in pattern classification problems without any restricting assumptions such as the availability of a priori knowledge or desired membership profile, convexity of classes, a limited number of classes, etc. Experimental results presented here show that QNNs are capable of recognizing structures in data, a property that conventional FFNNs with sigmoidal hidden units lack.", "title": "" }, { "docid": "7fcfa6b251a20d5bb35516d322ebc6c9", "text": "Plastic waste disposal is a huge ecotechnological problem and one of the approaches to solving this problem is the development of biodegradable plastics. This review summarizes data on their use, biodegradability, commercial reliability and production from renewable resources. Some commercially successful biodegradable plastics are based on chemical synthesis (i.e. polyglycolic acid, polylactic acid, polycaprolactone, and polyvinyl alcohol). Others are products of microbial fermentations (i.e. polyesters and neutral polysaccharides) or are prepared from chemically modified natural products (e.g., starch, cellulose, chitin or soy protein).", "title": "" }, { "docid": "bef1e01aed1501fb71ace92e8851352b", "text": "Adolescent idiopathic scoliosis is a lifetime, probably systemic condition of unknown cause, resulting in a spinal curve or curves of ten degrees or more in about 2.5% of most populations. However, in only about 0.25% does the curve progress to the point that treatment is warranted.Untreated, adolescent idiopathic scoliosis does not increase mortality rate, even though on rare occasions it can progress to the >100 degrees range and cause premature death. The rate of shortness of breath is not increased, although patients with 50 degrees curves at maturity or 80 degrees curves during adulthood are at increased risk of developing shortness of breath. Compared to non-scoliotic controls, most patients with untreated adolescent idiopathic scoliosis function at or near normal levels. They do have increased pain prevalence and may or may not have increased pain severity. Self-image is often decreased. Mental health is usually not affected. Social function, including marriage and childbearing may be affected, but only at the threshold of relatively larger curves.Non-operative treatment consists of bracing for curves of 25 degrees to 35 degrees or 40 degrees in patients with one to two years or more of growth remaining. Curve progression of >/= 6 degrees is 20 to 40% more likely with observation than with bracing. Operative treatment consists of instrumentation and arthrodesis to realign and stabilize the most affected portion of the spine. Lasting curve improvement of approximately 40% is usually achieved.In the most completely studied series to date, at 20 to 28 years follow-up both braced and operated patients had similar, significant, and clinically meaningful reduced function and increased pain compared to non-scoliotic controls. However, their function and pain scores were much closer to normal than patient groups with other, more serious conditions.Risks associated with treatment include temporary decrease in self-image in braced patients. Operated patients face the usual risks of major surgery, a 6 to 29% chance of requiring re-operation, and the remote possibility of developing a pain management problem.Knowledge of adolescent idiopathic scoliosis natural history and long-term treatment effects is and will always remain somewhat incomplete. However, enough is know to provide patients and parents the information needed to make informed decisions about management options.", "title": "" }, { "docid": "ac07f85a8d6114061569e043e19747f5", "text": "In this paper, some novel and modified driving techniques for a single switch zero voltage switching (ZVS) topology are introduced. These medium/high frequency and digitally synthesized driving techniques can be applied to decrease the dangers of peak currents that may damage the switching circuit when switching in out of nominal conditions. The technique is fully described and evaluated experimentally in a 2500W prototype intended for a domestic induction cooking application.", "title": "" }, { "docid": "34b19572056730e0dac6d427a191ac13", "text": "The paradigm shift from shallow classifiers with hand-crafted features to endto-end trainable deep learning models has shown significant improvements on supervised learning tasks. Despite the promising power of deep neural networks (DNN), how to alleviate overfitting during training has been a research topic of interest. In this paper, we present a Generative-Discriminative Variational Model (GDVM) for visual classification, in which we introduce a latent variable inferred from inputs for exhibiting generative abilities towards prediction. In other words, our GDVM casts the supervised learning task as a generative learning process, with data discrimination to be jointly exploited for improved classification. In our experiments, we consider the tasks of multi-class classification, multi-label classification, and zero-shot learning. We show that our GDVM performs favorably against the baselines or recent generative DNN models.", "title": "" }, { "docid": "ecededc13ef0b9993c6fc03c8d504f55", "text": "Natural language generation (NLG) has been featured in at most a handful of shipped games and interactive stories. This is certainly due to it being a very specialized practice, but another contributing factor is that the state of the art today, in terms of content quality, is simply inadequate. The major benefits of NLG are its alleviation of authorial burden and the capability it gives to a system of generating state-bespoke content, but we believe we can have these benefits without actually employing a full NLG pipeline. In this paper, we present the preliminary design of EXPRESSIONIST, an in-development mixed-initiative authoring tool that instantiates an authoring scheme residing somewhere between conventional NLG and conventional human content authoring. In this scheme, a human author plays the part of an NLG module in that she starts from a set of deep representations constructed for the game or story domain and proceeds to specify dialogic content that may express those representations. Rather than authoring static dialogue, the author defines a probabilistic context-free grammar that yields templated dialogue. This allows a human author to still harness a computer’s generativity, but in a capacity in which it can be trusted: operating over probabilities and treelike control structures. Additional features of EXPRESSIONIST’s design include arbitrary markup and realtime feedback showing currently valid derivations.", "title": "" }, { "docid": "ddbf68174da624f4d2f19fc25cafc870", "text": "Large scale streaming systems aim to provide high throughput and low latency. They are often used to run mission-critical applications, and must be available 24x7. Thus such systems need to adapt to failures and inherent changes in workloads, with minimal impact on latency and throughput. Unfortunately, existing solutions require operators to choose between achieving low latency during normal operation and incurring minimal impact during adaptation. Continuous operator streaming systems, such as Naiad and Flink, provide low latency during normal execution but incur high overheads during adaptation (e.g., recovery), while micro-batch systems, such as Spark Streaming and FlumeJava, adapt rapidly at the cost of high latency during normal operations.\n Our key observation is that while streaming workloads require millisecond-level processing, workload and cluster properties change less frequently. Based on this, we develop Drizzle, a system that decouples the processing interval from the coordination interval used for fault tolerance and adaptability. Our experiments on a 128 node EC2 cluster show that on the Yahoo Streaming Benchmark, Drizzle can achieve end-to-end record processing latencies of less than 100ms and can get 2-3x lower latency than Spark. Drizzle also exhibits better adaptability, and can recover from failures 4x faster than Flink while having up to 13x lower latency during recovery.", "title": "" }, { "docid": "912fb50be7a37154259ad3d7f5c4194f", "text": "This paper presents a novel single-ended disturb-free 9T subthreshold SRAM cell with cross-point data-aware Write word-line structure. The disturb-free feature facilitates bit-interleaving architecture, which can reduce multiple-bit upsets in a single word and enhance soft error immunity by employing Error Checking and Correction (ECC) technique. The proposed 9T SRAM cell is demonstrated by a 72 Kb SRAM macro with a Negative Bit-Line (NBL) Write-assist and an adaptive Read operation timing tracing circuit implemented in 65 nm low-leakage CMOS technology. Measured full Read and Write functionality is error free with VDD down to 0.35 V ( 0.15 V lower than the threshold voltage) with 229 KHz frequency and 4.05 μW power. Data is held down to 0.275 V with 2.29 μW Standby power. The minimum energy per operation is 4.5 pJ at 0.5 V. The 72 Kb SRAM macro has wide operation range from 1.2 V down to 0.35 V, with operating frequency of around 200 MHz for VDD around/above 1.0 V.", "title": "" }, { "docid": "cf341e272dcc4773829f09e36a0519b3", "text": "Malicious Web sites are a cornerstone of Internet criminal activities. The dangers of these sites have created a demand for safeguards that protect end-users from visiting them. This article explores how to detect malicious Web sites from the lexical and host-based features of their URLs. We show that this problem lends itself naturally to modern algorithms for online learning. Online algorithms not only process large numbers of URLs more efficiently than batch algorithms, they also adapt more quickly to new features in the continuously evolving distribution of malicious URLs. We develop a real-time system for gathering URL features and pair it with a real-time feed of labeled URLs from a large Web mail provider. From these features and labels, we are able to train an online classifier that detects malicious Web sites with 99% accuracy over a balanced dataset.", "title": "" }, { "docid": "73924f7a178ff56aaa1697052e876484", "text": "In this paper the development of a Wireless Sensor Network (WSN) for construction noise identification and sound locating is investigated using the novel application of Bluetooth Low Energy (BLE). Three WSNs using different system-on-chip (SoC) devices and networking protocols have been prototyped using a Raspberry Pi as the gateway in the network. The functionality of the system has been demonstrated with data logging experiments and comparisons has been made between the different WSN systems developed to identify the relative advantages of BLE. Experiments using the WSN for vehicle noise identification and sound location have further demonstrated the potential of the system. This paper demonstrates the versatility of a BLE WSNs and the low power consumption that is achievable with BLE devices for noise detection applications.", "title": "" }, { "docid": "f022a506d51f58a53ba03342a301a221", "text": "Irregular scene text such as curved, rotated or perspective texts commonly appear in natural scene images due to different camera view points, special design purposes etc. In this work, we propose a text salience map guided model to recognize these arbitrary direction scene texts. We train a deep Fully Convolutional Network (FCN) to calculate the precise salience map for texts. Then we estimate the positions and rotations of the text and utilize this information to guide the generation of CNN sequence features. Finally the sequence is recognized with a Recurrent Neural Network (RNN) model. Experiments on various public datasets show that the proposed approach is robust to different distortions and performs superior or comparable to the state-of-the-art techniques.", "title": "" }, { "docid": "58a9ef3dea7788c66942d7cb11dcd8fd", "text": "Frontalis suspension is a commonly used surgery that is indicated in patients with blepharoptosis and poor levator muscle function. The surgery is based on connecting the tarsal plate to the eyebrow with various sling materials. Although fascia lata is most commonly used due to its long-lasting effect and low rate of complications, it has several limitations such as difficulty of harvesting, insufficient amounts in small children, and postoperative donor-site complications. Other sling materials have overcome these limitations, but on the other hand, have been reported to be associated with other complications. In this review we focus on the different techniques and materials which are used in frontalis suspension surgeries, as well as the advantage and disadvantage of these techniques.", "title": "" }, { "docid": "055faaaa14959a204ca19a4962f6e822", "text": "Data mining (also known as knowledge discovery from databases) is the process of extraction of hidden, previously unknown and potentially useful information from databases. The outcome of the extracted data can be analyzed for the future planning and development perspectives. In this paper, we have made an attempt to demonstrate how one can extract the local (district) level census, socio-economic and population related other data for knowledge discovery and their analysis using the powerful data mining tool Weka. I. DATA MINING Data mining has been defined as the nontrivial extraction of implicit, previously unknown, and potentially useful information from databases/data warehouses. It uses machine learning, statistical and visualization techniques to discover and present knowledge in a form, which is easily comprehensive to humans [1]. Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help user focus on the most important information in their data warehouses. Data mining tools predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by retrospective tools typical of decision support systems. Data mining tools can answer business questions that traditionally were too time consuming to resolve. They scour databases for hidden patterns, finding predictive information that experts may miss because it lies outside their expectations. Data mining techniques can be implemented rapidly on existing software and hardware platforms to enhance the value of existing information resources, and can be integrated with new products and systems as they are brought on-line [2]. Data mining steps in the knowledge discovery process are as follows: 1. Data cleaningThe removal of noise and inconsistent data. 2. Data integration The combination of multiple sources of data. 3. Data selection The data relevant for analysis is retrieved from the database. 4. Data transformation The consolidation and transformation of data into forms appropriate for mining. 5. Data mining The use of intelligent methods to extract patterns from data. 6. Pattern evaluation Identification of patterns that are interesting. (ICETSTM – 2013) International Conference in “Emerging Trends in Science, Technology and Management-2013, Singapore Census Data Mining and Data Analysis using WEKA 36 7. Knowledge presentation Visualization and knowledge representation techniques are used to present the extracted or mined knowledge to the end user [3]. The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns such as groups of data records (cluster analysis), unusual records (anomaly detection) and dependencies (association rule mining). This usually involves using database techniques such as spatial indices. These patterns can then be seen as a kind of summary of the input data, and may be used in further analysis or, for example, in machine learning and predictive analytics. For example, the data mining step might identify multiple groups in the data, which can then be used to obtain more accurate prediction results by a decision support system. Neither the data collection, data preparation, nor result interpretation and reporting are part of the data mining step, but do belong to the overall KDD process as additional steps [7][8]. II. WEKA: Weka (Waikato Environment for Knowledge Analysis) is a popular suite of machine learning software written in Java, developed at the University of Waikato, New Zealand. Weka is free software available under the GNU General Public License. The Weka workbench contains a collection of visualization tools and algorithms for data analysis and predictive modeling, together with graphical user interfaces for easy access to this functionality [4]. Weka is a collection of machine learning algorithms for solving real-world data mining problems. It is written in Java and runs on almost any platform. The algorithms can either be applied directly to a dataset or called from your own Java code [5]. The original non-Java version of Weka was a TCL/TK front-end to (mostly third-party) modeling algorithms implemented in other programming languages, plus data preprocessing utilities in C, and a Makefile-based system for running machine learning experiments. This original version was primarily designed as a tool for analyzing data from agricultural domains, but the more recent fully Java-based version (Weka 3), for which development started in 1997, is now used in many different application areas, in particular for educational purposes and research. Advantages of Weka include: I. Free availability under the GNU General Public License II. Portability, since it is fully implemented in the Java programming language and thus runs on almost any modern computing platform III. A comprehensive collection of data preprocessing and modeling techniques IV. Ease of use due to its graphical user interfaces Weka supports several standard data mining tasks, more specifically, data preprocessing, clustering, classification, regression, visualization, and feature selection [10]. All of Weka's techniques are predicated on the assumption that the data is available as a single flat file or relation, where each data point is described by a fixed number of attributes (normally, numeric or nominal attributes, but some other attribute types are also supported). Weka provides access to SQL databases using Java Database Connectivity and can process the result returned by a database query. It is not capable of multi-relational data mining, but there is separate software for converting a collection of linked database tables into a single table that is suitable for (ICETSTM – 2013) International Conference in “Emerging Trends in Science, Technology and Management-2013, Singapore Census Data Mining and Data Analysis using WEKA 37 processing using Weka. Another important area that is currently not covered by the algorithms included in the Weka distribution is sequence modeling [4]. III. DATA PROCESSING, METHODOLOGY AND RESULTS The primary available data such as census (2001), socio-economic data, and few basic information of Latur district are collected from National Informatics Centre (NIC), Latur, which is mainly required to design and develop the database for Latur district of Maharashtra state