query_id
stringlengths
32
32
query
stringlengths
6
2.48k
positive_passages
listlengths
1
17
negative_passages
listlengths
10
100
subset
stringclasses
7 values
db2f203d3ab77a6309c0540827ba4da0
Modeling gate-pitch scaling impact on stress-induced mobility and external resistance for 20nm-node MOSFETs
[ { "docid": "c10a58037c4b13953236831af304e660", "text": "A 32 nm generation logic technology is described incorporating 2nd-generation high-k + metal-gate technology, 193 nm immersion lithography for critical patterning layers, and enhanced channel strain techniques. The transistors feature 9 Aring EOT high-k gate dielectric, dual band-edge workfunction metal gates, and 4th-generation strained silicon, resulting in the highest drive currents yet reported for NMOS and PMOS. Process yield, performance and reliability are demonstrated on a 291 Mbit SRAM test vehicle, with 0.171 mum2 cell size, containing >1.9 billion transistors.", "title": "" } ]
[ { "docid": "8d4007b4d769c2d90ae07b5fdaee8688", "text": "In this project, we implement the semi-supervised Recursive Autoencoders (RAE), and achieve the result comparable with result in [1] on the Movie Review Polarity dataset1. We achieve 76.08% accuracy, which is slightly lower than [1] ’s result 76.8%, with less vector length. Experiments show that the model can learn sentiment and build reasonable structure from sentence.We find longer word vector and adjustment of words’ meaning vector is beneficial, while normalization of transfer function brings some improvement. We also find normalization of the input word vector may be beneficial for training.", "title": "" }, { "docid": "de22ea59ae33c910ba1a2f697ad4fd0c", "text": "This study aimed to compare the differences of microbial spectrum and antibiotic resistance patterns between external and intraocular bacterial infections in an eye hospital in South China. A total of 737 bacteria isolates from suspected ocular infections were included in this retrospective study covering the period 2010-2013. The organisms cultured from the ocular surface (cornea, conjunctiva) accounted for the majority of the isolates (82.77%, n = 610), followed by the intraocular (aqueous humor, vitreous fluid), which accounted for 17.23% (n = 127). The top three species accounting for the external ocular infections were S. epidermidis (35.25%), P. aeruginosa (8.03%), and S. simulans (4.43%). The top three species for the intraocular infections were S. epidermidis (14.96%), S. hominis (8.66%), and B. subtilis (7.87%). The bacteria from the external ocular surface were more sensitive to neomycin, while those from the intraocular specimens were more sensitive to levofloxacin (P < 0.01). Multidrug resistance was found in 89 bacteria (12.08%), including isolates from both external (13.28%) and intraocular samples (6.30%). The results of this study indicate that the bacteria spectrum of external and intraocular infections is variable in the setting. A high percentage of bacterial organisms were found to be primarily susceptible to neomycin for external infection and levofloxacin for intraocular infection.", "title": "" }, { "docid": "eb962e14f34ea53dec660dfe304756b0", "text": "It is difficult to train a personalized task-oriented dialogue system because the data collected from each individual is often insufficient. Personalized dialogue systems trained on a small dataset can overfit and make it difficult to adapt to different user needs. One way to solve this problem is to consider a collection of multiple users’ data as a source domain and an individual user’s data as a target domain, and to perform a transfer learning from the source to the target domain. By following this idea, we propose the “PETAL” (PErsonalized Task-oriented diALogue), a transfer learning framework based on POMDP to learn a personalized dialogue system. The system first learns common dialogue knowledge from the source domain and then adapts this knowledge to the target user. This framework can avoid the negative transfer problem by considering differences between source and target users. The policy in the personalized POMDP can learn to choose different actions appropriately for different users. Experimental results on a real-world coffee-shopping data and simulation data show that our personalized dialogue system can choose different optimal actions for different users, and thus effectively improve the dialogue quality under the personalized setting.", "title": "" }, { "docid": "2f84b44cdce52068b7e692dad7feb178", "text": "Two stage PCR has been used to introduce single amino acid substitutions into the EF hand structures of the Ca(2+)-activated photoprotein aequorin. Transcription of PCR products, followed by cell free translation of the mRNA, allowed characterisation of recombinant proteins in vitro. Substitution of D to A at position 119 produced an active photoprotein with a Ca2+ affinity reduced by a factor of 20 compared to the wild type recombinant aequorin. This recombinant protein will be suitable for measuring Ca2+ inside the endoplasmic reticulum, the mitochondria, endosomes and the outside of live cells.", "title": "" }, { "docid": "bb2ad600e0e90a1a349e39ce0f097277", "text": "Tongue drive system (TDS) is a tongue-operated, minimally invasive, unobtrusive, and wireless assistive technology (AT) that infers users' intentions by detecting their voluntary tongue motion and translating them into user-defined commands. Here we present the new intraoral version of the TDS (iTDS), which has been implemented in the form of a dental retainer. The iTDS system-on-a-chip (SoC) features a configurable analog front-end (AFE) that reads the magnetic field variations inside the mouth from four 3-axial magnetoresistive sensors located at four corners of the iTDS printed circuit board (PCB). A dual-band transmitter (Tx) on the same chip operates at 27 and 432 MHz in the Industrial/Scientific/Medical (ISM) band to allow users to switch in the presence of external interference. The Tx streams the digitized samples to a custom-designed TDS universal interface, built from commercial off-the-shelf (COTS) components, which delivers the iTDS data to other devices such as smartphones, personal computers (PC), and powered wheelchairs (PWC). Another key block on the iTDS SoC is the power management integrated circuit (PMIC), which provides individually regulated and duty-cycled 1.8 V supplies for sensors, AFE, Tx, and digital control blocks. The PMIC also charges a 50 mAh Li-ion battery with constant current up to 4.2 V, and recovers data and clock to update its configuration register through a 13.56 MHz inductive link. The iTDS SoC has been implemented in a 0.5-μm standard CMOS process and consumes 3.7 mW on average.", "title": "" }, { "docid": "77c7f144c63df9022434313cfe2e5290", "text": "Today the prevalence of online banking is enormous. People prefer to accomplish their financial transactions through the online banking services offered by their banks. This method of accessing is more convenient, quicker and secured. Banks are also encouraging their customers to opt for this mode of e-banking facilities since that result in cost savings for the banks and there is better customer satisfaction. An important aspect of online banking is the precise authentication of users before allowing them to access their accounts. Typically this is done by asking the customers to enter their unique login id and password combination. The success of this authentication relies on the ability of customers to maintain the secrecy of their passwords. Since the customer login to the banking portals normally occur in public environments, the passwords are prone to key logging attacks. To avoid this, virtual keyboards are provided. But virtual keyboards are vulnerable to shoulder surfing based attacks. In this paper, a secured virtual keyboard scheme that withstands such attacks is proposed. Elaborate user studies carried out on the proposed scheme have testified the security and the usability of the proposed approach.", "title": "" }, { "docid": "d50d07954360c23bcbe3802776562f34", "text": "A stationary display of white discs positioned on intersecting gray bars on a dark background gives rise to a striking scintillating effectthe scintillating grid illusion. The spatial and temporal properties of the illusion are well known, but a neuronal-level explanation of the mechanism has not been fully investigated. Motivated by the neurophysiology of the Limulus retina, we propose disinhibition and self-inhibition as possible neural mechanisms that may give rise to the illusion. In this letter, a spatiotemporal model of the early visual pathway is derived that explicitly accounts for these two mechanisms. The model successfully predicted the change of strength in the illusion under various stimulus conditions, indicating that low-level mechanisms may well explain the scintillating effect in the illusion.", "title": "" }, { "docid": "4597ab07ac630eb5e256f57530e2828e", "text": "This paper presents novel QoS extensions to distributed control plane architectures for multimedia delivery over large-scale, multi-operator Software Defined Networks (SDNs). We foresee that large-scale SDNs shall be managed by a distributed control plane consisting of multiple controllers, where each controller performs optimal QoS routing within its domain and shares summarized (aggregated) QoS routing information with other domain controllers to enable inter-domain QoS routing with reduced problem dimensionality. To this effect, this paper proposes (i) topology aggregation and link summarization methods to efficiently acquire network topology and state information, (ii) a general optimization framework for flow-based end-to-end QoS provision over multi-domain networks, and (iii) two distributed control plane designs by addressing the messaging between controllers for scalable and secure inter-domain QoS routing. We apply these extensions to streaming of layered videos and compare the performance of different control planes in terms of received video quality, communication cost and memory overhead. Our experimental results show that the proposed distributed solution closely approaches the global optimum (with full network state information) and nicely scales to large networks.", "title": "" }, { "docid": "83591fa3bd2409d2c04fecdbdf9a4ede", "text": "The dramatic growth of cloud computing services and mobility trends, in terms of 3/4G availability and smart devices, is creating a new phenomenon called \"Consumerization\" that affects the consumers habits in all facets of the their life. Also during the working time people prefer to stay in their consumer environment because that's their comfort zone. A collateral phenomenon is called BYOD (Bring Your Own Device), that means the employees use their own devices also during their working time. These changing of habits represent an opportunity and a challenge for the enterprises. The opportunity is related to two main aspects: the productivity increase and the costs reduction. In a BYOD scenario the end users would pay totally or partially the devices and would work independently from time and location. On the opposite side, the new scenario bring some risks that could be critical. The use of devices for both personal and working activities opens to new security threats to face for IT organization. Also, the direct comparison between public cloud services for personal use and company's IT services could be a frustrating user experience, that's because of the public cloud services are often almost more effective and usable than typical IT company's services. The aim of this work is presenting a brief survey about the emerging methods and models to approach the BYOD phenomenon from the security point of view.", "title": "" }, { "docid": "41b8fb6fd9237c584ce0211f94a828be", "text": "Over the last few years, two of the main research directions in machine learning of natural language processing have been the study of semi-supervised learning algorithms as a way to train classifiers when the labeled data is scarce, and the study of ways to exploit knowledge and global information in structured learning tasks. In this paper, we suggest a method for incorporating domain knowledge in semi-supervised learning algorithms. Our novel framework unifies and can exploit several kinds of task specific constraints. The experimental results presented in the information extraction domain demonstrate that applying constraints helps the model to generate better feedback during learning, and hence the framework allows for high performance learning with significantly less training data than was possible before on these tasks.", "title": "" }, { "docid": "0dfd46719752d933c966b5e91006bc19", "text": "A fall is an abnormal activity that occurs rarely, so it is hard to collect real data for falls. It is, therefore, difficult to use supervised learning methods to automatically detect falls. Another challenge in using machine learning methods to automatically detect falls is the choice of engineered features. In this paper, we propose to use an ensemble of autoencoders to extract features from different channels of wearable sensor data trained only on normal activities. We show that the traditional approach of choosing a threshold as the maximum of the reconstruction error on the training normal data is not the right way to identify unseen falls. We propose two methods for automatic tightening of reconstruction error from only the normal activities for better identification of unseen falls. We present our results on two activity recognition datasets and show the efficacy of our proposed method against traditional autoencoder models and two standard one-class classification methods.", "title": "" }, { "docid": "34989468dace8410e9b7b68f0fd78a96", "text": "A novel coplanar waveguide (CPW)-fed triband planar monopole antenna is presented for WLAN/WiMAX applications. The monopole antenna is printed on a substrate with two rectangular corners cut off. The radiator of the antenna is very compact with an area of only 3.5 × 17 mm2, on which two inverted-L slots are etched to achieve three radiating elements so as to produce three resonant modes for triband operation. With simple structure and small size, the measured and simulated results show that the proposed antenna has 10-dB impedance bandwidths of 120 MHz (2.39-2.51 GHz), 340 MHz (3.38-3.72 GHz), and 1450 MHz (4.79-6.24 GHz) to cover all the 2.4/5.2/5.8-GHz WLAN and the 3.5/5.5-GHz WiMAX bands, and good dipole-like radiation characteristics are obtained over the operating bands.", "title": "" }, { "docid": "f1598c31e059d2e795f8fb393b21bb46", "text": "We present a Reinforcement Learning (RL) solution to the view planning problem (VPP), which generates a sequence of view points that are capable of sensing all accessible area of a given object represented as a 3D model. In doing so, the goal is to minimize the number of view points, making the VPP a class of set covering optimization problem (SCOP). The SCOP is NP-hard, and the inapproximability results tell us that the greedy algorithm provides the best approximation that runs in polynomial time. In order to find a solution that is better than the greedy algorithm, (i) we introduce a novel score function by exploiting the geometry of the 3D model, (ii) we device an intuitive approach to VPP using this score function, and (iii) we cast VPP as a Markovian Decision Process (MDP), and solve the MDP in RL framework using well-known RL algorithms. In particular, we use SARSA, Watkins-Q and TD with function approximation to solve the MDP. We compare the results of our method with the baseline greedy algorithm in an extensive set of test objects, and show that we can outperform the baseline in almost all cases.", "title": "" }, { "docid": "d74f13cbc4b2b6cace06a9f55b6d060c", "text": "Climate fluctuations and human exploitation are causing global changes in nutrient enrichment of terrestrial and aquatic ecosystems and declining abundances of apex predators. The resulting trophic cascades have had profound effects on food webs, leading to significant economic and societal consequences. However, the strength of cascades-that is the extent to which a disturbance is diminished as it propagates through a food web-varies widely between ecosystems, and there is no formal theory as to why this should be so. Some food chain models reproduce cascade effects seen in nature, but to what extent is this dependent on their formulation? We show that inclusion of processes represented mathematically as density-dependent regulation of either consumer uptake or mortality rates is necessary for the generation of realistic 'top-down' cascades in simple food chain models. Realistically modelled 'bottom-up' cascades, caused by changing nutrient input, are also dependent on the inclusion of density dependence, but especially on mortality regulation as a caricature of, e.g. disease and parasite dynamics or intraguild predation. We show that our conclusions, based on simple food chains, transfer to a more complex marine food web model in which cascades are induced by varying river nutrient inputs or fish harvesting rates.", "title": "" }, { "docid": "32e71f6ea2a624d669dfbb7a52042432", "text": "In this paper, a design method of an ultra-wideband multi-section power divider on suspended stripline (SSL) is presented. A clear design guideline for ultra-wideband power dividers is provided. As a design example, a 10-section SSL power divider is implemented. The fabricated divider exhibits the minimum insertion loss of 0.3 dB, the maximum insertion loss of 1.5 dB from 1 to 19 GHz. The measured VSWR is typically 1.40:1, and the isolation between output-port is typically 20 dB.", "title": "" }, { "docid": "73d3f2b0af6e6d1e27139b80ae0d0c81", "text": "The acceleration of rhythm of everyday life requires efficiency and flexibility in daily routines. The real expectations and needs of people concerning intelligent home devices should be carefully researched. The project Moon 2.0 by Indesit Company presents alternative ways of producing household appliance services developing a 2.0 Human Machine Interface and programs setting unit for washing machines, totally manageable by smart phones or I-Phones. Users cannot explicitly control washing machines when they would like to use a feature combination that has not application in a current washing program. The application of the Web 2.0 philosophy to the washing machine let the user the possibility to directly control all the existing features of the washing programs and to decide time by time how many programs their machine should have, with regards to the transparency and interactivity concepts of the ambient intelligence. Moon 2.0 should not be confused with an hand held personal home assistant capable of controlling a wide range of electronic home devices. The smart phone behaves the intelligence of the washing machine and offers the user endless customisation possibilities.", "title": "" }, { "docid": "96607113a8b6d0ca1c043d183420996b", "text": "Primary retroperitoneal masses include a diverse, and often rare, group of neoplastic and non-neoplastic entities that arise within the retroperitoneum but do not originate from any retroperitoneal organ. Their overlapping appearances on cross-sectional imaging may pose a diagnostic challenge to the radiologist; familiarity with characteristic imaging features, together with relevant clinical information, helps to narrow the differential diagnosis. In this article, a systematic approach to identifying and classifying primary retroperitoneal masses is described. The normal anatomy of the retroperitoneum is reviewed with an emphasis on fascial planes, retroperitoneal compartments, and their contents using cross-sectional imaging. Specific radiologic signs to accurately identify an intra-abdominal mass as primary retroperitoneal are presented, first by confirming the location as retroperitoneal and secondly by excluding an organ of origin. A differential diagnosis based on a predominantly solid or cystic appearance, including neoplastic and non-neoplastic entities, is elaborated. Finally, key diagnostic clues based on characteristic imaging findings are described, which help to narrow the differential diagnosis. This article provides a comprehensive overview of the cross-sectional imaging features of primary retroperitoneal masses, including normal retroperitoneal anatomy, radiologic signs of retroperitoneal masses and the differential diagnosis of solid and cystic, neoplastic and non-neoplastic retroperitoneal masses, with a view to assist the radiologist in narrowing the differential diagnosis.", "title": "" }, { "docid": "dd2e81d24584fe0684266217b732d881", "text": "In order to understand the role of titanium isopropoxide (TIPT) catalyst on insulation rejuvenation for water tree aged cables, dielectric properties and micro structure changes are investigated for the rejuvenated cables. Needle-shape defects are made inside cross-linked polyethylene (XLPE) cable samples to form water tree in the XLPE layer. The water tree aged samples are injected by the liquid with phenylmethyldimethoxy silane (PMDMS) catalyzed by TIPT for rejuvenation, and the breakdown voltage of the rejuvenated samples is significantly higher than that of the new samples. By the observation of scanning electronic microscope (SEM), the nano-TiO2 particles are observed inside the breakdown channels of the rejuvenated samples. Accordingly, the insulation performance of rejuvenated samples is significantly enhanced by the nano-TiO2 particles. Through analyzing the products of hydrolysis from TIPT, the nano-scale TiO2 particles are observed, and its micro-morphology is consistent with that observed inside the breakdown channels. According to the observation, the insulation enhancement mechanism is described. Therefore, the dielectric property of the rejuvenated cables is improved due to the nano-TiO2 produced by the hydrolysis from TIPT.", "title": "" }, { "docid": "da61b8bd6c1951b109399629f47dad16", "text": "In this paper, we introduce an approach for distributed nonlinear control of multiple hovercraft-type underactuated vehicles with bounded and unidirectional inputs. First, a bounded nonlinear controller is given for stabilization and tracking of a single vehicle, using a cascade backstepping method. Then, this controller is combined with a distributed gradient-based control for multi-vehicle formation stabilization using formation potential functions previously constructed. The vehicles are used in the Caltech Multi-Vehicle Wireless Testbed (MVWT). We provide simulation and experimental results for stabilization and tracking of a single vehicle, and a simulation of stabilization of a six-vehicle formation, demonstrating that in all cases the control bounds and the control objective are satisfied.", "title": "" }, { "docid": "565c949a2bf8b6f6c3d246c7c195419d", "text": "Extracorporeal photochemotherapy (ECP) is an effective treatment modality for patients with erythrodermic myocosis fungoides (MF) and Sezary syndrome (SS). During ECP, a fraction of peripheral blood mononuclear cells is collected, incubated ex-vivo with methoxypsoralen, UVA irradiated, and finally reinfused to the patient. Although the mechanism of action of ECP is not well established, clinical and laboratory observations support the hypothesis of a vaccination-like effect. ECP induces apoptosis of normal and neoplastic lymphocytes, while enhancing differentiation of monocytes towards immature dendritic cells (imDCs), followed by engulfment of apoptotic bodies. After reinfusion, imDCs undergo maturation and antigenic peptides from the neoplastic cells are expressed on the surface of DCs. Mature DCs travel to lymph nodes and activate cytotoxic T-cell clones with specificity against tumor antigens. Disease control is mediated through cytotoxic T-lymphocytes with tumor specificity. The efficacy and excellent safety profile of ECP has been shown in a large number of retrospective trials. Previous studies showed that monotherapy with ECP produces an overall response rate of approximately 60%, while clinical data support that ECP is much more effective when combined with other immune modulating agents such as interferons or retinoids, or when used as consolidation treatment after total skin electron beam irradiation. However, only a proportion of patients actually respond to ECP and parameters predictive of response need to be discovered. A patient with a high probability of response to ECP must fulfill all of the following criteria: (1) SS or erythrodermic MF, (2) presence of neoplastic cells in peripheral blood, and (3) early disease onset. Despite the fact that ECP has been established as a standard treatment modality, no prospective randomized study has been conducted so far, to the authors' knowledge. Considering the high cost of the procedure, the role of ECP in the treatment of SS/MF needs to be clarified via well designed multicenter prospective randomized trials.", "title": "" } ]
scidocsrr
6d0a7a3badf32dcbc215a93d114a80b8
A Puppet Interface for Retrieval of Motion Capture Data
[ { "docid": "ae58bc6ced30bf2c855473541840ec4d", "text": "Techniques from the image and signal processing domain can be successfully applied to designing, modifying, and adapting animated motion. For this purpose, we introduce multiresolution motion filtering, multitarget motion interpolation with dynamic timewarping, waveshaping and motion displacement mapping. The techniques are well-suited for reuse and adaptation of existing motion data such as joint angles, joint coordinates or higher level motion parameters of articulated figures with many degrees of freedom. Existing motions can be modified and combined interactively and at a higher level of abstraction than conventional systems support. This general approach is thus complementary to keyframing, motion capture, and procedural animation.", "title": "" } ]
[ { "docid": "821b46014ba0828b5d8cafef8a1289fd", "text": "Poor graduation and retention rates are widespread in higher education, with significant economic and social ramifications for individuals and our society in general. Early intervention with students most at risk of attrition can be effective in improving college student retention. Our research aim was to create a firstyear at-risk model using educational data mining and to apply that model at New York Institute of Technology (NYIT). Building the model creates new challenges: (1)the model must be welcomed by counseling staff and the outputs need to be user friendly, and (2)the model needs to work automatically from data collection to processing and prediction in order to eliminate the bottleneck of a human operator which can slow down the process. The result of our effort was an end-to-end solution, including a cost-effective infrastructure, that could be used by student support personnel for early identification and early intervention. The Student At-Risk Model (STAR) provides retention risk ratings for each new freshman at NYIT before the start of the fall semester and identifies the key factors that place a student at risk of not returning the following year. The model was built using historical data for the 2011 and 2012 Fall Class and the STAR system went into production at NYIT in Fall 2013.", "title": "" }, { "docid": "48ea1d793f0ae2b79f406c87fe5980b5", "text": "In this paper, we describe a UHF radio-frequency-identification tag test and measurement system based on National Instruments LabVIEW-controlled PXI RF hardware. The system operates in 800-1000-MHz frequency band with a variable output power up to 30 dBm and is capable of testing tags using Gen2 and other protocols. We explain testing methods and metrics, describe in detail the construction of our system, show its operation with real tag measurement examples, and draw general conclusions.", "title": "" }, { "docid": "5e6cc7d1849b6003ff86d3ba6227d546", "text": "BACKGROUND\nThe prognosis of advanced (stage IV) cancer of the digestive organs is very poor. We have previously reported a case of advanced breast cancer with bone metastasis that was successfully treated with combined treatments including autologous formalin-fixed tumor vaccine (AFTV). Herein, we report the success of this approach in advanced stage IV (heavily metastasized) cases of gall bladder cancer and colon cancer.\n\n\nCASE PRESENTATION\nCase 1: A 61-year-old woman with stage IV gall bladder cancer (liver metastasis and lymph node metastasis) underwent surgery in May 2011, including partial resection of the liver. She was treated with AFTV as the first-line adjuvant therapy, followed by conventional chemotherapy. This patient is still alive without any recurrence, as confirmed with computed tomography, for more than 5 years. Case 2: A 64-year-old man with stage IV colon cancer (multiple para-aortic lymph node metastases and direct abdominal wall invasion) underwent non-curative surgery in May 2006. Following conventional chemotherapy, two courses of AFTV and radiation therapy were administered sequentially. This patient has had no recurrence for more than 5 years.\n\n\nCONCLUSION\nWe report the success of combination therapy including AFTV in cases of liver-metastasized gall bladder cancer and abdominal wall-metastasized colon cancer. Both patients experienced long-lasting, complete remission. Therefore, combination therapies including AFTV should be considered in patients with advanced cancer of the digestive organs.", "title": "" }, { "docid": "397b3b96c16b2ce310ab61f9d2d7bdbf", "text": "Dependency networks approximate a joint probability distribution over multiple random variables as a product of conditional distributions. Relational Dependency Networks (RDNs) are graphical models that extend dependency networks to relational domains. This higher expressivity, however, comes at the expense of a more complex model-selection problem: an unbounded number of relational abstraction levels might need to be explored. Whereas current learning approaches for RDNs learn a single probability tree per random variable, we propose to turn the problem into a series of relational function-approximation problems using gradient-based boosting. In doing so, one can easily induce highly complex features over several iterations and in turn estimate quickly a very expressive model. Our experimental results in several different data sets show that this boosting method results in efficient learning of RDNs when compared to state-of-the-art statistical relational learning approaches.", "title": "" }, { "docid": "f2b6afabd67354280d091d11e8265b96", "text": "This paper aims to present three new methods for color detection and segmentation of road signs. The images are taken by a digital camera mounted in a car. The RGB images are converted into IHLS color space, and new methods are applied to extract the colors of the road signs under consideration. The methods are tested on hundreds of outdoor images in different light conditions, and they show high robustness. This project is part of the research taking place in Dalarna University/Sweden in the field of the ITS", "title": "" }, { "docid": "5ea366c59a6cd57ac2311a027084b566", "text": "Shape changing interfaces give physical shapes to digital data so that users can feel and manipulate data with their hands and bodies. However, physical objects in our daily life not only have shape but also various material properties. In this paper, we propose an interaction technique to represent material properties using shape changing interfaces. Specifically, by integrating the multi-modal sensation techniques of haptics, our approach builds a perceptive model for the properties of deformable materials in response to direct manipulation. As a proof-of-concept prototype, we developed preliminary physics algorithms running on pin-based shape displays. The system can create computationally variable properties of deformable materials that are visually and physically perceivable. In our experiments, users identify three deformable material properties (flexibility, elasticity and viscosity) through direct touch interaction with the shape display and its dynamic movements. In this paper, we describe interaction techniques, our implementation, future applications and evaluation on how users differentiate between specific properties of our system. Our research shows that shape changing interfaces can go beyond simply displaying shape allowing for rich embodied interaction and perceptions of rendered materials with the hands and body.", "title": "" }, { "docid": "6e9e687db8f202a8fa6d49c5996e7141", "text": "Although various scalable deep learning software packages have been proposed, it remains unclear how to best leverage parallel and distributed computing infrastructure to accelerate their training and deployment. Moreover, the effectiveness of existing parallel and distributed systems varies widely based on the neural network architecture and dataset under consideration. In order to efficiently explore the space of scalable deep learning systems and quickly diagnose their effectiveness for a given problem instance, we introduce an analytical performance model called PALEO. Our key observation is that a neural network architecture carries with it a declarative specification of the computational requirements associated with its training and evaluation. By extracting these requirements from a given architecture and mapping them to a specific point within the design space of software, hardware and communication strategies, PALEO can efficiently and accurately model the expected scalability and performance of a putative deep learning system. We show that PALEO is robust to the choice of network architecture, hardware, software, communication schemes, and parallelization strategies. We further demonstrate its ability to accurately model various recently published scalability results for CNNs such as NiN, Inception and AlexNet.", "title": "" }, { "docid": "661a5c7f49d4232f61a4a2ee0c1ddbff", "text": "Power is now a first-order design constraint in large-scale parallel computing. Used carefully, dynamic voltage scaling can execute parts of a program at a slower CPU speed to achieve energy savings with a relatively small (possibly zero) time delay. However, the problem of when to change frequencies in order to optimize energy savings is NP-complete, which has led to many heuristic energy-saving algorithms. To determine how closely these algorithms approach optimal savings, we developed a system that determines a bound on the energy savings for an application. Our system uses a linear programming solver that takes as inputs the application communication trace and the cluster power characteristics and then outputs a schedule that realizes this bound. We apply our system to three scientific programs, two of which exhibit load imbalance---particle simulation and UMT2K. Results from our bounding technique show particle simulation is more amenable to energy savings than UMT2K.", "title": "" }, { "docid": "b4880ddb59730f465f585f3686d1d2b1", "text": "The authors study the effect of word-of-mouth (WOM) marketing on member growth at an Internet social networking site and compare it with traditional marketing vehicles. Because social network sites record the electronic invitations sent out by existing members, outbound WOM may be precisely tracked. WOM, along with traditional marketing, can then be linked to the number of new members subsequently joining the site (signups). Due to the endogeneity among WOM, new signups, and traditional marketing activity, the authors employ a Vector Autoregression (VAR) modeling approach. Estimates from the VAR model show that word-ofmouth referrals have substantially longer carryover effects than traditional marketing actions. The long-run elasticity of signups with respect to WOM is estimated to be 0.53 (substantially larger than the average advertising elasticities reported in the literature) and the WOM elasticity is about 20 times higher than the elasticity for marketing events, and 30 times that of media appearances. Based on revenue from advertising impressions served to a new member, the monetary value of a WOM referral can be calculated; this yields an upper bound estimate for the financial incentives the firm might offer to stimulate word-of-mouth.", "title": "" }, { "docid": "fb1f3f300bcd48d99f0a553a709fdc89", "text": "This work includes a high step up voltage gain DC-DC converter for DC microgrid applications. The DC microgrid can be utilized for rural electrification, UPS support, Electronic lighting systems and Electrical vehicles. The whole system consists of a Photovoltaic panel (PV), High step up DC-DC converter with Maximum Power Point Tracking (MPPT) and DC microgrid. The entire system is optimized with both MPPT and converter separately. The MPP can be tracked by Incremental Conductance (IC) MPPT technique modified with D-Sweep (Duty ratio Sweep). D-sweep technique reduces the problem of multiple local maxima. Converter optimization includes a high step up DC-DC converter which comprises of both coupled inductor and switched capacitors. This increases the gain up to twenty times with high efficiency. Both converter optimization and MPPT optimization increases overall system efficiency. MATLAB/simulink model is implemented. Hardware of the system can be implemented by either voltage mode control or current mode control.", "title": "" }, { "docid": "32a3c87eb1f2415acaf3bccd652c1bea", "text": "Many recently trained neural networks employ large numbers of parameters to achieve good performance. One may intuitively use the number of parameters required as a rough gauge of the difficulty of a problem. But how accurate are such notions? How many parameters are really needed? In this paper we attempt to answer this question by training networks not in their native parameter space, but instead in a smaller, randomly oriented subspace. We slowly increase the dimension of this subspace, note at which dimension solutions first appear, and define this to be the intrinsic dimension of the objective landscape. The approach is simple to implement, computationally tractable, and produces several suggestive conclusions. Many problems have smaller intrinsic dimensions than one might suspect, and the intrinsic dimension for a given dataset varies little across a family of models with vastly different sizes. This latter result has the profound implication that once a parameter space is large enough to solve a problem, extra parameters serve directly to increase the dimensionality of the solution manifold. Intrinsic dimension allows some quantitative comparison of problem difficulty across supervised, reinforcement, and other types of learning where we conclude, for example, that solving the inverted pendulum problem is 100 times easier than classifying digits from MNIST, and playing Atari Pong from pixels is about as hard as classifying CIFAR-10. In addition to providing new cartography of the objective landscapes wandered by parameterized models, the method is a simple technique for constructively obtaining an upper bound on the minimum description length of a solution. A byproduct of this construction is a simple approach for compressing networks, in some cases by more than 100 times.", "title": "" }, { "docid": "b753eb752d4f87dbff82d77e8417f389", "text": "Our research team has spent the last few years studying the cognitive processes involved in simultaneous interpreting. The results of this research have shown that professional interpreters develop specific ways of using their working memory, due to their work in simultaneous interpreting; this allows them to perform the processes of linguistic input, lexical and semantic access, reformulation and production of the segment translated both simultaneously and under temporal pressure (Bajo, Padilla & Padilla, 1998). This research led to our interest in the processes involved in the tasks of mediation in general. We understand that linguistic and cultural mediation involves not only translation but also the different forms of interpreting: consecutive and simultaneous. Our general objective in this project is to outline a cognitive theory of translation and interpreting and find empirical support for it. From the field of translation and interpreting there have been some attempts to create global and partial theories of the processes of mediation (Gerver, 1976; Moser-Mercer, 1997; Gile, 1997), but most of these attempts lack empirical support. On the other hand, from the field of psycholinguistics there have been some attempts to make an empirical study of the tasks of translation (De Groot, 1993; Sánchez-Casas Davis and GarcíaAlbea, 1992) and interpreting (McDonald and Carpenter, 1981), but these have always been partial, concentrating on very specific aspects of translation and interpreting. The specific objectives of this project are:", "title": "" }, { "docid": "d43e159aae67755f9bebddb62202e1d5", "text": "Inactivation of tumour-suppressor genes by homozygous deletion is a prototypic event in the cancer genome, yet such deletions often encompass neighbouring genes. We propose that homozygous deletions in such passenger genes can expose cancer-specific therapeutic vulnerabilities when the collaterally deleted gene is a member of a functionally redundant family of genes carrying out an essential function. The glycolytic gene enolase 1 (ENO1) in the 1p36 locus is deleted in glioblastoma (GBM), which is tolerated by the expression of ENO2. Here we show that short-hairpin-RNA-mediated silencing of ENO2 selectively inhibits growth, survival and the tumorigenic potential of ENO1-deleted GBM cells, and that the enolase inhibitor phosphonoacetohydroxamate is selectively toxic to ENO1-deleted GBM cells relative to ENO1-intact GBM cells or normal astrocytes. The principle of collateral vulnerability should be applicable to other passenger-deleted genes encoding functionally redundant essential activities and provide an effective treatment strategy for cancers containing such genomic events.", "title": "" }, { "docid": "cb1e6d11d372e72f7675a55c8f2c429d", "text": "We evaluate the performance of a hardware/software architecture designed to perform a wide range of fast image processing tasks. The system ar chitecture is based on hardware featuring a Field Programmable Gate Array (FPGA) co-processor and a h ost computer. A LabVIEW TM host application controlling a frame grabber and an industrial camer a is used to capture and exchange video data with t he hardware co-processor via a high speed USB2.0 chann el, implemented with a standard macrocell. The FPGA accelerator is based on a Altera Cyclone II ch ip and is designed as a system-on-a-programmablechip (SOPC) with the help of an embedded Nios II so ftware processor. The SOPC system integrates the CPU, external and on chip memory, the communication channel and typical image filters appropriate for the evaluation of the system performance. Measured tran sfer rates over the communication channel and processing times for the implemented hardware/softw are logic are presented for various frame sizes. A comparison with other solutions is given and a rang e of applications is also discussed.", "title": "" }, { "docid": "584d2858178e4e33855103a71d7fdce4", "text": "This paper presents 5G mm-wave phased-array antenna for 3D-hybrid beamforming. This uses MFC to steer beam for the elevation, and uses butler matrix network for the azimuth. In case of butler matrix network, this, using 180° ring hybrid coupler switch network, is proposed to get additional beam pattern and improved SRR in comparison with conventional structure. Also, it can be selected 15 of the azimuth beam pattern. When using the chip of proposed structure, it is possible to get variable kind of beam-forming over 1000. In addition, it is suitable 5G system or a satellite communication system that requires a beamforming.", "title": "" }, { "docid": "823d838471a475ec32d460711b9805b4", "text": "Marketing has a tradition in conducting scientific research with cutting-edge techniques developed in management science, such as data envelopment analysis (DEA) (Charnes et al. 1985). Two decades ago, Kamakura, Ratchford, and Agrawal (1988) applied DEA to examine market efficiency and consumer welfare loss. In this review of three new books, my purpose is (1) to provide a background of DEA for marketing scholars and executives and (2) to motivate them with exciting DEA advances for marketing theory and practice. All three books provide brief descriptions of DEA’s history, origin, and basic models. For beginners, Ramanathan’s work, An Introduction to Data Envelopment Analysis, is a good source, offering basic concepts of DEA’s efficiency and programming formulations in a straightforward manner (with some illustrations) in the first three chapters. A unique feature of this book is that it dedicates a chapter to discussing as many as 11 DEA computer software programs and explaining some noncommercial DEA packages that are available free on the Internet for academic purposes. As Ramanathan states (p. 111), “[I]n this computer era, it is important that any management science technique has adequate software support so that potential users are encouraged to use it. Software harnesses the computing power of [personal computers] for use in practical decision-making situations. It can also expedite the implementation of a method.” EDITOR: Naveen Donthu", "title": "" }, { "docid": "438a373b6e56a384020492b54dcc124b", "text": "A new electrostatic discharge (ESD) protection scheme for differential low-noise amplifier (LNA) was proposed in this paper. The new ESD protection scheme, which evolved from the conventional double-diode ESD protection scheme without adding any extra device, was realized with cross-coupled silicon-controlled rectifier (SCR). With the new ESD protection scheme, the pin-to-pin ESD robustness can be improved, which was the most critical ESD-test pin combination for differential input pads. Experimental results had shown that differential LNA with cross-coupled-SCR ESD protection scheme can achieve excellent ESD robustness and good RF performances.", "title": "" }, { "docid": "950a6a611f1ceceeec49534c939b4e0f", "text": "Often signals and system parameters are most conveniently represented as complex-valued vectors. This occurs, for example, in array processing [1], as well as in communication systems [7] when processing narrowband signals using the equivalent complex baseband representation [2]. Furthermore, in many important applications one attempts to optimize a scalar real-valued measure of performance over the complex parameters defining the signal or system of interest. This is the case, for example, in LMS adaptive filtering where complex filter coefficients are adapted on line. To effect this adaption one attempts to optimize the performance measure by adjustments of the coefficients along its gradient direction [16, 23].", "title": "" }, { "docid": "e4e2bb8bf8cc1488b319a59f82a71f08", "text": "We aim to dismantle the prevalent black-box neural architectures used in complex visual reasoning tasks, into the proposed eXplainable and eXplicit Neural Modules (XNMs), which advance beyond existing neural module networks towards using scene graphs — objects as nodes and the pairwise relationships as edges — for explainable and explicit reasoning with structured knowledge. XNMs allow us to pay more attention to teach machines how to “think”, regardless of what they “look”. As we will show in the paper, by using scene graphs as an inductive bias, 1) we can design XNMs in a concise and flexible fashion, i.e., XNMs merely consist of 4 meta-types, which significantly reduce the number of parameters by 10 to 100 times, and 2) we can explicitly trace the reasoning-flow in terms of graph attentions. XNMs are so generic that they support a wide range of scene graph implementations with various qualities. For example, when the graphs are detected perfectly, XNMs achieve 100% accuracy on both CLEVR and CLEVR CoGenT, establishing an empirical performance upper-bound for visual reasoning; when the graphs are noisily detected from real-world images, XNMs are still robust to achieve a competitive 67.5% accuracy on VQAv2.0, surpassing the popular bag-of-objects attention models without graph structures.", "title": "" } ]