of India. The database is designed in MS-Access 2003 database management system to store the collected data. The data is formed according to the required format and structures. Further, the data is converted to ARFF (Attribute Relation File Format) format to process in WEKA. An ARFF file is an ASCII text file that describes a list of instances sharing a set of attributes. ARFF files were developed by the Machine Learning Project at the Department of Computer Science of The University of Waikato for use with the Weka machine learning software. This document descibes the version of ARFF used with Weka versions 3.2 to 3.3; this is an extension of the ARFF format as described in the data mining book written by Ian H. Witten and Eibe Frank [6][9]. After processing the ARFF file in WEKA the list of all attributes, statistics and other parameters can be utilized as shown in Figure 1. Fig.1 Processed ARFF file in WEKA. In the above shown file, there are 729 villages data is processed with different attributes (25) like population, health, literacy, village locations etc. Among all these, few of them are preprocessed attributes generated by census data like, percent_male_literacy, total_percent_literacy, total_percent_illiteracy, sex_ratio etc. (ICETSTM – 2013) International Conference in “Emerging Trends in Science, Technology and Management-2013, Singapore Census Data Mining and Data Analysis using WEKA 38 The processed data in Weka can be analyzed using different data mining techniques like, Classification, Clustering, Association rule mining, Visualization etc. algorithms. The Figure 2 shows the few processed attributes which are visualized into a 2 dimensional graphical representation. Fig. 2 Graphical visualization of processed attributes. The information can be extracted with respect to two or more associative relation of data set. In this process, we have made an attempt to visualize the impact of male and female literacy on the gender inequality. The literacy related and population data is processed and computed the percent wise male and female literacy. Accordingly we have computed the sex ratio attribute from the given male and female population data. The new attributes like, male_percent_literacy, female_percent_literacy and sex_ratio are compared each other to extract the impact of literacy on gender inequality. The Figure 3 and Figure 4 are the extracted results of sex ratio values with male and female literacy. Fig. 3 Female literacy and Sex ratio values. (ICETSTM – 2013) International Conference in “Emerging Trends in Science, Technology and Management-2013, Singapore Census Data Mining and Data Analysis using WEKA 39 Fig. 4 Male literacy and Sex ratio values. On the Y-axis, the female percent literacy values are shown in Figure 3, and the male percent literacy values are shown in Figure 4. By considering both the results, the female percent literacy is poor than the male percent literacy in the district. The sex ratio values are higher in male percent literacy than the female percent literacy. The results are purely showing that the literacy is very much important to manage the gender inequality of any region. ACKNOWLEDGEMENT: Authors are grateful to the department of NIC, Latur for providing all the basic data and WEKA for providing such a strong tool to extract and analyze knowledge from database. CONCLUSION Knowledge extraction from database is becom", "title": "" }, { "docid": "0a5293ffae592161f2b1c701042a9a36", "text": "In this era of the emerging digitized, mobilized, and cloudified enterprises, the concept of the \"compos able business\" is the most critical piece which ties everything together. The digital enterprise is here, and its prime characteristic is that is essentially detaches and segregates existing businesses and reassembles them according to market demands. Every industry, from transportation to eyewear is up for disruption, and developers are in the forefront of this movement. In turn, these developers are under intense pressure to accelerate time to market. The compos able enterprise approach requires a reconsideration of traditional models of the entire IT organization. These organization and their processes need to be broken up into components that follow certain key design principles such as The Minimal Functions with least Dependencies, portability, Shared Knowledge, Predictable Contracts and Maximized Human Value. The last three bullet points encapsulate the very definition of DevOps [3]. The concept of better integration between Development and Operations is a valuable objective. The goal is to foster measurable incremental cultural change to derive most overall value out of the union of people, process and technology. But the cultural issues, reward models, and risk allocation create obvious barriers in attaining those goals. The common industry belief is to use the compos able enterprise framework to build a platform using the right tools and you will have attained DevOps nirvana. In this paper we will explore valuable lessons learned from our mistakes in tool centric adoption of IT Infrastructure Library (ITIL) [8]. We will also show how we applied those lessons to develop a lightweight compos able/contextual DevOps framework that learns and measure itself to avoid those cultural pitfalls.", "title": "" }, { "docid": "0ac7db546c11b9d18897ceeb2e5be70f", "text": "A backstepping approach is proposed in this paper to cope with the failure of a quadrotor propeller. The presented methodology supposes to turn off also the motor which is opposite to the broken one. In this way, a birotor configuration with fixed propellers is achieved. The birotor is controlled to follow a planned emergency landing trajectory. Theory shows that the birotor can reach any point in the Cartesian space losing the possibility to control the yaw angle. Simulation tests are employed to validate the proposed controller design.", "title": "" }, { "docid": "8536cc1dc29e0b924273d1cbdcd4494c", "text": "In this paper, we develop simple models to study the performance of BitTorrent, a second generation peer-to-peer (P2P) application. We first present a simple fluid model and study the scalability, performance and efficiency of such a file-sharing mechanism. We then consider the built-in incentive mechanism of BitTorrent and study its effect on network performance. We also provide numerical results based on both simulations and real traces obtained from the Internet.", "title": "" }, { "docid": "f3f084416b4a13217d4d15976404eef4", "text": "People typically exhibit greater sensitivity to losses than to equivalent gains when making decisions. We investigated neural correlates of loss aversion while individuals decided whether to accept or reject gambles that offered a 50/50 chance of gaining or losing money. A broad set of areas (including midbrain dopaminergic regions and their targets) showed increasing activity as potential gains increased. Potential losses were represented by decreasing activity in several of these same gain-sensitive areas. Finally, individual differences in behavioral loss aversion were predicted by a measure of neural loss aversion in several regions, including the ventral striatum and prefrontal cortex.", "title": "" }, { "docid": "29199ac45d4aa8035fd03e675406c2cb", "text": "This work presents an autonomous mobile robot in order to cover an unknown terrain “randomly”, namely entirely, unpredictably and evenly. This aim is very important, especially in military missions, such as the surveillance of terrains, the terrain exploration for explosives and the patrolling for intrusion in military facilities. The “heart” of the proposed robot is a chaotic motion controller, which is based on a chaotic true random bit generator. This generator has been implemented with a microcontroller, which converts the produced chaotic bit sequence, to the robot's motion. Experimental results confirm that this approach, with an appropriate sensor for obstacle avoidance, can obtain very satisfactory results in regard to the fast scanning of the robot’s workspace with unpredictable way. Key-Words: Autonomous mobile robot, terrain coverage, microcontroller, random bit generator, nonlinear system, chaos, Logistic map.", "title": "" }, { "docid": "eb59f239621dde59a13854c5e6fa9f54", "text": "This paper presents a novel application of grammatical inference techniques to the synthesis of behavior models of software systems. This synthesis is used for the elicitation of software requirements. This problem is formulated as a deterministic finite-state automaton induction problem from positive and negative scenarios provided by an end-user of the software-to-be. A query-driven state merging algorithm (QSM) is proposed. It extends the RPNI and Blue-Fringe algorithms by allowing membership queries to be submitted to the end-user. State merging operations can be further constrained by some prior domain knowledge formulated as fluents, goals, domain properties, and models of external software components. The incorporation of domain knowledge both reduces the number of queries and guarantees that the induced model is consistent with such knowledge. The proposed techniques are implemented in the ISIS tool and practical evaluations on standard requirements engineering test cases and synthetic data illustrate the interest of this approach. Contact author: Pierre Dupont Department of Computing Science and Engineering (INGI) Université catholique de Louvain Place Sainte Barbe, 2. B-1348 Louvain-la-Neuve Belgium Email: Pierre.Dupont@uclouvain.be Phone: +32 10 47 91 14 Fax: +32 10 45 03 45", "title": "" } ]
scidocsrr
b84a121733a183a2c98c49b33e83d843
Object-Based Classification of Urban Areas Using VHR Imagery and Height Points Ancillary Data
[ { "docid": "2c8e7bfcd41924d0fe8f66166d366751", "text": "-Many image segmentation techniques are available in the literature. Some of these techniques use only the gray level histogram, some use spatial details while others use fuzzy set theoretic approaches. Most of these techniques are not suitable for noisy environments. Some works have been done using the Markov Random Field (MRF) model which is robust to noise, but is computationally involved. Neural network architectures which help to get the output in real time because of their parallel processing ability, have also been used for segmentation and they work fine even when the noise level is very high. The literature on color image segmentation is not that rich as it is for gray tone images. This paper critically reviews and summarizes some of these techniques. Attempts have been made to cover both fuzzy and non-fuzzy techniques including color image segmentation and neural network based approaches. Adequate attention is paid to segmentation of range images and magnetic resonance images. It also addresses the issue of quantitative evaluation of segmentation results. Image segmentation Fuzzy sets Markov Random Field Thresholding Edge detection Clustering Relaxation", "title": "" }, { "docid": "d984489b4b71eabe39ed79fac9cf27a1", "text": "Remote sensing from airborne and spaceborne platforms provides valuable data for mapping, environmental monitoring, disaster management and civil and military intelligence. However, to explore the full value of these data, the appropriate information has to be extracted and presented in standard format to import it into geo-information systems and thus allow efficient decision processes. The object-oriented approach can contribute to powerful automatic and semiautomatic analysis for most remote sensing applications. Synergetic use to pixel-based or statistical signal processing methods explores the rich information contents. Here, we explain principal strategies of object-oriented analysis, discuss how the combination with fuzzy methods allows implementing expert knowledge and describe a representative example for the proposed workflow from remote sensing imagery to GIS. The strategies are demonstrated using the first objectoriented image analysis software on the market, eCognition, which provides an appropriate link between remote sensing", "title": "" } ]
[ { "docid": "b7f85441bc39452f7f128d93ec823eb9", "text": "We investigate the problem of learning to rank with document retrieval from the perspective of learning for multiple objective functions. We present solutions to two open problems in learning to rank: first, we show how multiple measures can be combined into a single graded measure that can be learned. This solves the problem of learning from a 'scorecard' of measures by making such scorecards comparable, and we show results where a standard web relevance measure (NDCG) is used for the top-tier measure, and a relevance measure derived from click data is used for the second-tier measure; the second-tier measure is shown to significantly improve while leaving the top-tier measure largely unchanged. Second, we note that the learning-to-rank problem can itself be viewed as changing as the ranking model learns: for example, early in learning, adjusting the rank of all documents can be advantageous, but later during training, it becomes more desirable to concentrate on correcting the top few documents for each query. We show how an analysis of these problems leads to an improved, iteration-dependent cost function that interpolates between a cost function that is more appropriate for early learning, with one that is more appropriate for late-stage learning. The approach results in a significant improvement in accuracy with the same size models. We investigate these ideas using LambdaMART, a state-of-the-art ranking algorithm.", "title": "" }, { "docid": "14a2a003117d2bca8cb5034e09e8ea05", "text": "The regularization principals [31] lead approximation schemes to deal with various learning problems, e.g., the regularization of the norm in a reproducing kernel Hilbert space for the ill-posed problem. In this paper, we present a family of subspace learning algorithms based on a new form of regularization, which transfers the knowledge gained in training samples to testing samples. In particular, the new regularization minimizes the Bregman divergence between the distribution of training samples and that of testing samples in the selected subspace, so it boosts the performance when training and testing samples are not independent and identically distributed. To test the effectiveness of the proposed regularization, we introduce it to popular subspace learning algorithms, e.g., principal components analysis (PCA) for cross-domain face modeling; and Fisher's linear discriminant analysis (FLDA), locality preserving projections (LPP), marginal Fisher's analysis (MFA), and discriminative locality alignment (DLA) for cross-domain face recognition and text categorization. Finally, we present experimental evidence on both face image data sets and text data sets, suggesting that the proposed Bregman divergence-based regularization is effective to deal with cross-domain learning problems.", "title": "" }, { "docid": "5b79a02ccfbbcab32113abf1477bbb59", "text": "Using a large sample of publicly traded US firms over 16 years, we investigate the impact of corporate socially responsible (CSR) strategies on security analysts’ recommendations. Socially responsible firms receive more favorable recommendations in recent years relative to earlier ones, documenting a changing perception of the value of such strategies by the analysts. Moreover, we find that firms with higher visibility receive more favorable recommendations for their CSR strategies and that analysts with more experience, broader CSR awareness or those with more resources at their disposal, are more likely to perceive the value of CSR strategies more favorably. Our results document how CSR strategies can affect value creation in public equity markets through analyst recommendations. 1 Assistant Professor of Strategic and International Management, London Business School, Regent’s Park, NW1 4SA, London, United Kingdom. Email: iioannou@london.edu, Ph: +44 20 7000 8748, Fx: +44 20 7000 7001. 2 Assistant Professor of Business Administration, Harvard Business School, Soldiers’ Field Road, Morgan Hall 381, 02163 Boston, MA, USA. Email:gserafeim@hbs.edu, Ph: +1 617 495 6548, Fx: +1 617 496 7387. We are grateful to Constantinos Markides, and seminar participants at the research brown bag (SIM area) of the London Business School, the academic conference on Social Responsibility at University of Washington Tacoma, the 2010 European Academy of Management Conference, and the 2010 Academy of Management Conference. Ioannou acknowledges financial support from the Research and Materials Development Fund (RAMD) at the London Business School. All remaining errors are our own.", "title": "" }, { "docid": "73af8236cc76e386aa76c6d20378d774", "text": "Turkish Wikipedia Named-Entity Recognition and Text Categorization (TWNERTC) dataset is a collection of automatically categorized and annotated sentences obtained from Wikipedia. We constructed large-scale gazetteers by using a graph crawler algorithm to extract relevant entity and domain information from a semantic knowledge base, Freebase1. The constructed gazetteers contains approximately 300K entities with thousands of fine-grained entity types under 77 different domains. Since automated processes are prone to ambiguity, we also introduce two new content specific noise reduction methodologies. Moreover, we map fine-grained entity types to the equivalent four coarse-grained types, person, loc, org, misc. Eventually, we construct six different dataset versions and evaluate the quality of annotations by comparing ground truths from human annotators. We make these datasets publicly available to support studies on Turkish named-entity recognition (NER) and text categorization (TC).", "title": "" }, { "docid": "a44f0cbe9675be06439197053a96c277", "text": "This paper presents a novel approach to utilizing high level knowledge for the problem of scene recognition in an active vision framework, which we call active scene recognition. In traditional approaches, high level knowledge is used in the post-processing to combine the outputs of the object detectors to achieve better classification performance. In contrast, the proposed approach employs high level knowledge actively by implementing an interaction between a reasoning module and a sensory module (Figure 1). Following this paradigm, we implemented an active scene recognizer and evaluated it with a dataset of 20 scenes and 100+ objects. We also extended it to the analysis of dynamic scenes for activity recognition with attributes. Experiments demonstrate the effectiveness of the active paradigm in introducing attention and additional constraints into the sensing process.", "title": "" }, { "docid": "36a0b3223b83927f4dfe358086f2a660", "text": "We train a set of state of the art neural networks, the Maxout networks (Goodfellow et al., 2013a), on three benchmark datasets: the MNIST, CIFAR10 and SVHN, with three distinct storing formats: floating point, fixed point and dynamic fixed point. For each of those datasets and for each of those formats, we assess the impact of the precision of the storage on the final error of the training. We find that very low precision storage is sufficient not just for running trained networks but also for training them. For example, Maxout networks state-of-the-art results are nearly maintained with 10 bits for storing activations and gradients, and 12 bits for storing parameters.", "title": "" }, { "docid": "4e9086c19d4bbd7a269077593227e29b", "text": "We report dual-functional hollow gold nanospheres (HAuNS, approximately 40-nm diameter) capable of mediating both photothermal ablation of cancer cells and drug release upon near-infrared (NIR) light irradiation. As high as 63% DOX by weight ( approximately 1.7 microg DOX/microg Au) could be loaded to polyethylene glycol (PEG)-coated HAuNS since DOX was coated to both the outer and the inner surfaces of HAuNS. Irradiation with NIR laser induced photothermal conversion, which triggered rapid DOX release from DOX-loaded HAuNS. The release of DOX was also pH-dependent, with more DOX released in aqueous solution at lower pH. Significantly greater cell killing was observed when MDA-MB-231 cells incubated with DOX-loaded HAuNS were irradiated with NIR light, attributable to both HAuNS-mediated photothermal ablation and cytotoxicity of released free DOX.", "title": "" }, { "docid": "8ffdaf468a79e0bde22e9005c7cb18fd", "text": "A method is introduced for designing bandpass frequency-selective surfaces (FSSs) using arrays of antenna-filter-antenna (AFA) modules. An AFA module is a filter with radiation ports, which is obtained by integrating two antennas and a nonradiating resonant structure in between. AFA modules are designed based on circuit models and microwave filter design techniques. Three types of these AFA modules are designed using microstrip antennas and coplanar-waveguide resonators, and are used to form FSSs with three- and four-pole shaped bandpass response at 35 GHz. FSS structures are formed by arraying these modules in a periodic grid with an optimal cell size. The proposed concept and the design method are validated using numerical simulation (finite-element method), as well as experimental results.", "title": "" }, { "docid": "a69220d5cf0145eb6e2e8b13252e6eea", "text": "Database benchmarks are an important tool for database researchers and practitioners that ease the process of making informed comparisons between different database hardware, software and configurations. Large scale web services such as social networks are a major and growing database application area, but currently there are few benchmarks that accurately model web service workloads.