scidocsrr
09ab79166d649d927ba1096fdb2fd5a6
Learning Knowledge Graphs for Question Answering through Conversational Dialog
[ { "docid": "cf2fc7338a0a81e4c56440ec7c3c868e", "text": "We describe a new dependency parser for English tweets, TWEEBOPARSER. The parser builds on several contributions: new syntactic annotations for a corpus of tweets (TWEEBANK), with conventions informed by the domain; adaptations to a statistical parsing algorithm; and a new approach to exploiting out-of-domain Penn Treebank data. Our experiments show that the parser achieves over 80% unlabeled attachment accuracy on our new, high-quality test set and measure the benefit of our contributions. Our dataset and parser can be found at http://www.ark.cs.cmu.edu/TweetNLP.", "title": "" } ]
[ { "docid": "f7a69acbc2766e990cbd4f3c9b4124d1", "text": "This paper aims at assisting empirical researchers benefit from recent advances in causal inference. The paper stresses the paradigmatic shifts that must be undertaken in moving from traditional statistical analysis to causal analysis of multivariate data. Special emphasis is placed on the assumptions that underly all causal inferences, the languages used in formulating those assumptions, and the conditional nature of causal claims inferred from nonexperimental studies. These emphases are illustrated through a brief survey of recent results, including the control of confounding, the assessment of causal effects, the interpretation of counterfactuals, and a symbiosis between counterfactual and graphical methods of analysis.", "title": "" }, { "docid": "c6d3f20e9d535faab83fb34cec0fdb5b", "text": "Over the past two decades several attempts have been made to address the problem of face recognition and a voluminous literature has been produced. Current face recognition systems are able to perform very well in controlled environments e.g. frontal face recognition, where face images are acquired under frontal pose with strict constraints as defined in related face recognition standards. However, in unconstrained situations where a face may be captured in outdoor environments, under arbitrary illumination and large pose variations these systems fail to work. With the current focus of research to deal with these problems, much attention has been devoted in the facial feature extraction stage. Facial feature extraction is the most important step in face recognition. Several studies have been made to answer the questions like what features to use, how to describe them and several feature extraction techniques have been proposed. While many comprehensive literature reviews exist for face recognition a complete reference for different feature extraction techniques and their advantages/disadvantages with regards to a typical face recognition task in unconstrained scenarios is much needed. In this chapter we present a comprehensive review of the most relevant feature extraction techniques used in 2D face recognition and introduce a new feature extraction technique termed as Face-GLOH-signature to be used in face recognition for the first time (Sarfraz and Hellwich, 2008), which has a number of advantages over the commonly used feature descriptions in the context of unconstrained face recognition. The goal of feature extraction is to find a specific representation of the data that can highlight relevant information. This representation can be found by maximizing a criterion or can be a pre-defined representation. Usually, a face image is represented by a high dimensional vector containing pixel values (holistic representation) or a set of vectors where each vector summarizes the underlying content of a local region by using a high level 1", "title": "" }, { "docid": "f717225fa7518383e0db362e673b9af4", "text": "The web has become the world's largest repository of knowledge. Web usage mining is the process of discovering knowledge from the interactions generated by the user in the form of access logs, cookies, and user sessions data. Web Mining consists of three different categories, namely Web Content Mining, Web Structure Mining, and Web Usage Mining (is the process of discovering knowledge from the interaction generated by the users in the form of access logs, browser logs, proxy-server logs, user session data, cookies). Accurate web log mining results and efficient online navigational pattern prediction are undeniably crucial for tuning up websites and consequently helping in visitors’ retention. Like any other data mining task, web log mining starts with data cleaning and preparation and it ends up discovering some hidden knowledge which cannot be extracted using conventional methods. After applying web mining on web sessions we will get navigation patterns which are important for web users such that appropriate actions can be adopted. Due to huge data in web, discovery of patterns and there analysis for further improvement in website becomes a real time necessity. The main focus of this paper is using of hybrid prediction engine to classify users on the basis of discovered patterns from web logs. Our proposed framework is to overcome the problem arise due to using of any single algorithm, we will give results based on comparison of two different algorithms like Longest Common Sequence (LCS) algorithm and Frequent Pattern (Growth) algorithm. Keywords— Web Usage Mining, Navigation Pattern, Frequent Pattern (Growth) Algorithm. ________________________________________________________________________________________________________", "title": "" }, { "docid": "945cf1645df24629842c5e341c3822e7", "text": "Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the commercial public cloud, which makes effective data utilization service a very challenging task. Although traditional searchable encryption techniques allow users to securely search over encrypted data through keywords, they support only Boolean search and are not yet sufficient to meet the effective data utilization need that is inherently demanded by large number of users and huge amount of data files in cloud. In this paper, we define and solve the problem of secure ranked keyword search over encrypted cloud data. Ranked search greatly enhances system usability by enabling search result relevance ranking instead of sending undifferentiated results, and further ensures the file retrieval accuracy. Specifically, we explore the statistical measure approach, i.e., relevance score, from information retrieval to build a secure searchable index, and develop a one-to-many order-preserving mapping technique to properly protect those sensitive score information. The resulting design is able to facilitate efficient server-side ranking without losing keyword privacy. Thorough analysis shows that our proposed solution enjoys “as-strong-as-possible” security guarantee compared to previous searchable encryption schemes, while correctly realizing the goal of ranked keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution.", "title": "" }, { "docid": "046f15ecf1037477b10bfb4fa315c9c9", "text": "With the rapid proliferation of camera-equipped smart devices (e.g., smartphones, pads, tablets), visible light communication (VLC) over screen-camera links emerges as a novel form of near-field communication. Such communication via smart devices is highly competitive for its user-friendliness, security, and infrastructure-less (i.e., no dependency on WiFi or cellular infrastructure). However, existing approaches mostly focus on improving the transmission speed and ignore the transmission reliability. Considering the interplay between the transmission speed and reliability towards effective end-to-end communication, in this paper, we aim to boost the throughput over screen-camera links by enhancing the transmission reliability. To this end, we propose RDCode, a robust dynamic barcode which enables a novel packet-frame-block structure. Based on the layered structure, we design different error correction schemes at three levels: intra-blocks, inter-blocks and inter-frames, in order to verify and recover the lost blocks and frames. Finally, we implement RDCode and experimentally show that RDCode reaches a high level of transmission reliability (e.g., reducing the error rate to 10%) and yields a at least doubled transmission rate, compared with the existing state-of-the-art approach COBRA.", "title": "" }, { "docid": "733e5961428e5aad785926e389b9bd75", "text": "OBJECTIVE\nPeer support can be defined as the process of giving and receiving nonprofessional, nonclinical assistance from individuals with similar conditions or circumstances to achieve long-term recovery from psychiatric, alcohol, and/or other drug-related problems. Recently, there has been a dramatic rise in the adoption of alternative forms of peer support services to assist recovery from substance use disorders; however, often peer support has not been separated out as a formalized intervention component and rigorously empirically tested, making it difficult to determine its effects. This article reports the results of a literature review that was undertaken to assess the effects of peer support groups, one aspect of peer support services, in the treatment of addiction.\n\n\nMETHODS\nThe authors of this article searched electronic databases of relevant peer-reviewed research literature including PubMed and MedLINE.\n\n\nRESULTS\nTen studies met our minimum inclusion criteria, including randomized controlled trials or pre-/post-data studies, adult participants, inclusion of group format, substance use-related, and US-conducted studies published in 1999 or later. Studies demonstrated associated benefits in the following areas: 1) substance use, 2) treatment engagement, 3) human immunodeficiency virus/hepatitis C virus risk behaviors, and 4) secondary substance-related behaviors such as craving and self-efficacy. Limitations were noted on the relative lack of rigorously tested empirical studies within the literature and inability to disentangle the effects of the group treatment that is often included as a component of other services.\n\n\nCONCLUSION\nPeer support groups included in addiction treatment shows much promise; however, the limited data relevant to this topic diminish the ability to draw definitive conclusions. More rigorous research is needed in this area to further expand on this important line of research.", "title": "" }, { "docid": "d0a4bc15208b12b1647eb21e7ca9cc6c", "text": "The investment in an automated fabric defect detection system is more than economical when reduction in labor cost and associated benefits are considered. The development of a fully automated web inspection system requires robust and efficient fabric defect detection algorithms. The inspection of real fabric defects is particularly challenging due to the large number of fabric defect classes, which are characterized by their vagueness and ambiguity. Numerous techniques have been developed to detect fabric defects and the purpose of this paper is to categorize and/or describe these algorithms. This paper attempts to present the first survey on fabric defect detection techniques presented in about 160 references. Categorization of fabric defect detection techniques is useful in evaluating the qualities of identified features. The characterization of real fabric surfaces using their structure and primitive set has not yet been successful. Therefore, on the basis of the nature of features from the fabric surfaces, the proposed approaches have been characterized into three categories; statistical, spectral and model-based. In order to evaluate the state-of-the-art, the limitations of several promising techniques are identified and performances are analyzed in the context of their demonstrated results and intended application. The conclusions from this paper also suggest that the combination of statistical, spectral and model-based approaches can give better results than any single approach, and is suggested for further research.", "title": "" }, { "docid": "e72382020e2b15be32047da611ad078f", "text": "This article describes the results of a case study that applies Neural Networkbased Optical Character Recognition (OCR) to scanned images of books printed between 1487 and 1870 by training the OCR engine OCRopus (Breuel et al. 2013) on the RIDGES herbal text corpus (Odebrecht et al. 2017, in press). Training specific OCR models was possible because the necessary ground truth is available as error-corrected diplomatic transcriptions. The OCR results have been evaluated for accuracy against the ground truth of unseen test sets. Character and word accuracies (percentage of correctly recognized items) for the resulting machine-readable texts of individual documents range from 94% to more than 99% (character level) and from 76% to 97% (word level). This includes the earliest printed books, which were thought to be inaccessible by OCR methods until recently. Furthermore, OCR models trained on one part of the corpus consisting of books with different printing dates and different typesets (mixed models) have been tested for their predictive power on the books from the other part containing yet other fonts, mostly yielding character accuracies well above 90%. It therefore seems possible to construct generalized models trained on a range of fonts that can be applied to a wide variety of historical printings still giving good results. A moderate postcorrection effort of some pages will then enable the training of individual models with even better accuracies. Using this method, diachronic corpora including early printings can be constructed much faster and cheaper than by manual transcription. The OCR methods reported here open up the possibility of transforming our printed textual cultural 1 ar X iv :1 60 8. 02 15 3v 2 [ cs .C L ] 1 F eb 2 01 7 Springmann & Lüdeling OCR of historical printings heritage into electronic text by largely automatic means, which is a prerequisite for the mass conversion of scanned books.", "title": "" }, { "docid": "2ad8723c9fce1a6264672f41824963f8", "text": "Psychologists have repeatedly shown that a single statistical factor--often called \"general intelligence\"--emerges from the correlations among people's performance on a wide variety of cognitive tasks. But no one has systematically examined whether a similar kind of \"collective intelligence\" exists for groups of people. In two studies with 699 people, working in groups of two to five, we find converging evidence of a general collective intelligence factor that explains a group's performance on a wide variety of tasks. This \"c factor\" is not strongly correlated with the average or maximum individual intelligence of group members but is correlated with the average social sensitivity of group members, the equality in distribution of conversational turn-taking, and the proportion of females in the group.", "title": "" }, { "docid": "e7616fbe9853bf8e1c89441287baf30c", "text": "The objective of the current study is to compare the use of a nasal continuous positive airway pressure (nCPAP) to a high-flow humidified nasal cannula (HFNC) in infants with acute bronchiolitis, who were admitted to a pediatric intensive care unit (PICU) during two consecutive seasons. We retrospectively reviewed the medical records of all infants admitted to a PICU at a tertiary care French hospital during the bronchiolitis seasons of 2010/11 and 2011/12. Infants admitted to the PICU, who required noninvasive respiratory support, were included. The first noninvasive respiratory support modality was nCPAP during the 2010/11 season, while HFNC was used during the 2011/2012 season. We compared the length of stay (LOS) in the PICU; the daily measure of PCO2 and pH; and the mean of the five higher values of heart rate (HR), respiratory rate (RR), FiO2, and SpO2 each day, during the first 5 days. Thirty-four children met the inclusion criteria: 19 during the first period (nCPAP group) and 15 during the second period (HFNC group). Parameters such as LOS in PICU and oxygenation were similar in the two groups. Oxygen weaning occurred during the same time for the two groups. There were no differences between the two groups for RR, HR, FiO2, and CO2 evolution. HFNC therapy failed in three patients, two of whom required invasive mechanical ventilation, versus one in the nCPAP group. Conclusion: We did not find a difference between HFNC and nCPAP in the management of severe bronchiolitis in our PICU. Larger prospective studies are required to confirm these findings.", "title": "" }, { "docid": "0879f749188cbb88a8cefff60d0d4f6e", "text": "Raw tomato contains a high level of lycopene, which has been reported to have many important health benefits. However, information on the changes of the lycopene content in tomato during cooking is limited. In this study, the lycopene content in raw and thermally processed (baked, microwaved, and fried) tomato slurries was investigated and analyzed using a high-performance liquid chromatography (HPLC) method. In the thermal stability study using a pure lycopene standard, 50% of lycopene was degraded at 100 ◦C after 60 min, 125 ◦C after 20 min, and 150 ◦C after less than 10 min. Only 64.1% and 51.5% lycopene was retained when the tomato slurry was baked at 177 ◦C and 218 ◦C for 15 min, respectively. At these temperatures, only 37.3% and 25.1% of lycopene was retained after baking for 45 min. In 1 min of the high power of microwave heating, 64.4% of lycopene still remained. However, more degradation of lycopene in the slurry was found in the frying study. Only 36.6% and 35.5% of lycopene was retained after frying at 145 and 165 ◦C for 1 min, respectively.", "title": "" }, { "docid": "b088438d5e44d9fc2bd4156dbb708b1a", "text": "Applying parallelism to constraint solving seems a promising approach and it has been done with varying degrees of success. Early attempts to parallelize constraint propagation, which constitutes the core of traditional interleaved propagation and search constraint solving, were hindered by its essentially sequential nature. Recently, parallelization efforts have focussed mainly on the search part of constraint solving, as well as on local-search based solving. Lately, a particular source of parallelism has become pervasive, in the guise of GPUs, able to run thousands of parallel threads, and they have naturally drawn the attention of researchers in parallel constraint solving. In this paper, we address challenges faced when using multiple devices for constraint solving, especially GPUs, such as deciding on the appropriate level of parallelism to employ, load balancing and inter-device communication, and present our current solutions.", "title": "" }, { "docid": "5a25af5b9c51b7b1a7b36f0c9b121add", "text": "BACKGROUND\nCircumcision is a common procedure, but regional and societal attitudes differ on whether there is a need for a male to be circumcised and, if so, at what age. This is an important issue for many parents, but also pediatricians, other doctors, policy makers, public health authorities, medical bodies, and males themselves.\n\n\nDISCUSSION\nWe show here that infancy is an optimal time for clinical circumcision because an infant's low mobility facilitates the use of local anesthesia, sutures are not required, healing is quick, cosmetic outcome is usually excellent, costs are minimal, and complications are uncommon. The benefits of infant circumcision include prevention of urinary tract infections (a cause of renal scarring), reduction in risk of inflammatory foreskin conditions such as balanoposthitis, foreskin injuries, phimosis and paraphimosis. When the boy later becomes sexually active he has substantial protection against risk of HIV and other viral sexually transmitted infections such as genital herpes and oncogenic human papillomavirus, as well as penile cancer. The risk of cervical cancer in his female partner(s) is also reduced. Circumcision in adolescence or adulthood may evoke a fear of pain, penile damage or reduced sexual pleasure, even though unfounded. Time off work or school will be needed, cost is much greater, as are risks of complications, healing is slower, and stitches or tissue glue must be used.\n\n\nSUMMARY\nInfant circumcision is safe, simple, convenient and cost-effective. The available evidence strongly supports infancy as the optimal time for circumcision.", "title": "" }, { "docid": "5816f70a7f4d7d0beb6e0653db962df3", "text": "Packaging appearance is extremely important in cigarette manufacturing. Typically, there are two types of cigarette packaging defects: (1) cigarette laying defects such as incorrect cigarette numbers and irregular layout; (2) tin paper handle defects such as folded paper handles. In this paper, an automated vision-based defect inspection system is designed for cigarettes packaged in tin containers. The first type of defects is inspected by counting the number of cigarettes in a tin container. First k-means clustering is performed to segment cigarette regions. After noise filtering, valid cigarette regions are identified by estimating individual cigarette area using linear regression. The k clustering centers and area estimation function are learned off-line on training images. The second kind of defect is detected by checking the segmented paper handle region. Experimental results on 500 test images demonstrate the effectiveness of the proposed inspection system. The proposed method also contributes to the general detection and classification system such as identifying mitosis in early diagnosis of cervical cancer.", "title": "" }, { "docid": "dfca655ee52769c9c1d26e8c3f5b883f", "text": "BACKGROUND\nDihydrocapsiate (DCT) is a natural safe food ingredient which is structurally related to capsaicin from chili pepper and is found in the non-pungent pepper strain, CH-19 Sweet. It has been shown to elicit the thermogenic effects of capsaicin but without its gastrointestinal side effects.\n\n\nMETHODS\nThe present study was designed to examine the effects of DCT on both adaptive thermogenesis as the result of caloric restriction with a high protein very low calorie diet (VLCD) and to determine whether DCT would increase post-prandial energy expenditure (PPEE) in response to a 400 kcal/60 g protein liquid test meal. Thirty-three subjects completed an outpatient very low calorie diet (800 kcal/day providing 120 g/day protein) over 4 weeks and were randomly assigned to receive either DCT capsules three times per day (3 mg or 9 mg) or placebo. At baseline and 4 weeks, fasting basal metabolic rate and PPEE were measured in a metabolic hood and fat free mass (FFM) determined using displacement plethysmography (BOD POD).\n\n\nRESULTS\nPPEE normalized to FFM was increased significantly in subjects receiving 9 mg/day DCT by comparison to placebo (p < 0.05), but decreases in resting metabolic rate were not affected. Respiratory quotient (RQ) increased by 0.04 in the placebo group (p < 0.05) at end of the 4 weeks, but did not change in groups receiving DCT.\n\n\nCONCLUSIONS\nThese data provide evidence for postprandial increases in thermogenesis and fat oxidation secondary to administration of dihydrocapsiate.\n\n\nTRIAL REGISTRATION\nclinicaltrial.govNCT01142687.", "title": "" }, { "docid": "627f3c07a8ce5f0935ced97f685f44f4", "text": "Click-through rate (CTR) prediction plays a central role in search advertising. One needs CTR estimates unbiased by positional effect in order for ad ranking, allocation, and pricing to be based upon ad relevance or quality in terms of click propensity. However, the observed click-through data has been confounded by positional bias, that is, users tend to click more on ads shown in higher positions than lower ones, regardless of the ad relevance. We describe a probabilistic factor model as a general principled approach to studying these exogenous and often overwhelming phenomena. The model is simple and linear in nature, while empirically justified by the advertising domain. Our experimental results with artificial and real-world sponsored search data show the soundness of the underlying model assumption, which in turn yields superior prediction accuracy.", "title": "" }, { "docid": "be3296a4c18c8c102d9365d9ab092cf4", "text": "Color barcode-based visible light communication (VLC) over screen-camera links has attracted great research interest in recent years due to its many desirable properties, including free of charge, free of interference, free of complex network configuration and well-controlled communication security. To achieve high-throughput barcode streaming, previous systems separately address design challenges such as image blur, imperfect frame synchronization and error correction etc., without being investigated as an interrelated whole. This does not fully exploit the capacity of color barcode streaming, and these solutions all have their own limitations from a practical perspective. This paper proposes RainBar, a new and improved color barcode-based visual communication system, which features a carefully-designed high-capacity barcode layout design to allow flexible frame synchronization and accurate code extraction. A progressive code locator detection and localization scheme and a robust color recognition scheme are proposed to enhance system robustness and hence the decoding rate under various working conditions. An extensive experimental study is presented to demonstrate the effectiveness and flexibility of RainBar. Results on Android smartphones show that our system achieves higher average throughput than previous systems, under various working environments.", "title": "" }, { "docid": "45ea8497ccd9f63d519e40ef41938331", "text": "The appearance of an object in an image encodes invaluable information about that object and the surrounding scene. Inferring object reflectance and scene illumination from an image would help us decode this information: reflectance can reveal important properties about the materials composing an object; the illumination can tell us, for instance, whether the scene is indoors or outdoors. Recovering reflectance and illumination from a single image in the real world, however, is a difficult task. Real scenes illuminate objects from every visible direction and real objects vary greatly in reflectance behavior. In addition, the image formation process introduces ambiguities, like color constancy, that make reversing the process ill-posed. To address this problem, we propose a Bayesian framework for joint reflectance and illumination inference in the real world. We develop a reflectance model and priors that precisely capture the space of real-world object reflectance and a flexible illumination model that can represent real-world illumination with priors that combat the deleterious effects of image formation. We analyze the performance of our approach on a set of synthetic data and demonstrate results on real-world scenes. These contributions enable reliable reflectance and illumination inference in the real world.", "title": "" }, { "docid": "bb9f86e800e3f00bf7b34be85d846ff0", "text": "This paper presents a survey of the autopilot systems for small fixed-wing unmanned air vehicles (UAVs). The UAV flight control basics are introduced first. The radio control system and autopilot control system are then explained from both hardware and software viewpoints. Several typical commercial off-the-shelf autopilot packages are compared in detail. In addition, some research autopilot systems are introduced. Finally, conclusions are made with a summary of the current autopilot market and a remark on the future development.This paper presents a survey of the autopilot systems for small fixed-wing unmanned air vehicles (UAVs). The UAV flight control basics are introduced first. The radio control system and autopilot control system are then explained from both hardware and software viewpoints. Several typical commercial off-the-shelf autopilot packages are compared in detail. In addition, some research autopilot systems are introduced. Finally, conclusions are made with a summary of the current autopilot market and a remark on the future development.", "title": "" } ]
scidocsrr
a04245add9a1b1f59b8f46260db49621
Supplementary material for “ Masked Autoregressive Flow for Density Estimation ”
[ { "docid": "b6a8f45bd10c30040ed476b9d11aa908", "text": "PixelCNNs are a recently proposed class of powerful generative models with tractable likelihood. Here we discuss our implementation of PixelCNNs which we make available at https://github.com/openai/pixel-cnn. Our implementation contains a number of modifications to the original model that both simplify its structure and improve its performance. 1) We use a discretized logistic mixture likelihood on the pixels, rather than a 256-way softmax, which we find to speed up training. 2) We condition on whole pixels, rather than R/G/B sub-pixels, simplifying the model structure. 3) We use downsampling to efficiently capture structure at multiple resolutions. 4) We introduce additional short-cut connections to further speed up optimization. 5) We regularize the model using dropout. Finally, we present state-of-the-art log likelihood results on CIFAR-10 to demonstrate the usefulness of these modifications.", "title": "" }, { "docid": "4c21ec3a600d773ea16ce6c45df8fe9d", "text": "The efficacy of particle identification is compared using artificial neutral networks and boosted decision trees. The comparison is performed in the context of the MiniBooNE, an experiment at Fermilab searching for neutrino oscillations. Based on studies of Monte Carlo samples of simulated data, particle identification with boosting algorithms has better performance than that with artificial neural networks for the MiniBooNE experiment. Although the tests in this paper were for one experiment, it is expected that boosting algorithms will find wide application in physics. r 2005 Elsevier B.V. All rights reserved. PACS: 29.85.+c; 02.70.Uu; 07.05.Mh; 14.60.Pq", "title": "" }, { "docid": "3cdab5427efd08edc4f73266b7ed9176", "text": "Unsupervised learning of probabilistic models is a central yet challenging problem in machine learning. Specifically, designing models with tractable learning, sampling, inference and evaluation is crucial in solving this task. We extend the space of such models using real-valued non-volume preserving (real NVP) transformations, a set of powerful, stably invertible, and learnable transformations, resulting in an unsupervised learning algorithm with exact log-likelihood computation, exact and efficient sampling, exact and efficient inference of latent variables, and an interpretable latent space. We demonstrate its ability to model natural images on four datasets through sampling, log-likelihood evaluation, and latent variable manipulations.", "title": "" } ]
[ { "docid": "2a5710aeaba7e39c5e08c1a5310c89f6", "text": "We present an augmented reality system that supports human workers in a rapidly changing production environment. By providing spatially registered information on the task directly in the user's field of view the system can guide the user through unfamiliar tasks (e.g. assembly of new products) and visualize information directly in the spatial context were it is relevant. In the first version we present the user with picking and assembly instructions in an assembly application. In this paper we present the initial experience with this system, which has already been used successfully by several hundred users who had no previous experience in the assembly task.", "title": "" }, { "docid": "527c4c17aadb23a991d85511004a7c4f", "text": "Accurate and robust recognition and prediction of traffic situation plays an important role in autonomous driving, which is a prerequisite for risk assessment and effective decision making. Although there exist a lot of works dealing with modeling driver behavior of a single object, it remains a challenge to make predictions for multiple highly interactive agents that react to each other simultaneously. In this work, we propose a generic probabilistic hierarchical recognition and prediction framework which employs a two-layer Hidden Markov Model (TLHMM) to obtain the distribution of potential situations and a learning-based dynamic scene evolution model to sample a group of future trajectories. Instead of predicting motions of a single entity, we propose to get the joint distribution by modeling multiple interactive agents as a whole system. Moreover, due to the decoupling property of the layered structure, our model is suitable for knowledge transfer from simulation to real world applications as well as among different traffic scenarios, which can reduce the computational efforts of training and the demand for a large data amount. A case study of highway ramp merging scenario is demonstrated to verify the effectiveness and accuracy of the proposed framework.", "title": "" }, { "docid": "08c26a40328648cf6a6d0a7efc3917a5", "text": "Person re-identification (ReID) is an important task in video surveillance and has various applications. It is non-trivial due to complex background clutters, varying illumination conditions, and uncontrollable camera settings. Moreover, the person body misalignment caused by detectors or pose variations is sometimes too severe for feature matching across images. In this study, we propose a novel Convolutional Neural Network (CNN), called Spindle Net, based on human body region guided multi-stage feature decomposition and tree-structured competitive feature fusion. It is the first time human body structure information is considered in a CNN framework to facilitate feature learning. The proposed Spindle Net brings unique advantages: 1) it separately captures semantic features from different body regions thus the macro-and micro-body features can be well aligned across images, 2) the learned region features from different semantic regions are merged with a competitive scheme and discriminative features can be well preserved. State of the art performance can be achieved on multiple datasets by large margins. We further demonstrate the robustness and effectiveness of the proposed Spindle Net on our proposed dataset SenseReID without fine-tuning.", "title": "" }, { "docid": "b2f0b5ef76d9e98e93e6c5ed64642584", "text": "The yeast and fungal prions determine heritable and infectious traits, and are thus genes composed of protein. Most prions are inactive forms of a normal protein as it forms a self-propagating filamentous β-sheet-rich polymer structure called amyloid. Remarkably, a single prion protein sequence can form two or more faithfully inherited prion variants, in effect alleles of these genes. What protein structure explains this protein-based inheritance? Using solid-state nuclear magnetic resonance, we showed that the infectious amyloids of the prion domains of Ure2p, Sup35p and Rnq1p have an in-register parallel architecture. This structure explains how the amyloid filament ends can template the structure of a new protein as it joins the filament. The yeast prions [PSI(+)] and [URE3] are not found in wild strains, indicating that they are a disadvantage to the cell. Moreover, the prion domains of Ure2p and Sup35p have functions unrelated to prion formation, indicating that these domains are not present for the purpose of forming prions. Indeed, prion-forming ability is not conserved, even within Saccharomyces cerevisiae, suggesting that the rare formation of prions is a disease. The prion domain sequences generally vary more rapidly in evolution than does the remainder of the molecule, producing a barrier to prion transmission, perhaps selected in evolution by this protection.", "title": "" }, { "docid": "7b88e651bf87e3a780fd1cf31b997bc5", "text": "While the use of the internet and social media as a tool for extremists and terrorists has been well documented, understanding the mechanisms at work has been much more elusive. This paper begins with a grounded theory approach guided by a new theoretical approach to power that utilizes both terrorism cases and extremist social media groups to develop an explanatory model of radicalization. Preliminary hypotheses are developed, explored and refined in order to develop a comprehensive model which is then presented. This model utilizes and applies concepts from social theorist Michel Foucault, including the use of discourse and networked power relations in order to normalize and modify thoughts and behaviors. The internet is conceptualized as a type of institution in which this framework of power operates and seeks to recruit and radicalize. Overall, findings suggest that the explanatory model presented is a well suited, yet still incomplete in explaining the process of online radicalization.", "title": "" }, { "docid": "d1ebf47c1f0b1d8572d526e9260dbd32", "text": "In this paper, mortality in the immediate aftermath of an earthquake is studied on a worldwide scale using multivariate analysis. A statistical method is presented that analyzes reported earthquake fatalities as a function of a heterogeneous set of parameters selected on the basis of their presumed influence on earthquake mortality. The ensemble was compiled from demographic, seismic, and reported fatality data culled from available records of past earthquakes organized in a geographic information system. The authors consider the statistical relation between earthquake mortality and the available data ensemble, analyze the validity of the results in view of the parametric uncertainties, and propose a multivariate mortality analysis prediction method. The analysis reveals that, although the highest mortality rates are expected in poorly developed rural areas, high fatality counts can result from a wide range of mortality ratios that depend on the effective population size.", "title": "" }, { "docid": "2e812c0a44832721fcbd7272f9f6a465", "text": "Previous research has shown that people differ in their implicit theories about the essential characteristics of intelligence and emotions. Some people believe these characteristics to be predetermined and immutable (entity theorists), whereas others believe that these characteristics can be changed through learning and behavior training (incremental theorists). The present study provides evidence that in healthy adults (N = 688), implicit beliefs about emotions and emotional intelligence (EI) may influence performance on the ability-based Mayer-Salovey-Caruso Emotional Intelligence Test (MSCEIT). Adults in our sample with incremental theories about emotions and EI scored higher on the MSCEIT than entity theorists, with implicit theories about EI showing a stronger relationship to scores than theories about emotions. Although our participants perceived both emotion and EI as malleable, they viewed emotions as more malleable than EI. Women and young adults in general were more likely to be incremental theorists than men and older adults. Furthermore, we found that emotion and EI theories mediated the relationship of gender and age with ability EI. Our findings suggest that people's implicit theories about EI may influence their emotional abilities, which may have important consequences for personal and professional EI training.", "title": "" }, { "docid": "2f4cfa040664d08b1540677c8d72f962", "text": "We study the problem of modeling spatiotemporal trajectories over long time horizons using expert demonstrations. For instance, in sports, agents often choose action sequences with long-term goals in mind, such as achieving a certain strategic position. Conventional policy learning approaches, such as those based on Markov decision processes, generally fail at learning cohesive long-term behavior in such high-dimensional state spaces, and are only effective when fairly myopic decisionmaking yields the desired behavior. The key difficulty is that conventional models are “single-scale” and only learn a single state-action policy. We instead propose a hierarchical policy class that automatically reasons about both long-term and shortterm goals, which we instantiate as a hierarchical neural network. We showcase our approach in a case study on learning to imitate demonstrated basketball trajectories, and show that it generates significantly more realistic trajectories compared to non-hierarchical baselines as judged by professional sports analysts.", "title": "" }, { "docid": "83413682f018ae5aec9ec415679de940", "text": "An 18-year-old female patient arrived at the emergency department complaining of abdominal pain and fullness after a heavy meal. Physical examination revealed she was filthy and cover in feces, and she experienced severe abdominal distension. She died in ED and a diagnostic autopsy examination was requested. At external examination, the pathologist observed a significant dilation of the anal sphincter and suspected sexual assault, thus alerting the Judicial Authority who assigned the case to our department for a forensic autopsy. During the autopsy, we observed anal orifice expansion without signs of violence; food was found in the pleural cavity. The stomach was hyper-distended and perforated at three different points as well as the diaphragm. The patient was suffering from anorexia nervosa with episodes of overeating followed by manual voiding of her feces from the anal cavity (thus explaining the anal dilatation). The forensic pathologists closed the case as an accidental death.", "title": "" }, { "docid": "b692e35c404da653d27dc33c01867b6e", "text": "We demonstrate that it is possible to perform automatic sentiment classification in the very noisy domain of customer feedback data. We show that by using large feature vectors in combination with feature reduction, we can train linear support vector machines that achieve high classification accuracy on data that present classification challenges even for a human annotator. We also show that, surprisingly, the addition of deep linguistic analysis features to a set of surface level word n-gram features contributes consistently to classification accuracy in this domain.", "title": "" }, { "docid": "1701da2aed094fdcbfaca6c2252d2e53", "text": "Event cameras are bio-inspired vision sensors that output pixel-level brightness changes instead of standard intensity frames. These cameras do not suffer from motion blur and have a very high dynamic range, which enables them to provide reliable visual information during high-speed motions or in scenes characterized by high dynamic range. These features, along with a very low power consumption, make event cameras an ideal complement to standard cameras for VR/AR and video game applications. With these applications in mind, this paper tackles the problem of accurate, low-latency tracking of an event camera from an existing photometric depth map (i.e., intensity plus depth information) built via classic dense reconstruction pipelines. Our approach tracks the 6-DOF pose of the event camera upon the arrival of each event, thus virtually eliminating latency. We successfully evaluate the method in both indoor and outdoor scenes and show that—because of the technological advantages of the event camera—our pipeline works in scenes characterized by high-speed motion, which are still inaccessible to standard cameras.", "title": "" }, { "docid": "1c79bf1b4dcad01f9afc54f467d8067f", "text": "With the rapid growth of network bandwidth, increases in CPU cores on a single machine, and application API models demanding more short-lived connections, a scalable TCP stack is performance-critical. Although many clean-state designs have been proposed, production environments still call for a bottom-up parallel TCP stack design that is backward-compatible with existing applications.