\n In this paper we present a new synthetic benchmark called LinkBench. LinkBench is based on traces from production databases that store \"social graph\" data at Facebook, a major social network. We characterize the data and query workload in many dimensions, and use the insights gained to construct a realistic synthetic benchmark. LinkBench provides a realistic and challenging test for persistent storage of social and web service data, filling a gap in the available tools for researchers, developers and administrators.", "title": "" }, { "docid": "0a2cba5e6d5b6b467e34e79ee099f509", "text": "Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health-related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly accepted real-or-random model, as well as using the popular formal security verification tool, known as the Automated validation of Internet security protocols and applications. Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.", "title": "" }, { "docid": "328db3cbbf53bd26ea8b1cb8d1c197be", "text": "BACKGROUND\nNarcolepsy with cataplexy is associated with a loss of orexin/hypocretin. It is speculated that an autoimmune process kills the orexin-producing neurons, but these cells may survive yet fail to produce orexin.\n\n\nOBJECTIVE\nTo examine whether other markers of the orexin neurons are lost in narcolepsy with cataplexy.\n\n\nMETHODS\nWe used immunohistochemistry and in situ hybridization to examine the expression of orexin, neuronal activity-regulated pentraxin (NARP), and prodynorphin in hypothalami from five control and two narcoleptic individuals.\n\n\nRESULTS\nIn the control hypothalami, at least 80% of the orexin-producing neurons also contained prodynorphin mRNA and NARP. In the patients with narcolepsy, the number of cells producing these markers was reduced to about 5 to 10% of normal.\n\n\nCONCLUSIONS\nNarcolepsy with cataplexy is likely caused by a loss of the orexin-producing neurons. In addition, loss of dynorphin and neuronal activity-regulated pentraxin may contribute to the symptoms of narcolepsy.", "title": "" }, { "docid": "6d2e7ce04b96a98cc2828dc33c111bd1", "text": "This study explores how customer relationship management (CRM) systems support customer knowledge creation processes [48], including socialization, externalization, combination and internalization. CRM systems are categorized as collaborative, operational and analytical. An analysis of CRM applications in three organizations reveals that analytical systems strongly support the combination process. Collaborative systems provide the greatest support for externalization. Operational systems facilitate socialization with customers, while collaborative systems are used for socialization within an organization. Collaborative and analytical systems both support the internalization process by providing learning opportunities. Three-way interactions among CRM systems, types of customer knowledge, and knowledge creation processes are explored. 2013 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "be311c7a047a18fbddbab120aa97a374", "text": "This paper presents a novel mechatronics master-slave setup for hand telerehabilitation. The system consists of a sensorized glove acting as a remote master and a powered hand exoskeleton acting as a slave. The proposed architecture presents three main innovative solutions. First, it provides the therapist with an intuitive interface (a sensorized wearable glove) for conducting the rehabilitation exercises. Second, the patient can benefit from a robot-aided physical rehabilitation in which the slave hand robotic exoskeleton can provide an effective treatment outside the clinical environment without the physical presence of the therapist. Third, the mechatronics setup is integrated with a sensorized object, which allows for the execution of manipulation exercises and the recording of patient's improvements. In this paper, we also present the results of the experimental characterization carried out to verify the system usability of the proposed architecture with healthy volunteers.", "title": "" }, { "docid": "3361e6c7a448e69a73e8b3e879815386", "text": "The neck is not only the first anatomical area to show aging but also contributes to the persona of the individual. The understanding the aging process of the neck is essential for neck rejuvenation. Multiple neck rejuvenation techniques have been reported in the literature. In 1974, Skoog [1] described the anatomy of the superficial musculoaponeurotic system (SMAS) and its role in the aging of the neck. Recently, many patients have expressed interest in minimally invasive surgery with a low risk of complications and short recovery period. The use of thread for neck rejuvenation and the concept of the suture suspension neck lift have become widespread as a convenient and effective procedure; nevertheless, complications have also been reported such as recurrence, inadequate correction, and palpability of the sutures. In this study, we analyzed a new type of thread lift: elastic lift that uses elastic thread (Elasticum; Korpo SRL, Genova, Italy). We already use this new technique for the midface lift and can confirm its efficacy and safety in that context. The purpose of this study was to evaluate the outcomes and safety of the elastic lift technique for neck region lifting.", "title": "" }, { "docid": "5fe5cfd499144d07bff394d41d9ef713", "text": "Securing the sensitive data stored and accessed from mobile devices makes user authentication a problem of paramount importance. The tension between security and usability renders however the task of user authentication on mobile devices a challenging task. This paper introduces FAST (Fingergestures Authentication System using Touchscreen), a novel touchscreen based authentication approach on mobile devices. Besides extracting touch data from touchscreen equipped smartphones, FAST complements and validates this data using a digital sensor glove that we have built using off-the-shelf components. FAST leverages state-of-the-art classification algorithms to provide transparent and continuous mobile system protection. A notable feature is FAST 's continuous, user transparent post-login authentication. We use touch data collected from 40 users to show that FAST achieves a False Accept Rate (FAR) of 4.66% and False Reject Rate of 0.13% for the continuous post-login user authentication. The low FAR and FRR values indicate that FAST provides excellent post-login access security, without disturbing the honest mobile users.", "title": "" }, { "docid": "f95f77f81f5a4838f9f3fa2538e9d132", "text": "Learning analytics tools should be useful, i.e., they should be usable and provide the functionality for reaching the goals attributed to learning analytics. This paper seeks to unite learning analytics and action research. Based on this, we investigate how the multitude of questions that arise during technology-enhanced teaching and learning systematically can be mapped to sets of indicators. We examine, which questions are not yet supported and propose concepts of indicators that have a high potential of positively influencing teachers' didactical considerations. Our investigation shows that many questions of teachers cannot be answered with currently available research tools. Furthermore, few learning analytics studies report about measuring impact. We describe which effects learning analytics should have on teaching and discuss how this could be evaluated.", "title": "" }, { "docid": "9e065776a9f4283a6eb74e315c36a4b4", "text": "We introduce a new family of positive-definite kernels for large margin classification in support vector machines (SVMs). These kernels mimic the computation in large neural networks with one layer of hidden units. We also show how to derive new kernels, by recursive composition, that may be viewed as mapping their inputs through a series of nonlinear feature spaces. These recursively derived kernels mimic the computation in deep networks with multiple hidden layers. We evaluate SVMs with these kernels on problems designed to illustrate the advantages of deep architectures. Compared to previous benchmarks, we find that on some problems, these SVMs yield state-of-the-art results, beating not only other SVMs but also deep belief nets.", "title": "" }, { "docid": "0a790469194c1984ae2175d9ea49688c", "text": "Gynecomastia refers to a benign enlargement of the male breast. This article describes the authors’ method of using power-assisted liposuction and gland removal through a subareolar incision for thin patients. Power-assisted liposuction is performed for removal of fatty breast tissue in the chest area to allow skin retraction. The subareolar incision is used to remove glandular tissue from a male subject considered to be within a normal weight range but who has bilateral grade 1 or 2 gynecomastia. Gynecomastia correction was successfully performed for all the patients. The average volume of aspirated fat breast was 100–200 ml on each side. Each breast had 5–80 g of breast tissue removed. At the 3-month, 6-month, and 1-year follow-up assessments, all the treated patients were satisfied with their aesthetic results. Liposuction has the advantages of reducing the fat tissue where necessary to allow skin retraction and of reducing the traces left by surgery. The combination of surgical excision and power-assisted lipoplasty also is a valid choice for the treatment of thin patients.", "title": "" } ]
scidocsrr
d19dc9b2abf64f0c5c9c24359b6226dd
The 5G candidate waveform race: a comparison of complexity and performance
[ { "docid": "d23fc72c7fb3cbbc9120d2ab9fc14e75", "text": "Generalized frequency division multiplexing (GFDM) is a new concept that can be seen as a generalization of traditional OFDM. The scheme is based on the filtered multi-carrier approach and can offer an increased flexibility, which will play a significant role in future cellular applications. In this paper we present the benefits of the pulse shaped carriers in GFDM. We show that based on the FFT/IFFT algorithm, the scheme can be implemented with reasonable computational effort. Further, to be able to relate the results to the recent LTE standard, we present a suitable set of parameters for GFDM.", "title": "" } ]
[ { "docid": "427ce3159bf598c306645a5b9e670c95", "text": "In recent years, microblogging platforms have become good places to spread various spams, making the problem of gauging information credibility on social networks receive considerable attention especially under an emergency situation. Unlike previous studies on detecting rumors using tweets' inherent attributes generally, in this work, we shift the premise and focus on identifying event rumors on Weibo by extracting features from crowd responses that are texts of retweets (reposting tweets) and comments under a certain social event. Firstly the paper proposes a method of collecting theme data, including a sample set of tweets which have been confirmed to be false rumors based on information from the official rumor-busting service provided by Weibo. Secondly clustering analysis of tweets are made to examine the text features extracted from retweets and comments, and a classifier is trained based on observed feature distribution to automatically judge rumors from a mixed set of valid news and false information. The experiments show that the new features we propose are indeed effective in the classification, and especially some stop words and punctuations which are treated as noises in previous works can play an important role in rumor detection. To the best of our knowledge, this work is the first to detect rumors in Chinese via crowd responses under an emergency situation.", "title": "" }, { "docid": "62b103e6316c82f51e5c8da090dd19a9", "text": "Data visualization systems have predominantly been developed for WIMP-based direct manipulation interfaces. Only recently have other forms of interaction begun to appear, such as natural language or touch-based interaction, though usually operating only independently. Prior evaluations of natural language interfaces for visualization have indicated potential value in combining direct manipulation and natural language as complementary interaction techniques. We hypothesize that truly multimodal interfaces for visualization, those providing users with freedom of expression via both natural language and touch-based direct manipulation input, may provide an effective and engaging user experience. Unfortunately, however, little work has been done in exploring such multimodal visualization interfaces. To address this gap, we have created an architecture and a prototype visualization system called Orko that facilitates both natural language and direct manipulation input. Specifically, Orko focuses on the domain of network visualization, one that has largely relied on WIMP-based interfaces and direct manipulation interaction, and has little or no prior research exploring natural language interaction. We report results from an initial evaluation study of Orko, and use our observations to discuss opportunities and challenges for future work in multimodal network visualization interfaces.", "title": "" }, { "docid": "383b029f9c10186a163f48c01e1ef857", "text": "Neuroscience has focused on the detailed implementation of computation, studying neural codes, dynamics and circuits. In machine learning, however, artificial neural networks tend to eschew precisely designed codes, dynamics or circuits in favor of brute force optimization of a cost function, often using simple and relatively uniform initial architectures. Two recent developments have emerged within machine learning that create an opportunity to connect these seemingly divergent perspectives. First, structured architectures are used, including dedicated systems for attention, recursion and various forms of short- and long-term memory storage. Second, cost functions and training procedures have become more complex and are varied across layers and over time. Here we think about the brain in terms of these ideas. We hypothesize that (1) the brain optimizes cost functions, (2) the cost functions are diverse and differ across brain locations and over development, and (3) optimization operates within a pre-structured architecture matched to the computational problems posed by behavior. In support of these hypotheses, we argue that a range of implementations of credit assignment through multiple layers of neurons are compatible with our current knowledge of neural circuitry, and that the brain's specialized systems can be interpreted as enabling efficient optimization for specific problem classes. Such a heterogeneously optimized system, enabled by a series of interacting cost functions, serves to make learning data-efficient and precisely targeted to the needs of the organism. We suggest directions by which neuroscience could seek to refine and test these hypotheses.", "title": "" }, { "docid": "3bbbdf4d6572e548106fc1d24b50cbc6", "text": "Predicting the a↵ective valence of unknown multiword expressions is key for concept-level sentiment analysis. A↵ectiveSpace 2 is a vector space model, built by means of random projection, that allows for reasoning by analogy on natural language concepts. By reducing the dimensionality of a↵ective common-sense knowledge, the model allows semantic features associated with concepts to be generalized and, hence, allows concepts to be intuitively clustered according to their semantic and a↵ective relatedness. Such an a↵ective intuition (so called because it does not rely on explicit features, but rather on implicit analogies) enables the inference of emotions and polarity conveyed by multi-word expressions, thus achieving e cient concept-level sentiment analysis.", "title": "" }, { "docid": "4c759cf07b0a8fd28c88e3962cae33b1", "text": "Advances in computer science prompt the creation of new economic models. One of them in urban life is Sharing Economy. This new economic model receives high attentions and has been applied to a wide range of fields in recent years. We argue that sharing economy, and its applications, may be taken as a way for researchers to understand human behavior, and thus this paper targets a growing issue on the relationship between sharing economy and its impacts on human behavior. It especially looks at the change of behaviors while the sharing economy comes into our daily lives. The Airbnb, one of the most significant examples of sharing economy, is taken as a starting point of this survey, and results are revealed that young generation tends to accept this new economic experience as well as willing to be involved, not only as traveler but host, in this new phenomenon.", "title": "" }, { "docid": "61096a0d1e94bb83f7bd067b06d69edd", "text": "A main puzzle of deep neural networks (DNNs) revolves around the apparent absence of “overfitting”, defined in this paper as follows: the expected error does not get worse when increasing the number of neurons or of iterations of gradient descent. This is surprising because of the large capacity demonstrated by DNNs to fit randomly labeled data and the absence of explicit regularization. Recent results by Srebro et al. provide a satisfying solution of the puzzle for linear networks used in binary classification. They prove that minimization of loss functions such as the logistic, the cross-entropy and the exp-loss yields asymptotic, “slow” convergence to the maximum margin solution for linearly separable datasets, independently of the initial conditions. Here we prove a similar result for nonlinear multilayer DNNs near zero minima of the empirical loss. The result holds for exponential-type losses but not for the square loss. In particular, we prove that the normalized weight matrix at each layer of a deep network converges to a minimum norm solution (in the separable case). Our analysis of the dynamical system corresponding to gradient descent of a multilayer network suggests a simple criterion for predicting the generalization performance of different zero minimizers of the empirical loss. This material is based upon work supported by the Center for Brains, Minds and Machines (CBMM), funded by NSF STC award CCF-1231216. ar X iv :1 80 6. 11 37 9v 1 [ cs .L G ] 2 9 Ju n 20 18 Theory IIIb: Generalization in Deep Networks Tomaso Poggio ∗1, Qianli Liao1, Brando Miranda1, Andrzej Banburski1, Xavier Boix1, and Jack Hidary2 1Center for Brains, Minds and Machines, MIT 2Alphabet (Google) X", "title": "" }, { "docid": "0a9bfd72a12dcddfd27d982c8b27b9d5", "text": "A novel concept of a series feeding network of a microstrip antenna array has been shown. The proposed feeding network utilizes a four-port slot coupler as a three-way power divider, which is composed of two microstrip lines appropriately coupled through a slot within a common ground plane. The proposed power divider is used for simultaneous power distribution between two consecutive linear subarrays and between two 4 × 1 linear arrays constituting a single 8 × 1 linear subarray, where equal-amplitude and out-of-phase signals are required. Such a solution allows for realization of antenna arrays, in which all linear subarrays designed with the use of the “through-element” series feeding technique are fed at their centers from single transmission lines. The theoretical analysis as well as measurement results of the 8 × 8 antenna array operating within 10.5-GHz frequency range are shown.", "title": "" }, { "docid": "b7a3a7af3495d0a722040201f5fadd55", "text": "During the last decade, biodegradable metallic stents have been developed and investigated as alternatives for the currently-used permanent cardiovascular stents. Degradable metallic materials could potentially replace corrosion-resistant metals currently used for stent application as it has been shown that the role of stenting is temporary and limited to a period of 6-12 months after implantation during which arterial remodeling and healing occur. Although corrosion is generally considered as a failure in metallurgy, the corrodibility of certain metals can be an advantage for their application as degradable implants. The candidate materials for such application should have mechanical properties ideally close to those of 316L stainless steel which is the gold standard material for stent application in order to provide mechanical support to diseased arteries. Non-toxicity of the metal itself and its degradation products is another requirement as the material is absorbed by blood and cells. Based on the mentioned requirements, iron-based and magnesium-based alloys have been the investigated candidates for biodegradable stents. This article reviews the recent developments in the design and evaluation of metallic materials for biodegradable stents. It also introduces the new metallurgical processes which could be applied for the production of metallic biodegradable stents and their effect on the properties of the produced metals.", "title": "" }, { "docid": "6f4fe7bc805c4b635d6c201d8ea1f53c", "text": "In this paper we focus on the automatic identification of bird species from their audio recorded song. Bird monitoring is important to perform several tasks, such as to evaluate the quality of their living environment or to monitor dangerous situations to planes caused by birds near airports. We deal with the bird species identification problem using signal processing and machine learning techniques. First, features are extracted from the bird recorded songs using specific audio treatment, next the problem is performed according to a classical machine learning scenario, where a labeled database of previously known bird songs are employed to create a decision procedure that is used to predict the species of a new bird song. Experiments are conducted in a dataset of recorded songs of bird species which appear in a specific region. The experimental results compare the performance obtained in different situations, encompassing the complete audio signals, as recorded in the field, and short audio segments (pulses) obtained from the signals by a split procedure. The influence of the number of classes (bird species) in the identification accuracy is also evaluated.", "title": "" }, { "docid": "0b70a4a44a26ff9218224727fbba823c", "text": "Recently, DNN model compression based on network architecture design, e.g., SqueezeNet, attracted a lot attention. No accuracy drop on image classification is observed on these extremely compact networks, compared to well-known models. An emerging question, however, is whether these model compression techniques hurt DNNs learning ability other than classifying images on a single dataset. Our preliminary experiment shows that these compression methods could degrade domain adaptation (DA) ability, though the classification performance is preserved. Therefore, we propose a new compact network architecture and unsupervised DA method in this paper. The DNN is built on a new basic module Conv-M which provides more diverse feature extractors without significantly increasing parameters. The unified framework of our DA method will simultaneously learn invariance across domains, reduce divergence of feature representations, and adapt label prediction. Our DNN has 4.1M parameters, which is only 6.7% of AlexNet or 59% of GoogLeNet. Experiments show that our DNN obtains GoogLeNet-level accuracy both on classification and DA, and our DA method slightly outperforms previous competitive ones. Put all together, our DA strategy based on our DNN achieves state-of-the-art on sixteen of total eighteen DA tasks on popular Office-31 and Office-Caltech datasets.", "title": "" }, { "docid": "e08fc04b3ea61e9ffb88865caae6bb96", "text": "The online medium has become a significant way that people express their opinions online. Sentiment analysis can be used to find out the polarity of an opinion, such as positive, negative, or neutral. Sentiment analysis has applications such as companies getting their customer's opinions on their products, political sentiment analysis, or opinions on movie reviews. Recent research has involved looking at text from online blogs, tweets, online movie reviews, etc. to try and classify the text as being positive, negative, or neutral. For this research, a feedforward neural network will be experimented with for sentiment analysis of tweets. The training set of tweets are collected using the Twitter API using positive and negative keywords. The testing set of tweets are collected using the same positive and negative keywords.", "title": "" }, { "docid": "6467df0b918b3044a7dc4e11e924dbef", "text": "Advances in STR PCR DNA profiling technology allow for the analysis of minute quantities of DNA. It is frequently possible to obtain successful DNA results from cellular material transferred from the skin of an individual who has simply touched an object. Handling objects, such as weapons or other items associated with a crime, touching surfaces, or wearing clothing, may represent sufficient contact to transfer small numbers of DNA bearing cells, or trace DNA, which can be successfully analyzed. With this minimal amount of contact required to yield a suspect profile comes tremendous crime solving potential, and a number of considerations for prudent application, and the maximization of evidentiary value. Evidentiary materials not previously considered must be recognized and preserved, and the resulting DNA type profiles interpreted in their proper forensic context.", "title": "" }, { "docid": "515a1d01abc880c1b6f560ce5a10207d", "text": "We report on a compiler for Warp, a high-performance systolic array developed at Carnegie Mellon. This compiler enhances the usefulness of Warp significantly and allows application programmers to code substantial algorithms.\nThe compiler combines a novel programming model, which is based on a model of skewed computation for the array, with powerful optimization techniques. Programming in W2 (the language accepted by the compiler) is orders of magnitude easier than coding in microcode, the only alternative available previously.", "title": "" }, { "docid": "f33b73bf41e5253fb4b043a117fcd9e2", "text": "Traditional information systems return answers after a user submits a complete query. Users often feel \"left in the dark\" when they have limited knowledge about the underlying data, and have to use a try-and-see approach for finding information. A recent trend of supporting autocomplete in these systems is a first step towards solving this problem. In this paper, we study a new information-access paradigm, called \"interactive, fuzzy search,\" in which the system searches the underlying data \"on the fly\" as the user types in query keywords. It extends autocomplete interfaces by (1) allowing keywords to appear in multiple attributes (in an arbitrary order) of the underlying data; and (2) finding relevant records that have keywords matching query keywords approximately. This framework allows users to explore data as they type, even in the presence of minor errors. We study research challenges in this framework for large amounts of data. Since each keystroke of the user could invoke a query on the backend, we need efficient algorithms to process each query within milliseconds. We develop various incremental-search algorithms using previously computed and cached results in order to achieve an interactive speed. We have deployed several real prototypes using these techniques. One of them has been deployed to support interactive search on the UC Irvine people directory, which has been used regularly and well received by users due to its friendly interface and high efficiency.", "title": "" }, { "docid": "769ba1ac260f54ea64b83d34b97fc868", "text": "Truck platooning for which multiple trucks follow at a short distance is considered a near-term truck automation opportunity, with the potential to reduce fuel consumption. Short following distances and increasing automation make it hard for a driver to be the backup if the system fails. The EcoTwin consortium successfully demonstrated a two truck platooning system with trucks following at 20 meters distance at the public road, in which the driver is the backup. The ambition of the consortium is to increase the truck automation and to reduce the following distance, which requires a new fail-operational truck platooning architecture. This paper presents a level 2+ platooning system architecture, which is fail-operational for a single failure, and the corresponding process to obtain it. First insights in the existing two truck platooning system are obtained by analyzing its key aspects, being utilization, latency, reliability, and safety. Using these insights, candidate level 2+ platooning system architectures are defined from which the most suitable truck platooning architecture is selected. Future work is the design and implementation of a prototype, based on the presented level 2+ platooning system architecture.", "title": "" }, { "docid": "34dde046a67d74938e0729802a215361", "text": "can be found at: Small Group Research Additional services and information for http://sgr.sagepub.com/cgi/alerts Email Alerts: http://sgr.sagepub.com/subscriptions Subscriptions: http://www.sagepub.com/journalsReprints.nav Reprints: http://www.sagepub.com/journalsPermissions.nav Permissions: http://sgr.sagepub.com/cgi/content/refs/33/4/439 SAGE Journals Online and HighWire Press platforms): (this article cites 25 articles hosted on the Citations", "title": "" }, { "docid": "4d0522eed482d894b59cc7c3fed23d81", "text": "Extracting knowledge by performing computations on graphs is becoming increasingly challenging as graphs grow in size. A standard approach distributes the graph over a cluster of nodes, but performing computations on a distributed graph is expensive if large amount of data have to be moved. Without partitioning the graph, communication quickly becomes a limiting factor in scaling the system up. Existing graph partitioning heuristics incur high computation and communication cost on large graphs, sometimes as high as the future computation itself. Observing that the graph has to be loaded into the cluster, we ask if the partitioning can be done at the same time with a lightweight streaming algorithm.\n We propose natural, simple heuristics and compare their performance to hashing and METIS, a fast, offline heuristic. We show on a large collection of graph datasets that our heuristics are a significant improvement, with the best obtaining an average gain of 76%. The heuristics are scalable in the size of the graphs and the number of partitions. Using our streaming partitioning methods, we are able to speed up PageRank computations on Spark, a distributed computation system, by 18% to 39% for large social networks.", "title": "" }, { "docid": "bb542460bf9196ef1905cecdce252bf3", "text": "Wireless sensor nodes have many compelling applications such as smart buildings, medical implants, and surveillance systems. However, existing devices are bulky, measuring >;1cm3, and they are hampered by short lifetimes and fail to realize the “smart dust” vision of [1]. Smart dust requires a mm3-scale, wireless sensor node with perpetual energy harvesting. Recently two application-specific implantable microsystems [2][3] demonstrated the potential of a mm3-scale system in medical applications. However, [3] is not programmable and [2] lacks a method for re-programming or re-synchronizing once encapsulated. Other practical issues remain unaddressed, such as a means to protect the battery during the time period between system assembly and deployment and the need for flexible design to enable use in multiple application domains.", "title": "" }, { "docid": "a542b157e4be534997ce720329d2fea5", "text": "Microcavites contribute to enhancing the optical efficiency and color saturation of an organic light emitting diode (OLED) display. A major tradeoff of the strong cavity effect is its apparent color shift, especially for RGB-based OLED displays, due to their mismatched angular intensity distributions. To mitigate the color shift, in this work we first analyze the emission spectrum shifts and angular distributions for the OLEDs with strong and weak cavities, both theoretically and experimentally. Excellent agreement between simulation and measurement is obtained. Next, we propose a systematic approach for RGB-OLED displays based on multi-objective optimization algorithms. Three objectives, namely external quantum efficiency (EQE), color gamut coverage, and angular color shift of primary and mixed colors, can be optimized simultaneously. Our optimization algorithm is proven to be effective for suppressing color shift while keeping a relatively high optical efficiency and wide color gamut. © 2017 Optical Society of America under the terms of the OSA Open Access Publishing Agreement OCIS codes: (140.3948) Microcavity devices; (160.4890) Organic materials; (230.3670) Light-emitting diodes;", "title": "" }, { "docid": "c0f5abdba3aa843f4419f59c92ed14ea", "text": "ROC and DET curves are often used in the field of person authentication to assess the quality of a model or even to compare several models. We argue in this paper that this measure can be misleading as it compares performance measures that cannot be reached simultaneously by all systems. We propose instead new curves, called Expected Performance Curves (EPC). These curves enable the comparison between several systems according to a criterion, decided by the application, which is used to set thresholds according to a separate validation set. A free sofware is available to compute these curves. A real case study is used throughout the paper to illustrate it. Finally, note that while this study was done on an authentication problem, it also applies to most 2-class classification tasks.", "title": "" } ]
scidocsrr
44092962c3b11976b9292d8adadacfaf
Survey and evaluation of food recommendation systems and techniques
[ { "docid": "e2a1ff393ad57ebaa9f3631e7910bab6", "text": "We apply principles and techniques of recommendation systems to develop a predictive model of customers’ restaurant ratings. Using Yelp’s dataset, we extract collaborative and content based features to identify customer and restaurant profiles. In particular, we implement singular value decomposition, hybrid cascade of K-nearest neighbor clustering, weighted bi-partite graph projection, and several other learning algorithms. Using Root metrics Mean Squared Error and Mean Absolute Error, we then evaluate and compare the algorithms’ performances.", "title": "" }, { "docid": "2aa298d65ad723f7c89597165c563587", "text": "Recommender systems are needed to find food items of one’s interest. We review recommender systems and recommendation methods. We propose a food personalization framework based on adaptive hypermedia. We extend Hermes framework with food recommendation functionality. We combine TF-IDF term extraction method with cosine similarity measure. Healthy heuristics and standard food database are incorporated into the knowledgebase. Based on the performed evaluation, we conclude that semantic recommender systems in general outperform traditional recommenders systems with respect to accuracy, precision, and recall, and that the proposed recommender has a better F-measure than existing semantic recommenders.", "title": "" } ]