\n We present Fastsocket, a BSD Socket-compatible and scalable kernel socket design, which achieves table-level connection partition in TCP stack and guarantees connection locality for both passive and active connections. Fastsocket architecture is a ground up partition design, from NIC interrupts all the way up to applications, which naturally eliminates various lock contentions in the entire stack. Moreover, Fastsocket maintains the full functionality of the kernel TCP stack and BSD-socket-compatible API, and thus applications need no modifications.\n Our evaluations show that Fastsocket achieves a speedup of 20.4x on a 24-core machine under a workload of short-lived connections, outperforming the state-of-the-art Linux kernel TCP implementations. When scaling up to 24 CPU cores, Fastsocket increases the throughput of Nginx and HAProxy by 267% and 621% respectively compared with the base Linux kernel. We also demonstrate that Fastsocket can achieve scalability and preserve BSD socket API at the same time. Fastsocket is already deployed in the production environment of Sina WeiBo, serving 50 million daily active users and billions of requests per day.", "title": "" }, { "docid": "92ac3bfdcf5e554152c4ce2e26b77315", "text": "How can we perform efficient inference and learning in directed probabilistic models, in the presence of continuous latent variables with intractable posterior distributions, and large datasets? We introduce a stochastic variational inference and learning algorithm that scales to large datasets and, under some mild differentiability conditions, even works in the intractable case. Our contributions is two-fold. First, we show that a reparameterization of the variational lower bound yields a lower bound estimator that can be straightforwardly optimized using standard stochastic gradient methods. Second, we show that for i.i.d. datasets with continuous latent variables per datapoint, posterior inference can be made especially efficient by fitting an approximate inference model (also called a recognition model) to the intractable posterior using the proposed lower bound estimator. Theoretical advantages are reflected in experimental results.", "title": "" }, { "docid": "caf88f7fd5ec7f3a3499f46f541b985b", "text": "Photo-based question answering is a useful way of finding information about physical objects. Current question answering (QA) systems are text-based and can be difficult to use when a question involves an object with distinct visual features. A photo-based QA system allows direct use of a photo to refer to the object. We develop a three-layer system architecture for photo-based QA that brings together recent technical achievements in question answering and image matching. The first, template-based QA layer matches a query photo to online images and extracts structured data from multimedia databases to answer questions about the photo. To simplify image matching, it exploits the question text to filter images based on categories and keywords. The second, information retrieval QA layer searches an internal repository of resolved photo-based questions to retrieve relevant answers. The third, human-computation QA layer leverages community experts to handle the most difficult cases. A series of experiments performed on a pilot dataset of 30,000 images of books, movie DVD covers, grocery items, and landmarks demonstrate the technical feasibility of this architecture. We present three prototypes to show how photo-based QA can be built into an online album, a text-based QA, and a mobile application.", "title": "" }, { "docid": "78a2bf1c2edec7ec9eb48f8b07dc9e04", "text": "The performance of the most commonly used metal antennas close to the human body is one of the limiting factors of the performance of bio-sensors and wireless body area networks (WBAN). Due to the high dielectric and conductivity contrast with respect to most parts of the human body (blood, skin, …), the range of most of the wireless sensors operating in RF and microwave frequencies is limited to 1–2 cm when attached to the body. In this paper, we introduce the very novel idea of liquid antennas, that is based on engineering the properties of liquids. This approach allows for the improvement of the range by a factor of 5–10 in a very easy-to-realize way, just modifying the salinity of the aqueous solution of the antenna. A similar methodology can be extended to the development of liquid RF electronics for implantable devices and wearable real-time bio-signal monitoring, since it can potentially lead to very flexible antenna and electronic configurations.", "title": "" }, { "docid": "e8055c37b0082cff57e02389949fb7ca", "text": "Distributed SDN controllers have been proposed to address performance and resilience issues. While approaches for datacenters are built on strongly-consistent state sharing among controllers, others for WAN and constrained networks rely on a loosely-consistent distributed state. In this paper, we address the problem of failover for distributed SDN controllers by proposing two strategies for neighbor active controllers to take over the control of orphan OpenFlow switches: (1) a greedy incorporation and (2) a pre-partitioning among controllers. We built a prototype with distributed Floodlight controllers to evaluate these strategies. The results show that the failover duration with the greedy approach is proportional to the quantity of orphan switches while the pre-partitioning approach, introducing a very small additional control traffic, enables to react quicker in less than 200ms.", "title": "" }, { "docid": "7eed5e11e47807a3ff0af21461e88385", "text": "We propose Attentive Regularization (AR), a method to constrain the activation maps of kernels in Convolutional Neural Networks (CNNs) to specific regions of interest (ROIs). Each kernel learns a location of specialization along with its weights through standard backpropagation. A differentiable attention mechanism requiring no additional supervision is used to optimize the ROIs. Traditional CNNs of different types and structures can be modified with this idea into equivalent Targeted Kernel Networks (TKNs), while keeping the network size nearly identical. By restricting kernel ROIs, we reduce the number of sliding convolutional operations performed throughout the network in its forward pass, speeding up both training and inference. We evaluate our proposed architecture on both synthetic and natural tasks across multiple domains. TKNs obtain significant improvements over baselines, requiring less computation (around an order of magnitude) while achieving superior performance.", "title": "" }, { "docid": "5e4ef99cd48e385984509613b3697e37", "text": "RC4 has been the most popular stream cipher in the history of symmetric key cryptography. Its internal state contains a permutation over all possible bytes from 0 to 255, and it attempts to generate a pseudo-random sequence of bytes (called keystream) by extracting elements of this permutation. Over the last twenty years, numerous cryptanalytic results on RC4 stream cipher have been published, many of which are based on non-random (biased) events involving the secret key, the state variables, and the keystream of the cipher. Though biases based on the secret key are common in RC4 literature, none of the existing ones depends on the length of the secret key. In the first part of this paper, we investigate the effect of RC4 keylength on its keystream, and report significant biases involving the length of the secret key. In the process, we prove the two known empirical biases that were experimentally reported and used in recent attacks against WEP and WPA by Sepehrdad, Vaudenay and Vuagnoux in EUROCRYPT 2011. After our current work, there remains no bias in the literature of WEP and WPA attacks without a proof. In the second part of the paper, we present theoretical proofs of some significant initial-round empirical biases observed by Sepehrdad, Vaudenay and Vuagnoux in SAC 2010. In the third part, we present the derivation of the complete probability distribution of the first byte of RC4 keystream, a problem left open for a decade since the observation by Mironov in CRYPTO 2002. Further, the existence of positive biases towards zero for all the initial bytes 3 to 255 is proved and exploited towards a generalized broadcast attack on RC4. We also investigate for long-term non-randomness in the keystream, and prove a new long-term bias of RC4.", "title": "" }, { "docid": "95a376ec68ac3c4bd6b0fd236dca5bcd", "text": "Long-term suppression of postprandial glucose concentration is an important dietary strategy for the prevention and treatment of type 2 diabetes. Because previous reports have suggested that seaweed may exert anti-diabetic effects in animals, the effects of Wakame or Mekabu intake with 200 g white rice, 50 g boiled soybeans, 60 g potatoes, and 40 g broccoli on postprandial glucose, insulin and free fatty acid levels were investigated in healthy subjects. Plasma glucose levels at 30 min and glucose area under the curve (AUC) at 0-30 min after the Mekabu meal were significantly lower than that after the control meal. Plasma glucose and glucose AUC were not different between the Wakame and control meals. Postprandial serum insulin and its AUC and free fatty acid concentration were not different among the three meals. In addition, fullness, satisfaction, and wellness scores were not different among the three meals. Thus, consumption of 70 g Mekabu with a white rice-based breakfast reduces postprandial glucose concentration.", "title": "" }, { "docid": "c18903fad6b70086de9be9bafffb2b65", "text": "In this work we determine how well the common objective image quality measures (Mean Squared Error (MSE), local MSE, Signalto-Noise Ratio (SNR), Structural Similarity Index (SSIM), Visual Signalto-Noise Ratio (VSNR) and Visual Information Fidelity (VIF)) predict subjective radiologists’ assessments for brain and body computed tomography (CT) images. A subjective experiment was designed where radiologists were asked to rate the quality of compressed medical images in a setting similar to clinical. We propose a modified Receiver Operating Characteristic (ROC) analysis method for comparison of the image quality measures where the “ground truth” is considered to be given by subjective scores. The best performance was achieved by the SSIM index and VIF for brain and body CT images. The worst results were observed for VSNR. We have utilized a logistic curve model which can be used to predict the subjective assessments with an objective criteria. This is a practical tool that can be used to determine the quality of medical images.", "title": "" } ]
scidocsrr
83b21b45d3a3c8b232033bd87240c74b
Comparison of Different POS Tagging Techniques ( n-gram , HMM and Brill ’ s tagger ) for Bangla
[ { "docid": "96669cea810d2918f2d35875f87d45f2", "text": "In this paper, a new probabilistic tagging method is presented which avoids problems that Markov Model based taggers face, when they have to estimate transition probabilities from sparse data. In this tagging method, transition probabilities are estimated using a decision tree. Based on this method, a part-of-speech tagger (called TreeTagger) has been implemented which achieves 96.36 % accuracy on Penn-Treebank data which is better than that of a trigram tagger (96.06 %) on the same data.", "title": "" } ]
[ { "docid": "7b88e651bf87e3a780fd1cf31b997bc5", "text": "While the use of the internet and social media as a tool for extremists and terrorists has been well documented, understanding the mechanisms at work has been much more elusive. This paper begins with a grounded theory approach guided by a new theoretical approach to power that utilizes both terrorism cases and extremist social media groups to develop an explanatory model of radicalization. Preliminary hypotheses are developed, explored and refined in order to develop a comprehensive model which is then presented. This model utilizes and applies concepts from social theorist Michel Foucault, including the use of discourse and networked power relations in order to normalize and modify thoughts and behaviors. The internet is conceptualized as a type of institution in which this framework of power operates and seeks to recruit and radicalize. Overall, findings suggest that the explanatory model presented is a well suited, yet still incomplete in explaining the process of online radicalization.", "title": "" }, { "docid": "8e654ace264f8062caee76b0a306738c", "text": "We present a fully fledged practical working application for a rule-based NLG system that is able to create non-trivial, human sounding narrative from structured data, in any language (e.g., English, German, Arabic and Finnish) and for any topic.", "title": "" }, { "docid": "0ccf6d97ff8a6b664a73056ec8e39dc7", "text": "1. Resilient healthcare This integrative review focuses on the methodological strategies employed by studies on resilient healthcare. Resilience engineering (RE), which involves the study of coping with complexity (Woods and Hollnagel, 2006) in modern socio-technical systems (Bergström et al., 2015); emerged in about 2000. The RE discipline is quickly developing, and it has been applied to healthcare, aviation, the petrochemical industry, nuclear power plants, railways, manufacturing, natural disasters and other fields (Righi et al., 2015). The term ‘resilient healthcare’ (RHC) refers to the application of the concepts and methods of RE in the healthcare field, specifically regarding patient safety (Hollnagel et al., 2013a). Instead of the traditional risk management approach based on retrospective analyses of errors, RHC focuses on ‘everyday clinical work’, specifically on the ways it unfolds in practice (Braithwaite et al., 2017). Wears et al. (2015) defined RHC as follows. The ability of the health care system (a clinic, a ward, a hospital, a county) to adjust its functioning prior to, during, or following events (changes, disturbances or opportunities), and thereby sustain required operations under both expected and unexpected conditions. (p. xxvii) After more than a decade of theoretical development in the field of resilience, scholars are beginning to identify its methodological challenges (Woods, 2015; Nemeth and Herrera, 2015). The lack of welldefined constructs to conceptualize resilience challenges the ability to operationalize those constructs in empirical research (Righi et al., 2015; Wiig and Fahlbruch, forthcoming). Further, studying complexity requires challenging methodological designs to obtain evidence about the tested constructs to inform and further develop theory (Bergström and Dekker, 2014). It is imperative to gather emerging knowledge on applied methodology in empirical RHC research to map and discuss the methodological strategies in the healthcare domain. The insights gained might create and refine methodological designs to enable further development of RHC concepts and theory. This study aimed to describe and synthesize the methodological strategies currently applied in https://doi.org/10.1016/j.ssci.2018.08.025 Received 10 October 2016; Received in revised form 13 August 2018; Accepted 27 August 2018 ⁎ Corresponding author. E-mail addresses: siv.hilde.berg@sus.no (S.H. Berg), Kristin.akerjordet@uis.no (K. Akerjordet), mirjam.ekstedt@lnu.se (M. Ekstedt), karina.aase@uis.no (K. Aase). Safety Science 110 (2018) 300–312 Available online 05 September 2018 0925-7535/ © 2018 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/BY-NC-ND/4.0/). T empirical RHC research in terms of the empirical fields, applied research designs, methods, analytical strategies, main topics and data collection sources at different systemic levels, and to assess the quality of those studies. We argue that one implication of studying sociotechnical systems is that multiple levels in a given system must be addressed, as proposed by, for example, Rasmussen (1997). As such, this study synthesized the ways that RHC studies have approached empirical data at various systemic levels. 2. Methodology in resilient healthcare research ‘Research methodology’ is a strategy or plan of action that shapes the choices and uses of various methods and links them to desired outcomes (Crotty, 1998). This study broadly used the term ‘methodological strategy’ to denote an observed study’s overall research design, data collection sources, data collection methods and analytical methods at different systemic levels. The methodological issues discussed in the RHC literature to date have concerned the methods used to study everyday clinical practice, healthcare complexity and the operationalization of the constructs measuring resilience. 2.1. Methods of studying healthcare complexity RE research is characterized by its study of complexities. In a review of the rationale behind resilience research, Bergström et al. (2015) found that RE researchers typically justified their research by referring to the complexity of modern socio-technical systems that makes them inherently risky. Additionally, in the healthcare field, references are made to the complex adaptive system (CAS) perspective (Braithwaite et al., 2013). CAS emerged from complexity theory, and it takes a dynamic approach to human and nonhuman agents (Urry, 2003). Healthcare is part of a complex socio-technical system and an example of a CAS comprising professionals, patients, managers, policymakers and technologies, all of which interact with and rely on trade-offs and adjustments to succeed in everyday clinical work (Braithwaite et al., 2013). Under complexity theory, complex systems are viewed as open systems that interact with their environments, implying a need to understand the systems’ environments before understanding the systems. Because these environments are complex, no standard methodology can provide a complete understanding (Bergström and Dekker, 2014), and the opportunities for experimental research are limited. Controlled studies might not be able to identify the complex interconnections and multiple variables that influence care; thus, non-linear methods are necessary to describe and understand those systems. Consequently, research on complexity imposes methodological challenges related to the development of valid evidence (Braithwaite et al., 2013). It has been argued that triangulation is necessary to study complex work settings in order to reveal actual phenomena and minimize bias leading to misinterpretation (Nemeth et al., 2011). Methodological triangulation has been suggested, as well as data triangulation, as a strategic way to increase the internal and external validity of RE/RHC research (Nemeth et al., 2011; Mendonca, 2008). Data triangulation involves collecting data from various sources, such as reports, policy documents, multiple professional groups and patient feedback, whereas methodological triangulation involves combining different qualitative methods or mixing qualitative and quantitative methods. Multiple methods have been suggested for research on everyday clinical practice and healthcare complexity. Hollnagel (2014) suggested qualitative methods, such as qualitative interviews, field observations and organizational development techniques (e.g. appreciative inquiry and cooperative inquiry). Nemeth and Herrera (2015) proposed observation in actual settings as a core value of the RE field of practice. Drawing on the methods of cognitive system engineering, Nemeth et al. (2011) described the uses of cognitive task analysis (CTA) to study resilience. CTA comprises numerous methods, one of which is the critical decision method (CDM). CDM is a retrospective interview in which subjects are asked about critical events and decisions. Other proposed methods for studying complex work settings were work domain analysis (WDA), process tracing, artefact analysis and rapid prototyping. System modelling, using methods such as trend analysis, cluster analysis, social network analysis and log linear modelling, has been proposed as a way to study resilience from a socio-technical/CAS perspective (Braithwaite et al., 2013; Anderson et al., 2013). The functional resonance analysis method (FRAM) has been employed to study interactions and dependencies as they develop in specific situations. FRAM is presented as a way to study how complex and dynamic sociotechnical systems work (Hollnagel, 2012). In addition, Leveson et al. (2006) suggested STAMP, a model of accident causation based on systems theory, as a method to analyse resilience. 2.2. Operationalization of resilience A vast amount of the RE literature has been devoted to developing theories on resilience, emphasizing that the domain is in a theory development stage (Righi et al., 2015). This process of theory development is reflected in the diverse definitions and indicators of resilience proposed over the past decade e.g. 3, (Woods, 2006, 2011; Wreathall, 2006). Numerous constructs have been developed, such as resilient abilities (Woods, 2011; Hollnagel, 2008, 2010; Nemeth et al., 2008; Hollnagel et al., 2013b), Safety-II (Hollnagel, 2014), Work-as-done (WAD) and Work-as-imagined (WAI) (Hollnagel et al., 2015), and performance variability (Hollnagel, 2014). The operationalization of these constructs has been a topic of discussion. According to Westrum (2013), one challenge to determining measures of resilience in healthcare relates to the characteristics of resilience as a family of related ideas rather than as a single construct. The applied definitions of ‘resilience’ in RE research have focused on a given system’s adaptive capacities and its abilities to adopt or absorb disturbing conditions. This conceptual understanding of resilience has been applied to RHC [6, p. xxvii]. By understanding resilience as a ‘system’s ability’, the healthcare system is perceived as a separate ontological category. The system is regarded as a unit that might have individual goals, actions or abilities not necessarily shared by its members. Therefore, RHC is greater than the sum of its members’ individual actions, which is a perspective found in methodological holism (Ylikoski, 2012). The challenge is to operationalize the study of ‘the system as a whole’. Some scholars have advocated on behalf of locating the empirical basis of resilience by studying individual performances and aggregating those data to develop a theory of resilience (Mendonca, 2008; Furniss et al., 2011). This approach uses the strategy of finding the properties of the whole (the healthcare system) within the parts at the micro level, which is found in methodological individualism. The WAD and performance variability constructs bring resilience closer to an empirical ground by fr", "title": "" }, { "docid": "1348ee3316643f4269311b602b71d499", "text": "This paper describes our proposed solution for SemEval 2017 Task 1: Semantic Textual Similarity (Daniel Cer and Specia, 2017). The task aims at measuring the degree of equivalence between sentences given in English. Performance is evaluated by computing Pearson Correlation scores between the predicted scores and human judgements. Our proposed system consists of two subsystems and one regression model for predicting STS scores. The two subsystems are designed to learn Paraphrase and Event Embeddings that can take the consideration of paraphrasing characteristics and sentence structures into our system. The regression model associates these embeddings to make the final predictions. The experimental result shows that our system acquires 0.8 of Pearson Correlation Scores in this task.", "title": "" }, { "docid": "2a54b353758963273464525999c45960", "text": "This work studies comparatively two typical sentence matching tasks: textual entailment (TE) and answer selection (AS), observing that weaker phrase alignments are more critical in TE, while stronger phrase alignments deserve more attention in AS. The key to reach this observation lies in phrase detection, phrase representation, phrase alignment, and more importantly how to connect those aligned phrases of different matching degrees with the final classifier. Prior work (i) has limitations in phrase generation and representation, or (ii) conducts alignment at word and phrase levels by handcrafted features or (iii) utilizes a single framework of alignment without considering the characteristics of specific tasks, which limits the framework’s effectiveness across tasks. We propose an architecture based on Gated Recurrent Unit that supports (i) representation learning of phrases of arbitrary granularity and (ii) task-specific attentive pooling of phrase alignments between two sentences. Experimental results on TE and AS match our observation and show the effectiveness of our approach.", "title": "" }, { "docid": "e882a33ff28c37b379c22d73e16147b3", "text": "Combining ant colony optimization (ACO) and multiobjective evolutionary algorithm based on decomposition (MOEA/D), this paper proposes a multiobjective evolutionary algorithm, MOEA/D-ACO. Following other MOEA/D-like algorithms, MOEA/D-ACO decomposes a multiobjective optimization problem into a number of single objective optimization problems. Each ant (i.e. agent) is responsible for solving one subproblem. All the ants are divided into a few groups and each ant has several neighboring ants. An ant group maintains a pheromone matrix and an individual ant has a heuristic information matrix. During the search, each ant also records the best solution found so far for its subproblem. To construct a new solution, an ant combines information from its group’s pheromone matrix, its own heuristic information matrix and its current solution. An ant checks the new solutions constructed by itself and its neighbors, and updates its current solution if it has found a better one in terms of its own objective. Extensive experiments have been conducted in this paper to study and compare MOEA/D-ACO with other algorithms on two set of test problems. On the multiobjective 0-1 knapsack problem, MOEA/D-ACO outperforms MOEA/D-GA on all the nine test instances. We also demonstrate that the heuristic information matrices in MOEA/D-ACO are crucial to the good performance of MOEA/D-ACO for the knapsack problem. On the biobjective traveling salesman problem, MOEA/D-ACO performs much better than BicriterionAnt on all the 12 test instances. We also evaluate the effects of grouping, neighborhood and the location information of current solutions on the performance of MOEA/D-ACO. The work in this paper shows that reactive search optimization scheme, i.e., the “learning while optimizing” principle, is effective in improving multiobjective optimization algorithms.", "title": "" }, { "docid": "c20e31ddee311a1703fb5ff3687a1215", "text": "The large number of object categories and many overlapping or closely neighboring objects in large-scale urban scenes pose great challenges in point cloud classification. Most works in deep learning have achieved a great success on regular input representations, but they are hard to be directly applied to classify point clouds due to the irregularity and inhomogeneity of the data. In this paper, a deep neural network with spatial pooling (DNNSP) is proposed to classify large-scale point clouds without rasterization. The DNNSP first obtains the point-based feature descriptors of all points in each point cluster. The distance minimum spanning tree-based pooling is then applied in the point feature representation to describe the spatial information among the points in the point clusters. The max pooling is next employed to aggregate the point-based features into the cluster-based features. To assure the DNNSP is invariant to the point permutation and sizes of the point clusters, the point-based feature representation is determined by the multilayer perception (MLP) and the weight sharing for each point is retained, which means that the weight of each point in the same layer is the same. In this way, the DNNSP can learn the features of points scaled from the entire regions to the centers of the point clusters, which makes the point cluster-based feature representations robust and discriminative. Finally, the cluster-based features are input to another MLP for point cloud classification. We have evaluated qualitatively and quantitatively the proposed method using several airborne laser scanning and terrestrial laser scanning point cloud data sets. The experimental results have demonstrated the effectiveness of our method in improving classification accuracy.", "title": "" }, { "docid": "8c89db7cda2547a9f84dec7a0990cd59", "text": "In this paper, a changeable winding brushless DC (BLDC) motor for the expansion of the speed region is described. The changeable winding BLDC motor is driven by a large number of phase turns at low speeds and by a reduced number of turns at high speeds. For this reason, the section where the winding changes is very important. Ideally, the time at which the windings are to be converted should be same as the time at which the voltage changes. However, if this timing is not exactly synchronized, a large current is generated in the motor, and the demagnetization of the permanent magnet occurs. In addition, a large torque ripple is produced. In this paper, we describe the demagnetization of the permanent magnet in a fault situation when the windings change, and we suggest a design process to solve this problem.", "title": "" }, { "docid": "e9a0a18a557bd586b0d23381a2436e0e", "text": "Although tremendous success has been achieved for interactive object cutout in still images, accurately extracting dynamic objects in video remains a very challenging problem. Previous video cutout systems present two major limitations: (1) reliance on global statistics, thus lacking the ability to deal with complex and diverse scenes; and (2) treating segmentation as a global optimization, thus lacking a practical workflow that can guarantee the convergence of the systems to the desired results.\n We present Video SnapCut, a robust video object cutout system that significantly advances the state-of-the-art. In our system segmentation is achieved by the collaboration of a set of local classifiers, each adaptively integrating multiple local image features. We show how this segmentation paradigm naturally supports local user editing and propagates them across time. The object cutout system is completed with a novel coherent video matting technique. A comprehensive evaluation and comparison is presented, demonstrating the effectiveness of the proposed system at achieving high quality results, as well as the robustness of the system against various types of inputs.", "title": "" }, { "docid": "18c90883c96b85dc8b3ef6e1b84c3494", "text": "Data Selection is a popular step in Machine Translation pipelines. Feature Decay Algorithms (FDA) is a technique for data selection that has shown a good performance in several tasks. FDA aims to maximize the coverage of n-grams in the test set. However, intuitively, more ambiguous n-grams require more training examples in order to adequately estimate their translation probabilities. This ambiguity can be measured by alignment entropy. In this paper we propose two methods for calculating the alignment entropies for n-grams of any size, which can be used for improving the performance of FDA. We evaluate the substitution of the n-gramspecific entropy values computed by these methods to the parameters of both the exponential and linear decay factor of FDA. The experiments conducted on German-to-English and Czechto-English translation demonstrate that the use of alignment entropies can lead to an increase in the quality of the results of FDA.", "title": "" }, { "docid": "400a56ea0b2c005ed16500f0d7818313", "text": "Real estate appraisal, which is the process of estimating the price for real estate properties, is crucial for both buyers and sellers as the basis for negotiation and transaction. Traditionally, the repeat sales model has been widely adopted to estimate real estate prices. However, it depends on the design and calculation of a complex economic-related index, which is challenging to estimate accurately. Today, real estate brokers provide easy access to detailed online information on real estate properties to their clients. We are interested in estimating the real estate price from these large amounts of easily accessed data. In particular, we analyze the prediction power of online house pictures, which is one of the key factors for online users to make a potential visiting decision. The development of robust computer vision algorithms makes the analysis of visual content possible. In this paper, we employ a recurrent neural network to predict real estate prices using the state-of-the-art visual features. The experimental results indicate that our model outperforms several other state-of-the-art baseline algorithms in terms of both mean absolute error and mean absolute percentage error.", "title": "" }, { "docid": "8db6d5115156ebd347577dd81cf916f1", "text": "Measurement of chlorophyll concentration is gaining more-and-more importance in evaluating the status of the marine ecosystem. For wide areas monitoring a reliable architecture of wireless sensors network is required. In this paper, we present a network of smart sensors, based on ISO/IEC/IEEE 21451 suite of standards, for in situ and in continuous space-time monitoring of surface water bodies, in particular for seawater. The system is meant to be an important tool for evaluating water quality and a valid support to strategic decisions concerning critical environment issues. The aim of the proposed system is to capture possible extreme events and collect long-term periods of data.", "title": "" }, { "docid": "7547da5f5e33051dcbbb8a2d7abe46ce", "text": "We introduce the joint time-frequency scattering transform, a time shift invariant descriptor of time-frequency structure for audio classification. It is obtained by applying a two-dimensional wavelet transform in time and log-frequency to a time-frequency wavelet scalogram. We show that this descriptor successfully characterizes complex time-frequency phenomena such as time-varying filters and frequency modulated excitations. State-of-the-art results are achieved for signal reconstruction and phone segment classification on the TIMIT dataset.", "title": "" }, { "docid": "cd29357697fafb5aa5b66807f746b682", "text": "Autonomous path planning algorithms are significant to planetary exploration rovers, since relying on commands from Earth will heavily reduce their efficiency of executing exploration missions. This paper proposes a novel learning-based algorithm to deal with global path planning problem for planetary exploration rovers. Specifically, a novel deep convolutional neural network with double branches (DB-CNN) is designed and trained, which can plan path directly from orbital images of planetary surfaces without implementing environment mapping. Moreover, the planning procedure requires no prior knowledge about planetary surface terrains. Finally, experimental results demonstrate that DBCNN achieves better performance on global path planning and faster convergence during training compared with the existing Value Iteration Network (VIN).", "title": "" }, { "docid": "f162ca10328e222567d33ac4920a2c94", "text": "We live in a digital world where every detail of our information is being transferred from one smart device to another via cross-platform, third-party cloud services. Smart technologies, such as, smartphones are playing dynamic roles in order to successfully complete our daily routines and official tasks that require access to all types of critical data. Before the advent of these smart technologies, securing critical information was quite a challenge. However, after the advent and global adoption of such technologies, information security has become one of the primary and most fundamental task for security professionals. The integration of social media has made this task even more challenging to undertake successfully. To this day, there are plentiful studies in which numerous authentication and security techniques were proposed and developed for smartphone and cloud computing technologies. These studies have successfully addressed multiple authentication threats and other related issues in existing the smartphone and cloud computing technologies. However, to the best of our understanding and knowledge, these studies lack many aspects in terms of authentication attacks, logical authentication analysis, and the absence of authentication implementation scenarios. Due to these authentication anomalies and ambiguities, such studies cannot be fully considered for successful implementation. Therefore, in this paper, we have performed a comprehensive security analysis and review of various smartphone and cloud computing authentication frameworks and protocols to outline up-to-date authentication threats and issues in the literature. These authentication challenges are further summarized and presented in the form of different graphs to illustrate where the research is currently heading. Finally, based on those outcomes, we identify the latest and existing authentication uncertainties, threats, and other related issues to address future directions and open research issues in the domain of the smartphone-and cloud-computing authentication.", "title": "" }, { "docid": "36bdb668b97c77496cdb66c045c58495", "text": "OBJECTIVE\nThe purpose of the present study was to examine the prevalence of fast-food purchases for family meals and the associations with sociodemographic variables, dietary intake, home food environment, and weight status in adolescents and their parents.\n\n\nDESIGN\nThis study is a cross-sectional evaluation of parent interviews and adolescent surveys from Project EAT (Eating Among Teens).\n\n\nSUBJECTS\nSubjects included 902 middle-school and high-school adolescents (53% female, 47% male) and their parents (89% female, 11% male). The adolescent population was ethnically diverse: 29% white, 24% black, 21% Asian American, 14% Hispanic and 12% other.\n\n\nRESULTS\nResults showed that parents who reported purchasing fast food for family meals at least 3 times per week were significantly more likely than parents who reported purchasing fewer fast-food family meals to report the availability of soda pop and chips in the home. Adolescents in homes with fewer than 3 fast-food family meals per week were significantly more likely than adolescents in homes with more fast-food family meals to report having vegetables and milk served with meals at home. Fast-food purchases for family meals were positively associated with the intake of fast foods and salty snack foods for both parents and adolescents; and weight status among parents. Fast-food purchases for family meals were negatively associated with parental vegetable intake.\n\n\nCONCLUSIONS\nFast-food purchases may be helpful for busy families, but families need to be educated on the effects of fast food for family meals and how to choose healthier, convenient family meals.", "title": "" }, { "docid": "78f272578191996200259e10d209fe19", "text": "The information in government web sites, which are widely adopted in many countries, must be accessible for all people, easy to use, accurate and secure. The main objective of this study is to investigate the usability, accessibility and security aspects of e-government web sites in Kyrgyz Republic. The analysis of web government pages covered 55 sites listed in the State Information Resources of the Kyrgyz Republic and five government web sites which were not included in the list. Analysis was conducted using several automatic evaluation tools. Results suggested that government web sites in Kyrgyz Republic have a usability error rate of 46.3 % and accessibility error rate of 69.38 %. The study also revealed security vulnerabilities in these web sites. Although the “Concept of Creation and Development of Information Network of the Kyrgyz Republic” was launched at September 23, 1994, government web sites in the Kyrgyz Republic have not been reviewed and still need great efforts to improve accessibility, usability and security.", "title": "" }, { "docid": "0701f4d74179857b736ebe2c7cdb78b7", "text": "Modern computer networks generate significant volume of behavioural system logs on a daily basis. Such networks comprise many computers with Internet connectivity, and many users who access the Web and utilise Cloud services make use of numerous devices connected to the network on an ad-hoc basis. Measuring the risk of cyber attacks and identifying the most recent modus-operandi of cyber criminals on large computer networks can be difficult due to the wide range of services and applications running within the network, the multiple vulnerabilities associated with each application, the severity associated with each vulnerability, and the ever-changing attack vector of cyber criminals. In this paper we propose a framework to represent these features, enabling real-time network enumeration and traffic analysis to be carried out, in order to produce quantified measures of risk at specific points in time. We validate the approach using data from a University network, with a data collection consisting of 462,787 instances representing threats measured over a 144 hour period. Our analysis can be generalised to a variety of other contexts. © 2016 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).", "title": "" }, { "docid": "a0d90497749ff73b3c971a49fa35ffa9", "text": "Current energy policies address environmental issues including environmentally friendly technologies to increase energy supplies and encourage cleaner, more efficient energy use, and address air pollution, greenhouse effect, global warming, and climate change. The biofuel policy aims to promote the use in transport of fuels made from biomass, as well as other renewable fuels. Biofuels provide the prospect of new economic opportunities for people in rural areas in oil importer and developing countries. The central policy of biofuel concerns job creation, greater efficiency in the general business environment, and protection of the environment. Projections are important tools for long-term planning and policy settings. Renewable energy sources that use indigenous resources have the potential to provide energy services with zero or almost zero emissions of both air pollutants and greenhouse gases. Biofuels are expected to reduce dependence on imported petroleum with associated political and economic vulnerability, reduce greenhouse gas emissions and other pollutants, and revitalize the economy by increasing demand and prices for agricultural products. 2009 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "544591326b250f5d68a64f793d55539b", "text": "Introduction: Exfoliative cheilitis, one of a spectrum of diseases that affect the vermilion border of the lips, is uncommon and has no known cause. It is a chronic superficial inflammatory disorder of the vermilion borders of the lips characterized by persistent scaling; it can be a difficult condition to manage. The diagnosis is now restricted to those few patients whose lesions cannot be attributed to other causes, such as contact sensitization or light. Case Report: We present a 17 year-old male presented to the out clinic in Baghdad with the chief complaint of a persistent scaly on his lower lips. The patient reported that the skin over the lip thickened gradually over a 3 days period and subsequently became loose, causing discomfort. Once he peeled away the loosened layer, a new layer began to form again. Conclusion: The lack of specific treatment makes exfoliative cheilitis a chronic disease that radically affects a person’s life. The aim of this paper is to describe a case of recurrent exfoliative cheilitis successfully treated with intralesional corticosteroids and to present possible hypotheses as to the cause.", "title": "" } ]