[ { "docid": "db1f678587259ccc036182a5297e6f94", "text": "There is a growing recognition of the role of the frontal lobes in the aetiology of severe behavioural aberrations. The authors describe a case of Oedipism in a patient who had MRI evidence of frontal lobe encephalomalacia. After discussing the function of the frontal lobes in modulating behaviour the authors suggest that the structural lesion seen on the MRI was in part responsible for the patient's self-destructive act. Treatment issues and the importance of recognizing underlying structural lesions in instances of extreme self-mutilation are discussed.", "title": "" }, { "docid": "57897a9c927743037dab98a1538a1563", "text": "Affective lexicons are a useful tool for emotion studies as well as for opinion mining and sentiment analysis. Such lexicons contain lists of words annotated with their emotional assessments. There exist a number of affective lexicons for English, Spanish, German and other languages. However, only a few of such resources are available for French. A lot of human efforts are needed to build and extend an affective lexicon. In our research, we propose to use Twitter, the most popular microblogging platform nowadays, to collect a dataset of emotional texts in French. Using the collected dataset, we estimated affective norms of words to construct an affective lexicon, which we use for polarity classification of video game reviews. Experimental results show that our method performs comparably to classic supervised learning methods.", "title": "" }, { "docid": "6c07520a738f068f1bc3bdb8e3fda89b", "text": "We analyze the role of the Global Brain in the sharing economy, by synthesizing the notion of distributed intelligence with Goertzel’s concept of an offer network. An offer network is an architecture for a future economic system based on the matching of offers and demands without the intermediate of money. Intelligence requires a network of condition-action rules, where conditions represent challenges that elicit action in order to solve a problem or exploit an opportunity. In society, opportunities correspond to offers of goods or services, problems to demands. Tackling challenges means finding the best sequences of condition-action rules to connect all demands to the offers that can satisfy them. This can be achieved with the help of AI algorithms working on a public database of rules, demands and offers. Such a system would provide a universal medium for voluntary collaboration and economic exchange, efficiently coordinating the activities of all people on Earth. It would replace and subsume the patchwork of commercial and community-based sharing platforms presently running on the Internet. It can in principle resolve the traditional problems of the capitalist economy: poverty, inequality, externalities, poor sustainability and resilience, booms and busts, and the neglect of non-monetizable values.", "title": "" }, { "docid": "c9dca9b27abe9ebabeff7c7e3814dcae", "text": "The Internet of Things (IoT) can be defined as an environment where internet capabilities are applied to everyday objects that have earlier not been considered as computers to provide a network connectivity that will enable these objects to generate, exchange and consume data. According to a forecast given by the Ericsson Mobility report issued in June 2016, there will be as many as 16 billion connected devices that will get Internet of Things (IoT) technology-enabled by 2021. Apart from having its uses in personal well-being and comfort, IoT will be a key factor in the planning of smart cities specially in the time when governments are focussed on the development of smart cities. This technology can be implemented not just for communication networks but also for sanitation, transportation, healthcare, energy use and much more.", "title": "" }, { "docid": "23a9e62d26a54c321e67cbb8bdea2b16", "text": "An autonomous vehicle following system including control approaches is presented in this paper. An existing robotic driver is used to control a standard passenger vehicle such that no modifications to the car are necessary. Only information about the relative position of the lead vehicle and the motion of the following vehicle is required, and methods are presented to construct a reference trajectory to enable accurate following. A laser scanner is used to detect the lead vehicle and the following vehicle’s ego-motion is sensed using an IMU and wheel encoder. An algorithm was developed and tested to locate the lead vehicle with RMS position and orientation errors of 65mm and 5.8◦ respectively. Several trajectory-based lateral controllers were tested in simulation and then experimentally, with the best controller having an RMS lateral deviation of 37cm from the path of the lead vehicle. A new trajectorybased spacing controller was tested in simulation which allows the following vehicle to reproduce the velocity of the lead vehicle.", "title": "" }, { "docid": "47ea90e34fc95a941bc127ad8ccd2ca9", "text": "The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time. In practice, timely dealing with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions—this in essence defines cyber threat intelligence notion. However, such an intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyse, and interpret cyber attack evidences. In this introductory chapter we first discuss the notion of cyber threat intelligence and its main challenges and opportunities, and then briefly introduce the chapters of the book which either address the identified challenges or present opportunistic solutions to provide threat intelligence.", "title": "" }, { "docid": "5a525ccce94c64cd8b2d8cf9125a7802", "text": "and others at both organizations for their support and valuable input. Special thanks to Grey Advertising's Ben Arno who suggested the term brand resonance. Additional thanks to workshop participants at Duke University and Dartmouth College. MSI was established in 1961 as a not-for profit institute with the goal of bringing together business leaders and academics to create knowledge that will improve business performance. The primary mission was to provide intellectual leadership in marketing and its allied fields. Over the years, MSI's global network of scholars from leading graduate schools of management and thought leaders from sponsoring corporations has expanded to encompass multiple business functions and disciplines. Issues of key importance to business performance are identified by the Board of Trustees, which represents MSI corporations and the academic community. MSI supports studies by academics on these issues and disseminates the results through conferences and workshops, as well as through its publications series. This report, prepared with the support of MSI, is being sent to you for your information and review. It is not to be reproduced or published, in any form or by any means, electronic or mechanical, without written permission from the Institute and the author. Building a strong brand has been shown to provide numerous financial rewards to firms, and has become a top priority for many organizations. In this report, author Keller outlines the Customer-Based Brand Equity (CBBE) model to assist management in their brand-building efforts. According to the model, building a strong brand involves four steps: (1) establishing the proper brand identity, that is, establishing breadth and depth of brand awareness, (2) creating the appropriate brand meaning through strong, favorable, and unique brand associations, (3) eliciting positive, accessible brand responses, and (4) forging brand relationships with customers that are characterized by intense, active loyalty. Achieving these four steps, in turn, involves establishing six brand-building blocks—brand salience, brand performance, brand imagery, brand judgments, brand feelings, and brand resonance. The most valuable brand-building block, brand resonance, occurs when all the other brand-building blocks are established. With true brand resonance, customers express a high degree of loyalty to the brand such that they actively seek means to interact with the brand and share their experiences with others. Firms that are able to achieve brand resonance should reap a host of benefits, for example, greater price premiums and more efficient and effective marketing programs. The CBBE model provides a yardstick by …", "title": "" }, { "docid": "913b84b1afc5f34eb107d9717529bf53", "text": "With the rapid development of the peer-to-peer lending industry in China, it has been a crucial task to evaluate the default risk of each loan. Motivated by the research in natural language processing, we make use of the online operation behavior data of borrowers and propose a consumer credit scoring method based on attention mechanism LSTM, which is a novel application of deep learning algorithm. Inspired by the idea of Word2vec, we treat each type of event as a word, construct the Event2vec model to convert each type of event transformation into a vector and, then, use an attention mechanism LSTM network to predict the probability of user default. The method is evaluated on the real dataset, and the results show that the proposed solution can effectively increase the predictive accuracy compared with the traditional artificial feature extraction method and the standard LSTM model.", "title": "" }, { "docid": "e831e47d09429ef0838366ffb07ed353", "text": "This paper studies the effects of boosting in the context of different classification methods for text categorization, including Decision Trees, Naive Bayes, Support Vector Machines (SVMs) and a Rocchio-style classifier. We identify the inductive biases of each classifier and explore how boosting, as an error-driven resampling mechanism, reacts to those biases. Our experiments on the Reuters-21578 benchmark show that boosting is not effective in improving the performance of the base classifiers on common categories. However, the effect of boosting for rare categories varies across classifiers: for SVMs and Decision Trees, we achieved a 13-17% performance improvement in macro-averaged F1 measure, but did not obtain substantial improvement for the other two classifiers. This interesting finding of boosting on rare categories has not been reported before.", "title": "" }, { "docid": "2542d745b0ed5c3501db4aaf8e3cc528", "text": "We present discriminative Gaifman models, a novel family of relational machine learning models. Gaifman models learn feature representations bottom up from representations of locally connected and bounded-size regions of knowledge bases (KBs). Considering local and bounded-size neighborhoods of knowledge bases renders logical inference and learning tractable, mitigates the problem of overfitting, and facilitates weight sharing. Gaifman models sample neighborhoods of knowledge bases so as to make the learned relational models more robust to missing objects and relations which is a common situation in open-world KBs. We present the core ideas of Gaifman models and apply them to large-scale relational learning problems. We also discuss the ways in which Gaifman models relate to some existing relational machine learning approaches.", "title": "" }, { "docid": "f795ba59b0c2c81953b94ac981ee0b57", "text": "The Digital Beamforming Synthetic Aperture Radar (DBSAR) is a state-of-the-art L-band radar that employs advanced radar technology and a customized data acquisition and real-time processor in order to enable multimode measurement techniques in a single radar platform. DBSAR serves as a test bed for the development, implementation, and testing of digital beamforming radar techniques applicable to Earth science and planetary measurements. DBSAR flew its first field campaign on board the National Aeronautics and Space Administration P3 aircraft in October 2008, demonstrating enabling techniques for scatterometry, synthetic aperture, and altimetry.", "title": "" }, { "docid": "609997fbec79d71daa7c63e6fbbc6cc4", "text": "Memory encoding occurs rapidly, but the consolidation of memory in the neocortex has long been held to be a more gradual process. We now report, however, that systems consolidation can occur extremely quickly if an associative \"schema\" into which new information is incorporated has previously been created. In experiments using a hippocampal-dependent paired-associate task for rats, the memory of flavor-place associations became persistent over time as a putative neocortical schema gradually developed. New traces, trained for only one trial, then became assimilated and rapidly hippocampal-independent. Schemas also played a causal role in the creation of lasting associative memory representations during one-trial learning. The concept of neocortical schemas may unite psychological accounts of knowledge structures with neurobiological theories of systems memory consolidation.", "title": "" }, { "docid": "6a4844bf755830d14fb24caff1aa8442", "text": "We present a stochastic first-order optimization algorithm, named BCSC, that adds a cyclic constraint to stochastic block-coordinate descent. It uses different subsets of the data to update different subsets of the parameters, thus limiting the detrimental effect of outliers in the training set. Empirical tests in benchmark datasets show that our algorithm outperforms state-of-the-art optimization methods in both accuracy as well as convergence speed. The improvements are consistent across different architectures, and can be combined with other training techniques and regularization methods.", "title": "" }, { "docid": "022487e0851506af02cc2a73675b3532", "text": "Communicators tend to share more stereotype-consistent than stereotype-inconsistent information. The authors propose and test a situated functional model of this stereotype consistency bias: stereotype-consistent and inconsistent information differentially serve 2 central functions of communication--sharing information and regulating relationships; depending on the communication context, information seen to serve these different functions better is more likely communicated. Results showed that stereotype-consistent information is perceived as more socially connective but less informative than inconsistent information, and when the stereotype is perceived to be highly shared in the community, more stereotype-consistent than inconsistent information is communicated due to its greater social connectivity function. These results highlight the need to examine communication as a dynamic and situated social activity.", "title": "" }, { "docid": "9a00d5d6585cb766be0459bbdb76a612", "text": "Nature within cities will have a central role in helping address key global public health challenges associated with urbanization. However, there is almost no guidance on how much or how frequently people need to engage with nature, and what types or characteristics of nature need to be incorporated in cities for the best health outcomes. Here we use a nature dose framework to examine the associations between the duration, frequency and intensity of exposure to nature and health in an urban population. We show that people who made long visits to green spaces had lower rates of depression and high blood pressure, and those who visited more frequently had greater social cohesion. Higher levels of physical activity were linked to both duration and frequency of green space visits. A dose-response analysis for depression and high blood pressure suggest that visits to outdoor green spaces of 30 minutes or more during the course of a week could reduce the population prevalence of these illnesses by up to 7% and 9% respectively. Given that the societal costs of depression alone in Australia are estimated at AUD$12.6 billion per annum, savings to public health budgets across all health outcomes could be immense.", "title": "" }, { "docid": "94866e444039836c17c96434a9163517", "text": "Query suggestion refers to the process of suggesting related queries to search engine users. Most existing researches have focused on improving the relevance of suggested queries. In this paper, we introduce the concept of diversifying the content of the search results from suggested queries while keeping the suggestion relevant. Our framework first retrieves a set of query candidates from search engine logs using random walk and other techniques. We then re-rank the suggested queries by ranking them in the order which maximizes the diversification function that measures the difference between the original search results and the results from suggested queries. The diversification function we proposed includes features like ODP category, URL and domain similarity and so on. One important outcome from our research which contradicts with most existing researches is that, with the increase of suggestion relevance, the similarity between the queries actually decreases. Experiments are conducted on a large set of human-labeled data, which is randomly sampled from a commercial search engine's log. Results indicate that the post-ranking framework significantly improves the relevance of suggested queries by comparing to existing models.", "title": "" }, { "docid": "7a473f5c5c7369b5f5622e9ffc7c20c9", "text": "In this paper we develop a parallelized iris template matching implementation on inexpensive Graphics Processing Units (GPUs) with Nvidia's CUDA programming model to achieve matching rates of 44 million iris template comparisons per second without rotation invariance. With tolerance to head tilt, we achieve 4.2 million matches per second and compare our implementation to state of the art prior work performed on GPU and FPGA, emphasizing our improvements. Additionally a comparison to highly optimized CPU implementations of iris template matching is performed, showing a 14X speedup using our approach. In contrast to other published work, we develop an implementation for parallel iris template matching that incorporates iris code shifting for rotation invariance and provide timing data showing our proposed architecture is efficiently implemented, capitalizing on shared and texture memory to speedup the bit shifting process beyond current prior art.", "title": "" }, { "docid": "fb15c88052883b11a34d0911979c30a1", "text": "What explains patterns of compliance with and resistance to autocratic rule? This paper provides a theoretical framework for understanding how individuals living under dictatorship calibrate their political behaviors. I argue that the types of non-compliance observed in autocratic contexts differ depending on the intensity of expected punishment and the extent to which sanctions are directed at individuals, families or larger communities. Using data from documents captured by US forces during the 2003 invasion of Iraq, I use unanticipated political shocks to examine over-time discontinuities in citizen behavior in Iraq under Saddam Hussein during two distinct periods — before and after the First Gulf War and the associated Kurdish and Shi‘a anti-regime uprisings. Prior to 1991 and the establishment of a Kurdish autonomous zone in northern Iraq, severe repression and widespread use of collective punishment created the conditions for Iraqi Kurds to engage in a widespread anti-regime rebellion. Before 1991, Shi‘a Iraqis were able to express limited forms of political discontent; after 1991, however, Shi‘a were forced to publicly signal compliance while shifting to more private forms of anti-regime activity. While Iraqis living in and around Saddam Hussein’s hometown of Tikrit almost universally self-identified as Ba‘thists and enjoyed privileges as a result of close ties to the regime, Sunnis living in areas distant from Tikrit became increasingly estranged from the regime as international sanctions closed off economic opportunities. ∗Many thanks to the staff at the Library and Archives of the Hoover Institution and the W. Glenn Campbell and Rita Ricardo-Campbell National Fellows Program at the Hoover Institution.", "title": "" }, { "docid": "9e15118bd0317faee30c18e0710c8327", "text": "We aim at developing autonomous miniature hovering flying robots capable of navigating in unstructured GPSdenied environments. A major challenge is the miniaturization of the embedded sensors and processors allowing such platforms to fly autonomously. In this paper, we propose a novel ego-motion estimation algorithm for hovering robots equipped with inertial and optic-flow sensors that runs in realtime on a microcontroller. Unlike many vision-based methods, this algorithm does not rely on feature tracking, structure estimation, additional distance sensors or assumptions about the environment. Key to this method is the introduction of the translational optic-flow direction constraint (TOFDC), which does not use the optic-flow scale, but only its direction to correct for inertial sensor drift during changes of direction. This solution requires comparatively much simpler electronics and sensors and works in environments of any geometries. We demonstrate the implementation of this algorithm on a miniature 46g quadrotor for closed-loop position control.", "title": "" }, { "docid": "7e37b1db5510d0d90eef22a3275c3c9d", "text": "In the context of the wars between the upstart Internet retailers and the existing bricks-and-mortar retailers, many e-marketing techniques were invented. This article develops a single unifying and theoretically based taxonomy for e-marketing techniques: the e-marketing mix. Drawing on the paradigms of exchange, relationships, and digital interactions in networks, 11 e-marketing functions are identified that form the elements of the e-marketing mix. Nine of the 11 e-marketing functions are considered basic, while 7 functions moderate the effects of others and are termed overlapping. The 11 e-marketing functions provide a categorization of the e-marketing techniques. Compared to the conventional marketing mix, the e-marketing mix has more overlapping elements and directly represents personalization, an aspect of segmentation, as a basic function. The existence of multiple elements that are basic and overlapping in the e-marketing mix indicates that integration across elements should be more commonplace compared to the traditional marketing mix.", "title": "" } ]
scidocsrr
f56f899275cdcaa5153e3b9f16a78a0d
JAIST: Combining multiple features for Answer Selection in Community Question Answering
[ { "docid": "c3525081c0f4eec01069dd4bd5ef12ab", "text": "More than twelve years have elapsed since the first public release of WEKA. In that time, the software has been rewritten entirely from scratch, evolved substantially and now accompanies a text on data mining [35]. These days, WEKA enjoys widespread acceptance in both academia and business, has an active community, and has been downloaded more than 1.4 million times since being placed on Source-Forge in April 2000. This paper provides an introduction to the WEKA workbench, reviews the history of the project, and, in light of the recent 3.6 stable release, briefly discusses what has been added since the last stable version (Weka 3.4) released in 2003.", "title": "" }, { "docid": "cd45dd9d63c85bb0b23ccb4a8814a159", "text": "Parameter set learned using all WMT12 data (Callison-Burch et al., 2012): • 100,000 binary rankings covering 8 language directions. •Restrict scoring for all languages to exact and paraphrase matching. Parameters encode human preferences that generalize across languages: •Prefer recall over precision. •Prefer word choice over word order. •Prefer correct translations of content words over function words. •Prefer exact matches over paraphrase matches, while still giving significant credit to paraphrases. Visualization", "title": "" }, { "docid": "f2478e4b1156e112f84adbc24a649d04", "text": "Community Question Answering (cQA) provides new interesting research directions to the traditional Question Answering (QA) field, e.g., the exploitation of the interaction between users and the structure of related posts. In this context, we organized SemEval2015 Task 3 on Answer Selection in cQA, which included two subtasks: (a) classifying answers as good, bad, or potentially relevant with respect to the question, and (b) answering a YES/NO question with yes, no, or unsure, based on the list of all answers. We set subtask A for Arabic and English on two relatively different cQA domains, i.e., the Qatar Living website for English, and a Quran-related website for Arabic. We used crowdsourcing on Amazon Mechanical Turk to label a large English training dataset, which we released to the research community. Thirteen teams participated in the challenge with a total of 61 submissions: 24 primary and 37 contrastive. The best systems achieved an official score (macro-averaged F1) of 57.19 and 63.7 for the English subtasks A and B, and 78.55 for the Arabic subtask A.", "title": "" } ]
[ { "docid": "0e81057fffb454c912c8626721a43d85", "text": "Although scaffolding is an important and frequently studied concept, much discussion exists with regard to its conceptualizations, appearances, and effectiveness. Departing from the last decade’s scaffolding literature, this review scrutinizes these three areas of scaffolding. First, contingency, fading, and transfer of responsibility are discerned in this review as the three key characteristics of scaffolding. Second, an overview is presented of the numerous descriptive studies that provided narratives on the appearances of scaffolding and classifications of scaffolding strategies. These strategies are synthesized into a framework for analysis, distinguishing between scaffolding means and intentions. Third, the small number of effectiveness studies available is discussed and the results suggest that scaffolding is effective. However, more research is needed. The main challenge in scaffolding research appears to be its measurement. Based on the encountered and described measurement problems, suggestions for future research are made.", "title": "" }, { "docid": "6fa9cc1030bd87a626fac1cfc7696054", "text": "Frequently, the design of interactive systems focuses exclusively on the capabilities provided by the dynamic nature of computational media. Yet our experience includes many examples in which physical models provide certain strengths not found in computational models. Rather than viewing this as a dichotomy—where one must choose between one or the other—we are exploring the creation of computational environments that build on the strengths of combined physical and virtual approaches. Over the last decade, we have developed different design environments to support stakeholders engaged in design processes by enhancing communication, facilitating shared understanding, and creating better artifacts. Until a few years ago, our work explored physical and computational media separately. In this paper we present our efforts to develop integrated design environments linking physical and computational dimensions to attain the complementary synergies that these two worlds offer. Our purpose behind this integration is the development of systems that can enhance the movement from conceptual thinking to concrete representations using face-to-face interaction to promote the negotiation of meaning, the direct interaction with artifacts, and the possibility that diverse stakeholders can participate fully in the process of design. To this end, we analyze the strengths, affordances, weaknesses, and limitations of the two media used separately and illustrate with our most recent work the value added by integrating these environments.", "title": "" }, { "docid": "2af96909058f0323d60a9c2b3807690a", "text": "Minutiae point pattern matching is the most common approach for fingerprint verification. Although many minutiae point pattern matching algorithms have been proposed, reliable automatic fingerprint verification remains as a challenging problem, both with respect to recovering the optimal alignment and the construction of an adequate matching function. In this paper, we develop a memetic fingerprint matching algorithm (MFMA) which aims to identify the optimal or near optimal global matching between two minutiae sets. Within the MFMA, we first introduce an efficient matching operation to produce an initial population of local alignment configurations by examining local features of minutiae. Then, we devise a hybrid evolutionary procedure by combining the use of the global search functionality of a genetic algorithm with a local improvement operator to search for the optimal or near optimal global alignment. Finally, we define a reliable matching function for fitness computation. The proposed algorithm was evaluated by means of a series of experiments conducted on the FVC2002 database and compared with previous work. Experimental results confirm that the MFMA is an effective and practical matching algorithm for fingerprint verification. The algorithm is faster and more accurate than a traditional genetic-algorithm-based method. It is also more accurate than a number of other methods implemented for comparison, though our method generally requires more computational time in performing fingerprint matching.", "title": "" }, { "docid": "cab1d175b7976b6e941764c319a6c85d", "text": "Participants listened to randomly selected excerpts of popular music and rated how nostalgic each song made them feel. Nostalgia was stronger to the extent that a song was autobiographically salient, arousing, familiar, and elicited a greater number of positive, negative, and mixed emotions. These effects were moderated by individual differences (nostalgia proneness, mood state, dimensions of the Affective Neurosciences Personality Scale, and factors of the Big Five Inventory). Nostalgia proneness predicted stronger nostalgic experiences, even after controlling for other individual difference measures. Nostalgia proneness was predicted by the Sadness dimension of the Affective Neurosciences Personality Scale and Neuroticism of the Big Five Inventory. Nostalgia was associated with both joy and sadness, whereas nonnostalgic and nonautobiographical experiences were associated with irritation.", "title": "" }, { "docid": "1f2832276b346316b15fe05d8593217c", "text": "This paper presents a new method for generating inductive loop invariants that are expressible as boolean combinations of linear integer constraints. The key idea underlying our technique is to perform a backtracking search that combines Hoare-style verification condition generation with a logical abduction procedure based on quantifier elimination to speculate candidate invariants. Starting with true, our method iteratively strengthens loop invariants until they are inductive and strong enough to verify the program. A key feature of our technique is that it is lazy: It only infers those invariants that are necessary for verifying program correctness. Furthermore, our technique can infer arbitrary boolean combinations (including disjunctions) of linear invariants. We have implemented the proposed approach in a tool called HOLA. Our experiments demonstrate that HOLA can infer interesting invariants that are beyond the reach of existing state-of-the-art invariant generation tools.", "title": "" }, { "docid": "4933f3f3007dab687fc852e9c2b1ab0a", "text": "This paper presents a topology for bidirectional solid-state transformers with a minimal device count. The topology, referenced as dynamic-current or Dyna-C, has two current-source inverter stages with a high-frequency galvanic isolation, requiring 12 switches for four-quadrant three-phase ac/ac power conversion. The topology has voltage step-up/down capability, and the input and output can have arbitrary power factors and frequencies. Further, the Dyna-C can be configured as isolated power converters for single- or multiterminal dc, and single- or multiphase ac systems. The modular nature of the Dyna-C lends itself to be connected in series and/or parallel for high-voltage high-power applications. The proposed converter topology can find a broad range of applications such as isolated battery chargers, uninterruptible power supplies, renewable energy integration, smart grid, and power conversion for space-critical applications including aviation, locomotives, and ships. This paper outlines various configurations of the Dyna-C, as well as the relative operation and controls. The converter functionality is validated through simulations and experimental measurements of a 50-kVA prototype.", "title": "" }, { "docid": "0ff76204fcdf1a7cf2a6d13a5d3b1597", "text": "In this study, we found that the optimum take-off angle for a long jumper may be predicted by combining the equation for the range of a projectile in free flight with the measured relations between take-off speed, take-off height and take-off angle for the athlete. The prediction method was evaluated using video measurements of three experienced male long jumpers who performed maximum-effort jumps over a wide range of take-off angles. To produce low take-off angles the athletes used a long and fast run-up, whereas higher take-off angles were produced using a progressively shorter and slower run-up. For all three athletes, the take-off speed decreased and the take-off height increased as the athlete jumped with a higher take-off angle. The calculated optimum take-off angles were in good agreement with the athletes' competition take-off angles.", "title": "" }, { "docid": "8f930fc4f06f8b17e2826f0975af1fa1", "text": "Smart parking is a typical IoT application that can benefit from advances in sensor, actuator and RFID technologies to provide many services to its users and parking owners of a smart city. This paper considers a smart parking infrastructure where sensors are laid down on the parking spots to detect car presence and RFID readers are embedded into parking gates to identify cars and help in the billing of the smart parking. Both types of devices are endowed with wired and wireless communication capabilities for reporting to a gateway where the situation recognition is performed. The sensor devices are tasked to play one of the three roles: (1) slave sensor nodes located on the parking spot to detect car presence/absence; (2) master nodes located at one of the edges of a parking lot to detect presence and collect the sensor readings from the slave nodes; and (3) repeater sensor nodes, also called \"anchor\" nodes, located strategically at specific locations in the parking lot to increase the coverage and connectivity of the wireless sensor network. While slave and master nodes are placed based on geographic constraints, the optimal placement of the relay/anchor sensor nodes in smart parking is an important parameter upon which the cost and efficiency of the parking system depends. We formulate the optimal placement of sensors in smart parking as an integer linear programming multi-objective problem optimizing the sensor network engineering efficiency in terms of coverage and lifetime maximization, as well as its economic gain in terms of the number of sensors deployed for a specific coverage and lifetime. We propose an exact solution to the node placement problem using single-step and two-step solutions implemented in the Mosel language based on the Xpress-MPsuite of libraries. Experimental results reveal the relative efficiency of the single-step compared to the two-step model on different performance parameters. These results are consolidated by simulation results, which reveal that our solution outperforms a random placement in terms of both energy consumption, delay and throughput achieved by a smart parking network.", "title": "" }, { "docid": "f33147619ba2d24efcea9e32f70c7695", "text": "The wide use of micro bloggers such as Twitter offers a valuable and reliable source of information during natural disasters. The big volume of Twitter data calls for a scalable data management system whereas the semi-structured data analysis requires full-text searching function. As a result, it becomes challenging yet essential for disaster response agencies to take full advantage of social media data for decision making in a near-real-time fashion. In this work, we use Lucene to empower HBase with full-text searching ability to build a scalable social media data analytics system for observing and analyzing human behaviors during the Hurricane Sandy disaster. Experiments show the scalability and efficiency of the system. Furthermore, the discovery of communities has the benefit of identifying influential users and tracking the topical changes as the disaster unfolds. We develop a novel approach to discover communities in Twitter by applying spectral clustering algorithm to retweet graph. The topics and influential users of each community are also analyzed and demonstrated using Latent Semantic Indexing (LSI).", "title": "" }, { "docid": "4a57ca8bc92a11c044b3e40c1496932a", "text": "Recent times have witnessed an increase in use of high-performance reconfigurable computing for accelerating large-scale simulations. A characteristic of such simulations, like infrared (IR) scene simulation, is the use of large quantities of uncorrelated random numbers. It is therefore of interest to have a fast uniform random number generator implemented in reconfigurable hardware. While there have been previous attempts to accelerate the MT19937 pseudouniform random number generator using FPGAs we believe that we can substantially improve the previous implementations to develop a higher throughput and more areatime efficient design. Due to the potential for parallel implementation of random numbers generators, designs that have both a small area footprint and high throughput are to be preferred to ones that have the high throughput but with significant extra area requirements. In this paper, we first present a single port design and then present an enhanced 624 port hardware implementation of the MT19937 algorithm. The 624 port hardware implementation when implemented