scidocsrr
6b8dab419a719ee44a0e0bd45e44e048
Convolutional Sparse Coding for Image Super-Resolution
[ { "docid": "d3c4c641f46800c15c0995ce9e1943f7", "text": "We present a computationally e cient architecture for image super-resolution that achieves state-of-the-art results on images with large spatial extend. Apart from utilizing Convolutional Neural Networks, our approach leverages recent advances in fast approximate inference for sparse coding. We empirically show that upsampling methods work much better on latent representations than in the original spatial domain. Our experiments indicate that the proposed architecture can serve as a basis for additional future improvements in image superresolution.", "title": "" }, { "docid": "4918abc325eae43369e9173c2c75706b", "text": "We propose a fast regression model for practical single image super-resolution based on in-place examples, by leveraging two fundamental super-resolution approaches- learning from an external database and learning from self-examples. Our in-place self-similarity refines the recently proposed local self-similarity by proving that a patch in the upper scale image have good matches around its origin location in the lower scale image. Based on the in-place examples, a first-order approximation of the nonlinear mapping function from low-to high-resolution image patches is learned. Extensive experiments on benchmark and real-world images demonstrate that our algorithm can produce natural-looking results with sharp edges and preserved fine details, while the current state-of-the-art algorithms are prone to visual artifacts. Furthermore, our model can easily extend to deal with noise by combining the regression results on multiple in-place examples for robust estimation. The algorithm runs fast and is particularly useful for practical applications, where the input images typically contain diverse textures and they are potentially contaminated by noise or compression artifacts.", "title": "" }, { "docid": "d4c7493c755a3fde5da02e3f3c873d92", "text": "Edge-directed image super resolution (SR) focuses on ways to remove edge artifacts in upsampled images. Under large magnification, however, textured regions become blurred and appear homogenous, resulting in a super-resolution image that looks unnatural. Alternatively, learning-based SR approaches use a large database of exemplar images for “hallucinating” detail. The quality of the upsampled image, especially about edges, is dependent on the suitability of the training images. This paper aims to combine the benefits of edge-directed SR with those of learning-based SR. In particular, we propose an approach to extend edge-directed super-resolution to include detail from an image/texture example provided by the user (e.g., from the Internet). A significant benefit of our approach is that only a single exemplar image is required to supply the missing detail – strong edges are obtained in the SR image even if they are not present in the example image due to the combination of the edge-directed approach. In addition, we can achieve quality results at very large magnification, which is often problematic for both edge-directed and learning-based approaches.", "title": "" }, { "docid": "e72d47bddec148ed3edbbd26950016be", "text": "Sparse and convolutional constraints form a natural prior for many optimization problems that arise from physical processes. Detecting motifs in speech and musical passages, super-resolving images, compressing videos, and reconstructing harmonic motions can all leverage redundancies introduced by convolution. Solving problems involving sparse and convolutional constraints remains a difficult computational problem, however. In this paper we present an overview of convolutional sparse coding in a consistent framework. The objective involves iteratively optimizing a convolutional least-squares term for the basis functions, followed by an L1-regularized least squares term for the sparse coefficients. We discuss a range of optimization methods for solving the convolutional sparse coding objective, and the properties that make each method suitable for different applications. In particular, we concentrate on computational complexity, speed to convergence, memory usage, and the effect of implied boundary conditions. We present a broad suite of examples covering different signal and application domains to illustrate the general applicability of convolutional sparse coding, and the efficacy of the available optimization methods.", "title": "" }, { "docid": "c0d794e7275e7410998115303bf0cf79", "text": "We present a hierarchical model that learns image decompositions via alternating layers of convolutional sparse coding and max pooling. When trained on natural images, the layers of our model capture image information in a variety of forms: low-level edges, mid-level edge junctions, high-level object parts and complete objects. To build our model we rely on a novel inference scheme that ensures each layer reconstructs the input, rather than just the output of the layer directly beneath, as is common with existing hierarchical approaches. This makes it possible to learn multiple layers of representation and we show models with 4 layers, trained on images from the Caltech-101 and 256 datasets. When combined with a standard classifier, features extracted from these models outperform SIFT, as well as representations from other feature learning methods.", "title": "" } ]
[ { "docid": "f850321173db137674eb74a0dd2afc30", "text": "The relational data model has been dominant and widely used since 1970. However, as the need to deal with big data grows, new data models, such as Hadoop and NoSQL, were developed to address the limitation of the traditional relational data model. As a result, determining which data model is suitable for applications has become a challenge. The purpose of this paper is to provide insight into choosing the suitable data model by conducting a benchmark using Yahoo! Cloud Serving Benchmark (YCSB) on three different database systems: (1) MySQL for relational data model, (2) MongoDB for NoSQL data model, and (3) HBase for Hadoop framework. The benchmark was conducted by running four different workloads. Each workload is executed using a different increasing operation and thread count, while observing how their change respectively affects throughput, latency, and runtime.", "title": "" }, { "docid": "06c9f35d9b46266e07bcfc1218c65992", "text": "To effectively collaborate with people, robots are expected to detect and profile the users they are interacting with, but also to modify and adapt their behavior according to the learned models. The goal of this survey is to focus on the perspective of user profiling and behavioral adaptation. On the one hand, human-robot interaction requires a human-oriented perception to model and recognize the human actions and capabilities, the intentions and goals behind such actions, and the parameters characterizing the social interaction. On the other hand, the robot behavior should be adapted in its physical movement within the space, in the actions to be selected to achieve collaboration, and by modulating the parameters characterizing the interaction. In this direction, this survey of the current literature introduces a general classification scheme for both the profiling and the behavioral adaptation research topics in terms of physical, cognitive, and social interaction viewpoints. c © 2017 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "42d1368bf2c5e659f9e9a215e1ebbd4c", "text": "The quality of computer generated images of three-dimensional scenes depends on the shading technique used to paint the objects on the cathode-ray tube screen. The shading algorithm itself depends in part on the method for modeling the object, which also determines the hidden surface algorithm. The various methods of object modeling, shading, and hidden surface removal are thus strongly interconnected. Several shading techniques corresponding to different methods of object modeling and the related hidden surface algorithms are presented here. Human visual perception and the fundamental laws of optics are considered in the development of a shading rule that provides better quality and increased realism in generated images.", "title": "" }, { "docid": "1126a40d59f4d1c9702eed5dc97c78fa", "text": "Computational argumentation is expected to play a critical role in the future of web search. To make this happen, many searchrelated questions must be revisited, such as how people query for arguments, how to mine arguments from the web, or how to rank them. In this paper, we develop an argument search framework for studying these and further questions. The framework allows for the composition of approaches to acquiring, mining, assessing, indexing, querying, retrieving, ranking, and presenting arguments while relying on standard infrastructure and interfaces. Based on the framework, we build a prototype search engine, called args, that relies on an initial, freely accessible index of nearly 300k arguments crawled from reliable web resources. The framework and the argument search engine are intended as an environment for collaborative research on computational argumentation and its practical evaluation.", "title": "" }, { "docid": "6d2adebf7fbdf67b778b60ac69ea5cd3", "text": "In this paper, we propose Zero-Suppressed BDDs (0-Sup-BDDs), which are BDDs based on a new reduction rule. This data structure brings unique and compact representation of sets which appear in many combinatorial problems. Using 0-Sup-BDDs, we can manipulate such sets more simply and efficiently than using original BDDs. We show the properties of 0-Sup-BDDs, their manipulation algorithms, and good applications for LSI CAD systems.", "title": "" }, { "docid": "e86e4a07d1daa8a113d855fca2781815", "text": "In this paper, we propose a bidimensional attention based recursive autoencoder (BattRAE) to integrate cues and source-target interactions at multiple levels of granularity into bilingual phrase representations. We employ recursive autoencoders to generate tree structures of phrase with embeddings at different levels of granularity (e.g., words, sub-phrases, phrases). Over these embeddings on the source and target side, we introduce a bidimensional attention network to learn their interactions encoded in a bidimensional attention matrix, from which we extract two soft attention weight distributions simultaneously. The weight distributions enable BattRAE to generate compositive phrase representations via convolution. Based on the learned phrase representations, we further use a bilinear neural model, trained via a max-margin method, to measure bilingual semantic similarity. In order to evaluate the effectiveness of BattRAE, we incorporate this semantic similarity as an additional feature into a state-of-the-art SMT system. Extensive experiments on NIST Chinese-English test sets show that our model achieves a substantial improvement of up to 1.82 BLEU points over the baseline.", "title": "" }, { "docid": "c6143ea4fb8027119be6678651cba6c9", "text": "Extreme learning machine (ELM) has recently attracted many researchers' interest due to its very fast learning speed, good generalization ability, and ease of implementation. It provides a unified solution that can be used directly to solve regression, binary, and multiclass classification problems. In this paper, we propose a stacked ELMs (S-ELMs) that is specially designed for solving large and complex data problems. The S-ELMs divides a single large ELM network into multiple stacked small ELMs which are serially connected. The S-ELMs can approximate a very large ELM network with small memory requirement. To further improve the testing accuracy on big data problems, the ELM autoencoder can be implemented during each iteration of the S-ELMs algorithm. The simulation results show that the S-ELMs even with random hidden nodes can achieve similar testing accuracy to support vector machine (SVM) while having low memory requirements. With the help of ELM autoencoder, the S-ELMs can achieve much better testing accuracy than SVM and slightly better accuracy than deep belief network (DBN) with much faster training speed.", "title": "" }, { "docid": "031c67b13cdd534074fb8a5028d07b2a", "text": "I. MOTIVATION Deploying convolutional neural networks (CNNs) effectively in real-time applications often requires both high throughput and low power consumption. However, a state-of-the-art CNN typically performs about 10 FLOPs per evaluation [1]. Reducing this computational cost has become an essential challenge. Several prior studies have proposed pruning ineffectual features and weights statically, thus reducing the FLOPs [2]. Dedicated hardware accelerators have also been shown to improve performance by exploiting the sparsity in a CNN [3], [4], [5]. However, the aforementioned proposals suffer from increasing the irregularity of the computation at the finest granularity. We propose a novel approach to reduce CNN computation, called channel gating, which dynamically prunes the unnecessary computation specific to a particular image, while minimizing the accuracy loss and hardware modification. Intuitively, channel gating leverages the spatial information inside the input features to identify ineffective receptive fields and skip the corresponding computation by gating a fraction of the input channels. The paper makes the following major contributions: • We introduce the channel gating scheme, which dynamically prunes computation on input channels at receptive field level. • We propose an efficient single-pass training scheme to train the channel gating CNN from scratch, allowing the network to automatically learn an effective gating policy. • We demonstrate the benefits of introducing channel gating in CNNs empirically and get 66% and 60% reduction in FLOPs with 0.22% and 0.29% accuracy loss on the CIFAR-10/100 datasets respectively using a state-of-theart ResNet model. • We propose a specialized accelerator architecture, which improves the performance and energy efficiency of the channel gating CNN inference (Ongoing).", "title": "" }, { "docid": "32ce76009016ba30ce38524b7e9071c9", "text": "Error in medicine is a subject of continuing interest among physicians, patients, policymakers, and the general public. This article examines the issue of disclosure of medical errors in the context of emergency medicine. It reviews the concept of medical error; proposes the professional duty of truthfulness as a justification for error disclosure; examines barriers to error disclosure posed by health care systems, patients, physicians, and the law; suggests system changes to address the issue of medical error; offers practical guidelines to promote the practice of error disclosure; and discusses the issue of disclosure of errors made by another physician.", "title": "" }, { "docid": "6d60f0cd26681db25f322d77cadfdd34", "text": "Over the last years, several authors have signaled that state of the art categorization methods fail to perform well when trained and tested on data from different databases. The general consensus in the literature is that this issue, known as domain adaptation and/or dataset bias, is due to a distribution mismatch between data collections. Methods addressing it go from max-margin classifiers to learning how to modify the features and obtain a more robust representation. The large majority of these works use BOW feature descriptors, and learning methods based on image-to-image distance functions. Following the seminal work of [6], in this paper we challenge these two assumptions. We experimentally show that using the NBNN classifier over existing domain adaptation databases achieves always very strong performances. We build on this result, and present an NBNN-based domain adaptation algorithm that learns iteratively a class metric while inducing, for each sample, a large margin separation among classes. To the best of our knowledge, this is the first work casting the domain adaptation problem within the NBNN framework. Experiments show that our method achieves the state of the art, both in the unsupervised and semi-supervised settings.", "title": "" }, { "docid": "fdbae668610803991b359702fbd8d430", "text": "The progress of the social science disciplines depends on conducting relevant research. However, research methodology adopted and choices made during the course of the research project are underpinned by varying ontological, epistemological and axiological positions that may be known or unknown to the researcher. This paper sought to critically explore the philosophical underpinnings of the social science research. It was suggested that a “multiversal” ontological position, positivist-hermeneutic epistemological position and value-laden axiological position should be adopted for social science research by non-western scholars as alternative to the dominant naïve realist, positivist, and value-free orientation. Against the backdrop of producing context-relevant knowledge, non-western scholars are encouraged to re-examine their philosophical positions in the conduct of social science research.", "title": "" }, { "docid": "9f16e90dc9b166682ac9e2a8b54e611a", "text": "Lua is a programming language designed as scripting language, which is fast, lightweight, and suitable for embedded applications. Due to its features, Lua is widely used in the development of games and interactive applications for digital TV. However, during the development phase of such applications, some errors may be introduced, such as deadlock, arithmetic overflow, and division by zero. This paper describes a novel verification approach for software written in Lua, using as backend the Efficient SMTBased Context-Bounded Model Checker (ESBMC). Such an approach, called bounded model checking - Lua (BMCLua), consists in translating Lua programs into ANSI-C source code, which is then verified with ESBMC. Experimental results show that the proposed verification methodology is effective and efficient, when verifying safety properties in Lua programs. The performed experiments have shown that BMCLua produces an ANSI-C code that is more efficient for verification, when compared with other existing approaches. To the best of our knowledge, this work is the first that applies bounded model checking to the verification of Lua programs.", "title": "" }, { "docid": "1b6e35187b561de95051f67c70025152", "text": "Ž . The technology acceptance model TAM proposes that ease of use and usefulness predict applications usage. The current research investigated TAM for work-related tasks with the World Wide Web as the application. One hundred and sixty-three subjects responded to an e-mail survey about a Web site they access often in their jobs. The results support TAM. They also Ž . Ž . demonstrate that 1 ease of understanding and ease of finding predict ease of use, and that 2 information quality predicts usefulness for revisited sites. In effect, the investigation applies TAM to help Web researchers, developers, and managers understand antecedents to users’ decisions to revisit sites relevant to their jobs. q 2000 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "3b9e33ca0f2e479c58e3290f5c3ee2d5", "text": "BACKGROUND\nCardiac complications due to iron overload are the most common cause of death in patients with thalassemia major. The aim of this study was to compare iron chelation effects of deferoxamine, deferasirox, and combination of deferoxamine and deferiprone on cardiac and liver iron load measured by T2* MRI.\n\n\nMETHODS\nIn this study, 108 patients with thalassemia major aged over 10 years who had iron overload in cardiac T2* MRI were studied in terms of iron chelators efficacy on the reduction of myocardial siderosis. The first group received deferoxamine, the second group only deferasirox, and the third group, a combination of deferoxamine and deferiprone. Myocardial iron was measured at baseline and 12 months later through T2* MRI technique.\n\n\nRESULTS\nThe three groups were similar in terms of age, gender, ferritin level, and mean myocardial T2* at baseline. In the deferoxamine group, myocardial T2* was increased from 12.0±4.1 ms at baseline to 13.5±8.4 ms at 12 months (p=0.10). Significant improvement was observed in myocardial T2* of the deferasirox group (p<0.001). In the combined treatment group, myocardial T2* was significantly increased (p<0.001). These differences among the three groups were not significant at the 12 months. A significant improvement was observed in liver T2* at 12 months compared to baseline in the deferasirox and the combination group.\n\n\nCONCLUSION\nIn comparison to deferoxamine monotherapy, combination therapy and deferasirox monotherapy have a significant impact on reducing iron overload and improvement of myocardial and liver T2* MRI.", "title": "" }, { "docid": "d68cd0d594f8db4a0decdbdf3656ece1", "text": "In this paper we describe PRISM, a tool being developed at the University of Birmingham for the analysis of probabilistic systems. PRISM supports three probabilistic models: discrete-time Markov chains, continuous-time Markov chains and Markov decision processes. Analysis is performed through model checking such systems against specifications written in the probabilistic temporal logics PCTL and CSL. The tool features three model checking engines: one symbolic, using BDDs (binary decision diagrams) and MTBDDs (multi-terminal BDDs); one based on sparse matrices; and one which combines both symbolic and sparse matrix methods. PRISM has been successfully used to analyse probabilistic termination, performance, dependability and quality of service properties for a range of systems, including randomized distributed algorithms [2], polling systems [22], workstation clusters [18] and wireless cell communication [17].", "title": "" }, { "docid": "6e031a7dab98c28ca348d969f01787f0", "text": "Emotion regulation plays a central role in mental health and illness, but little is known about even the most basic forms of emotion regulation. To examine the acute effects of inhibiting negative and positive emotion, we asked 180 female participants to watch sad, neutral, and amusing films under 1 of 2 conditions. Suppression participants (N = 90) inhibited their expressive behavior while watching the films; no suppression participants (N = 90) simply watched the films. Suppression diminished expressive behavior in all 3 films and decreased amusement self-reports in sad and amusing films. Physiologically, suppression had no effect in the neutral film, but clear effects in both negative and positive emotional films, including increased sympathetic activation of the cardiovascular system. On the basis of these findings, we suggest several ways emotional inhibition may influence psychological functioning.", "title": "" }, { "docid": "f84011e3b4c8b1e80d4e79dee3ccad53", "text": "What is the future of fashion? Tackling this question from a data-driven vision perspective, we propose to forecast visual style trends before they occur. We introduce the first approach to predict the future popularity of styles discovered from fashion images in an unsupervised manner. Using these styles as a basis, we train a forecasting model to represent their trends over time. The resulting model can hypothesize new mixtures of styles that will become popular in the future, discover style dynamics (trendy vs. classic), and name the key visual attributes that will dominate tomorrow’s fashion. We demonstrate our idea applied to three datasets encapsulating 80,000 fashion products sold across six years on Amazon. Results indicate that fashion forecasting benefits greatly from visual analysis, much more than textual or meta-data cues surrounding products.", "title": "" }, { "docid": "cd977d0e24fd9e26e90f2cf449141842", "text": "Several leadership and ethics scholars suggest that the transformational leadership process is predicated on a divergent set of ethical values compared to transactional leadership. Theoretical accounts declare that deontological ethics should be associated with transformational leadership while transactional leadership is likely related to teleological ethics. However, very little empirical research supports these claims. Furthermore, despite calls for increasing attention as to how leaders influence their followers’ perceptions of the importance of ethics and corporate social responsibility (CSR) for organizational effectiveness, no empirical study to date has assessed the comparative impact of transformational and transactional leadership styles on follower CSR attitudes. Data from 122 organizational leaders and 458 of their followers indicated that leader deontological ethical values (altruism, universal rights, Kantian principles, etc.) were strongly associated with follower ratings of transformational leadership, while leader teleological ethical values (utilitarianism) were related to follower ratings of transactional leadership. As predicted, only transformational leadership was associated with follower beliefs in the stakeholder view of CSR. Implications for the study and practice of ethical leadership, future research directions, and management education are discussed.", "title": "" }, { "docid": "75a1832a5fdd9c48f565eb17e8477b4b", "text": "We introduce a new interactive system: a game that is fun and can be used to create valuable output. When people play the game they help determine the contents of images by providing meaningful labels for them. If the game is played as much as popular online games, we estimate that most images on the Web can be labeled in a few months. Having proper labels associated with each image on the Web would allow for more accurate image search, improve the accessibility of sites (by providing descriptions of images to visually impaired individuals), and help users block inappropriate images. Our system makes a significant contribution because of its valuable output and because of the way it addresses the image-labeling problem. Rather than using computer vision techniques, which don't work well enough, we encourage people to do the work by taking advantage of their desire to be entertained.", "title": "" }, { "docid": "2ef2e4f2d001ab9221b3d513627bcd0b", "text": "Semantic segmentation is in-demand in satellite imagery processing. Because of the complex environment, automatic categorization and segmentation of land cover is a challenging problem. Solving it can help to overcome many obstacles in urban planning, environmental engineering or natural landscape monitoring. In this paper, we propose an approach for automatic multi-class land segmentation based on a fully convolutional neural network of feature pyramid network (FPN) family. This network is consisted of pre-trained on ImageNet Resnet50 encoder and neatly developed decoder. Based on validation results, leaderboard score and our own experience this network shows reliable results for the DEEPGLOBE - CVPR 2018 land cover classification sub-challenge. Moreover, this network moderately uses memory that allows using GTX 1080 or 1080 TI video cards to perform whole training and makes pretty fast predictions.", "title": "" } ]
scidocsrr
020f04c8d6919166f7b0c8afa2a653ac
Adaptive encrypted traffic fingerprinting with bi-directional dependence
[ { "docid": "e5773f061bc010c523d77802591d06ea", "text": "Recent studies on Website Fingerprinting (WF) claim to have found highly effective attacks on Tor. However, these studies make assumptions about user settings, adversary capabilities, and the nature of the Web that do not necessarily hold in practical scenarios. The following study critically evaluates these assumptions by conducting the attack where the assumptions do not hold. We show that certain variables, for example, user's browsing habits, differences in location and version of Tor Browser Bundle, that are usually omitted from the current WF model have a significant impact on the efficacy of the attack. We also empirically show how prior work succumbs to the base rate fallacy in the open-world scenario. We address this problem by augmenting our classification method with a verification step. We conclude that even though this approach reduces the number of false positives over 63\\%, it does not completely solve the problem, which remains an open issue for WF attacks.", "title": "" }, { "docid": "1568a9bb47ca0ef28bccf6fdeaad87b7", "text": "Many Android apps use SSL/TLS to transmit sensitive information securely. However, developers often provide their own implementation of the standard SSL/TLS certificate validation process. Unfortunately, many such custom implementations have subtle bugs, have built-in exceptions for self-signed certificates, or blindly assert all certificates are valid, leaving many Android apps vulnerable to SSL/TLS Man-in-the-Middle attacks. In this paper, we present SMV-HUNTER, a system for the automatic, large-scale identification of such vulnerabilities that combines both static and dynamic analysis. The static component detects when a custom validation procedure has been given, thereby identifying potentially vulnerable apps, and extracts information used to guide the dynamic analysis, which then uses user interface enumeration and automation techniques to trigger the potentially vulnerable code under an active Man-in-the-Middle attack. We have implemented SMV-HUNTER and evaluated it on 23,418 apps downloaded from the Google Play market, of which 1,453 apps were identified as being potentially vulnerable by static analysis, with an average overhead of approximately 4 seconds per app, running on 16 threads in parallel. Among these potentially vulnerable apps, 726 were confirmed vulnerable using our dynamic analysis, with an average overhead of about 44 seconds per app, running on 8 emulators in parallel.", "title": "" }, { "docid": "fe774d53084bff85c10c8746183957df", "text": "Recent work has shown that properties of network traffic that remain observable after encryption, namely packet sizes and timing, can reveal surprising information about the traffic’s contents (e.g., the language of a VoIP call [29], passwords in secure shell logins [20], or even web browsing habits [21, 14]). While there are some legitimate uses for encrypted traffic analysis, these techniques also raise important questions about the privacy of encrypted communications. A common tactic for mitigating such threats is to pad packets to uniform sizes or to send packets at fixed timing intervals; however, this approach is often inefficient. In this paper, we propose a novel method for thwarting statistical traffic analysis algorithms by optimally morphing one class of traffic to look like another class. Through the use of convex optimization techniques, we show how to optimally modify packets in real-time to reduce the accuracy of a variety of traffic classifiers while incurring much less overhead than padding. Our evaluation of this technique against two published traffic classifiers for VoIP [29] and web traffic [14] shows that morphing works well on a wide range of network data—in some cases, simultaneously providing better privacy and lower overhead than naı̈ve", "title": "" } ]
[ { "docid": "543218f4bb3516a1d588715b7ede8730", "text": "In this paper, we present a CMOS digital image stabilization algorithm based on the characteristics of a rolling shutter camera. Due to the rolling shuttering mechanism of a CMOS sensor, a CMOS video frame shows CMOS distortions which are not observed in a CCD video frame, and previous video stabilization techniques cannot handle these distortions properly even though they can make a visually stable CMOS video sequence. In our proposed algorithm, we first suggest a CMOS distortion model. This model is based on a rolling shutter mechanism which provides a solution to solve the CMOS distortion problem. Next, we estimate the global image motion and the CMOS distortion transformation directly from the homography between CMOS frames. Using the two transformations, we remove CMOS distortions as well as jittering motions in a CMOS video. In the experimental results, we demonstrate that our proposed algorithm can handle the CMOS distortion problem more effectively as well as the jittering problem in a CMOS video compared to previous CCD-based digital image stabilization techniques.", "title": "" }, { "docid": "7f1eb105b7a435993767e4a4b40f7ed9", "text": "In the last two decades, organizations have recognized, indeed fixated upon, the impOrtance of quality and quality management One manifestation of this is the emergence of the total quality management (TQM) movement, which has been proclaimed as the latest and optimal way of managing organizations. Likewise, in the domain of human resource management, the concept of quality of work life (QWL) has also received much attention of late from theoreticians, researchers, and practitioners. However, little has been done to build a bridge between these two increasingly important concepts, QWL and TQM. The purpose of this research is to empirically examine the relationship between quality of work life (the internalized attitudes employees' have about their jobs) and an indicatorofTQM, customer service attitudes, CSA (the externalized signals employees' send to customers about their jobs). In addition, this study examines how job involvement and organizational commitment mediate the relationship between QWL and CSA. OWL and <:sA HlU.3 doc JJ a9t94 page 3 INTRODUCTION Quality and quality management have become increasingly important topics for both practitioners and researchers (Anderson, Rungtusanatham, & Schroeder, 1994). Among the many quality related activities that have arisen, the principle of total quality mana~ement (TQM) has been advanced as the optimal approach for managing people and processes. Indeed, it is considered by some to be the key to ensuring the long-term viability of organizations (Feigenbaum, 1982). Ofcourse, niany companies have invested heavily in total quality efforts in the form of capital expenditures on plant and equipment, and through various human resource management programs designed to spread the quality gospel. However, many still argue that there is insufficient theoretical development and empirical eviden~e for the determinants and consequences of quality management initiatives (Dean & Bowen, 1994). Mter reviewing the relevant research literatures, we find that three problems persist in the research on TQM. First, a definition of quality has not been agreed upon. Even more problematic is the fact that many of the definitions that do exist are continuously evolving. Not smprisingly, these variable definitions often lead to inconsistent and even conflicting conclusions, Second, very few studies have systematically examined these factors that influence: the quality of goods and services, the implementation of quality activities, or the performance of organizations subsequent to undertaking quality initiatives (Spencer, 1994). Certainly this has been true for quality-related human resource management interventions. Last, TQM has suffered from an \"implementation problem\" (Reger, Gustafson, Demarie, & Mullane, 1994, p. 565) which has prevented it from transitioning from the theoretical to the applied. In the domain of human resource management, quality of working life (QWL) has also received a fair amount of attention of late from theorists, researchers, and practitioners. The underlying, and mostimportant, principles of QWL capture an employee's satisfaction with and feelings about their: work, work environment, and organization. Most who study QWL, and TQM for that matter, tend to focus on the importance of employee systems and organizational performance, whereas researchers in the field ofHRM OWLmdCSA HlU.3doc 1J1l2f}4 pBgc4 usually emphasize individual attitudes and individual performance (Walden, 1994). Fmthennore, as Walden (1994) alludes to, there are significantly different managerial prescriptions and applied levels for routine human resource management processes, such as selection, performance appraisal, and compensation, than there are for TQM-driven processes, like teamwork, participative management, and shared decision-making (Deming, 1986, 1993; Juran, 1989; M. Walton, 1986; Dean & Bowen, 1994). To reiterate, these variations are attributable to the difference between a mico focus on employees as opposed to a more macrofocus on employee systems. These specific differences are but a few of the instances where the views of TQM and the views of traditional HRM are not aligned (Cardy & Dobbins, 1993). In summary, although TQM is a ubiquitous organizational phenomenon; it has been given little research attention, especially in the form ofempirical studies. Therefore, the goal of this study is to provide an empirical assessment of how one, internalized, indicator ofHRM effectiveness, QWL, is associated with one, externalized, indicator of TQM, customer service attitudes, CSA. In doing so, it bridges the gap between \"employee-focused\" H.RM outcoines and \"customer-focused\" TQM consequences. In addition, it examines the mediating effects of organizational commitment and job involvement on this relationship. QUALITY OF WORK LIFE AND CUSTOMER SERVICE AITITUDES In this section, we introduce and review the main principles of customer service attitudes, CSA, and discuss its measurement Thereafter, our extended conceptualization and measurement of QWL will be presented. Fmally, two variables hypothesized to function as mediators of the relationship between CSA and QWL, organization commitment and job involvement, will be· explored. Customer Service Attitudes (CSA) Despite all the ruminations about it in the business and trade press, TQM still remains an ambiguous notion, one that often gives rise to as many different definitions as there are observers. Some focus on the presence of organizational systems. Others, the importance of leadership. ., Many stress the need to reduce variation in organizational processes (Deming, 1986). A number · OWL and CSA mn.3 doc 11 fl9tlJ4 page 5 emphasize reducing costs through q~ty improvement (p.B. Crosby, 1979). Still others focus on quality planing, control, and improvement (Juran, 1989). Regardless of these differences, however, the most important, generally agreed upon principle is to be \"customer focused\" (Feigenbaum, 1982). The cornerstone for this principle is the belief that customer satisfaction and customer judgments about the organization and itsproducts are the most important determinants of long-term organizational viability (Oliva, Oliver & MacMillan, 1992). Not surprisingly, this belief is a prominent tenet in both the manufacturing and service sectors alike. Conventional wisdom holds that quality can best be evaluated from the customers' perspective. Certainly, customers can easily articulate how well a product or service meets their expectations. Therefore, managers and researchers must take into account subjective and cognitive factors that influence customers' judgments when trying to identify influential customer cues, rather than just relying on organizational presumptions. Recently, for example, Hannon & Sano (1994) described how customer-driven HR strategies and practices are pervasive in Japan. An example they cited was the practice of making the tOp graduates from the best schools work in low level, customer service jobs for their first 1-2 years so that they might better underst3nd customers and their needs. To be sure, defining quality in terms of whether a product or service meets the expectations ofcustomers is all-encompassing. As a result of the breadth of this issue, and the limited research on this topic, many importantquestions about the service relationship, particularly those penaining to exchanges between employees and customers, linger. Some include, \"What are the key dimensions of service quality?\" and \"What are the actions service employees might direct their efforts to in order to foster good relationships with customers?\" Arguably, the most readily obvious manifestations of quality for any customer are the service attitudes ofemployees. In fact, dming the employee-customer interaction, conventional wisdom holds that employees' customer service attitudes influence customer satisfaction, customer evaluations, and decisions to buy. . OWL and <:SA HJU.3,doc J J129m page 6 According to Rosander (1980), there are five dimensions of service quality: quality of employee performance, facility, data, decision, and outcome. Undoubtedly, the performance of the employee influences customer satisfaction. This phenomenon has been referred to as interactive quality (Lehtinen & Lehtinen, 1982). Parasuraman, Zeithaml, & Berry (1985) go so far as to suggest that service quality is ultimately a function of the relationship between the employee and the customer, not the product or the price. Sasser, Olsen, & Wyckoff (1987) echo the assertion that personnel performance is a critical factor in the satisfaction of customers. If all of them are right, the relationship between satisfaction with quality of work life and customer service attitudes cannot be understated. Measuring Customer Service Attitudes The challenge of measuring service quality has increasingly captured the attention of researchers (Teas, 1994; Cronin & Taylor, 1992). While the substance and determinants of quality may remain undefined, its importance to organizations is unquestionable. Nevertheless, numerous problems inherent in the measurement of customer service attitudes still exist (Reeves & Bednar, 1994). Perhaps the complexities involved in measuring this construct have deterred many researchers from attempting to define and model service quality. Maybe this is also the reason why many of the efforts to define and measure service quality have emanated primarily from manufacturing, rather than service, settings. When it has been measured, quality has sometimes been defined as a \"zero defect\" policy, a perspective the Japanese have embraced. Alternatively, P.B. Crosby (1979) quantifies quality as \"conformance to requirements.\" Garvin (1983; 1988), on the other hand, measures quality in terms ofcounting the incidence of \"internal failures\" and \"external failures.\" Other definitions include \"value\" (Abbot, 1955; Feigenbaum, 1982), \"concordance to specification'\" (Gilmo", "title": "" }, { "docid": "c23bedbcad1433c14b0942d12e12cb60", "text": "In this study, we examine the role of strategy use in working memory (WM) tasks by providing short-term memory (STM) task strategy training to participants. In Experiment 1, the participants received four sessions of training to use a story-formation (i.e., chaining) strategy. There were substantial improvements from pretest to posttest (after training) in terms of both STM and WM task performance. Experiment 2 demonstrated that WM task improvement did not occur for control participants, who were given the same amount of practice but were not provided with strategy instructions. An assessment of participants' strategy use on the STM task before training indicated that more strategic participants displayed better WM task performance and better verbal skills. These results support our hypothesis that strategy use influences performance on WM tasks.", "title": "" }, { "docid": "e2d6dbce669a6d177b68a5660e4821b5", "text": "In this letter, a novel slot-coupling feeding technique is used to realize a dual-polarized 2 × 1 microstrip stacked patch array for mobile wireless communication systems. The array is intended as a basic module for base-station linear arrays, whose final size depending on beamwidth and gain requirements. Each array element is fed through two microstrip lines arranged on the basis of a sequential rotation technique. Each stacked square patch is excited through a square ring slot realized in the feeding network ground plane. Design procedure, simulation results and measurement data are presented for a 2 × 1 array working in the GSM 1800-1900 band (1710-1910 MHz), UMTS band (1920-2170 MHz), ISM band (2400-2484 MHz), and UMTS 3G expansion band (2500-2690 MHz) or, alternatively, WiMAX band (2300-2700 MHz), with a resulting 45% percentage bandwidth (reflection coefficient <; -10 dB). Due to both the symmetry properties of the novel slot-coupling feeding configuration and the implementation of a sequential rotation technique, good results have been obtained in terms of port isolation and cross-polar radiation patterns.", "title": "" }, { "docid": "e54a6ff961fe04d8d5c7700077ae1979", "text": "Extracting meaningful relationships with semantic significance from biomedical literature is often a challenging task. BioCreative V track4 challenge for the first time has organized a comprehensive shared task to test the robustness of the text-mining algorithms in extracting semantically meaningful assertions from the evidence statement in biomedical text. In this work, we tested the ability of a rule-based semantic parser to extract Biological Expression Language (BEL) statements from evidence sentences culled out of biomedical literature as part of BioCreative V Track4 challenge. The system achieved an overall best F-measure of 21.29% in extracting the complete BEL statement. For relation extraction, the system achieved an F-measure of 65.13% on test data set. Our system achieved the best performance in five of the six criteria that was adopted for evaluation by the task organizers. Lack of ability to derive semantic inferences, limitation in the rule sets to map the textual extractions to BEL function were some of the reasons for low performance in extracting the complete BEL statement. Post shared task we also evaluated the impact of differential NER components on the ability to extract BEL statements on the test data sets besides making a single change in the rule sets that translate relation extractions into a BEL statement. There is a marked improvement by over 20% in the overall performance of the BELMiner's capability to extract BEL statement on the test set. The system is available as a REST-API at http://54.146.11.205:8484/BELXtractor/finder/.\n\n\nDatabase URL\nhttp://54.146.11.205:8484/BELXtractor/finder/.", "title": "" }, { "docid": "8fcc03933f2287eb6e6a6d2730d2c0cd", "text": "While virtualization helps to enable multi-tenancy in data centers, it introduces new challenges to the resource management in traditional OSes. We find that one important design in an OS, prioritizing interactive and I/O-bound workloads, can become ineffective in a virtualized OS. Resource multiplexing between multiple tenants breaks the assumption of continuous CPU availability in physical systems and causes two types of priority inversions in virtualized OSes. In this paper, we present xBalloon, a lightweight approach to preserving I/O prioritization. It uses a balloon process in the virtualized OS to avoid priority inversion in both short-term and long-term scheduling. Experiments in a local Xen environment and Amazon EC2 show that xBalloon improves I/O performance in a recent Linux kernel by as much as 136% on network throughput, 95% on disk throughput, and 125x on network tail latency.", "title": "" }, { "docid": "ac0b86c5a0e7949c5e77610cee865e2b", "text": "BACKGROUND\nDegenerative lumbosacral stenosis is a common problem in large breed dogs. For severe degenerative lumbosacral stenosis, conservative treatment is often not effective and surgical intervention remains as the last treatment option. The objective of this retrospective study was to assess the middle to long term outcome of treatment of severe degenerative lumbosacral stenosis with pedicle screw-rod fixation with or without evidence of radiological discospondylitis.\n\n\nRESULTS\nTwelve client-owned dogs with severe degenerative lumbosacral stenosis underwent pedicle screw-rod fixation of the lumbosacral junction. During long term follow-up, dogs were monitored by clinical evaluation, diagnostic imaging, force plate analysis, and by using questionnaires to owners. Clinical evaluation, force plate data, and responses to questionnaires completed by the owners showed resolution (n = 8) or improvement (n = 4) of clinical signs after pedicle screw-rod fixation in 12 dogs. There were no implant failures, however, no interbody vertebral bone fusion of the lumbosacral junction was observed in the follow-up period. Four dogs developed mild recurrent low back pain that could easily be controlled by pain medication and an altered exercise regime.\n\n\nCONCLUSIONS\nPedicle screw-rod fixation offers a surgical treatment option for large breed dogs with severe degenerative lumbosacral stenosis with or without evidence of radiological discospondylitis in which no other treatment is available. Pedicle screw-rod fixation alone does not result in interbody vertebral bone fusion between L7 and S1.", "title": "" }, { "docid": "e44ecb493e84ee21c84b012e122a27b9", "text": "In 2015, an outbreak of hand, foot and mouth disease (HFMD) occurred in Romania and many patients presented with onychomadesis following HFMD. We report on five children (3 girls and 2 boys, aged between 3 and 12 years) who were consulted for onychomadesis involving the fingernails and toenails, all of them being diagnosed with HFMD 4-6 weeks ago. We observed no relationship between onychomadesis and the severity of the previous HFMD in our patients. In all of our cases, treatment for onychomadesis was not necessary; nail changes were temporary with spontaneous normal regrowth.", "title": "" }, { "docid": "15316c80d2a880b06846e8dd398a5c3f", "text": "One weak spot is all it takes to open secured digital doors and online accounts causing untold damage and consequences.", "title": "" }, { "docid": "08765f109452855227eb85395e4c49b1", "text": "and on their differing feelings toward the politicians (in this case, across liking, trusting, and feeling affiliated with the candidates). After 16 test runs, the voters did indeed change their attitudes and feelings toward the candidates in different and yet generally realistic ways, and even changed their attitudes about other issues based on what a candidate extolled.", "title": "" }, { "docid": "679f15129877227621332bce7ea40218", "text": "The Semantic Web Rule Language (SWRL) allows the combination of rules and ontology terms, defined using the Web Ontology Language (OWL), to increase the expressiveness of both. However, as rule sets grow, they become difficult to understand and error prone, especially when used and maintained by more than one person. If SWRL is to become a true web standard, it has to be able to handle big rule sets. To find answers to this problem, we first surveyed business rule systems and found the key features and interfaces they used and then, based on our finds, we proposed techniques and tools that use new visual representations to edit rules in a web application. They allow error detection, rule similarity analysis, rule clustering visualization and atom reuse between rules. These tools are implemented in the SWRL Editor, an open source plug-in for Web-Protégé (a web-based ontology editor) that leverages Web-Protégé’s collaborative tools to allow groups of users to not only view and edit rules but also comment and discuss about them. We evaluated our solution comparing it to the only two SWRL editor implementations openly available and showed that it implements more of the key features present in traditional rule systems.", "title": "" }, { "docid": "a2cdcd9400c2c6663b3672e9cf8d41f6", "text": "The use of immersive virtual reality (VR) systems in museums is a recent trend, as the development of new interactive technologies has inevitably impacted the more traditional sciences and arts. This is more evident in the case of novel interactive technologies that fascinate the broad public, as has always been the case with virtual reality. The increasing development of VR technologies has matured enough to expand research from the military and scientific visualization realm into more multidisciplinary areas, such as education, art and entertainment. This paper analyzes the interactive virtual environments developed at an institution of informal education and discusses the issues involved in developing immersive interactive virtual archaeology projects for the broad public.", "title": "" }, { "docid": "d390629aef305dc5fc0cabe8c5ae33d1", "text": "Storage systems need to support high-performance for special-purpose data processing applications that run on an evolving storage device technology landscape. This puts tremendous pressure on storage systems to support rapid change both in terms of their interfaces and their performance. But adapting storage systems can be difficult because unprincipled changes might jeopardize years of code-hardening and performance optimization efforts that were necessary for users to entrust their data to the storage system. We introduce the programmable storage approach, which exposes internal services and abstractions of the storage stack as building blocks for higher-level services. We also build a prototype to explore how existing abstractions of common storage system services can be leveraged to adapt to the needs of new data processing systems and the increasing variety of storage devices. We illustrate the advantages and challenges of this approach by composing existing internal abstractions into two new higher-level services: a file system metadata load balancer and a high-performance distributed shared-log. The evaluation demonstrates that our services inherit desirable qualities of the back-end storage system, including the ability to balance load, efficiently propagate service metadata, recover from failure, and navigate trade-offs between latency and throughput using leases.", "title": "" }, { "docid": "89ae73a8337870e8ef5e078de7bf2f58", "text": "In grid connected photovoltaic (PV) systems, maximum power point tracking (MPPT) algorithm plays an important role in optimizing the solar energy efficiency. In this paper, the new artificial neural network (ANN) based MPPT method has been proposed for searching maximum power point (MPP) fast and exactly. For the first time, the combined method is proposed, which is established on the ANN-based PV model method and incremental conductance (IncCond) method. The advantage of ANN-based PV model method is the fast MPP approximation base on the ability of ANN according the parameters of PV array that used. The advantage of IncCond method is the ability to search the exactly MPP based on the feedback voltage and current but don't care the characteristic on PV array‥ The effectiveness of proposed algorithm is validated by simulation using Matlab/ Simulink and experimental results using kit field programmable gate array (FPGA) Virtex II pro of Xilinx.", "title": "" }, { "docid": "0a633ecc32e4f7fccc6c39e2d0d15393", "text": "Computing complex spiking artificial neural networks (SANNs) on conventional hardware platforms is far from reaching real-time requirements. Therefore we propose a neuro-processor, called NeuroPipe-Chip, as part of an accelerator board. In this paper, we introduce two new concepts on chip-level to speed up the computation of SANNs. These concepts are implemented in a prototype of the NeuroPipe-Chip. We present the hardware structure of the prototype and evaluate its performance in a system simulation based on a hardware description language (HDL). For the computation of a simple SANN for image segmentation, the NeuroPipe-Chip operating at 100 MHz shows an improvement of more than two orders of magnitude compared to an Alpha 500 MHz workstation and approaches real-time requirements for the computation of SANNs in the order of 10(6) neurons. Hence, such an accelerator would allow for applications of complex SANNs to solve real-world tasks like real-time image processing. The NeuroPipe-Chip has been fabricated in an Alcatel 0.35-mum digital CMOS technology.", "title": "" }, { "docid": "28370dc894584f053a5bb029142ad587", "text": "Pharmaceutical parallel trade in the European Union is a large and growing phenomenon, and hope has been expressed that it has the potential to reduce prices paid by health insurance and consumers and substantially to raise overall welfare. In this paper we examine the phenomenon empirically, using data on prices and volumes of individual imported products. We have found that the gains from parallel trade accrue mostly to the distribution chain rather than to health insurance and consumers. This is because in destination countries parallel traded drugs are priced just below originally sourced drugs. We also test to see whether parallel trade has a competition impact on prices in destination countries and find that it does not. Such competition effects as there are in pharmaceuticals come mainly from the presence of generics. Accordingly, instead of a convergence to the bottom in EU pharmaceutical prices, the evidence points at ‘convergence to the top’. This is explained by the fact that drug prices are subjected to regulation in individual countries, and by the limited incentives of purchasers to respond to price differentials.", "title": "" }, { "docid": "950759f015897a7e3e4948f736788c76", "text": "The characterization of complex air traffic situations is an important issue in air traffic management (ATM). Within the current ground-based ATM system, complexity metrics have been introduced with the goal of evaluating the difficulty experienced by air traffic controllers in guaranteeing the appropriate aircraft separation in a sector. The rapid increase in air travel demand calls for new generation ATM systems that can safely and efficiently handle higher levels of traffic. To this purpose, part of the responsibility for separation maintenance will be delegated to the aircraft, and trajectory management functions will be further automated and distributed. The evolution toward an autonomous aircraft framework envisages new tasks where assessing complexity may be valuable and requires a whole new perspective in the definition of suitable complexity metrics. This paper presents a critical analysis of the existing approaches for modeling and predicting air traffic complexity, examining their portability to autonomous ATM systems. Possible applications and related requirements will be discussed.", "title": "" }, { "docid": "a63989ee86e2a57aae2d33421c61cd68", "text": "As the rapid growth of multi-modal data, hashing methods for cross-modal retrieval have received considerable attention. Deep-networks-based cross-modal hashing methods are appealing as they can integrate feature learning and hash coding into end-to-end trainable frameworks. However, it is still challenging to find content similarities between different modalities of data due to the heterogeneity gap. To further address this problem, we propose an adversarial hashing network with attention mechanism to enhance the measurement of content similarities by selectively focusing on informative parts of multi-modal data. The proposed new adversarial network, HashGAN, consists of three building blocks: 1) the feature learning module to obtain feature representations, 2) the generative attention module to generate an attention mask, which is used to obtain the attended (foreground) and the unattended (background) feature representations, 3) the discriminative hash coding module to learn hash functions that preserve the similarities between different modalities. In our framework, the generative module and the discriminative module are trained in an adversarial way: the generator is learned to make the discriminator cannot preserve the similarities of multi-modal data w.r.t. the background feature representations, while the discriminator aims to preserve the similarities of multimodal data w.r.t. both the foreground and the background feature representations. Extensive evaluations on several benchmark datasets demonstrate that the proposed HashGAN brings substantial improvements over other state-ofthe-art cross-modal hashing methods.", "title": "" }, { "docid": "46a6718638a6d72b4f9a4e3f0ba8e548", "text": "Industries today face the growing problems from scarce energy. Energy awareness will help industrial organizations survive in terms of availability and cost of energy. With IoT technology, MQTT serves as an application protocol for energy saving. However, there are few reviews on evidence of energy savings by MQTT of IoT after commercialization. The MQTT classification is proposed to identify MQTT energy technology and related technologies. This article surveys experimented MQTT application articles published between 2011 and 2017 to confirm this classification. Survey results indicate energy saving in all articles. The findings show that MQTT is a suitable IoT protocol for industrial applications that supports energy saving for industries.", "title": "" }, { "docid": "23e18cb7783764b1c0bb71285bb20778", "text": "This paper deals with the phenomenon of online self-disclosure. Two qualitative data analyses of YouTube videos were conducted. The studies revealed emerging forms of self-disclosure online, which are not necessarily bound to conditions of visual anonymity. This finding puts previous research results into question, which stress the strong correlation between self-disclosure and visual anonymity. The results of both qualitative studies showed that people also tend to disclose information in (visually) non-anonymous settings. The paper concludes by presenting a revised model of online self-disclosure and describing enhancing factors for self-disclosing behaviour on the internet based on the latest research results. 2015 Elsevier Ltd. All rights reserved.", "title": "" } ]
scidocsrr
357406becb34531dd3515c51bb87ad33
Efficient Tree-Based Topic Modeling
[ { "docid": "fce925493fc9f7cbbe4c202e5e625605", "text": "Topic models are a useful and ubiquitous tool for understanding large corpora. However, topic models are not perfect, and for many users in computational social science, digital humanities, and information studies—who are not machine learning experts—existing models and frameworks are often a “take it or leave it” proposition. This paper presents a mechanism for giving users a voice by encoding users’ feedback to topic models as correlations between words into a topic model. This framework, interactive topic modeling (itm), allows untrained users to encode their feedback easily and iteratively into the topic models. Because latency in interactive systems is crucial, we develop more efficient inference algorithms for tree-based topic models. We validate the framework both with simulated and real users.", "title": "" }, { "docid": "6f6667e4c485978b566d25837083b565", "text": "Topic models provide a powerful tool for analyzing large text collections by representing high dimensional data in a low dimensional subspace. Fitting a topic model given a set of training documents requires approximate inference techniques that are computationally expensive. With today's large-scale, constantly expanding document collections, it is useful to be able to infer topic distributions for new documents without retraining the model. In this paper, we empirically evaluate the performance of several methods for topic inference in previously unseen documents, including methods based on Gibbs sampling, variational inference, and a new method inspired by text classification. The classification-based inference method produces results similar to iterative inference methods, but requires only a single matrix multiplication. In addition to these inference methods, we present SparseLDA, an algorithm and data structure for evaluating Gibbs sampling distributions. Empirical results indicate that SparseLDA can be approximately 20 times faster than traditional LDA and provide twice the speedup of previously published fast sampling methods, while also using substantially less memory.", "title": "" } ]
[ { "docid": "7abdd1fc5f2a8c5b7b19a6a30eadad0a", "text": "This Paper investigate action recognition by using Extreme Gradient Boosting (XGBoost). XGBoost is a supervised classification technique using an ensemble of decision trees. In this study, we also compare the performance of Xboost using another machine learning techniques Support Vector Machine (SVM) and Naive Bayes (NB). The experimental study on the human action dataset shows that XGBoost better as compared to SVM and NB in classification accuracy. Although takes more computational time the XGBoost performs good classification on action recognition.", "title": "" }, { "docid": "9145fdedff7a7ef78af9ea51c720ca3c", "text": "In this paper, we combine ideas from machine learning (ML) and operations research and management science (OR/MS) in developing a framework, along with specific methods, for using data to prescribe optimal decisions in OR/MS problems. In a departure from other work on data-driven optimization and reflecting our practical experience with the data available in applications of OR/MS, we consider data consisting, not only of observations of quantities with direct e↵ect on costs/revenues, such as demand or returns, but predominantly of observations of associated auxiliary quantities. The main problem of interest is a conditional stochastic optimization problem, given imperfect observations, where the joint probability distributions that specify the problem are unknown. We demonstrate that our proposed solution methods, which are inspired by ML methods such as local regression (LOESS), classification and regression trees (CART), and random forests (RF), are generally applicable to a wide range of decision problems. We prove that they are computationally tractable and asymptotically optimal under mild conditions even when data is not independent and identically distributed (iid) and even for censored observations. As an analogue to the coe cient of determination R, we develop a metric P termed the coe cient of prescriptiveness to measure the prescriptive content of data and the e cacy of a policy from an operations perspective. To demonstrate the power of our approach in a real-world setting we study an inventory management problem faced by the distribution arm of an international media conglomerate, which ships an average of 1 billion units per year. We leverage both internal data and public online data harvested from IMDb, Rotten Tomatoes, and Google to prescribe operational decisions that outperform baseline measures. Specifically, the data we collect, leveraged by our methods, accounts for an 88% improvement as measured by our coe cient of prescriptiveness.", "title": "" }, { "docid": "9e5cd5c6eed0d603e962318e5b6d8060", "text": "Software can be tested either manually or automatically. The two approaches are complementary: automated testing can perform a large number of tests in little time, whereas manual testing uses the knowledge of the testing engineer to target testing to the parts of the system that are assumed to be more error-prone. Despite this complementarity, tools for manual and automatic testing are usually different, leading to decreased productivity and reliability of the testing process. AutoTest is a testing tool that provides a \"best of both worlds\" strategy: it integrates developers' test cases into an automated process of systematic contract-driven testing. This allows it to combine the benefits of both approaches while keeping a simple interface, and to treat the two types of tests in a unified fashion: evaluation of results is the same, coverage measures are added up, and both types of tests can be saved in the same format", "title": "" }, { "docid": "b988525d515588da8becc18c2aa21e82", "text": "Numerical optimization has been used as an extension of vehicle dynamics simulation in order to reproduce trajectories and driving techniques used by expert race drivers and investigate the effects of several vehicle parameters in the stability limit operation of the vehicle. In this work we investigate how different race-driving techniques may be reproduced by considering different optimization cost functions. We introduce a bicycle model with suspension dynamics and study the role of the longitudinal load transfer in limit vehicle operation, i.e., when the tires operate at the adhesion limit. Finally we demonstrate that for certain vehicle configurations the optimal trajectory may include large slip angles (drifting), which matches the techniques used by rally-race drivers.", "title": "" }, { "docid": "1844a5877f911ecaf932282e5a67b727", "text": "Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN users readily expose personal and private details about themselves, such as relationship status, date of birth, school name, email address, phone number, and even home address. This information, if put into the wrong hands, can be used to harm users both in the virtual world and in the real world. These risks become even more severe when the users are children. In this paper, we present a thorough review of the different security and privacy risks, which threaten the well-being of OSN users in general, and children in particular. In addition, we present an overview of existing solutions that can provide better protection, security, and privacy for OSN users. We also offer simple-to-implement recommendations for OSN users, which can improve their security and privacy when using these platforms. Furthermore, we suggest future research directions.", "title": "" }, { "docid": "31865d8e75ee9ea0c9d8c575bbb3eb90", "text": "Magicians use misdirection to prevent you from realizing the methods used to create a magical effect, thereby allowing you to experience an apparently impossible event. Magicians have acquired much knowledge about misdirection, and have suggested several taxonomies of misdirection. These describe many of the fundamental principles in misdirection, focusing on how misdirection is achieved by magicians. In this article we review the strengths and weaknesses of past taxonomies, and argue that a more natural way of making sense of misdirection is to focus on the perceptual and cognitive mechanisms involved. Our psychologically-based taxonomy has three basic categories, corresponding to the types of psychological mechanisms affected: perception, memory, and reasoning. Each of these categories is then divided into subcategories based on the mechanisms that control these effects. This new taxonomy can help organize magicians' knowledge of misdirection in a meaningful way, and facilitate the dialog between magicians and scientists.", "title": "" }, { "docid": "cd1fbb15de42090945dbc8396dfd13df", "text": "We propose a new dependency parsing scheme which jointly parses a sentence and repairs grammatical errors by extending the non-directional transitionbased formalism of Goldberg and Elhadad (2010) with three additional actions: SUBSTITUTE, DELETE, INSERT. Because these actions may cause an infinite loop in derivation, we also introduce simple constraints that ensure the parser termination. We evaluate our model with respect to dependency accuracy and grammaticality improvements for ungrammatical sentences, demonstrating the robustness and applicability of our scheme.", "title": "" }, { "docid": "85c74646e74aaff7121042beaded5bfe", "text": "We consider the sampling bias introduced in the study of online networks when collecting data through publicly available APIs (application programming interfaces). We assess differences between three samples of Twitter activity; the empirical context is given by political protests taking place in May 2012. We track online communication around these protests for the period of one month, and reconstruct the network of mentions and re-tweets according to the search and the streaming APIs, and to different filraph comparison tering parameters. We find that smaller samples do not offer an accurate picture of peripheral activity; we also find that the bias is greater for the network of mentions, partly because of the higher influence of snowballing in identifying relevant nodes. We discuss the implications of this bias for the study of diffusion dynamics and political communication through social media, and advocate the need for more uniform sampling procedures to study online communication. © 2014 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "669b4b1574c22a0c18dd1dc107bc54a1", "text": "T lymphocytes respond to foreign antigens both by producing protein effector molecules known as lymphokines and by multiplying. Complete activation requires two signaling events, one through the antigen-specific receptor and one through the receptor for a costimulatory molecule. In the absence of the latter signal, the T cell makes only a partial response and, more importantly, enters an unresponsive state known as clonal anergy in which the T cell is incapable of producing its own growth hormone, interleukin-2, on restimulation. Our current understanding at the molecular level of this modulatory process and its relevance to T cell tolerance are reviewed.", "title": "" }, { "docid": "0ba036ae72811c02179842f1949974b6", "text": "The authors propose a new climatic drought index: the standardized precipitation evapotranspiration index (SPEI). The SPEI is based on precipitation and temperature data, and it has the advantage of combining multiscalar character with the capacity to include the effects of temperature variability on drought assessment. The procedure to calculate the index is detailed and involves a climatic water balance, the accumulation of deficit/surplus at different time scales, and adjustment to a log-logistic probability distribution. Mathematically, the SPEI is similar to the standardized precipitation index (SPI), but it includes the role of temperature. Because the SPEI is based on a water balance, it can be compared to the self-calibrated Palmer drought severity index (sc-PDSI). Time series of the three indices were compared for a set of observatories with different climate characteristics, located in different parts of the world. Under global warming conditions, only the sc-PDSI and SPEI identified an increase in drought severity associated with higher water demand as a result of evapotranspiration. Relative to the sc-PDSI, the SPEI has the advantage of being multiscalar, which is crucial for drought analysis and monitoring.", "title": "" }, { "docid": "cb2edc1728a31b3c37ebf636be81f01f", "text": "Optimization problems in the power industry have attracted researchers from engineering, operations research and mathematics for many years. The complex nature of generation, transmission, and distribution of electric power implies ample opportunity of improvement towards the optimal. Mathematical models have proven indispensable in deepening the understanding of these optimization problems. The progress in algorithms and implementations has an essential share in widening the abilities to solve these optimization problems on hardware that is permanently improving. In the present paper we address unit commitment in power operation planning. This problem concerns the scheduling of start-up/shut-down decisions and operation levels for power generation units such that the fuel costs over some time horizon are minimal. The diversity of power systems regarding technological design and economic environment leads to a variety of issues potentially occurring in mathematical models of unit commitment. The ongoing liberalization of electricity markets will add to this by shifting the objective in power planning from fuel cost minimization to revenue maximization. For an introduction into basic aspects of unit commitment the reader is referred to the book by Wood and Wollenberg [35]. A literature synopsis on various traditional methodological approaches has been compiled by Sheble and Fahd [29]. In our paper, we present some of the more recent issues in modeling and algorithms for unit commitment. The present paper grew out of a collaboration with the German utility VEAG Vereinigte Energiewerke AG Berlin whose generation system comprises conventional coal and gas fired thermal units as well as pumped-storage plants. An important", "title": "" }, { "docid": "86c481ed5b7e57230a244676d315ca6c", "text": "Flocculation harvesting of the fucoxanthin-rich marine microalga Isochrysis galbana has received little attention. Therefore, we attempted to screen for an optimal chemical flocculant and optimize flocculation conditions from five chemical flocculants—ferric chloride (FC), aluminum sulfate (AS), polyaluminum chloride (PAC), aluminum potassium sulfate (APS), and zinc sulfate (ZS)—for effective flocculation of I. galbana. The growth rate, photosynthetic performance, and fucoxanthin content were determined in re-suspended flocculated algal cells and in the flocculation supernatant cultured algal cells. The results showed that high growth rate and fucoxanthin accumulation were observed when FC was used as the flocculant in I. galbana cultures, which indicated that FC may cause less harm to I. galbana than the other aluminum-based flocculants. Furthermore, satisfactory flocculation efficiency was also observed when FC was used to flocculate I. galbana, and the FC dosage was less than that required for flocculation of I. galbana using PAC, APS, and AS. Thus, we selected FC as the optimal flocculant for harvesting I. galbana based on its flocculation efficiency together with algal physiological performance, growth rate, and fucoxanthin content.", "title": "" }, { "docid": "189de13d5c7f9816dcaf5f5b230118a3", "text": "This paper offers a framework for equitable instruction that emerged while designing a computer science course for students entering the sixth grade. Leveraging research from a range of fields, including sociology, mathematics education, and the learning sciences, we argue that in addition to material resources, such as rich course content and quality instruction, equity also depends on students' access to non-material resources, such as productive domain identities and peer relationships. We illustrate each dimension of the framework by describing in detail a core set of pedagogical practices implemented during a summer course.", "title": "" }, { "docid": "c6bb3a3fdacefdfa6c14b89cb8a9e734", "text": "This paper deals with finite networks which consist of interconnections of synchronously evolving processors. Each processor updates its state by applying a “sigmoidal” scalar nonlinearity to a linear combination of the previous states of all units. We prove that one may simulate all Turing Machines by rational nets. In particular, one can do this in linear time, and there is a net made up of about 1,000 processors which computes a universal partial-recursive function. Products (high order nets) are not required, contrary to what had been stated in the literature. Furthermore, we assert a similar theorem about non-deterministic Turing Machines. Consequences for undecidability and complexity issues about nets are discussed too.", "title": "" }, { "docid": "0c4a57f3b0defd307b1b7b6f22404d5a", "text": "We present a novel wavelet method for the simulation of fluids at high spatial resolution. The algorithm enables large- and small-scale detail to be edited separately, allowing high-resolution detail to be added as a post-processing step. Instead of solving the Navier-Stokes equations over a highly refined mesh, we use the wavelet decomposition of a low-resolution simulation to determine the location and energy characteristics of missing high-frequency components. We then synthesize these missing components using a novel incompressible turbulence function, and provide a method to maintain the temporal coherence of the resulting structures. There is no linear system to solve, so the method parallelizes trivially and requires only a few auxiliary arrays. The method guarantees that the new frequencies will not interfere with existing frequencies, allowing animators to set up a low resolution simulation quickly and later add details without changing the overall fluid motion.", "title": "" }, { "docid": "408e7d0a33bf2ab5f570543f4a8d7aba", "text": "Instrumental behavior can be controlled by goal-directed action-outcome and habitual stimulus-response processes that are supported by anatomically distinct brain systems. Based on previous findings showing that stress modulates the interaction of \"cognitive\" and \"habit\" memory systems, we asked in the presented study whether stress may coordinate goal-directed and habit processes in instrumental learning. For this purpose, participants were exposed to stress (socially evaluated cold pressor test) or a control condition before they were trained to perform two instrumental actions that were associated with two distinct food outcomes. After training, one of these food outcomes was selectively devalued as subjects were saturated with that food. Next, subjects were presented the two instrumental actions in extinction. Stress before training in the instrumental task rendered participants' behavior insensitive to the change in the value of the food outcomes, that is stress led to habit performance. Moreover, stress reduced subjects' explicit knowledge of the action-outcome contingencies. These results demonstrate for the first time that stress promotes habits at the expense of goal-directed performance in humans.", "title": "" }, { "docid": "cb8fa49be63150e1b85f98a44df691a5", "text": "SQL tuning---the attempt to improve a poorly-performing execution plan produced by the database query optimizer---is a critical aspect of database performance tuning. Ironically, as commercial databases strive to improve on the manageability front, SQL tuning is becoming more of a black art. It requires a high level of expertise in areas like (i) query optimization, run-time execution of query plan operators, configuration parameter settings, and other database internals; (ii) identification of missing indexes and other access structures; (iii) statistics maintained about the data; and (iv) characteristics of the underlying storage system. Since database systems, their workloads, and the data that they manage are not getting any simpler, database users and administrators often rely on trial and error for SQL tuning.\n In this paper, we take the position that the trial-and-error (or, experiment-driven) process of SQL tuning can be automated by the database system in an efficient manner; freeing the user or administrator from this burden in most cases. A number of current approaches to SQL tuning indeed take an experiment-driven approach. We are prototyping a tool, called zTuned, that automates experiment-driven SQL tuning. This paper describes the design choices in zTuned to address three nontrivial issues: (i) how is the SQL tuning logic integrated with the regular query optimizer, (ii) how to plan the experiments to conduct so that a satisfactory (new) plan can be found quickly, and (iii) how to conduct experiments with minimal impact on the user-facing production workload. We conclude with a preliminary empirical evaluation and outline promising new directions in automated SQL tuning.", "title": "" }, { "docid": "d658b95cc9dc81d0dbb3918795ccab50", "text": "A brain–computer interface (BCI) is a communication channel which does not depend on the brain’s normal output pathways of peripheral nerves and muscles [1–3]. It supplies paralyzed patients with a new approach to communicate with the environment. Among various brain monitoring methods employed in current BCI research, electroencephalogram (EEG) is the main interest due to its advantages of low cost, convenient operation and non-invasiveness. In present-day EEG-based BCIs, the following signals have been paid much attention: visual evoked potential (VEP), sensorimotor mu/beta rhythms, P300 evoked potential, slow cortical potential (SCP), and movement-related cortical potential (MRCP). Details about these signals can be found in chapter “Brain Signals for Brain–Computer Interfaces”. These systems offer some practical solutions (e.g., cursor movement and word processing) for patients with motor disabilities. In this chapter, practical designs of several BCIs developed in Tsinghua University will be introduced. First of all, we will propose the paradigm of BCIs based on the modulation of EEG rhythms and challenges confronting practical system designs. In Sect. 2, modulation and demodulation methods of EEG rhythms will be further explained. Furthermore, practical designs of a VEP-based BCI and a motor imagery based BCI will be described in Sect. 3. Finally, Sect. 4 will present some real-life application demos using these practical BCI systems.", "title": "" }, { "docid": "a212ba02d2546ee33e42fe26f4b05295", "text": "The requirement to operate aircraft in GPS-denied environments can be met by using visual odometry. Aiming at a full-scale aircraft equipped with a high-accuracy inertial navigation system (INS), the proposed method combines vision and the INS for odometry estimation. With such an INS, the aircraft orientation is accurate with low drift, but it contains high-frequency noise that can affect the vehicle motion estimation, causing position estimation to drift. Our method takes the INS orientation as input and estimates translation. During motion estimation, the method virtually rotates the camera by reparametrizing features with their depth direction perpendicular to the ground. This partially eliminates error accumulation in motion estimation caused by the INS high-frequency noise, resulting in a slow drift. We experiment on two hardware configurations in the acquisition of depth for the visual features: 1) the height of the aircraft above the ground is measured by an altimeter assuming that the imaged ground is a local planar patch, and 2) the depth map of the ground is registered with a two-dimensional laser in a push-broom configuration. The method is tested with data collected from a full-scale helicopter. The accumulative flying distance for the overall tests is approximately 78 km. We observe slightly better accuracy with the push-broom laser than the altimeter. C © 2015 Wiley Periodicals, Inc.", "title": "" }, { "docid": "a5082b49cc584548ac066b9c6ffb2452", "text": "In this paper we review the algorithm development and applications in high resolution shock capturing methods, level set methods and PDE based methods in computer vision and image processing. The emphasis is on Stanley Osher's contribution in these areas and the impact of his work. We will start with shock capturing methods and will review the Engquist-Osher scheme, TVD schemes, entropy conditions, ENO and WENO schemes and numerical schemes for Hamilton-Jacobi type equations. Among level set methods we will review level set calculus, numerical techniques, uids and materials, variational approach, high codimension motion, geometric optics, and the computation of discontinuous solutions to Hamilton-Jacobi equations. Among computer vision and image processing we will review the total variation model for image denoising, images on implicit surfaces, and the level set method in image processing and computer vision.", "title": "" } ]