on a Xilinx XC2VP70-6 FPGA chip has a throughput of 119.6 × 10 32 bit random numbers per second which is more than 17x that of the previously best published uniform random number generator. Furthermore it has the lowest area time metric of all the currently published FPGA-based pseudouniform random number generators.", "title": "" }, { "docid": "5088c5e6880f8557fa37b824b7d91b28", "text": "Localization of sensor nodes is an important aspect in Wireless Sensor Networks (WSNs). This paper presents an overview of the major localization techniques for WSNs. These techniques are classified into centralized and distributed depending on where the computational effort is carried out. The paper concentrates on the factors that need to be considered when selecting a localization technique. The advantages and limitation of various techniques are also discussed. Finally, future research directions and challenges are highlighted.", "title": "" }, { "docid": "53ab46387cb1c04e193d2452c03a95ad", "text": "Real time control of five-axis machine tools requires smooth generation of feed, acceleration and jerk in CNC systems without violating the physical limits of the drives. This paper presents a feed scheduling algorithm for CNC systems to minimize the machining time for five-axis contour machining of sculptured surfaces. The variation of the feed along the five-axis tool-path is expressed in a cubic B-spline form. The velocity, acceleration and jerk limits of the five axes are considered in finding the most optimal feed along the toolpath in order to ensure smooth and linear operation of the servo drives with minimal tracking error. The time optimal feed motion is obtained by iteratively modulating the feed control points of the B-spline to maximize the feed along the tool-path without violating the programmed feed and the drives’ physical limits. Long tool-paths are handled efficiently by applying a moving window technique. The improvement in the productivity and linear operation of the five drives is demonstrated with five-axis simulations and experiments on a CNC machine tool. r 2008 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "8eb31344917df5420df8912cdd4966d1", "text": "This contribution presents a precise localization method for advanced driver assistance systems. A Maximally Stable Extremal Region (MSER) detector is used to extract bright areas, i.e. lane markings, from grayscale camera images. Furthermore, this algorithm is also used to extract features from a laser scanner grid map. These regions are automatically stored as landmarks in a geospatial data base during a map creation phase. A particle filter is then employed to perform the pose estimation. For the weight update of the filter the similarity between the set of online MSER detections and the set of mapped landmarks within the field of view is evaluated. Hereby, a two stage sensor fusion is carried out. First, in order to have a large field of view available, not only a forward facing camera but also a rearward facing camera is used and the detections from both sensors are fused. Secondly, the weight update also integrates the features detected from the laser grid map, which is created using measurements of three laser scanners. The performance of the proposed algorithm is evaluated on a 7 km long stretch of a rural road. The evaluation reveals that a relatively good position estimation and a very accurate orientation estimation (0.01 deg ± 0.22 deg) can be achieved using the presented localization method. In addition, an evaluation of the localization performance based only on each of the respective kinds of MSER features is provided in this contribution and compared to the combined approach.", "title": "" }, { "docid": "b1f000790b6ff45bd9b0b7ba3aec9cb2", "text": "Broad-scale destruction and fragmentation of native vegetation is a highly visible result of human land-use throughout the world (Chapter 4). From the Atlantic Forests of South America to the tropical forests of Southeast Asia, and in many other regions on Earth, much of the original vegetation now remains only as fragments amidst expanses of land committed to feeding and housing human beings. Destruction and fragmentation of habitats are major factors in the global decline of populations and species (Chapter 10), the modification of native plant and animal communities and the alteration of ecosystem processes (Chapter 3). Dealing with these changes is among the greatest challenges facing the “mission-orientated crisis discipline” of conservation biology (Soulé 1986; see Chapter 1). Habitat fragmentation, by definition, is the “breaking apart” of continuous habitat, such as tropical forest or semi-arid shrubland, into distinct pieces. When this occurs, three interrelated processes take place: a reduction in the total amount of the original vegetation (i.e. habitat loss); subdivision of the remaining vegetation into fragments, remnants or patches (i.e. habitat fragmentation); and introduction of new forms of land-use to replace vegetation that is lost. These three processes are closely intertwined such that it is often difficult to separate the relative effect of each on the species or community of concern. Indeed, many studies have not distinguished between these components, leading to concerns that “habitat fragmentation” is an ambiguous, or even meaningless, concept (Lindenmayer and Fischer 2006). Consequently, we use “landscape change” to refer to these combined processes and “habitat fragmentation” for issues directly associated with the subdivision of vegetation and its ecological consequences. This chapter begins by summarizing the conceptual approaches used to understand conservation in fragmented landscapes. We then examine the biophysical aspects of landscape change, and how such change affects species and communities, posing two main questions: (i) what are the implications for the patterns of occurrence of species and communities?; and (ii) how does landscape change affect processes that influence the distribution and viability of species and communities? The chapter concludes by identifying the kinds of actions that will enhance the conservation of biota in fragmented landscapes.", "title": "" }, { "docid": "63a58b3b6eb46cdd92b9c241b1670926", "text": "The Healthcare industry is generally &quot;information rich&quot;, but unfortunately not all the data are mined which is required for discovering hidden patterns & effective decision making. Advanced data mining techniques are used to discover knowledge in database and for medical research, particularly in Heart disease prediction. This paper has analysed prediction systems for Heart disease using more number of input attributes. The system uses medical terms such as sex, blood pressure, cholesterol like 13 attributes to predict the likelihood of patient getting a Heart disease. Until now, 13 attributes are used for prediction. This research paper added two more attributes i. e. obesity and smoking. The data mining classification techniques, namely Decision Trees, Naive Bayes, and Neural Networks are analyzed on Heart disease database. The performance of these techniques is compared, based on accuracy. As per our results accuracy of Neural Networks, Decision Trees, and Naive Bayes are 100%, 99. 62%, and 90. 74% respectively. Our analysis shows that out of these three classification models Neural Networks predicts Heart disease with highest accuracy.", "title": "" }, { "docid": "e5338d8c6c765165c65de5c4f390da2a", "text": "Rewards are sparse in the real world and most today’s reinforcement learning algorithms struggle with such sparsity. One solution to this problem is to allow the agent to create rewards for itself — thus making rewards dense and more suitable for learning. In particular, inspired by curious behaviour in animals, observing something novel could be rewarded with a bonus. Such bonus is summed up with the real task reward — making it possible for RL algorithms to learn from the combined reward. We propose a new curiosity method which uses episodic memory to form the novelty bonus. To determine the bonus, the current observation is compared with the observations in memory. Crucially, the comparison is done based on how many environment steps it takes to reach the current observation from those in memory — which incorporates rich information about environment dynamics. This allows us to overcome the known “couch-potato” issues of prior work — when the agent finds a way to instantly gratify itself by exploiting actions which lead to unpredictable consequences. We test our approach in visually rich 3D environments in VizDoom and DMLab. In VizDoom, our agent learns to successfully navigate to a distant goal at least 2 times faster than the state-of-the-art curiosity method ICM. In DMLab, our agent generalizes well to new procedurally generated levels of the game — reaching the goal at least 2 times more frequently than ICM on test mazes with very sparse reward.", "title": "" }, { "docid": "83cd04900b09258aa975f44dc2e3649d", "text": "The transition stage from the natural cognitive decline of normal aging to the more serious decline of dementia is referred to as mild cognitive impairment (MCI). The cognitive changes caused in MCI are noticeable by the individuals experiencing them and by others, but the changes are not severe enough to interfere with daily life or with independent activities. Because there is a thin line between normal aging and MCI, it is difficult for individuals to discern between the two conditions. Moreover, if the symptoms of MCI are not diagnosed in time, it may lead to more serious and permanent conditions. However, if these symptoms are detected in time and proper care and precaution are taken, it is possible to prevent the condition from worsening. A smart-home environment that unobtrusively keeps track of the individual's daily living activities is a possible solution to improve care and quality of life.", "title": "" }, { "docid": "adf3678a3f1fcd5db580a417194239f2", "text": "In training deep neural networks for semantic segmentation, the main limiting factor is the low amount of ground truth annotation data that is available in currently existing datasets. The limited availability of such data is due to the time cost and human effort required to accurately and consistently label real images on a pixel level. Modern sandbox video game engines provide open world environments where traffic and pedestrians behave in a pseudo-realistic manner. This caters well to the collection of a believable road-scene dataset. Utilizing open-source tools and resources found in single-player modding communities, we provide a method for persistent, ground truth, asset annotation of a game world. By collecting a synthetic dataset containing upwards of 1, 000, 000 images, we demonstrate realtime, on-demand, ground truth data annotation capability of our method. Supplementing this synthetic data to Cityscapes dataset, we show that our data generation method provides qualitative as well as quantitative improvements—for training networks—over previous methods that use video games as surrogate.", "title": "" }, { "docid": "5d92f58e929a851097eae320eb9c3ddc", "text": "In recent years, the study of genomic alterations and protein expression involved in the pathways of breast cancer carcinogenesis has provided an increasing number of targets for drugs development in the setting of metastatic breast cancer (i.e., trastuzumab, everolimus, palbociclib, etc.) significantly improving the prognosis of this disease. These drugs target specific molecular abnormalities that confer a survival advantage to cancer cells. On these bases, emerging evidence from clinical trials provided increasing proof that the genetic landscape of any tumor may dictate its sensitivity or resistance profile to specific agents and some studies have already showed that tumors treated with therapies matched with their molecular alterations obtain higher objective response rates and longer survival. Predictive molecular biomarkers may optimize the selection of effective therapies, thus reducing treatment costs and side effects. This review offers an overview of the main molecular pathways involved in breast carcinogenesis, the targeted therapies developed to inhibit these pathways, the principal mechanisms of resistance and, finally, the molecular biomarkers that, to date, are demonstrated in clinical trials to predict response/resistance to targeted treatments in metastatic breast cancer.", "title": "" }, { "docid": "8390fd7e559832eea895fabeb48c3549", "text": "An algorithm is presented to perform connected component labeling of images of arbitrary dimension that are represented by a linear bintree. The bintree is a generalization of the quadtree data structure that enables dealing with images of arbitrary dimension. The linear bintree is a pointerless representation. The algorithm uses an active border which is represented by linked lists instead of arrays. This results in a significant reduction in the space requirements, thereby making it feasible to process threeand higher dimensional images. Analysis of the execution time of the algorithm shows almost linear behavior with respect to the number of leaf nodes in the image, and empirical tests are in agreement. The algorithm can be modified easily to compute a ( d 1)-dimensional boundary measure (e.g., perimeter in two dimensions and surface area in three dimensions) with linear", "title": "" } ]
scidocsrr
92a6ff6616ba7c6622b8b1510ef7f142
Interactive whiteboards: Interactive or just whiteboards?
[ { "docid": "e1d0c07f9886d3258f0c5de9dd372e17", "text": "strategies and tools must be based on some theory of learning and cognition. Of course, crafting well-articulated views that clearly answer the major epistemological questions of human learning has exercised psychologists and educators for centuries. What is a mind? What does it mean to know something? How is our knowledge represented and manifested? Many educators prefer an eclectic approach, selecting “principles and techniques from the many theoretical perspectives in much the same way we might select international dishes from a smorgasbord, choosing those we like best and ending up with a meal which represents no nationality exclusively and a design technology based on no single theoretical base” (Bednar et al., 1995, p. 100). It is certainly the case that research within collaborative educational learning tools has drawn upon behavioral, cognitive information processing, humanistic, and sociocultural theory, among others, for inspiration and justification. Problems arise, however, when tools developed in the service of one epistemology, say cognitive information processing, are integrated within instructional systems designed to promote learning goals inconsistent with it. When concepts, strategies, and tools are abstracted from the theoretical viewpoint that spawned them, they are too often stripped of meaning and utility. In this chapter, we embed our discussion in learner-centered, constructivist, and sociocultural perspectives on collaborative technology, with a bias toward the third. The principles of these perspectives, in fact, provide the theoretical rationale for much of the research and ideas presented in this book. 2", "title": "" } ]
[ { "docid": "8a3dba8aa5aa8cf69da21079f7e36de6", "text": "This letter presents a novel technique for synthesis of coupled-resonator filters with inter-resonator couplings varying linearly with frequency. The values of non-zero elements of the coupling matrix are found by solving a nonlinear least squares problem involving eigenvalues of matrix pencils derived from the coupling matrix and reference zeros and poles of scattering parameters. The proposed method was verified by numerical tests carried out for various coupling schemes including triplets and quadruplets for which the frequency-dependent coupling was found to produce an extra zero.", "title": "" }, { "docid": "e55ad28c68a422ec959e8b247aade1b9", "text": "Developing reliable methods for representing and managing information uncertainty remains a persistent and relevant challenge to GIScience. Information uncertainty is an intricate idea, and recent examinations of this concept have generated many perspectives on its representation and visualization, with perspectives emerging from a wide range of disciplines and application contexts. In this paper, we review and assess progress toward visual tools and methods to help analysts manage and understand information uncertainty. Specifically, we report on efforts to conceptualize uncertainty, decision making with uncertainty, frameworks for representing uncertainty, visual representation and user control of displays of information uncertainty, and evaluative efforts to assess the use and usability of visual methods of uncertainty. We conclude by identifying seven key research challenges in visualizing information uncertainty, particularly as it applies to decision making and analysis.", "title": "" }, { "docid": "c8911f38bfd68baa54b49b9126c2ad22", "text": "This document presents a performance comparison of three 2D SLAM techniques available in ROS: Gmapping, Hec-torSLAM and CRSM SLAM. These algorithms were evaluated using a Roomba 645 robotic platform with differential drive and a RGB-D Kinect sensor as an emulator of a scanner lasser. All tests were realized in static indoor environments. To improve the quality of the maps, some rosbag files were generated and used to build the maps in an off-line way.", "title": "" }, { "docid": "baa0bf8fe429c4fe8bfb7ebf78a1ed94", "text": "The weakly supervised object localization (WSOL) is to locate the objects in an image while only image-level labels are available during the training procedure. In this work, the Selective Feature Category Mapping (SFCM) method is proposed, which introduces the Feature Category Mapping (FCM) and the widely-used selective search method to solve the WSOL task. Our FCM replaces layers after the specific layer in the state-of-the-art CNNs with a set of kernels and learns the weighted pooling for previous feature maps. It is trained with only image-level labels and then map the feature maps to their corresponding categories in the test phase. Together with selective search method, the location of each object is finally obtained. Extensive experimental evaluation on ILSVRC2012 and PASCAL VOC2007 benchmarks shows that SFCM is simple but very effective, and it is able to achieve outstanding classification performance and outperform the state-of-the-art methods in the WSOL task.", "title": "" }, { "docid": "b305e3504e3a99a5cd026e7845d98dab", "text": "This paper provides a survey of modern nonlinear filtering methods for attitude estimation. Early applications relied mostly on the extended Kalman filter for attitude estimation. Since these applications, several new approaches have been developed that have proven to be superior to the extended Kalman filter. Several of these approaches maintain the basic structure of the extended Kalman filter, but employ various modifications in order to provide better convergence or improve other performance characteristics. Examples of such approaches include: filter QUEST, extended QUEST and the backwards-smoothing extended Kalman filter. Filters that propagate and update a discrete set of sigma points rather than using linearized equations for the mean and covariance are also reviewed. A twostep approach is discussed with a first-step state that linearizes the measurement model and an iterative second step to recover the desired attitude states. These approaches are all based on the Gaussian assumption that the probability density function is adequately specified by its mean and covariance. Other approaches that do not require this assumption are reviewed, Associate Professor, Department of Mechanical & Aerospace Engineering. Email: johnc@eng.buffalo.edu. Associate Fellow AIAA. Aerospace Engineer, Guidance, Navigation and Control Systems Engineering Branch. Email: Landis.Markley@nasa.gov. Fellow AIAA. Postdoctoral Research Fellow, Department of Mechanical & Aerospace Engineering. Email: cheng3@eng.buffalo.edu. Member AIAA.", "title": "" }, { "docid": "fc79bfdb7fbbfa42d2e1614964113101", "text": "Probability Theory, 2nd ed. Princeton, N. J.: 960. Van Nostrand, 1 121 T. T. Kadota, “Optimum reception of binary gaussian signals,” Bell Sys. Tech. J., vol. 43, pp. 2767-2810, November 1964. 