scidocsrr
e883ea79acdede6263f10fd118f13e1a
Vehicle dynamic state estimation: state of the art schemes and perspectives
[ { "docid": "8ae7e5ec3d4492875272011cba8bb828", "text": "This paper provides a survey of recent works on cognitive cars with a focus on driver-oriented intelligent vehicle motion control. The main objective here is to clarify the goals and guidelines for future development in the area of advanced driver-assistance systems (ADASs). Two major research directions are investigated and discussed in detail: (1) stimuli-decisions-actions, which focuses on the driver side, and (2) perception enhancement-action-suggestion-function-delegation, which emphasizes the ADAS side. This paper addresses the important achievements and major difficulties of each direction and discusses how to combine the two directions into a single integrated system to obtain safety and comfort while driving. Other related topics, including driver training and infrastructure design, are also studied.", "title": "" } ]
[ { "docid": "70743017cdee81c042491fe9ea550515", "text": "Lightweight cryptographic solutions are required to guarantee the security of Internet of Things (IoT) pervasiveness. Cryptographic primitives mandate a non-linear operation. The design of a lightweight, secure, non-linear 4 × 4 substitution box (S-box) suited to Internet of Things (IoT) applications is proposed in this work. The structure of the 4 × 4 S-box is devised in the finite fields GF (24) and GF ((22)2). The finite field S-box is realized by multiplicative inversion followed by an affine transformation. The multiplicative inverse architecture employs Euclidean algorithm for inversion in the composite field GF ((22)2). The affine transformation is carried out in the field GF (24). The isomorphic mapping between the fields GF (24) and GF ((22)2) is based on the primitive element in the higher order field GF (24). The recommended finite field S-box architecture is combinational and enables sub-pipelining. The linear and differential cryptanalysis validates that the proposed S-box is within the maximal security bound. It is observed that there is 86.5% lesser gate count for the realization of sub field operations in the composite field GF ((22)2) compared to the GF (24) field. In the PRESENT lightweight cipher structure with the basic loop architecture, the proposed S-box demonstrates 5% reduction in the gate equivalent area over the look-up-table-based S-box with TSMC 180 nm technology.", "title": "" }, { "docid": "a334bfdcbaacf1cada20694e2e3dd867", "text": "The oral bioavailability of diclofenac potassium 50 mg administered as a soft gelatin capsule (softgel capsule), powder for oral solution (oral solution), and tablet was evaluated in a randomized, open-label, 3-period, 6-sequence crossover study in healthy adults. Plasma diclofenac concentrations were measured using a validated liquid chromatography-mass spectrometry/mass spectrometry method, and pharmacokinetic analysis was performed by noncompartmental methods. The median time to achieve peak plasma concentrations of diclofenac was 0.5, 0.25, and 0.75 hours with the softgel capsule, oral solution, and tablet formulations, respectively. The geometric mean ratio and associated 90%CI for AUCinf, and Cmax of the softgel capsule formulation relative to the oral solution formulation were 0.97 (0.95-1.00) and 0.85 (0.76-0.95), respectively. The geometric mean ratio and associated 90%CI for AUCinf and Cmax of the softgel capsule formulation relative to the tablet formulation were 1.04 (1.00-1.08) and 1.67 (1.43-1.96), respectively. In conclusion, the exposure (AUC) of diclofenac with the new diclofenac potassium softgel capsule formulation was comparable to that of the existing oral solution and tablet formulations. The peak plasma concentration of diclofenac from the new softgel capsule was 67% higher than the existing tablet formulation, whereas it was 15% lower in comparison with the oral solution formulation.", "title": "" }, { "docid": "f5964bb7a6bca95fae0c3f923d3165fc", "text": "The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the lack of a comprehensive process to designing storage protection solutions. Designing protection for storage systems is best done by utilizing proactive system engineering rather than reacting with ad hoc countermeasures to the latest attack du jour. The purpose of threat modeling is to organize system threats and vulnerabilities into general classes to be addressed with known storage protection techniques. Although there has been prior work on threat modeling primarily for software applications, to our knowledge this is the first attempt at domain-specific threat modeling for storage systems. We discuss protection challenges unique to storage systems and propose two different processes to creating a threat model for storage systems: one based on classical security principles Confidentiality, Integrity, Availability, Authentication, or CIAA) and another based on the Data Lifecycle Model. It is our hope that this initial work will start a discussion on how to better design and implement storage protection solutions against storage threats.", "title": "" }, { "docid": "3b2376110b0e6949379697b7ba6730b5", "text": "............................................................................................................................... i Acknowledgments............................................................................................................... ii Table of", "title": "" }, { "docid": "b1b842bed367be06c67952c34921f6f6", "text": "Definitions and uses of the concept of empowerment are wide-ranging: the term has been used to describe the essence of human existence and development, but also aspects of organizational effectiveness and quality. The empowerment ideology is rooted in social action where empowerment was associated with community interests and with attempts to increase the power and influence of oppressed groups (such as workers, women and ethnic minorities). Later, there was also growing recognition of the importance of the individual's characteristics and actions. Based on a review of the literature, this paper explores the uses of the empowerment concept as a framework for nurses' professional growth and development. Given the complexity of the concept, it is vital to understand the underlying philosophy before moving on to define its substance. The articles reviewed were classified into three groups on the basis of their theoretical orientation: critical social theory, organization theory and social psychological theory. Empowerment seems likely to provide for an umbrella concept of professional development in nursing.", "title": "" }, { "docid": "57fd4b59ffb27c35faa6a5ee80001756", "text": "This paper describes a novel method for motion generation and reactive collision avoidance. The algorithm performs arbitrary desired velocity profiles in absence of external disturbances and reacts if virtual or physical contact is made in a unified fashion with a clear physically interpretable behavior. The method uses physical analogies for defining attractor dynamics in order to generate smooth paths even in presence of virtual and physical objects. The proposed algorithm can, due to its low complexity, run in the inner most control loop of the robot, which is absolutely crucial for safe Human Robot Interaction. The method is thought as the locally reactive real-time motion generator connecting control, collision detection and reaction, and global path planning.", "title": "" }, { "docid": "4107fe17e6834f96a954e13cbb920f78", "text": "Non-orthogonal multiple access (NOMA) can support more users than OMA techniques using the same wireless resources, which is expected to support massive connectivity for Internet of Things in 5G. Furthermore, in order to reduce the transmission latency and signaling overhead, grant-free transmission is highly expected in the uplink NOMA systems, where user activity has to be detected. In this letter, by exploiting the temporal correlation of active user sets, we propose a dynamic compressive sensing (DCS)-based multi-user detection (MUD) to realize both user activity and data detection in several continuous time slots. In particular, as the temporal correlation of the active user sets between adjacent time slots exists, we can use the estimated active user set in the current time slot as the prior information to estimate the active user set in the next time slot. Simulation results show that the proposed DCS-based MUD can achieve much better performance than that of the conventional CS-based MUD in NOMA systems.", "title": "" }, { "docid": "040f73fc915d3799193abf5e3a48e8f4", "text": "BACKGROUND\nDiphallia is a very rare anomaly and seen once in every 5.5 million live births. True diphallia with normal penile structures is extremely rare. Surgical management for patients with complete penile duplication without any penile or urethral pathology is challenging.\n\n\nCASE REPORT\nA 4-year-old boy presented with diphallia. Initial physical examination revealed first physical examination revealed complete penile duplication, urine flow from both penises, meconium flow from right urethra, and anal atresia. Further evaluations showed double colon and rectum, double bladder, and large recto-vesical fistula. Two cavernous bodies and one spongious body were detected in each penile body. Surgical treatment plan consisted of right total penectomy and end-to-side urethra-urethrostomy. No postoperative complications and no voiding dysfunction were detected during the 18 months follow-up.\n\n\nCONCLUSION\nPenile duplication is a rare anomaly, which presents differently in each patient. Because of this, the treatment should be individualized and end-to-side urethra-urethrostomy may be an alternative to removing posterior urethra. This approach eliminates the risk of damaging prostate gland and sphincter.", "title": "" }, { "docid": "64b13ae694ec4c16cdbd59ceecec0915", "text": "Determining the stance expressed by an author from a post written for a twosided debate in an online debate forum is a relatively new problem. We seek to improve Anand et al.’s (2011) approach to debate stance classification by modeling two types of soft extra-linguistic constraints on the stance labels of debate posts, user-interaction constraints and ideology constraints. Experimental results on four datasets demonstrate the effectiveness of these inter-post constraints in improving debate stance classification.", "title": "" }, { "docid": "3b0ee097a17ed82306a0b2cc3c1d70d1", "text": "This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. Distribution of this document is unlimited. Summary This is one RFC of a pair that defines and discusses the requirements for Internet host software. This RFC covers the communications protocol layers: link layer, IP layer, and transport layer; its companion RFC-1123 covers the application and support protocols.", "title": "" }, { "docid": "1c3a87fd2e10a9799e7c0a79be635816", "text": "According to Network Effect literature network externalities lead to market failure due to Pareto-inferior coordination results. We show that the assumptions and simplifications implicitly used for modeling standardization processes fail to explain the real-world variety of diffusion courses in today’s dynamic IT markets and derive requirements for a more general model of network effects. We argue that Agent-based Computational Economics provides a solid basis for meeting these requirements by integrating evolutionary models from Game Theory and Institutional Economics.", "title": "" }, { "docid": "f72267cde1287bc3d0a235043c4dc5f5", "text": "End-to-end congestion control mechanisms have been critical to the robustness and stability of the Internet. Most of today’s Internet traffic is TCP, and we expect this to remain so in the future. Thus, having “TCP-friendly” behavior is crucial for new applications. However, the emergence of non-congestion-controlled realtime applications threatens unfairness to competing TCP traffic and possible congestion collapse. We present an end-to-end TCP-friendly Rate Adaptation Protocol (RAP), which employs an additive-increase, multiplicativedecrease (AIMD) algorithm. It is well suited for unicast playback of realtime streams and other semi-reliable rate-based applications. Its primary goal is to be fair and TCP-friendly while separating network congestion control from application-level reliability. We evaluate RAP through extensive simulation, and conclude that bandwidth is usually evenly shared between TCP and RAP traffic. Unfairness to TCP traffic is directly determined by how TCP diverges from the AIMD algorithm. Basic RAP behaves in a TCPfriendly fashion in a wide range of likely conditions, but we also devised a fine-grain rate adaptation mechanism to extend this range further. Finally, we show that deploying RED queue management can result in an ideal fairness between TCP and RAP traffic.", "title": "" }, { "docid": "ecf8cd68405d9c1c9c741ebbbc374faa", "text": "Rapid development has promoted the 3D land use in the urban environment with the increasing requirements of the complex interweaving, such as dwellings, commercial areas, public transportation and urban utilities and infrastructure.3D cadastral object are features which concern unban planning, land resource and real estate of municipalities, whether they are on, obove or below the earth’s surface. In essence, the 3D cadastral objects are content and partition of urban geographic space, and they aim at registering legal status and property rights associated with land and other real estates or properties (Guo, Ying, 2010). It has become a huge challenge for governments to manage 3D land space breaking through the traditional 2D information system, which needs the support of 3D techniques.", "title": "" }, { "docid": "c07c69bf5e2fce6f9944838ce80b5b8c", "text": "Many image editing applications rely on the analysis of image patches. In this paper, we present a method to analyze patches by embedding them to a vector space, in which the Euclidean distance reflects patch similarity. Inspired by Word2Vec, we term our approach Patch2Vec. However, there is a significant difference between words and patches. Words have a fairly small and well defined dictionary. Image patches, on the other hand, have no such dictionary and the number of different patch types is not well defined. The problem is aggravated by the fact that each patch might contain several objects and textures. Moreover, Patch2Vec should be universal because it must be able to map never-seen-before texture to the vector space. The mapping is learned by analyzing the distribution of all natural patches. We use Convolutional Neural Networks (CNN) to learn Patch2Vec. In particular, we train a CNN on labeled images with a triplet-loss objective function. The trained network encodes a given patch to a 128D vector. Patch2Vec is evaluated visually, qualitatively, and quantitatively. We then use several variants of an interactive single-click image segmentation algorithm to demonstrate the power of our method.", "title": "" }, { "docid": "f453b2fdb5da78a9a8b303b5bed8ae25", "text": "Building correct and efficient concurrent algorithms is known to be a difficult problem of fundamental importance. To achieve efficiency, designers try to remove unnecessary and costly synchronization. However, not only is this manual trial-and-error process ad-hoc, time consuming and error-prone, but it often leaves designers pondering the question of: is it inherently impossible to eliminate certain synchronization, or is it that I was unable to eliminate it on this attempt and I should keep trying?\n In this paper we respond to this question. We prove that it is impossible to build concurrent implementations of classic and ubiquitous specifications such as sets, queues, stacks, mutual exclusion and read-modify-write operations, that completely eliminate the use of expensive synchronization.\n We prove that one cannot avoid the use of either: i) read-after-write (RAW), where a write to shared variable A is followed by a read to a different shared variable B without a write to B in between, or ii) atomic write-after-read (AWAR), where an atomic operation reads and then writes to shared locations. Unfortunately, enforcing RAW or AWAR is expensive on all current mainstream processors. To enforce RAW, memory ordering--also called fence or barrier--instructions must be used. To enforce AWAR, atomic instructions such as compare-and-swap are required. However, these instructions are typically substantially slower than regular instructions.\n Although algorithm designers frequently struggle to avoid RAW and AWAR, their attempts are often futile. Our result characterizes the cases where avoiding RAW and AWAR is impossible. On the flip side, our result can be used to guide designers towards new algorithms where RAW and AWAR can be eliminated.", "title": "" }, { "docid": "47b5e127b64cf1842841afcdb67d6d84", "text": "This work describes the aerodynamic characteristic for aircraft wing model with and without bird feather like winglet. The aerofoil used to construct the whole structure is NACA 653-218 Rectangular wing and this aerofoil has been used to compare the result with previous research using winglet. The model of the rectangular wing with bird feather like winglet has been fabricated using polystyrene before design using CATIA P3 V5R13 software and finally fabricated in wood. The experimental analysis for the aerodynamic characteristic for rectangular wing without winglet, wing with horizontal winglet and wing with 60 degree inclination winglet for Reynolds number 1.66×10, 2.08×10 and 2.50×10 have been carried out in open loop low speed wind tunnel at the Aerodynamics laboratory in Universiti Putra Malaysia. The experimental result shows 25-30 % reduction in drag coefficient and 10-20 % increase in lift coefficient by using bird feather like winglet for angle of attack of 8 degree. Keywords—Aerofoil, Wind tunnel, Winglet, Drag Coefficient.", "title": "" }, { "docid": "2ae1dfeae3c6b8a1ca032198f2989aef", "text": "This study enhances the existing literature on online trust by integrating the consumers’ product evaluations model and technology adoption model in e-commerce environments. In this study, we investigate how perceived value influences the perceptions of online trust among online buyers and their willingness to repurchase from the same website. This study proposes a research model that compares the relative importance of perceived value and online trust to perceived usefulness in influencing consumers’ repurchase intention. The proposed model is tested using data collected from online consumers of e-commerce. The findings show that although trust and ecommerce adoption components are critical in influencing repurchase intention, product evaluation factors are also important in determining repurchase intention. Perceived quality is influenced by the perceptions of competitive price and website reputation, which in turn influences perceived value; and perceived value, website reputation, and perceived risk influence online trust, which in turn influence repurchase intention. The findings also indicate that the effect of perceived usefulness on repurchase intention is not significant whereas perceived value and online trust are the major determinants of repurchase intention. Major theoretical contributions and practical implications are discussed.", "title": "" }, { "docid": "c19bc89db255ecf88bc1514d8bd7d018", "text": "Fulfilling the requirements of point-of-care testing (POCT) training regarding proper execution of measurements and compliance with internal and external quality control specifications is a great challenge. Our aim was to compare the values of the highly critical parameter hemoglobin (Hb) determined with POCT devices and central laboratory analyzer in the highly vulnerable setting of an emergency department in a supra maximal care hospital to assess the quality of POCT performance. In 2548 patients, Hb measurements using POCT devices (POCT-Hb) were compared with Hb measurements performed at the central laboratory (Hb-ZL). Additionally, sub collectives (WHO anemia classification, patients with Hb <8 g/dl and suprageriatric patients (age >85y.) were analyzed. Overall, the correlation between POCT-Hb and Hb-ZL was highly significant (r = 0.96, p<0.001). Mean difference was -0.44g/dl. POCT-Hb values tended to be higher than Hb-ZL values (t(2547) = 36.1, p<0.001). Standard deviation of the differences was 0.62 g/dl. Only in 26 patients (1%), absolute differences >2.5g/dl occurred. McNemar´s test revealed significant differences regarding anemia diagnosis according to WHO definition for male, female and total patients (♂ p<0.001; ♀ p<0.001, total p<0.001). Hb-ZL resulted significantly more often in anemia diagnosis. In samples with Hb<8g/dl, McNemar´s test yielded no significant difference (p = 0.169). In suprageriatric patients, McNemar´s test revealed significant differences regarding anemia diagnosis according to WHO definition in male, female and total patients (♂ p<0.01; ♀ p = 0.002, total p<0.001). The difference between Hb-ZL and POCT-Hb with Hb<8g/dl was not statistically significant (<8g/dl, p = 1.000). Overall, we found a highly significant correlation between the analyzed hemoglobin concentration measurement methods, i.e. POCT devices and at the central laboratory. The results confirm the successful implementation of the presented POCT concept. Nevertheless some limitations could be identified in anemic patients stressing the importance of carefully examining clinically implausible results.", "title": "" }, { "docid": "333e2df79425177f0ce2686bd5edbfbe", "text": "The current paper proposes a novel variational Bayes predictive coding RNN model, which can learn to generate fluctuated temporal patterns from exemplars. The model learns to maximize the lower bound of the weighted sum of the regularization and reconstruction error terms. We examined how this weighting can affect development of different types of information processing while learning fluctuated temporal patterns. Simulation results show that strong weighting of the reconstruction term causes the development of deterministic chaos for imitating the randomness observed in target sequences, while strong weighting of the regularization term causes the development of stochastic dynamics imitating probabilistic processes observed in targets. Moreover, results indicate that the most generalized learning emerges between these two extremes. The paper concludes with implications in terms of the underlying neuronal mechanisms for autism spectrum disorder and for free action.", "title": "" }, { "docid": "5346751cf6a34febe478c7ec0b195808", "text": "Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text format. Many different types of Optical Character Recognition (OCR) tools are commercially available today; it is a useful and popular method for different types of applications. OCR can predict the accurate result depends on text pre-processing and segmentation algorithms. Image quality is one of the most important factors that improve quality of recognition in performing OCR tools. Images can be processed independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate.", "title": "" } ]
scidocsrr
4691227725b0c4061296472d3d93fd8c
Tightly-coupled Monocular Visual-odometric SLAM using Wheels and a MEMS Gyroscope
[ { "docid": "7f3fe1eadb59d58db8e5911c1de3465f", "text": "We propose a semi-direct monocular visual odometry algorithm that is precise, robust, and faster than current state-of-the-art methods. The semi-direct approach eliminates the need of costly feature extraction and robust matching techniques for motion estimation. Our algorithm operates directly on pixel intensities, which results in subpixel precision at high frame-rates. A probabilistic mapping method that explicitly models outlier measurements is used to estimate 3D points, which results in fewer outliers and more reliable points. Precise and high frame-rate motion estimation brings increased robustness in scenes of little, repetitive, and high-frequency texture. The algorithm is applied to micro-aerial-vehicle state-estimation in GPS-denied environments and runs at 55 frames per second on the onboard embedded computer and at more than 300 frames per second on a consumer laptop. We call our approach SVO (Semi-direct Visual Odometry) and release our implementation as open-source software.", "title": "" } ]
[ { "docid": "9e79c88e5504f0267007aaa107314aa3", "text": "We evaluate two dependency parsers, MSTParser and MaltParser, with respect to their capacity to recover unbounded dependencies in English, a type of evaluation that has been applied to grammarbased parsers and statistical phrase structure parsers but not to dependency parsers. The evaluation shows that when combined with simple post-processing heuristics, the parsers correctly recall unbounded dependencies roughly 50% of the time, which is only slightly worse than two grammar-based parsers specifically designed to cope with such dependencies.", "title": "" }, { "docid": "9dbf6052fc1cf275ddd3ee1a1849b2f7", "text": "Crowdfunding is an exciting new phenomenon with the potential to disrupt early-stage capital markets. Enabled through specialized internet websites and social media, entrepreneurs now have a new source for start-up capital (estimated at $2.8 billion in 2012). Currently, entrepreneurs need to network through intermediaries to have access to wealthy investors. Crowdfunding bypasses these intermediaries and brings the ability to raise capital to the crowd. Consequently, decisions to fund an entrepreneurial endeavor are not made through ‘who you know’ and back-room deals, but through the discourse that occurs through the crowdfunding project page. The purpose of this research is to analyze and understand this discourse and the meaning it creates over the course of a crowdfunding campaign. The lens of sociomateriality in conjunction with discourse analysis is used to identify how meaning is created and its influence on the IS artifact.", "title": "" }, { "docid": "d061ac8a6c312c768a9dfc6e59cfe6a8", "text": "The assessment of crop yield losses is needed for the improvement of production systems that contribute to the incomes of rural families and food security worldwide. However, efforts to quantify yield losses and identify their causes are still limited, especially for perennial crops. Our objectives were to quantify primary yield losses (incurred in the current year of production) and secondary yield losses (resulting from negative impacts of the previous year) of coffee due to pests and diseases, and to identify the most important predictors of coffee yields and yield losses. We established an experimental coffee parcel with full-sun exposure that consisted of six treatments, which were defined as different sequences of pesticide applications. The trial lasted three years (2013-2015) and yield components, dead productive branches, and foliar pests and diseases were assessed as predictors of yield. First, we calculated yield losses by comparing actual yields of specific treatments with the estimated attainable yield obtained in plots which always had chemical protection. Second, we used structural equation modeling to identify the most important predictors. Results showed that pests and diseases led to high primary yield losses (26%) and even higher secondary yield losses (38%). We identified the fruiting nodes and the dead productive branches as the most important and useful predictors of yields and yield losses. These predictors could be added in existing mechanistic models of coffee, or can be used to develop new linear mixed models to estimate yield losses. Estimated yield losses can then be related to production factors to identify corrective actions that farmers can implement to reduce losses. The experimental and modeling approaches of this study could also be applied in other perennial crops to assess yield losses.", "title": "" }, { "docid": "3b39cb869ee94778c5c20bff169631f2", "text": "Mobile app reviews by users contain a wealth of information on the issues that users are experiencing. For example, a review might contain a feature request, a bug report, and/or a privacy complaint. Developers, users and app store owners (e.g. Apple, Blackberry, Google, Microsoft) can benefit from a better understanding of these issues – developers can better understand users’ concerns, app store owners can spot anomalous apps, and users can compare similar apps to decide which ones to download or purchase. However, user reviews are not labelled, e.g. we do not know which types of issues are raised in a review. Hence, one must sift through potentially thousands of reviews with slang and abbreviations to understand the various types of issues. Moreover, the unstructured and informal nature of reviews complicates the automated labelling of such reviews. In this paper, we study the multi-labelled nature of reviews from 20 mobile apps in the Google Play Store and Apple App Store. We find that up to 30 % of the reviews raise various types of issues in a single review (e.g. a review might contain a feature request and a bug report). We then propose an approach that can automatically assign multiple labels to reviews based on the raised issues with a precision of 66 % and recall of 65 %. Finally, we apply our approach to address three proof-of-concept analytics use case scenarios: (i) we compare competing apps to assist developers and users, (ii) we provide an overview of 601,221 reviews from 12,000 apps in the Google Play Store to assist app store owners and developers and (iii) we detect anomalous apps in the Google Play Store to assist app store owners and users.", "title": "" }, { "docid": "0a75a45141a7f870bba32bed890da782", "text": "Surveillance systems for public security are going beyond the conventional CCTV. A new generation of systems relies on image processing and computer vision techniques, deliver more ready-to-use information, and provide assistance for early detection of unusual events. Crowd density is a useful source of information because unusual crowdedness is often related to unusual events. Previous works on crowd density estimation either ignore perspective distortion or perform the correction based on incorrect formulation. Also there is no investigation on whether the geometric correction derived for the ground plane can be applied to human objects standing upright to the plane. This paper derives the relation for geometric correction for the ground plane and proves formally that it can be directly applied to all the foreground pixels. We also propose a very efficient implementation because it is important for a real-time application. Finally a time-adaptive criterion for unusual crowdedness detection is described.", "title": "" }, { "docid": "bec41dd9e724598c8ab47fa1840cad61", "text": "Described here is a case of suicide with the use of a chainsaw. A female suffering from schizophrenia committed suicide by an ingenious use of a chainsaw that resulted in the transection of her cervical spine and spinal cord. The findings of the resulting investigation are described and the mechanism of suicides with the use of a chainsaw is reviewed. A dry bone study was realized to determine the bone sections, the correlation between anatomic lesions and characteristics of chainsaw. The damage of organs and soft tissues is compared according to the kinds of chainsaw used.", "title": "" }, { "docid": "ac64e1183d9c53845ed5f98d308bcb4b", "text": "Robust PCA methods are typically based on batch optimization and have to load all the samples into memory during optimization. This prevents them from efficiently processing big data. In this paper, we develop an Online Robust PCA (OR-PCA) that processes one sample per time instance and hence its memory cost is independent of the number of samples, significantly enhancing the computation and storage efficiency. The proposed OR-PCA is based on stochastic optimization of an equivalent reformulation of the batch RPCA. Indeed, we show that OR-PCA provides a sequence of subspace estimations converging to the optimum of its batch counterpart and hence is provably robust to sparse corruption. Moreover, OR-PCA can naturally be applied for tracking dynamic subspace. Comprehensive simulations on subspace recovering and tracking demonstrate the robustness and efficiency advantages of the OR-PCA over online PCA and batch RPCA methods.", "title": "" }, { "docid": "b2120881f15885cdb610d231f514bc9f", "text": "In this work we do an analysis of Bitcoin’s price and volatility. Particularly, we look at Granger-causation relationships among the pairs of time series: Bitcoin price and the S&P 500, Bitcoin price and the VIX, Bitcoin realized volatility and the S&P 500, and Bitcoin realized volatility and the VIX. Additionally, we explored the relationship between Bitcoin weekly price and public enthusiasm for Blockchain, the technology behind Bitcoin, as measured by Google Trends data. we explore the Granger-causality relationships between Bitcoin weekly price and Blockchain Google Trend time series. We conclude that there exists a bidirectional Granger-causality relationship between Bitcoin realized volatility and the VIX at the 5% significance level, that we cannot reject the hypothesis that Bitcoin weekly price do not Granger-causes Blockchain trends and that we cannot reject the hypothesis that Bitcoin realized volatility do not Granger-causes S&P 500.", "title": "" }, { "docid": "f1220465c3ac6da5a2edc96b5979d4be", "text": "We consider Complexity Leadership Theory [Uhl-Bien, M., Marion, R., & McKelvey, B. (2007). Complexity Leadership Theory: Shifting leadership from the industrial age to the knowledge era. The Leadership Quarterly.] in contexts of bureaucratic forms of organizing to describe how adaptive dynamics can work in combination with administrative functions to generate emergence and change in organizations. Complexity leadership approaches are consistent with the central assertion of the meso argument that leadership is multi-level, processual, contextual, and interactive. In this paper we focus on the adaptive function, an interactive process between adaptive leadership (an agentic behavior) and complexity dynamics (nonagentic social dynamics) that generates emergent outcomes (e.g., innovation, learning, adaptability) for the firm. Propositions regarding the actions of complexity leadership in bureaucratic forms of organizing are offered. © 2009 Elsevier Inc. All rights reserved.", "title": "" }, { "docid": "98c72706e0da844c80090c1ed5f3abeb", "text": "Autoencoders provide a powerful framework for learning compressed representations by encoding all of the information needed to reconstruct a data point in a latent code. In some cases, autoencoders can “interpolate”: By decoding the convex combination of the latent codes for two datapoints, the autoencoder can produce an output which semantically mixes characteristics from the datapoints. In this paper, we propose a regularization procedure which encourages interpolated outputs to appear more realistic by fooling a critic network which has been trained to recover the mixing coefficient from interpolated data. We then develop a simple benchmark task where we can quantitatively measure the extent to which various autoencoders can interpolate and show that our regularizer dramatically improves interpolation in this setting. We also demonstrate empirically that our regularizer produces latent codes which are more effective on downstream tasks, suggesting a possible link between interpolation abilities and learning useful representations.", "title": "" }, { "docid": "a8ed801fa46b432da485d740ebc48909", "text": "The consensus protocol underlying Bitcoin (the blockchain) works remarkably well in practice. However proving its security in a formal setting has been an elusive goal. A recent analytical result by Pass, Seeman and shelat indicates that an idealized blockchain is indeed secure against attacks in an asynchronous network where messages are maliciously delayed by at most ∆ 1/np, with n being the number of miners and p the mining hardness. This paper improves upon the result by showing that if appropriate inconsistency tolerance is allowed the blockchain can withstand even more powerful external attacks in the honest miner setting. Specifically we prove that the blockchain is secure against long delay attacks with ∆ ≥ 1/np in an asynchronous network.", "title": "" }, { "docid": "055e41fd6ace430ea9593a30e3dd02d2", "text": "Every day we are exposed to different ideas, or memes, competing with each other for our attention. Previous research explained popularity and persistence heterogeneity of memes by assuming them in competition for limited attention resources, distributed in a heterogeneous social network. Little has been said about what characteristics make a specific meme more likely to be successful. We propose a similarity-based explanation: memes with higher similarity to other memes have a significant disadvantage in their potential popularity. We employ a meme similarity measure based on semantic text analysis and computer vision to prove that a meme is more likely to be successful and to thrive if its characteristics make it unique. Our results show that indeed successful memes are located in the periphery of the meme similarity space and that our similarity measure is a promising predictor of a meme success.", "title": "" }, { "docid": "e0bfadccbcadbe46c4387bd8f0faed9d", "text": "Reinforcement learning (RL) offers powerful algorithms to search for optimal controllers of systems with nonlinear, possibly stochastic dynamics that are unknown or highly uncertain. This review mainly covers artificial-intelligence approaches to RL, from the viewpoint of the control engineer. We explain how approximate representations of the solution make RL feasible for problems with continuous states and control actions. Stability is a central concern in control, and we argue that while the control-theoretic RL subfield called adaptive dynamic programming is dedicated to it, stability of RL largely remains an open question. We also cover in detail the case where deep neural networks are used for approximation, leading to the field of deep RL, which has shown great success in recent years. With the control practitioner in mind, we outline opportunities and pitfalls of deep RL; and we close the survey with an outlook that – among other things – points out some avenues for bridging the gap between control and artificial-intelligence RL techniques.", "title": "" }, { "docid": "24fc1997724932c6ddc3311a529d7505", "text": "In these days securing a network is an important issue. Many techniques are provided to secure network. Cryptographic is a technique of transforming a message into such form which is unreadable, and then retransforming that message back to its original form. Cryptography works in two techniques: symmetric key also known as secret-key cryptography algorithms and asymmetric key also known as public-key cryptography algorithms. In this paper we are reviewing different symmetric and asymmetric algorithms.", "title": "" }, { "docid": "324e67e78d8786448106b25871c91ed6", "text": "Interpretation of image contents is one of the objectives in computer vision specifically in image processing. In this era it has received much awareness of researchers. In image interpretation the partition of the image into object and background is a severe step. Segmentation separates an image into its component regions or objects. Image segmentation t needs to segment the object from the background to read the image properly and identify the content of the image carefully. In this context, edge detection is a fundamental tool for image segmentation. In this paper an attempt is made to study the performance of most commonly used edge detection techniques for image segmentation and also the comparison of these techniques is carried out with an experiment by using MATLAB software.", "title": "" }, { "docid": "38d04471b8166ef7a0955881db67f494", "text": "Changes in educational thinking and in medical program accreditation provide an opportunity to reconsider approaches to undergraduate medical education. Current developments in competency-based medical education (CBME), in particular, present both possibilities and challenges for undergraduate programs. CBME does not specify particular learning strategies or formats, but rather provides a clear description of intended outcomes. This approach has the potential to yield authentic curricula for medical practice and to provide a seamless linkage between all stages of lifelong learning. At the same time, the implementation of CBME in undergraduate education poses challenges for curriculum design, student assessment practices, teacher preparation, and systemic institutional change, all of which have implications for student learning. Some of the challenges of CBME are similar to those that can arise in the implementation of any integrated program, while others are specific to the adoption of outcome frameworks as an organizing principle for curriculum design. This article reviews a number of issues raised by CBME in the context of undergraduate programs and provides examples of best practices that might help to address these issues.", "title": "" }, { "docid": "4a7a5f8ceb87e3a551e2ea561af9a757", "text": "A special type of representation for knots and for local knot manipulations is described and used in a software tool called TOK to implement a number of algorithms on knots. Two algorithms for knot simplification are described: simulated annealing applied to the knot representation, and a “divide-simplify-join” algorithm. Both of these algorithms make use of the compact knot representation and of the basic mechanism TOK provides for carrying out a predefined knot manipulation on the knot representation. The simplification algorithms implemented with the TOK system exploit local knot manipulations and have proven themselves effective for simplifying even very complicated knots in reasonable time. Introduction What is Knot Theory? Knots are very complicated mathematical objects that have intuitive, real-world counterparts. This makes them very interesting to study. A tangle in a (frictionless ) rope is a knot if when the ends of the rope are pulled in opposite directions, the tangle is not unraveled. Given a pile of rope with two ends sticking out, it is difficult, or even impossible to say by inspection whether or not the rope is truly knotted. An even more difficult problem is to decide if two piles of tangled rope are equivalent; meaning that one pile may be stretched and deformed to look like the other pile without tearing the rope. Figure 1 illustrates that equivalence is sometimes not obvious even for simple knots. Figure 1. (a) Two trefoil knots (b) Two trivial knots Knot theory studies an abstraction of the intuitive “knot on a rope” notion. The theory deals with questions such as proving knottedness, and classifying types of knottedness. In a more abstract sense we may say that knot theory studies the placement problem: “Given spaces X andY, classify howX may be placed inY” . Here a placement is usually an embedding, and classification often means up to some form of movement. In these terms classical knot theory studies embeddings of a circle in Euclidean three space. (Hence we consider the two ends of the rope tied together) There are two main schools in knot theory research. The first is called combinatorial or pictorial knot theory. Here the main idea is to associate with the mathematical object a drawing that represents the knot, and to study various combinatorical properties of this drawing. The second school considers the abstract notion of a knot as an embedding and studies the topology of the so called complementary space of the image of the embedding, by applying to this space the tools of Algebraic Topology. This paper dwells in the first realm pictorial knot theory. Following is a brief description of the basic theory that is needed to understand the TOK knot manipulation tool. For a more comprehensive overview see [1][2][3]. * Electrical Engineering Department Technion, 3200 Haifa, Israel danl@tx.technion.ac.il orli@tx.technion.ac.il ** Computer Science Department Technion, 3200 Haifa, Israel (on sabbatical at AT&T Bell Laboratories, Murray Hill, NJ 07974, USA)", "title": "" }, { "docid": "b42f2ef7f854f628eafbb6b9069b31a2", "text": "We address the problem of real-time generation of smooth and collision-free trajectories for autonomous flight of a quadrotor through 3-D cluttered environments. Our approach starts by generating a sequence of variable sized 3-D free space grids as the virtual flight corridor using an OctoMap-based environment representation and search-based planning method. The key contribution is a quadratic programming-based formulation for generating multi-segment polynomial trajectories that are entirely fit within the corridor, and thus collision-free. Our formulation also allows incorporating higher-order dynamical constraints to ensure that the trajectory is feasible for the platform. A novel non-iterative constraint relaxation method is also proposed for implicit optimization of segment duration. The proposed algorithm runs real-time onboard our quadrotor experimental testbed. Both simulation and online experimental results are presented for performance verification.", "title": "" }, { "docid": "53b1ac64f63cab0d99092764eed4f829", "text": "We present a new unsupervised topic discovery model for a collection of text documents. In contrast to the majority of the state-of-the-art topic models, our model does not break the document's structure such as paragraphs and sentences. In addition, it preserves word order in the document. As a result, it can generate two levels of topics of different granularity, namely, segment-topics and word-topics. In addition, it can generate n-gram words in each topic. We also develop an approximate inference scheme using Gibbs sampling method. We conduct extensive experiments using publicly available data from different collections and show that our model improves the quality of several text mining tasks such as the ability to support fine grained topics with n-gram words in the correlation graph, the ability to segment a document into topically coherent sections, document classification, and document likelihood estimation.", "title": "" }, { "docid": "144dd29cf17d8746ec4fe6f0c567154b", "text": "Cities' visual appearance plays a central role in shaping human perception and response to the surrounding urban environment. For example, the visual qualities of urban spaces affect the psychological states of their inhabitants and can induce negative social outcomes. Hence, it becomes critically important to understand people's perceptions and evaluations of urban spaces. Previous works have demonstrated that algorithms can be used to predict high level attributes of urban scenes (e.g. safety, attractiveness, uniqueness), accurately emulating human perception. In this paper we propose a novel approach for predicting the perceived safety of a scene from Google Street View Images. Opposite to previous works, we formulate the problem of learning to predict high level judgments as a ranking task and we employ a Convolutional Neural Network (CNN), significantly improving the accuracy of predictions over previous methods. Interestingly, the proposed CNN architecture relies on a novel pooling layer, which permits to automatically discover the most important areas of the images for predicting the concept of perceived safety. An extensive experimental evaluation, conducted on the publicly available Place Pulse dataset, demonstrates the advantages of the proposed approach over state-of-the-art methods.", "title": "" } ]
scidocsrr
c83376cb5c074c60dafe2dcc919c7d5a
The well-being of playful adults : Adult playfulness , subjective well-being , physical well-being , and the pursuit of enjoyable activities
[ { "docid": "440d104d20d89e0f331de31c70993f2e", "text": "The prime aim of this set of studies was to test the disposition to play (playfulness) in adults in its relation with various measures of personality but also ability (self-estimated but also psychometrically measured ingenuity). Study 1 (n = 180) shows that adults playfulness relates primarily to extraversion, lower conscientiousness, and higher endorsements of culture; joy of being laughed at (gelotophilia) and agreeableness were also predictive in a regression analysis; Study 2 (n = 264) shows that playfulness relates primarily to a high expectation of intrinsic and a low expectation of extrinsic goals as well as greater intrinsic and lower extrinsic importance of goals (for expressive and fun-variants of playfulness); Study 3 (n = 212) shows that playfulness relates to greater selfperception of one’s degree of ingenuity and psychometric ingenuity correlated primarily with greater spontaneous and creative variants of playfulness (in about the same range for origence and fluidity of the productions). Overall, the findings were in line with the expectations and could stimulate further studies of playfulness in adults. Posted at the Zurich Open Repository and Archive, University of Zurich ZORA URL: https://doi.org/10.5167/uzh-63532 Published Version Originally published at: Proyer, Rene T (2012). Examining playfulness in adults: Testing its correlates with personality, positive psychological functioning, goal aspirations, and multi-methodically assessed ingenuity. Psychological Test and Assessment Modeling, 54(2):103-127. Psychological Test and Assessment Modeling, Volume 54, 2012 (2), 103-127 Examining playfulness in adults: Testing its correlates with personality, positive psychological functioning, goal aspirations, and multi-methodically assessed ingenuity", "title": "" } ]
[ { "docid": "ec6f53bd2cbc482c1450934b1fd9e463", "text": "Cloud computing providers have setup several data centers at different geographical locations over the Internet in order to optimally serve needs of their customers around the world. However, existing systems do not support mechanisms and policies for dynamically coordinating load distribution among different Cloud-based data centers in order to determine optimal location for hosting application services to achieve reasonable QoS levels. Further, the Cloud computing providers are unable to predict geographic distribution of users consuming their services, hence the load coordination must happen automatically, and distribution of services must change in response to changes in the load. To counter this problem, we advocate creation of federated Cloud computing environment (InterCloud) that facilitates just-in-time, opportunistic, and scalable provisioning of application services, consistently achieving QoS targets under variable workload, resource and network conditions. The overall goal is to create a computing environment that supports dynamic expansion or contraction of capabilities (VMs, services, storage, and database) for handling sudden variations in service demands. This paper presents vision, challenges, and architectural elements of InterCloud for utility-oriented federation of Cloud computing environments. The proposed InterCloud environment supports scaling of applications across multiple vendor clouds. We have validated our approach by conducting a set of rigorous performance evaluation study using the CloudSim toolkit. The results demonstrate that federated Cloud computing model has immense potential as it offers significant performance gains as regards to response time and cost saving under dynamic workload scenarios.", "title": "" }, { "docid": "e7475c3fd58141c496e8b430a2db24d3", "text": "This study concerns the quality of life of patients after stroke and how this is influenced by disablement and emotional factors. Ninety-six consecutive patients of mean age 71 years were followed for two years. At the end of that time 23% had experienced a recurrence of stroke and 27% were deceased. Of the survivors 76% were independent as regards activities of daily life (ADL) and lived in their own homes. Age as well as initial function were prognostically important factors. Patients who could participate in interviews marked on a visual analogue scale their evaluation of quality of life before and after stroke. Most of them had experienced a decrease and no improvement was observed during the two years. The deterioration was more pronounced in ADL dependent patients than among the independent. However, depression and anxiety were found to be of similar importance for quality of life as was physical disablement. These findings call for a greater emphasis on psychological support in the care of post stroke patients. The visual analogue scale can be a useful tool for detecting special needs.", "title": "" }, { "docid": "45ba18a9561acc0a6ecc9f7d47a05616", "text": "This paper presents a new active gate drive for SiC MOSFETs switching. The proposed driver is based on feedforward control method. The switch is benefited from a simple and effective analog gate driver (GD). The main achievement of this GD is the transient enhancement with minimum undesirable effect on the switching efficiency. Also, the electromagnetic interference (EMI) as the main threat to the operation of SiC MOSFET is eliminated by this method. The proposed GD has been validated through the simulation and experimental tests. All the evaluation have been carried out in a hard switching condition with high-frequency switching.", "title": "" }, { "docid": "97578b3a8f5f34c96e7888f273d4494f", "text": "We analyze the use, advantages, and drawbacks of graph kernels in chemoin-formatics, including a comparison of kernel-based approaches with other methodology, as well as examples of applications. Kernel-based machine learning [1], now widely applied in chemoinformatics, delivers state-of-the-art performance [2] in tasks like classification and regression. Molecular graph kernels [3] are a recent development where kernels are defined directly on the molecular structure graph. This allows the adaptation of methods from graph theory to structure graphs and their direct use with kernel learning algorithms. The main advantage of kernel learning, the so-called “kernel trick”, allows for a systematic, computationally feasible, and often globally optimal search for non-linear patterns, as well as the direct use of non-numerical inputs such as strings and graphs. A drawback is that solutions are expressed indirectly in terms of similarity to training samples, and runtimes that are typically quadratic or cubic in the number of training samples. Graph kernels [3] are positive semidefinite functions defined directly on graphs. The most important types are based on random walks, subgraph patterns, optimal assignments, and graphlets. Molecular structure graphs have strong properties that can be exploited [4], e.g., they are undirected, have no self-loops and no multiple edges, are connected (except for salts), annotated, often planar in the graph-theoretic sense, and their vertex degree is bounded by a small constant. In many applications, they are small. Many graph kernels are generalpurpose, some are suitable for structure graphs, and a few have been explicitly designed for them. We present three exemplary applications of the iterative similarity optimal assignment kernel [5], which was designed for the comparison of small structure graphs: The discovery of novel agonists of the peroxisome proliferator-activated receptor g [6] (ligand-based virtual screening), the estimation of acid dissociation constants [7] (quantitative structure-property relationships), and molecular de novo design [8].", "title": "" }, { "docid": "5cccc7cc748d3461dc3c0fb42a09245f", "text": "The self and attachment difficulties associated with chronic childhood abuse and other forms of pervasive trauma must be understood and addressed in the context of the therapeutic relationship for healing to extend beyond resolution of traditional psychiatric symptoms and skill deficits. The authors integrate contemporary research and theory about attachment and complex developmental trauma, including dissociation, and apply it to psychotherapy of complex trauma, especially as this research and theory inform the therapeutic relationship. Relevant literature on complex trauma and attachment is integrated with contemporary trauma theory as the background for discussing relational issues that commonly arise in this treatment, highlighting common challenges such as forming a therapeutic alliance, managing frame and boundaries, and working with dissociation and reenactments.", "title": "" }, { "docid": "e82c0826863ccd9cd647725fc00a2137", "text": "Particle Markov chain Monte Carlo (PMCMC) is a systematic way of combining the two main tools used for Monte Carlo statistical inference: sequential Monte Carlo (SMC) and Markov chain Monte Carlo (MCMC). We present a new PMCMC algorithm that we refer to as particle Gibbs with ancestor sampling (PGAS). PGAS provides the data analyst with an off-the-shelf class of Markov kernels that can be used to simulate, for instance, the typically high-dimensional and highly autocorrelated state trajectory in a state-space model. The ancestor sampling procedure enables fast mixing of the PGAS kernel even when using seemingly few particles in the underlying SMC sampler. This is important as it can significantly reduce the computational burden that is typically associated with using SMC. PGAS is conceptually similar to the existing PG with backward simulation (PGBS) procedure. Instead of using separate forward and backward sweeps as in PGBS, however, we achieve the same effect in a single forward sweep. This makes PGAS well suited for addressing inference problems not only in state-space models, but also in models with more complex dependencies, such as non-Markovian, Bayesian nonparametric, and general probabilistic graphical models.", "title": "" }, { "docid": "36d5ba974945cba3bf9120f3ab9aa7a0", "text": "In this paper, we analyze the spectral efficiency of multicell massive multiple-input-multiple-output (MIMO) systems with downlink training and a new pilot contamination precoding (PCP) scheme. First, we analyze the spectral efficiency of the beamforming training (BT) scheme with maximum-ratio transmission (MRT) precoding. Then, we derive an approximate closed-form expression of the spectral efficiency to find the optimal lengths of uplink and downlink pilots. Simulation results show that the achieved spectral efficiency can be improved due to channel estimation at the user side, but in comparison with a single-cell scenario, the spectral efficiency per cell in multicell scenario degrades because of pilot contamination. We focus on the practical case where the number of base station (BS) antennas is large but still finite and propose the BT and PCP (BT-PCP) transmission scheme to mitigate the pilot contamination with limited cooperation between BSs. We confirm the effectiveness of the proposed BT-PCP scheme with simulation, and we show that the proposed BT-PCP scheme achieves higher spectral efficiency than the conventional PCP method and that the performance gap from the perfect channel state information (CSI) scenario without pilot contamination is small.", "title": "" }, { "docid": "fe6c0bfab2443fd6c5c6e2f8f8da6f0b", "text": "Monocular optical flow has been widely used to detect obstacles in Micro Air Vehicles (MAVs) during visual navigation. However, this approach requires significant movement, which reduces the efficiency of navigation and may even introduce risks in narrow spaces. In this paper, we introduce a novel setup of self-supervised learning (SSL), in which optical flow cues serve as a scaffold to learn the visual appearance of obstacles in the environment. We apply it to a landing task, in which initially ‘surface roughness’ is estimated from the optical flow field in order to detect obstacles. Subsequently, a linear regression function is learned that maps appearance features represented by texton distributions to the roughness estimate. After learning, the MAV can detect obstacles by just analyzing a still image. This allows the MAV to search for a landing spot without moving. We first demonstrate this principle to work with offline tests involving images captured from an on-board camera, and then demonstrate the principle in flight. Although surface roughness is a property of the entire flow field in the global image, the appearance learning even allows for the pixel-wise segmentation of obstacles.", "title": "" }, { "docid": "8c3a76aa28177f64e72c52df5ff4a679", "text": "Learning sophisticated feature interactions behind user behaviors is critical in maximizing CTR for recommender systems. Despite great progress, existing methods seem to have a strong bias towards lowor high-order interactions, or require expertise feature engineering. In this paper, we show that it is possible to derive an end-to-end learning model that emphasizes both lowand highorder feature interactions. The proposed model, DeepFM, combines the power of factorization machines for recommendation and deep learning for feature learning in a new neural network architecture. Compared to the latest Wide & Deep model from Google, DeepFM has a shared input to its “wide” and “deep” parts, with no need of feature engineering besides raw features. Comprehensive experiments are conducted to demonstrate the effectiveness and efficiency of DeepFM over the existing models for CTR prediction, on both benchmark data and commercial data.", "title": "" }, { "docid": "38ecb51f7fca71bd47248987866a10d2", "text": "Machine Translation has been a topic of research from the past many years. Many methods and techniques have been proposed and developed. However, quality of translation has always been a matter of concern. In this paper, we outline a target language generation mechanism with the help of language English-Sanskrit language pair using rule based machine translation technique [1]. Rule Based Machine Translation provides high quality translation and requires in depth knowledge of the language apart from real world knowledge and the differences in cultural background and conceptual divisions. A string of English sentence can be translated into string of Sanskrit ones. The methodology for design and development is implemented in the form of software named as “EtranS”. KeywordsAnalysis, Machine translation, translation theory, Interlingua, language divergence, Sanskrit, natural language processing.", "title": "" }, { "docid": "9d9afbd6168c884f54f72d3daea57ca7", "text": "0167-8655/$ see front matter 2009 Elsevier B.V. A doi:10.1016/j.patrec.2009.06.012 * Corresponding author. Tel.: +82 2 705 8931; fax: E-mail addresses: sjyoon@sogang.ac.kr (S. Yoon), sa Computer aided diagnosis (CADx) systems for digitized mammograms solve the problem of classification between benign and malignant tissues while studies have shown that using only a subset of features generated from the mammograms can yield higher classification accuracy. To this end, we propose a mutual information-based Support Vector Machine Recursive Feature Elimination (SVM-RFE) as the classification method with feature selection in this paper. We have conducted extensive experiments on publicly available mammographic data and the obtained results indicate that the proposed method outperforms other SVM and SVM-RFE-based methods. 2009 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "f9d33c91e71a3e84f3b06af83fcdbb6c", "text": "OBJECTIVES\nTo estimate the magnitude of small meaningful and substantial individual change in physical performance measures and evaluate their responsiveness.\n\n\nDESIGN\nSecondary data analyses using distribution- and anchor-based methods to determine meaningful change.\n\n\nSETTING\nSecondary analysis of data from an observational study and clinical trials of community-dwelling older people and subacute stroke survivors.\n\n\nPARTICIPANTS\nOlder adults with mobility disabilities in a strength training trial (n=100), subacute stroke survivors in an intervention trial (n=100), and a prospective cohort of community-dwelling older people (n=492).\n\n\nMEASUREMENTS\nGait speed, Short Physical Performance Battery (SPPB), 6-minute-walk distance (6MWD), and self-reported mobility.\n\n\nRESULTS\nMost small meaningful change estimates ranged from 0.04 to 0.06 m/s for gait speed, 0.27 to 0.55 points for SPPB, and 19 to 22 m for 6MWD. Most substantial change estimates ranged from 0.08 to 0.14 m/s for gait speed, 0.99 to 1.34 points for SPPB, and 47 to 49 m for 6MWD. Based on responsiveness indices, per-group sample sizes for clinical trials ranged from 13 to 42 for substantial change and 71 to 161 for small meaningful change.\n\n\nCONCLUSION\nBest initial estimates of small meaningful change are near 0.05 m/s for gait speed, 0.5 points for SPPB, and 20 m for 6MWD and of substantial change are near 0.10 m/s for gait speed, 1.0 point for SPPB, and 50 m for 6MWD. For clinical use, substantial change in these measures and small change in gait speed and 6MWD, but not SPPB, are detectable. For research use, these measures yield feasible sample sizes for detecting meaningful change.", "title": "" }, { "docid": "9fd3f40785872710c03f1953e81f311a", "text": "The Wnt pathway is integrally involved in regulating self-renewal, proliferation, and maintenance of cancer stem cells (CSCs). We explored the effect of the Wnt antagonist, secreted frizzled-related protein 4 (sFRP4), in modulating epithelial to mesenchymal transition (EMT) in CSCs from human glioblastoma cells lines, U87 and U373. sFRP4 chemo-sensitized CSC-enriched cells to the most commonly used anti-glioblastoma drug, temozolomide (TMZ), by the reversal of EMT. Cell movement, colony formation, and invasion in vitro were suppressed by sFRP4+TMZ treatment, which correlated with the switch of expression of markers from mesenchymal (Twist, Snail, N-cadherin) to epithelial (E-cadherin). sFRP4 treatment elicited activation of the Wnt-Ca2(+) pathway, which antagonizes the Wnt/ß-catenin pathway. Significantly, the chemo-sensitization effect of sFRP4 was correlated with the reduction in the expression of drug resistance markers ABCG2, ABCC2, and ABCC4. The efficacy of sFRP4+TMZ treatment was demonstrated in vivo using nude mice, which showed minimum tumor engraftment using CSCs pretreated with sFRP4+TMZ. These studies indicate that sFRP4 treatment would help to improve response to commonly used chemotherapeutics in gliomas by modulating EMT via the Wnt/ß-catenin pathway. These findings could be exploited for designing better targeted strategies to improve chemo-response and eventually eliminate glioblastoma CSCs.", "title": "" }, { "docid": "1465aa476fe6313f15009bed69546a7d", "text": "The skyline operator and its variants such as dynamic skyline and reverse skyline operators have attracted considerable attention recently due to their broad applications. However, computations of such operators are challenging today since there is an increasing trend of applications to deal with big data. For such data-intensive applications, the MapReduce framework has been widely used recently. In this paper, we propose efficient parallel algorithms for processing the skyline and its variants using MapReduce. We first build histograms to effectively prune out non-skyline (non-reverse skyline) points in advance. We next partition data based on the regions divided by the histograms and compute candidate (reverse) skyline points for each region independently using MapReduce. Finally, we check whether each candidate point is actually a (reverse) skyline point in every region independently. Our performance study confirms the effectiveness and scalability of the proposed algorithms.", "title": "" }, { "docid": "84ad9c8ae3e1ed3d25650a29af0673c6", "text": "As data mining evolves and matures more and more businesses are incorporating this technology into their business practices. However, currently data mining and decision support software is expensive and selection of the wrong tools can be costly in many ways. This paper provides direction and decision-making information to the practicing professional. A framework for evaluating data mining tools is presented and a methodology for applying this framework is described. Finally a case study to demonstrate the method’s effectiveness is presented. This methodology represents the first-hand experience using many of the leading data mining tools against real business data at the Center for Data Insight (CDI) at Northern Arizona University (NAU). This is not a comprehensive review of commercial tools but instead provides a method and a point-of-reference for selecting the best software tool for a particular problem. Experience has shown that there is not one best data-mining tool for all purposes. This instrument is designed to accommodate differences in environments and problem domains. It is expected that this methodology will be used to publish tool comparisons and benchmarking results.", "title": "" }, { "docid": "4af5aa24efc82a8e66deb98f224cd033", "text": "Abstract—In the recent years, the rapid spread of mobile device has create the vast amount of mobile data. However, some shallow-structure models such as support vector machine (SVM) have difficulty dealing with high dimensional data with the development of mobile network. In this paper, we analyze mobile data to predict human trajectories in order to understand human mobility pattern via a deep-structure model called “DeepSpace”. To the best of out knowledge, it is the first time that the deep learning approach is applied to predicting human trajectories. Furthermore, we develop the vanilla convolutional neural network (CNN) to be an online learning system, which can deal with the continuous mobile data stream. In general, “DeepSpace” consists of two different prediction models corresponding to different scales in space (the coarse prediction model and fine prediction models). This two models constitute a hierarchical structure, which enable the whole architecture to be run in parallel. Finally, we test our model based on the data usage detail records (UDRs) from the mobile cellular network in a city of southeastern China, instead of the call detail records (CDRs) which are widely used by others as usual. The experiment results show that “DeepSpace” is promising in human trajectories prediction.", "title": "" }, { "docid": "6f6ae8ea9237cca449b8053ff5f368e7", "text": "With the rapid development of Location-based Social Network (LBSN) services, a large number of Point-of-Interests (POIs) have been available, which consequently raises a great demand of building personalized POI recommender systems. A personalized POI recommender system can significantly help users to find their preferred POIs and assist POI owners to attract more customers. However, due to the complexity of users’ checkin decision making process that is influenced by many different factors such as POI distance and region’s prosperity, and the dynamics of user’s preference, POI recommender systems usually suffer from many challenges. Although different latent factor based methods (e.g., probabilistic matrix factorization) have been proposed, most of them do not successfully incorporate both geographical influence and temporal effect together into latent factor models. To this end, in this paper, we propose a new Spatial-Temporal Probabilistic Matrix Factorization (STPMF) model that models a user’s preference for POI as the combination of his geographical preference and other general interest in POI. Furthermore, in addition to static general interest of user, we capture the temporal dynamics of user’s interest as well by modeling checkin data in a unique way. To evaluate the proposed STPMF model, we conduct extensive experiments with many state-of-the-art baseline methods and evaluation metrics on two real-world data sets. The experimental results clearly demonstrate the effectiveness of our proposed STPMF model.", "title": "" }, { "docid": "a1cff98eecf6691777bb89e849645077", "text": "Information-centric networking(ICN) opens new opportunities in the IoT domain due to its in-network caching capability. This significantly reduces read latency and the load on the origin server. In-network caching in ICN however introduces its own set of challenges because of its ubiquitous caches. Maintaining cache consistency without incurring high overhead is an important problem that needs to be handled in ICN to prevent a client from retrieving stale data. We propose a cache consistency approach based on the rate at which an IoT application generates its data. Our technique is lightweight and can be deployed easily in real network. Our simulation results demonstrate that our proposed algorithm significantly reduces the network traffic as well as the load on the origin server while serving fresh content to the clients.", "title": "" }, { "docid": "816c78f518d8d0621015d4922623e58d", "text": "Driver fatigue is a significant factor in many traffic accidents. We propose a novel approach for driver fatigue detection from facial image sequences, which is based on multiscale dynamic features. First, Gabor filters are used to get a multiscale representation for image sequences. Then Local Binary Patterns are extracted from each multiscale image. To account for the temporal aspect of human fatigue, the LBP image sequence is divided into dynamic units, and a histogram of each dynamic unit is computed and concatenated as dynamic features. Finally a statistical learning algorithm is applied to extract the most discriminative features from the multiscale dynamic features and construct a strong classifier for fatigue detection. The proposed approach is validated under real-life fatigue conditions. The test data includes 600 image sequences with illumination and pose variations from 30 people’s videos. Experimental results show the validity of the proposed approach, and a correct rate of 98.33% is achieved which is much better than the baselines.", "title": "" }, { "docid": "8bb5794d38528ab459813ab1fa484a69", "text": "We introduce the ACL Anthology Network (AAN), a manually curated networked database of citations, collaborations, and summaries in the field of Computational Linguistics. We also present a number of statistics about the network including the most cited authors, the most central collaborators, as well as network statistics about the paper citation, author citation, and author collaboration networks.", "title": "" } ]
scidocsrr
a92bf41d623dafed5ba22750e516b746
Current and Future Trends in Mobile Device Forensics: A Survey
[ { "docid": "55f80d7b459342a41bb36a5c0f6f7e0d", "text": "A smart phone is a handheld device that combines the functionality of a cellphone, a personal digital assistant (PDA) and other information appliances such a music player. These devices can however be used in a crime and would have to be quickly analysed for evidence. This data is collected using either a forensic tool which resides on a PC or specialised hardware. This paper proposes the use of an on-phone forensic tool to collect the contents of the device and store it on removable storage. This approach requires less equipment and can retrieve the volatile information that resides on the phone such as running processes. The paper discusses the Symbian operating system, the evidence that is stored on the device and contrasts the approach with that followed by other tools.", "title": "" } ]