131 T. T. Kadota. “Ootrmum recention of binarv sure and Gaussian signals,” Bell Sys. ?‘ech: J., vol. 44;~~. 1621-1658, October 1965. 141 U. Grenander, ‘Stochastic processes and statistical inference,” Arkiv fiir Matematik, vol. 17, pp. 195-277, 1950. 151 L. A. Zadeh and J. R. Ragazzini, “Optimum filters for the detection of signals in noise,” Proc. IRE, vol. 40, pp. 1223-1231, O,+nhm 1 a.63 161 J. H. Laning and R. H. Battin, Random Processes in Automatic Control. New York: McGraw-Hill. 1956. nn. 269-358. 171 C.. W. Helstrom, “ Solution of the dete&on integral equation for stationary filtered white noise,” IEEE Trans. on Information Theory, vol. IT-II, pp. 335-339, July 1965. 181 T. Kailath, “The detection of known signals in colored Gaussian noise,” Stanford Electronics Labs., Stanford Univ., Stanford, Calif. Tech. Rept. 7050-4, July 1965. 191 T. T. Kadota, “Optimum reception of nf-ary Gaussian signals in Gaussian noise,” Bell. Sys. Tech. J., vol. 44, pp. 2187-2197, November 1965. [lOI T. T. Kadota, “Term-by-term differentiability of Mercer’s expansion,” Proc. of Am. Math. Sot., vol. 18, pp. 69-72, February 1967.", "title": "" }, { "docid": "ecea888d3b2d6b9ce0a26a4af6382db8", "text": "Business Process Management (BPM) research resulted in a plethora of methods, techniques, and tools to support the design, enactment, management, and analysis of operational business processes. This survey aims to structure these results and provides an overview of the state-of-the-art in BPM. In BPM the concept of a process model is fundamental. Process models may be used to configure information systems, but may also be used to analyze, understand, and improve the processes they describe. Hence, the introduction of BPM technology has both managerial and technical ramifications, and may enable significant productivity improvements, cost savings, and flow-time reductions. The practical relevance of BPM and rapid developments over the last decade justify a comprehensive survey.", "title": "" }, { "docid": "03ba329de93f763ff6f0a8c4c6e18056", "text": "Nowadays, with the availability of massive amount of trade data collected, the dynamics of the financial markets pose both a challenge and an opportunity for high frequency traders. In order to take advantage of the rapid, subtle movement of assets in High Frequency Trading (HFT), an automatic algorithm to analyze and detect patterns of price change based on transaction records must be available. The multichannel, time-series representation of financial data naturally suggests tensor-based learning algorithms. In this work, we investigate the effectiveness of two multilinear methods for the mid-price prediction problem against other existing methods. The experiments in a large scale dataset which contains more than 4 millions limit orders show that by utilizing tensor representation, multilinear models outperform vector-based approaches and other competing ones.", "title": "" }, { "docid": "4f631769d8267c81ea568c9eed71ac09", "text": "To study a phenomenon scientifically, it must be appropriately described and measured. How mindfulness is conceptualized and assessed has considerable importance for mindfulness science, and perhaps in part because of this, these two issues have been among the most contentious in the field. In recognition of the growing scientific and clinical interest in", "title": "" }, { "docid": "f1f72a6d5d2ab8862b514983ac63480b", "text": "Grids are commonly used as histograms to process spatial data in order to detect frequent patterns, predict destinations, or to infer popular places. However, they have not been previously used for GPS trajectory similarity searches or retrieval in general. Instead, slower and more complicated algorithms based on individual point-pair comparison have been used. We demonstrate how a grid representation can be used to compute four different route measures: novelty, noteworthiness, similarity, and inclusion. The measures may be used in several applications such as identifying taxi fraud, automatically updating GPS navigation software, optimizing traffic, and identifying commuting patterns. We compare our proposed route similarity measure, C-SIM, to eight popular alternatives including Edit Distance on Real sequence (EDR) and Frechet distance. The proposed measure is simple to implement and we give a fast, linear time algorithm for the task. It works well under noise, changes in sampling rate, and point shifting. We demonstrate that by using the grid, a route similarity ranking can be computed in real-time on the Mopsi20141 route dataset, which consists of over 6,000 routes. This ranking is an extension of the most similar route search and contains an ordered list of all similar routes from the database. The real-time search is due to indexing the cell database and comes at the cost of spending 80% more memory space for the index. The methods are implemented inside the Mopsi2 route module.", "title": "" }, { "docid": "68865e653e94d3366961434cc012363f", "text": "Solving the problem of consciousness remains one of the biggest challenges in modern science. One key step towards understanding consciousness is to empirically narrow down neural processes associated with the subjective experience of a particular content. To unravel these neural correlates of consciousness (NCC) a common scientific strategy is to compare perceptual conditions in which consciousness of a particular content is present with those in which it is absent, and to determine differences in measures of brain activity (the so called \"contrastive analysis\"). However, this comparison appears not to reveal exclusively the NCC, as the NCC proper can be confounded with prerequisites for and consequences of conscious processing of the particular content. This implies that previous results cannot be unequivocally interpreted as reflecting the neural correlates of conscious experience. Here we review evidence supporting this conjecture and suggest experimental strategies to untangle the NCC from the prerequisites and consequences of conscious experience in order to further develop the otherwise valid and valuable contrastive methodology.", "title": "" }, { "docid": "c224cc83b4c58001dbbd3e0ea44a768a", "text": "We review the current status of research in dorsal-ventral (D-V) patterning in vertebrates. Emphasis is placed on recent work on Xenopus, which provides a paradigm for vertebrate development based on a rich heritage of experimental embryology. D-V patterning starts much earlier than previously thought, under the influence of a dorsal nuclear -Catenin signal. At mid-blastula two signaling centers are present on the dorsal side: The prospective neuroectoderm expresses bone morphogenetic protein (BMP) antagonists, and the future dorsal endoderm secretes Nodal-related mesoderm-inducing factors. When dorsal mesoderm is formed at gastrula, a cocktail of growth factor antagonists is secreted by the Spemann organizer and further patterns the embryo. A ventral gastrula signaling center opposes the actions of the dorsal organizer, and another set of secreted antagonists is produced ventrally under the control of BMP4. The early dorsal -Catenin signal inhibits BMP expression at the transcriptional level and promotes expression of secreted BMP antagonists in the prospective central nervous system (CNS). In the absence of mesoderm, expression of Chordin and Noggin in ectoderm is required for anterior CNS formation. FGF (fibroblast growth factor) and IGF (insulin-like growth factor) signals are also potent neural inducers. Neural induction by anti-BMPs such as Chordin requires mitogen-activated protein kinase (MAPK) activation mediated by FGF and IGF. These multiple signals can be integrated at the level of Smad1. Phosphorylation by BMP receptor stimulates Smad1 transcriptional activity, whereas phosphorylation by MAPK has the opposite effect. Neural tissue is formed only at very low levels of activity of BMP-transducing Smads, which require the combination of both low BMP levels and high MAPK signals. Many of the molecular players that regulate D-V patterning via regulation of BMP signaling have been conserved between Drosophila and the vertebrates.", "title": "" }, { "docid": "aad34b3e8acc311d0d32964c6607a6e1", "text": "This paper looks at the performance of photovoltaic modules in nonideal conditions and proposes topologies to minimize the degradation of performance caused by these conditions. It is found that the peak power point of a module is significantly decreased due to only the slightest shading of the module, and that this effect is propagated through other nonshaded modules connected in series with the shaded one. Based on this result, two topologies for parallel module connections have been outlined. In addition, dc/dc converter technologies, which are necessary to the design, are compared by way of their dynamic models, frequency characteristics, and component cost. Out of this comparison, a recommendation has been made", "title": "" }, { "docid": "1ad06e5eee4d4f29dd2f0e8f0dd62370", "text": "Recent research on map matching algorithms for land vehicle navigation has been based on either a conventional topological analysis or a probabilistic approach. The input to these algorithms normally comes from the global positioning system and digital map data. Although the performance of some of these algorithms is good in relatively sparse road networks, they are not always reliable for complex roundabouts, merging or diverging sections of motorways and complex urban road networks. In high road density areas where the average distance between roads is less than 100 metres, there may be many road patterns matching the trajectory of the vehicle reported by the positioning system at any given moment. Consequently, it may be difficult to precisely identify the road on which the vehicle is travelling. Therefore, techniques for dealing with qualitative terms such as likeliness are essential for map matching algorithms to identify a correct link. Fuzzy logic is one technique that is an effective way to deal with qualitative terms, linguistic vagueness, and human intervention. This paper develops a map matching algorithm based on fuzzy logic theory. The inputs to the proposed algorithm are from the global positioning system augmented with data from deduced reckoning sensors to provide continuous navigation. The algorithm is tested on different road networks of varying complexity. The validation of this algorithm is carried out using high precision positioning data obtained from GPS carrier phase observables. The performance of the developed map matching algorithm is evaluated against the performance of several well-accepted existing map matching algorithms. The results show that the fuzzy logic-based map matching algorithm provides a significant improvement over existing map matching algorithms both in terms of identifying correct links and estimating the vehicle position on the links.", "title": "" }, { "docid": "39eaf3ad7373d36404e903a822a3d416", "text": "We present HaptoMime, a mid-air interaction system that allows users to touch a floating virtual screen with hands-free tactile feedback. Floating images formed by tailored light beams are inherently lacking in tactile feedback. Here we propose a method to superpose hands-free tactile feedback on such a floating image using ultrasound. By tracking a fingertip with an electronically steerable ultrasonic beam, the fingertip encounters a mechanical force consistent with the floating image. We demonstrate and characterize the proposed transmission scheme and discuss promising applications with an emphasis that it helps us 'pantomime' in mid-air.", "title": "" }, { "docid": "b0c5c8e88e9988b6548acb1c8ebb5edd", "text": "We present a bottom-up aggregation approach to image segmentation. Beginning with an image, we execute a sequence of steps in which pixels are gradually merged to produce larger and larger regions. In each step, we consider pairs of adjacent regions and provide a probability measure to assess whether or not they should be included in the same segment. Our probabilistic formulation takes into account intensity and texture distributions in a local area around each region. It further incorporates priors based on the geometry of the regions. Finally, posteriors based on intensity and texture cues are combined using “ a mixture of experts” formulation. This probabilistic approach is integrated into a graph coarsening scheme, providing a complete hierarchical segmentation of the image. The algorithm complexity is linear in the number of the image pixels and it requires almost no user-tuned parameters. In addition, we provide a novel evaluation scheme for image segmentation algorithms, attempting to avoid human semantic considerations that are out of scope for segmentation algorithms. Using this novel evaluation scheme, we test our method and provide a comparison to several existing segmentation algorithms.", "title": "" }, { "docid": "c1b5b1dcbb3e7ff17ea6ad125bbc4b4b", "text": "This article focuses on a new type of wireless devices in the domain between RFIDs and sensor networks—Energy-Harvesting Active Networked Tags (EnHANTs). Future EnHANTs will be small, flexible, and self-powered devices that can be attached to objects that are traditionally not networked (e.g., books, furniture, toys, produce, and clothing). Therefore, they will provide the infrastructure for various tracking applications and can serve as one of the enablers for the Internet of Things. We present the design considerations for the EnHANT prototypes, developed over the past 4 years. The prototypes harvest indoor light energy using custom organic solar cells, communicate and form multihop networks using ultra-low-power Ultra-Wideband Impulse Radio (UWB-IR) transceivers, and dynamically adapt their communications and networking patterns to the energy harvesting and battery states. We describe a small-scale testbed that uniquely allows evaluating different algorithms with trace-based light energy inputs. Then, we experimentally evaluate the performance of different energy-harvesting adaptive policies with organic solar cells and UWB-IR transceivers. Finally, we discuss the lessons learned during the prototype and testbed design process.", "title": "" }, { "docid": "c44ef4f4242147affdbe613c70ec4a85", "text": "The physical and generalized sensor models are two widely used imaging geometry models in the photogrammetry and remote sensing. Utilizing the rational function model (RFM) to replace physical sensor models in photogrammetric mapping is becoming a standard way for economical and fast mapping from high-resolution images. The RFM is accepted for imagery exploitation since high accuracies have been achieved in all stages of the photogrammetric process just as performed by rigorous sensor models. Thus it is likely to become a passkey in complex sensor modeling. Nowadays, commercial off-the-shelf (COTS) digital photogrammetric workstations have incorporated the RFM and related techniques. Following the increasing number of RFM related publications in recent years, this paper reviews the methods and key applications reported mainly over the past five years, and summarizes the essential progresses and address the future research directions in this field. These methods include the RFM solution, the terrainindependent and terrain-dependent computational scenarios, the direct and indirect RFM refinement methods, the photogrammetric exploitation techniques, and photogrammetric interoperability for cross sensor/platform imagery integration. Finally, several open questions regarding some aspects worth of further study are addressed.", "title": "" }, { "docid": "d5b004af32bd747c2b5ad175975f8c06", "text": "This paper presents a design of a quasi-millimeter wave wideband antenna array consisting of a leaf-shaped bowtie antenna (LSBA) and series-parallel feed networks in which parallel strip and microstrip lines are employed. A 16-element LSBA array is designed such that the antenna array operates over the frequency band of 22-30GHz. In order to demonstrate the effective performance of the presented configuration, characteristics of the designed LSBA array are evaluated by the finite-difference time domain (FDTD) analysis and measurements. Over the frequency range from 22GHz to 30GHz, the simulated reflection coefficient is observed to be less than -8dB, and the actual gain of 12.3-19.4dBi is obtained.", "title": "" }, { "docid": "c117a5fc0118f3ea6c576bb334759d59", "text": "While neural networks have achieved high accuracy on standard image classification benchmarks, their accuracy drops to nearly zero in the presence of small adversarial perturbations to test inputs. Defenses based on regularization and adversarial training have been proposed, but often followed by new, stronger attacks that defeat these defenses. Can we somehow end this arms race? In this work, we study this problem for neural networks with one hidden layer. We first propose a method based on a semidefinite relaxation that outputs a certificate that for a given network and test input, no attack can force the error to exceed a certain value. Second, as this certificate is differentiable, we jointly optimize it with the network parameters, providing an adaptive regularizer that encourages robustness against all attacks. On MNIST, our approach produces a network and a certificate that no attack that perturbs each pixel by at most = 0.1 can cause more than 35% test error.", "title": "" } ]
scidocsrr