[ { "docid": "a406ed86fdc5b68c66561fb672037438", "text": "We investigate techniques based on deep neural networks (DNNs) for attacking the single-channel multi-talker speech recognition problem. Our proposed approach contains five key ingredients: a multi-style training strategy on artificially mixed speech data, a separate DNN to estimate senone posterior probabilities of the louder and softer speakers at each frame, a weighted finite-state transducer (WFST)-based two-talker decoder to jointly estimate and correlate the speaker and speech, a speaker switching penalty estimated from the energy pattern change in the mixed-speech, and a confidence based system combination strategy. Experiments on the 2006 speech separation and recognition challenge task demonstrate that our proposed DNN-based system has remarkable noise robustness to the interference of a competing speaker. The best setup of our proposed systems achieves an average word error rate (WER) of 18.8% across different SNRs and outperforms the state-of-the-art IBM superhuman system by 2.8% absolute with fewer assumptions.", "title": "" }, { "docid": "82d4b2aa3e3d3ec10425c6250268861c", "text": "Deep Neural Networks (DNNs) are typically trained by backpropagation in a batch learning setting, which requires the entire training data to be made available prior to the learning task. This is not scalable for many real-world scenarios where new data arrives sequentially in a stream form. We aim to address an open challenge of “Online Deep Learning” (ODL) for learning DNNs on the fly in an online setting. Unlike traditional online learning that often optimizes some convex objective function with respect to a shallow model (e.g., a linear/kernel-based hypothesis), ODL is significantly more challenging since the optimization of the DNN objective function is non-convex, and regular backpropagation does not work well in practice, especially for online learning settings. In this paper, we present a new online deep learning framework that attempts to tackle the challenges by learning DNN models of adaptive depth from a sequence of training data in an online learning setting. In particular, we propose a novel Hedge Backpropagation (HBP) method for online updating the parameters of DNN effectively, and validate the efficacy of our method on large-scale data sets, including both stationary and concept drifting scenarios.", "title": "" }, { "docid": "d5237790e32a2155a842d4b8afbf413e", "text": "1077-3142/$ see front matter 2013 Elsevier Ltd. All rights reserved. http://dx.doi.org/10.1016/j.cviu.2013.11.008 q This paper has been recommended for acceptance by Nicu Sebe. ⇑ Corresponding author. Address: 601 University Drive, Department of Computer Science, Texas State University, San Marcos, TX 78666, United States. Fax: +1 512 245 8750. E-mail address: lu@txstate.edu (Y. Lu). Bo Li , Yijuan Lu a,⇑, Afzal Godil , Tobias Schreck , Benjamin Bustos , Alfredo Ferreira , Takahiko Furuya , Manuel J. Fonseca , Henry Johan , Takahiro Matsuda , Ryutarou Ohbuchi , Pedro B. Pascoal , Jose M. Saavedra d,h", "title": "" }, { "docid": "ee20233660c2caa4a24dbfb512172277", "text": "Any projection of a 3D scene into a wide-angle image unavoidably results in distortion. Current projection methods either bend straight lines in the scene, or locally distort the shapes of scene objects. We present a method that minimizes this distortion by adapting the projection to content in the scene, such as salient scene regions and lines, in order to preserve their shape. Our optimization technique computes a spatially-varying projection that respects user-specified constraints while minimizing a set of energy terms that measure wide-angle image distortion. We demonstrate the effectiveness of our approach by showing results on a variety of wide-angle photographs, as well as comparisons to standard projections.", "title": "" }, { "docid": "1458c69afa813c6a8df73d5a3bad3fc1", "text": "This paper presents closed-form solutions for the inverse and direct dynamic models of the Gough-Stewart parallel robot. The models are obtained in terms of the Cartesian dynamic model elements of the legs and of the Newton-Euler equation of the platform. The final form has an interesting and intuitive physical interpretation. The base inertial parameters of the robot, which constitute the minimum number of inertial parameters, are explicitly determined. The number of operations to compute the inverse and direct dynamic models are given.", "title": "" }, { "docid": "48096a9a7948a3842afc082fa6e223a6", "text": "We present a method for using previously-trained ‘teacher’ agents to kickstart the training of a new ‘student’ agent. To this end, we leverage ideas from policy distillation (Rusu et al., 2015; Parisotto et al., 2015) and population based training (Jaderberg et al., 2017). Our method places no constraints on the architecture of the teacher or student agents, and it regulates itself to allow the students to surpass their teachers in performance. We show that, on a challenging and computationally-intensive multi-task benchmark (Beattie et al., 2016), kickstarted training improves the data efficiency of new agents, making it significantly easier to iterate on their design. We also show that the same kickstarting pipeline can allow a single student agent to leverage multiple ‘expert’ teachers which specialise on individual tasks. In this setting kickstarting yields surprisingly large gains, with the kickstarted agent matching the performance of an agent trained from scratch in almost 10× fewer steps, and surpassing its final performance by 42%. Kickstarting is conceptually simple and can easily be incorporated into reinforcement learning experiments.", "title": "" }, { "docid": "104e9a0e95ec6eeaefc441bf69cf3e9b", "text": "Celebrity worship is a form of parasocial interaction in which individuals become obsessed with 1 or more celebrities, similar to an erotomanic type of delusional disorder. Drawing on the cognitive factors implicated in erotomania, the authors hypothesized that celebrity worshippers might be expected to exhibit verbal, visuospatial, and cognitive deficits related to flexibility and associative learning. This general hypothesis was tested in a sample of 102 participants who completed the Celebrity Attitude Scale (L. E. McCutcheon, R. Lange, & J. Houran, 2002), the Entertainment-Social, Intense-Personal, and Borderline Pathological subscales, and 6 cognitive measures that included creativity (verbal), crystallized intelligence, critical thinking, spatial ability, and need for cognition. The results were consistent with predictions and suggest that cognitive deficits only help facilitate an individual's susceptibility to engage in celebrity worship. The results are discussed in terms of the multivariate absorption-addiction model of celebrity worship.", "title": "" }, { "docid": "d924282668c0c5dfc0908205402dfabf", "text": "Performance appraisal (PA) is a crucial HR process that enables an organization to periodically measure and evaluate every employee’s performance and also to drive performance improvements. In this paper, we describe a novel system called HiSPEED to analyze PA data using automated statistical, data mining and text mining techniques, to generate novel and actionable insights/patterns and to help in improving the quality and effectiveness of the PA process. The goal is to produce insights that can be used to answer (in part) the crucial “business questions” that HR executives and business leadership face in talent management. The business questions pertain to (1) improving the quality of the goal setting process, (2) improving the quality of the self-appraisal comments and supervisor feedback comments, (3) discovering high-quality supervisor suggestions for performance improvements, (4) discovering evidence provided by employees to support their self-assessments, (5) measuring the quality of supervisor assessments, (6) understanding the root causes of poor and exceptional performances, (7) detecting instances of personal and systemic biases and so forth. The paper discusses specially designed algorithms to answer these business questions and illustrates them by reporting the insights produced on a real-life PA dataset from a large multinational IT services organization.", "title": "" }, { "docid": "01a636d56a324f8bb8367b8fc73c8687", "text": "Formal risk analysis and management in software engineering is still an emerging part of project management. We provide a brief introduction to the concepts of risk management for software development projects, and then an overview of a new risk management framework. Risk management for software projects is intended to minimize the chances of unexpected events, or more specifically to keep all possible outcomes under tight management control. Risk management is also concerned with making judgments about how risk events are to be treated, valued, compared and combined. The ProRisk management framework is intended to account for a number of the key risk management principles required for managing the process of software development. It also provides a support environment to operationalize these management tasks.", "title": "" }, { "docid": "03e48fbf57782a713bd218377290044c", "text": "Several researchers have shown that the efficiency of value iteration, a dynamic programming algorithm for Markov decision processes, can be improved by prioritizing the order of Bellman backups to focus computation on states where the value function can be improved the most. In previous work, a priority queue has been used to order backups. Although this incurs overhead for maintaining the priority queue, previous work has argued that the overhead is usually much less than the benefit from prioritization. However this conclusion is usually based on a comparison to a non-prioritized approach that performs Bellman backups on states in an arbitrary order. In this paper, we show that the overhead for maintaining the priority queue can be greater than the benefit, when it is compared to very simple heuristics for prioritizing backups that do not require a priority queue. Although the order of backups induced by our simple approach is often sub-optimal, we show that its smaller overhead allows it to converge faster than other state-of-the-art priority-based solvers.", "title": "" }, { "docid": "b670bfebc1effc53ebb8b34b57ce81ed", "text": "The palm-print verification system is based on two modes, viz, Enrollment mode and Recognition mode. In the enrollment mode, the palm-print features are acquired from the sensor and stored in a database along with the person's identity for the recognition of his/her identity. In the recognition mode, the palm-print features are re-acquired from the sensor and compared against the stored data to determine the user identity. In the pre-processing stage, two segmentation processes are proposed to extract the region of interest (ROI) of palm. The first skin-color segmentation is used to extract the hand image from the background. The second region of interest of the palm is segmented by using the valley detection algorithm. The Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) are applied for the purpose of extracting the features. Further, the Sobel Operator and Local Binary Pattern (LBP) are used for increasing the number of features. The mean and standard deviation of DWT, DCT and LBP are computed. Twenty hand-scanned images and ten samples of CASIA palmprint database were used in this experiment. The performance of the proposed system is found to be satisfactory.", "title": "" }, { "docid": "ec5d110ea0267fc3e72e4fa2cb4f186e", "text": "We present a secure Internet of Things (IoT) architecture for Smart Cities. The large-scale deployment of IoT technologies within a city promises to make city operations efficient while improving quality of life for city inhabitants. Mission-critical Smart City data, captured from and carried over IoT networks, must be secured to prevent cyber attacks that might cripple city functions, steal personal data and inflict catastrophic harm. We present an architecture containing four basic IoT architectural blocks for secure Smart Cities: Black Network, Trusted SDN Controller, Unified Registry and Key Management System. Together, these basic IoT-centric blocks enable a secure Smart City that mitigates cyber attacks beginning at the IoT nodes themselves.", "title": "" }, { "docid": "75a416e67e26cad0ce0809127c67209b", "text": "We describe a general framework for modelling probabilistic databases using factorization approaches. The framework includes tensor-based approaches which have been very successful in modelling triple-oriented databases and also includes recently developed neural network models. We consider the case that the target variable models the existence of a tuple, a continuous quantity associated with a tuple, multiclass variables or count variables. We discuss appropriate cost functions with different parameterizations and optimization approaches. We argue that, in general, some combination of models leads to best predictive results. We present experimental results on the modelling of existential variables and count variables.", "title": "" }, { "docid": "17e280502d20361d920fa0e00aa6f98a", "text": "In recent years, having the advantages of being small, low in cost and high in efficiency, Half bridge (HB) LLC resonant converter for power density and high efficiency is increasingly required in the battery charge application. The HB LLC resonant converters have been used for reducing the current and voltage stress and switching losses of the components. However, it is not suited for wide range of the voltage and output voltage due to the uneven voltage and current component's stresses. The HB LLC resonant for battery charge of on board is presented in this paper. The theoretical results are verified through an experimental prototype for battery charger on board.", "title": "" }, { "docid": "afcb6c9130e16002100ff68f68d98ff3", "text": "This study characterizes adults who report being physically abused during childhood, and examines associations of reported type and frequency of abuse with adult mental health. Data were derived from the 2000-2001 and 2004-2005 National Epidemiologic Survey on Alcohol and Related Conditions, a large cross-sectional survey of a representative sample (N = 43,093) of the U.S. population. Weighted means, frequencies, and odds ratios of sociodemographic correlates and prevalence of psychiatric disorders were computed. Logistic regression models were used to examine the strength of associations between child physical abuse and adult psychiatric disorders adjusted for sociodemographic characteristics, other childhood adversities, and comorbid psychiatric disorders. Child physical abuse was reported by 8% of the sample and was frequently accompanied by other childhood adversities. Child physical abuse was associated with significantly increased adjusted odds ratios (AORs) of a broad range of DSM-IV psychiatric disorders (AOR = 1.16-2.28), especially attention-deficit hyperactivity disorder, posttraumatic stress disorder, and bipolar disorder. A dose-response relationship was observed between frequency of abuse and several adult psychiatric disorder groups; higher frequencies of assault were significantly associated with increasing adjusted odds. The long-lasting deleterious effects of child physical abuse underscore the urgency of developing public health policies aimed at early recognition and prevention.", "title": "" }, { "docid": "e31af9137176dd39efe0a9e286dd981b", "text": "This paper presents a novel automated procedure for discovering expressive shape specifications for sophisticated functional data structures. Our approach extracts potential shape predicates based on the definition of constructors of arbitrary user-defined inductive data types, and combines these predicates within an expressive first-order specification language using a lightweight data-driven learning procedure. Notably, this technique requires no programmer annotations, and is equipped with a type-based decision procedure to verify the correctness of discovered specifications. Experimental results indicate that our implementation is both efficient and effective, capable of automatically synthesizing sophisticated shape specifications over a range of complex data types, going well beyond the scope of existing solutions.", "title": "" }, { "docid": "ba695228c0fbaf91d6db972022095e98", "text": "This study evaluated the critical period hypothesis for second language (L2) acquisition. The participants were 240 native speakers of Korean who differed according to age of arrival (AOA) in the United States (1 to 23 years), but were all experienced in English (mean length of residence 5 15 years). The native Korean participants’ pronunciation of English was evaluated by having listeners rate their sentences for overall degree of foreign accent; knowledge of English morphosyntax was evaluated using a 144-item grammaticality judgment test. As AOA increased, the foreign accents grew stronger, and the grammaticality judgment test scores decreased steadily. However, unlike the case for the foreign accent ratings, the effect of AOA on the grammaticality judgment test scores became nonsignificant when variables confounded with AOA were controlled. This suggested that the observed decrease in morphosyntax scores was not the result of passing a maturationally defined critical period. Additional analyses showed that the score for sentences testing knowledge of rule based, generalizable aspects of English morphosyntax varied as a function of how much education the Korean participants had received in the United States. The scores for sentences testing lexically based aspects of English morphosyntax, on the other hand, depended on how much the Koreans used English. © 1999 Academic Press", "title": "" }, { "docid": "04c60b1bc04886086382402e9c14717d", "text": "This paper proposes a novel robust and adaptive sliding-mode (SM) control for a cascaded two-level inverter (CTLI)-based grid-connected photovoltaic (PV) system. The modeling and design of the control scheme for the CTLI-based grid-connected PV system is developed to supply active power and reactive power with variable solar irradiance. A vector controller is developed, keeping the maximum power delivery of the PV in consideration. Two different switching schemes have been considered to design SM controllers and studied under similar operating situations. Instead of the referred space vector pulsewidth modulation (PWM) technique, a simple PWM modulation technique is used for the operation of the proposed SM controller. The performance of the SM controller is improved by using an adaptive hysteresis band calculation. The controller performance is found to be satisfactory for both the schemes at considered load and solar irradiance level variations in simulation environment. The laboratory prototype, operated with the proposed controller, is found to be capable of implementing the control algorithm successfully in the considered situation.", "title": "" }, { "docid": "66133239610bb08d83fb37f2c11a8dc5", "text": "sists of two excitation laser beams. One beam scans the volume of the brain from the side of a horizontally positioned zebrafish but is rapidly switched off when inside an elliptical exclusion region located over the eye (Fig. 1b). Simultaneously, a second beam scans from the front, to cover the forebrain and the regions between the eyes. Together, these two beams achieve nearly complete coverage of the brain without exposing the retina to direct laser excitation, which allows unimpeded presentation of visual stimuli that are projected onto a screen below the fish. To monitor intended swimming behavior, we used existing methods for recording activity from motor neuron axons in the tail of paralyzed larval zebrafish1 (Fig. 1a and Supplementary Note). This system provides imaging speeds of up to three brain volumes per second (40 planes per brain volume); increases in camera speed will allow for faster volumetric sampling. Because light-sheet imaging may still introduce some additional sensory stimulation (excitation light scattering in the brain and reflected from the glass walls of the chamber), we assessed whether fictive behavior in 5–7 d post-fertilization (d.p.f.) fish was robust to the presence of the light sheets. We tested two visuoLight-sheet functional imaging in fictively behaving zebrafish", "title": "" }, { "docid": "b7914e542be8aeb5755106525916e86d", "text": "Waymo's self-driving cars contain a broad set of technologies that enable our cars to sense the vehicle surroundings, perceive and understand what is happening in the vehicle vicinity, and determine the safe and efficient actions that the vehicle should take. Many of these technologies are rooted in advanced semiconductor technologies, e.g. faster transistors that enable more compute or low noise designs that enable the faintest sensor signals to be perceived. This paper summarizes a few areas where semiconductor technologies have proven to be fundamentally enabling to self-driving capabilities. The paper also lays out some of the challenges facing advanced semiconductors in the automotive context, as well as some of the opportunities for future innovation.", "title": "" } ]
scidocsrr
6eecbc049f3eea656e9ff579fffc1a8f
Compare Stereo Patches Using Atrous Convolutional Neural Networks
[ { "docid": "4421a42fc5589a9b91215b68e1575a3f", "text": "We present a method for extracting depth information from a rectified image pair. Our approach focuses on the first stage of many stereo algorithms: the matching cost computation. We approach the problem by learning a similarity measure on small image patches using a convolutional neural network. Training is carried out in a supervised manner by constructing a binary classification data set with examples of similar and dissimilar pairs of patches. We examine two network architectures for this task: one tuned for speed, the other for accuracy. The output of the convolutional neural network is used to initialize the stereo matching cost. A series of post-processing steps follow: cross-based cost aggregation, semiglobal matching, a left-right consistency check, subpixel enhancement, a median filter, and a bilateral filter. We evaluate our method on the KITTI 2012, KITTI 2015, and Middlebury stereo data sets and show that it outperforms other approaches on all three data sets.", "title": "" }, { "docid": "01f9b07bc5c6ca47a6181deb908445e8", "text": "This paper deals with deep neural networks for predicting accurate dense disparity map with Semi-global matching (SGM). SGM is a widely used regularization method for real scenes because of its high accuracy and fast computation speed. Even though SGM can obtain accurate results, tuning of SGMs penalty-parameters, which control a smoothness and discontinuity of a disparity map, is uneasy and empirical methods have been proposed. We propose a learning based penalties estimation method, which we call SGM-Nets that consist of Convolutional Neural Networks. A small image patch and its position are input into SGMNets to predict the penalties for the 3D object structures. In order to train the networks, we introduce a novel loss function which is able to use sparsely annotated disparity maps such as captured by a LiDAR sensor in real environments. Moreover, we propose a novel SGM parameterization, which deploys different penalties depending on either positive or negative disparity changes in order to represent the object structures more discriminatively. Our SGM-Nets outperformed state of the art accuracy on KITTI benchmark datasets.", "title": "" }, { "docid": "b0c62e2049ea4f8ada0d506e06adb4bb", "text": "In the past year, convolutional neural networks have been shown to perform extremely well for stereo estimation. However, current architectures rely on siamese networks which exploit concatenation followed by further processing layers, requiring a minute of GPU computation per image pair. In contrast, in this paper we propose a matching network which is able to produce very accurate results in less than a second of GPU computation. Towards this goal, we exploit a product layer which simply computes the inner product between the two representations of a siamese architecture. We train our network by treating the problem as multi-class classification, where the classes are all possible disparities. This allows us to get calibrated scores, which result in much better matching performance when compared to existing approaches.", "title": "" } ]
[ { "docid": "b101bbf15197b3506e9344a31fc68593", "text": "Health—exploring complexity: an interdisciplinary systems approach HEC2016 28 August–2 September 2016, Munich, Germany Eva Grill • Martin Müller • Ulrich Mansmann Springer Science+Business Media Dordrecht 2016 Health is a complex process with potentially interacting components from the molecular to the societal and environmental level. Adequate research designs and data analysis methods are needed to improve our understanding of this complexity, to ultimately derive high quality evidence to inform patients, health professionals, and health policy decision makers. Also, effective patient-centred health care has to address the complexity of health, functioning, and disability, not only by implementing interventions, but also by using information technology that represents the complexity of health care to inform all actors. Given this background, we developed the concept of our conference HEC2016 as an interdisciplinary European event in beautiful Bavaria, in the city of München. Quite ironically this is the place, where William of Ockham, whose ideas of parsimony are the very opposite of complexity, accused of heresy, spent 17 years under the protection of the Bavarian King Ludwig IV. Furthermore, our local public health hero Max von Pettenkofer (1818–1901) contributed a lot to the basic systemic understanding of health, especially the relevance of a healthy environment. Under the joint theme of health as a complex system we joined the activities of five scientific disciplines: Medical Informatics, Medical Biometry, Bioinformatics, Epidemiology and Health Data Management. The mission behind this interdisciplinary effort was to serve as an important scientific forum for the exchange of new ideas and applications to strengthen health sciences on a national and international level. The analysis of health as a complex system opens needed perspectives on a challenging reality: filtering current hypotheses, resolving controversies, and tailoring interventions to the need of the individual within a health system environment. The conference encouraged the dialogue of the disciplines in order to advance our understanding of health and to decrease burden of disease. HEC2016 brought together the annual conferences of the German Association for Medical Informatics, Biometry and Epidemiology (GMDS), the German Society for Epidemiology (DGEpi), the International Epidemiological AssociationEuropean Region (IEA-EEF) and the European Federation for Medical Informatics Association (EFMI, MIE 2016). HEC2016 took place in München, Germany, in the main building of the Ludwig-Maximilians-Universität (LMU) from 28 August to 2 September 2016 under the auspices of the Institute for Medical Information Processing, Biometry and Epidemiology of LMU. The conference received 832 contributions for oral and poster presentation (Table 1). Fourteen percent of them were from outside Europe with the largest group of 10 % from Asia (Table 2). Scientific program committees and reviewers selected 408 submissions as oral contributions and 303 for poster presentations. The program was surrounded by twelve tutorials held by international renowned scientists and covered a broad spectrum from innovative biostatistical and epidemiological methods to tutorials in application of innovative software, scientific writing and data protection issues. Over 50 panel discussions and workshops allowed in-depth exchange of ideas on specific topics and underscored the interactive nature of HEC2016. A special focus of HEC2016 was on the promotion of young scientists from all disciplines whose participation was supported by numerous travel grants. We would like to express our deepest gratitude to all the colleagues who supported us as speakers, committee members and reviewers, lent us a hand before, during and after the conference, gave critical but friendly comments at all stages of the preparations, supported us by providing coffee, audience or Butterbrezen, and specifically to those who submitted contributions to the conference and attended the conference and its many tutorials, lectures and sessions. We extend our gratitude to the Deutsche Forschungsgemeinschaft for generous financial support (grant no. GR 3608/4-1). Last not least we would like to thank our families who allowed us to spend most of our weekends with organizing this conference, to William of Ockham for lending us his razor (from time to time) and to Max von Pettenkofer for guidance. Eva Grill Martin Müller Ulrich Mansmann for the local organizing committee (Tables 1, 2) 123 Eur J Epidemiol (2016) 31:S1–S239 DOI 10.1007/s10654-016-0183-1", "title": "" }, { "docid": "0b74dd11a1a85e98779ce7763f8fb8fd", "text": "The prediction of asthma that persists throughout childhood and into adulthood, in early life of a child has practical, clinical and prognostic implications and sets the basis for the future prevention. Artificial Neural Networks (ANNs) seems to be a superior tool for analyzing data sets where nonlinear relationships are existing between the input data and the predicted output. This study presents an effective machine-learning approach based on Multi-Layer Perceptron (MLP) neural networks, for the prediction of persistent asthma in children. Through a feature reduction, 10 high importance prognostic factors correlated to persistent asthma have been discovered. The feature selection approach results in 89.8% reduction of the initial number of features. Afterwards, a feature reduced classifier is constructed, which achieves 100% accuracy on the training and test data sets. Experimental results are presenting and verify this statement.", "title": "" }, { "docid": "a441211bd9d8a881f00122eea4be71a4", "text": "Network embedding algorithms to date are primarily designed for static networks, where all nodes are known before learning. How to infer embeddings for out-of-sample nodes, i.e. nodes that arrive after learning, remains an open problem. The problem poses great challenges to existing methods, since the inferred embeddings should preserve intricate network properties such as high-order proximity, share similar characteristics (i.e. be of a homogeneous space) with in-sample node embeddings, and be of low computational cost. To overcome these challenges, we propose a Deeply Transformed High-order Laplacian Gaussian Process (DepthLGP) method to infer embeddings for out-of-sample nodes. DepthLGP combines the strength of nonparametric probabilistic modeling and deep learning. In particular, we design a high-order Laplacian Gaussian process (hLGP) to encode network properties, which permits fast and scalable inference. In order to further ensure homogeneity, we then employ a deep neural network to learn a nonlinear transformation from latent states of the hLGP to node embeddings. DepthLGP is general, in that it is applicable to embeddings learned by any network embedding algorithms. We theoretically prove the expressive power of DepthLGP, and conduct extensive experiments on real-world networks. Empirical results demonstrate that our approach can achieve significant performance gain over existing approaches.", "title": "" }, { "docid": "376e5237101ec6f659085df1e9521e66", "text": "Unmanned aerial vehicles are gaining a lot of popularity among an ever growing community of amateurs as well as service providers. Emerging technologies, such as LTE 4G/5G networks and mobile edge computing, will widen the use case scenarios of UAVs. In this article, we discuss the potential of UAVs, equipped with IoT devices, in delivering IoT services from great heights. A high-level view of a UAV-based integrative IoT platform for the delivery of IoT services from large height, along with the overall system orchestrator, is presented in this article. As an envisioned use case of the platform, the article demonstrates how UAVs can be used for crowd surveillance based on face recognition. To evaluate the use case, we study the offloading of video data processing to a MEC node compared to the local processing of video data onboard UAVs. For this, we developed a testbed consisting of a local processing node and one MEC node. To perform face recognition, the Local Binary Pattern Histogram method from the Open Source Computer Vision is used. The obtained results demonstrate the efficiency of the MEC-based offloading approach in saving the scarce energy of UAVs, reducing the processing time of recognition, and promptly detecting suspicious persons.", "title": "" }, { "docid": "11a28e11ba6e7352713b8ee63291cd9c", "text": "This review focuses on discussing the main changes on the upcoming fourth edition of the WHO Classification of Tumors of the Pituitary Gland emphasizing histopathological and molecular genetics aspects of pituitary neuroendocrine (i.e., pituitary adenomas) and some of the non-neuroendocrine tumors involving the pituitary gland. Instead of a formal review, we introduced the highlights of the new WHO classification by answering select questions relevant to practising pathologists. The revised classification of pituitary adenomas, in addition to hormone immunohistochemistry, recognizes the role of other immunohistochemical markers including but not limited to pituitary transcription factors. Recognizing this novel approach, the fourth edition of the WHO classification has abandoned the concept of \"a hormone-producing pituitary adenoma\" and adopted a pituitary adenohypophyseal cell lineage designation of the adenomas with subsequent categorization of histological variants according to hormone content and specific histological and immunohistochemical features. This new classification does not require a routine ultrastructural examination of these tumors. The new definition of the Null cell adenoma requires the demonstration of immunonegativity for pituitary transcription factors and adenohypophyseal hormones Moreover, the term of atypical pituitary adenoma is no longer recommended. In addition to the accurate tumor subtyping, assessment of the tumor proliferative potential by mitotic count and Ki-67 index, and other clinical parameters such as tumor invasion, is strongly recommended in individual cases for consideration of clinically aggressive adenomas. This classification also recognizes some subtypes of pituitary neuroendocrine tumors as \"high-risk pituitary adenomas\" due to the clinical aggressive behavior; these include the sparsely granulated somatotroph adenoma, the lactotroph adenoma in men, the Crooke's cell adenoma, the silent corticotroph adenoma, and the newly introduced plurihormonal Pit-1-positive adenoma (previously known as silent subtype III pituitary adenoma). An additional novel aspect of the new WHO classification was also the definition of the spectrum of thyroid transcription factor-1 expressing pituitary tumors of the posterior lobe as representing a morphological spectrum of a single nosological entity. These tumors include the pituicytoma, the spindle cell oncocytoma, the granular cell tumor of the neurohypophysis, and the sellar ependymoma.", "title": "" }, { "docid": "f78e430994e9eeccd034df76d2b5316a", "text": "An externally leveraged circular resonant piezoelectric actuator with haptic natural frequency and fast response time was developed within the volume of 10 mm diameter and 3.4 mm thickness for application in mobile phones. An efficient displacement-amplifying mechanism was developed using a piezoelectric bimorph, a lever system, and a mass-spring system. The proposed displacement-amplifying mechanism utilizes both internally and externally leveraged structures. The former generates bending by means of bending deformation of the piezoelectric bimorph, and the latter transforms the bending to radial displacement of the lever system, which is transformed to a large axial displacement of the spring. The piezoelectric bimorph, lever system, and spring were designed to maximize static displacement and the mass-spring system was designed to have a haptic natural frequency. The static displacement, natural frequency, maximum output displacement, and response time of the resonant piezoelectric actuator were calculated by means of finite-element analyses. The proposed resonant piezoelectric actuator was prototyped and the simulated results were verified experimentally. The prototyped piezoelectric actuator generated the maximum output displacement of 290 μm at the haptic natural frequency of 242 Hz. Owing to the proposed efficient displacement-amplifying mechanism, the proposed resonant piezoelectric actuator had the fast response time of 14 ms, approximately one-fifth of a conventional resonant piezoelectric actuator of the same size.", "title": "" }, { "docid": "bb7bd1a00239a0b8b875ca03ccf218c3", "text": "Objectives: To assess the effect of milk with honey in childre n undergoing tonsillectomy on bleeding, pain and wound healing. Methods: The experimental study wit contol group was conduct ed out ear, nose and throat clinic and outpatient clinic in a public hospital. In the study, it were studied with children undergoing tonsillectomy who are 6-17 years of age (N=68). The standardized natural flowe r honey was applied to children in the experimental group after tonsillectomy, every day, in addition to the standard diet in clinical routine. The children wer e assigned randomly the experimental and control groups accord ing to the operation sequence. In collecting the da ta, questionnaire, pain, wound healing and visual analo g scales was used. The data were analyzed by percen tage distributions, means, chi-square test, variance ana lysis, and correlation analysis. It was depended on ethical principles. Results: In the study, it was determined that not bleeding, is significant less pain and the level of wound he aling of children in group milk with honey than children i milk group (p<.001). It has been found that a st rong negative correlation between the level of pain and wound healing of children in milk with honey and mi lk groups (p<.001). Conclusions: It has been determined that milk with honey was ef fective in prevent bleeding, reducing pain, and accelerate wound healing. Honey, which is a natural nutrient is a safe care tool that can be applied i n children undergoing tonsillectomy without diabetes and aller gic to honey and oral feeding in addition to routin e clinical the diet.", "title": "" }, { "docid": "96995acef120dbae49a731b461e2d089", "text": "Abstruct-In the conventional remote sensing supervised classification, training information and classification results are represented in a one-pixel-one-class method. Class mixture cannot be taken into consideration in training a classifier and in determining pixels’ membership. The expressive limitation has reduced the classification accuracy level and led to the poor extraction of information. This paper describes a fuzzy supervised classification method in which geographical information is represented as fuzzy sets. The algorithm consists of two major steps: The estimate of fuzzy parameters from fuzzy training data, and afuzzy partition of spectral space. Partial membership of pixels allows component cover classes of mixed pixels to be identified and more accurate statistical parameters to be generated, and, in turn, a higher classification accuracy to be achieved. Results of classifying a Landsat MSS image are presented and their accuracy is analyzed. Keywords-Remote sensing, fuzzy set theory, image classification, information representation.", "title": "" }, { "docid": "8a50b086b61e19481cc3dee78a785f09", "text": "A new approach to the online classification of streaming data is introduced in this paper. It is based on a self-developing (evolving) fuzzy-rule-based (FRB) classifier system of Takagi-Sugeno ( eTS) type. The proposed approach, called eClass (evolving class ifier), includes different architectures and online learning methods. The family of alternative architectures includes: 1) eClass0, with the classifier consequents representing class label and 2) the newly proposed method for regression over the features using a first-order eTS fuzzy classifier, eClass1. An important property of eClass is that it can start learning ldquofrom scratch.rdquo Not only do the fuzzy rules not need to be prespecified, but neither do the number of classes for eClass (the number may grow, with new class labels being added by the online learning process). In the event that an initial FRB exists, eClass can evolve/develop it further based on the newly arrived data. The proposed approach addresses the practical problems of the classification of streaming data (video, speech, sensory data generated from robotic, advanced industrial applications, financial and retail chain transactions, intruder detection, etc.). It has been successfully tested on a number of benchmark problems as well as on data from an intrusion detection data stream to produce a comparison with the established approaches. The results demonstrate that a flexible (with evolving structure) FRB classifier can be generated online from streaming data achieving high classification rates and using limited computational resources.", "title": "" }, { "docid": "577b0b3215fbd6a6b6fd0d8882967a1e", "text": "Generating texts of different sentiment labels is getting more and more attention in the area of natural language generation. Recently, Generative Adversarial Net (GAN) has shown promising results in text generation. However, the texts generated by GAN usually suffer from the problems of poor quality, lack of diversity and mode collapse. In this paper, we propose a novel framework SentiGAN, which has multiple generators and one multi-class discriminator, to address the above problems. In our framework, multiple generators are trained simultaneously, aiming at generating texts of different sentiment labels without supervision. We propose a penalty based objective in the generators to force each of them to generate diversified examples of a specific sentiment label. Moreover, the use of multiple generators and one multi-class discriminator can make each generator focus on generating its own examples of a specific sentiment label accurately. Experimental results on four datasets demonstrate that our model consistently outperforms several state-of-the-art text generation methods in the sentiment accuracy and quality of generated texts.", "title": "" }, { "docid": "ba8046daa43adc38915313bd107e5268", "text": "OBJECTIVES\nProlotherapy is an injection-based complementary treatment for various musculoskeletal diseases. The aim of this study was to evaluate the therapeutic efficacy of ultrasound-guided prolotherapy in the treatment of acromial enthesopathy and acromioclavicular joint arthropathy.\n\n\nMETHODS\nThirty-one patients with chronic moderate-to-severe shoulder pain were recruited from September 2015 to September 2017. Ultrasound-guided prolotherapy was performed by injecting 10 mL of a 15% dextrose solution into the acromial enthesis of the deltoid or acromioclavicular joint capsule aseptically. Prolotherapy was given in 2 sessions separated by a 1-month interval. The pretreatment-to-posttreatment change in the pain visual analog scale (VAS) score was recorded as the primary outcome. The mean follow-up duration was 61.8 days. A paired t test was used to assess the difference in pretreatment and posttreatment VAS scores. A univariate logistic regression analysis was conducted to identify the demographic variables associated with substantial pain reduction after the intervention. Substantial pain reduction was defined as a posttreatment VAS score of 3 or less.\n\n\nRESULTS\nTwenty of the 31 patients reported substantial pain reduction without adverse effects after the intervention. The mean VAS score reduction ± SD was 4.3 ± 2.6 (pretreatment, 6.8 ± 1.5; posttreatment, 2.5 ± 2.1; P < .01).\n\n\nCONCLUSIONS\nUltrasound-guided prolotherapy with a 15% dextrose solution is an effective and safe therapeutic option for moderate-to-severe acromial enthesopathy and acromioclavicular joint arthropathy.", "title": "" }, { "docid": "8245472f3dad1dce2f81e21b53af5793", "text": "Butanol is an aliphatic saturated alcohol having the molecular formula of C(4)H(9)OH. Butanol can be used as an intermediate in chemical synthesis and as a solvent for a wide variety of chemical and textile industry applications. Moreover, butanol has been considered as a potential fuel or fuel additive. Biological production of butanol (with acetone and ethanol) was one of the largest industrial fermentation processes early in the 20th century. However, fermentative production of butanol had lost its competitiveness by 1960s due to increasing substrate costs and the advent of more efficient petrochemical processes. Recently, increasing demand for the use of renewable resources as feedstock for the production of chemicals combined with advances in biotechnology through omics, systems biology, metabolic engineering and innovative process developments is generating a renewed interest in fermentative butanol production. This article reviews biotechnological production of butanol by clostridia and some relevant fermentation and downstream processes. The strategies for strain improvement by metabolic engineering and further requirements to make fermentative butanol production a successful industrial process are also discussed.", "title": "" }, { "docid": "6d51921b6e21b51f63ba66eaab24feb6", "text": "Habit formation is thought to aid maintenance of physical activity, but little research is available into determinants of habit strength aside from repeated performance. Previous work has shown that intrinsically motivated physical activity, underpinned by inherent satisfaction derived from activity, is more likely to be sustained. We explored whether this might reflect a tendency for self-determined activity to become more strongly habitual. A sample of 192 adults aged 18–30 completed measures of motivational regulation, intention, behaviour, and habit strength. Results showed that self-determined regulation interacted with past behaviour in predicting habit strength: prior action was more predictive of habit strength among more autonomously motivated participants. There was an unexpected direct effect of self-determined regulation on habit strength, independently of past behaviour. Findings offer possible directions for future habit formation work.", "title": "" }, { "docid": "cbc9437811bff9a1d96dd5d5f886c598", "text": "Weakly supervised learning for object detection has been gaining significant attention in the recent past. Visually similar objects are extracted automatically from weakly labelled videos hence bypassing the tedious process of manually annotating training data. However, the problem as applied to small or medium sized objects is still largely unexplored. Our observation is that weakly labelled information can be derived from videos involving human-object interactions. Since the object is characterized neither by its appearance nor its motion in such videos, we propose a robust framework that taps valuable human context and models similarity of objects based on appearance and functionality. Furthermore, the framework is designed such that it maximizes the utility of the data by detecting possibly multiple instances of an object from each video. We show that object models trained in this fashion perform between 86% and 92% of their fully supervised counterparts on three challenging RGB and RGB-D datasets.", "title": "" }, { "docid": "7d014f64578943f8ec8e5e27d313e148", "text": "In this paper, we extend the Divergent Component of Motion (DCM, also called `Capture Point') to 3D. We introduce the “Enhanced Centroidal Moment Pivot point” (eCMP) and the “Virtual Repellent Point” (VRP), which allow for the encoding of both direction and magnitude of the external (e.g. leg) forces and the total force (i.e. external forces plus gravity) acting on the robot. Based on eCMP, VRP and DCM, we present a method for real-time planning and control of DCM trajectories in 3D. We address the problem of underactuation and propose methods to guarantee feasibility of the finally commanded forces. The capabilities of the proposed control framework are verified in simulations.", "title": "" }, { "docid": "8c03df6650b3e400bc5447916d01820a", "text": "People called night owls habitually have late bedtimes and late times of arising, sometimes suffering a heritable circadian disturbance called delayed sleep phase syndrome (DSPS). Those with DSPS, those with more severe progressively-late non-24-hour sleep-wake cycles, and those with bipolar disorder may share genetic tendencies for slowed or delayed circadian cycles. We searched for polymorphisms associated with DSPS in a case-control study of DSPS research participants and a separate study of Sleep Center patients undergoing polysomnography. In 45 participants, we resequenced portions of 15 circadian genes to identify unknown polymorphisms that might be associated with DSPS, non-24-hour rhythms, or bipolar comorbidities. We then genotyped single nucleotide polymorphisms (SNPs) in both larger samples, using Illumina Golden Gate assays. Associations of SNPs with the DSPS phenotype and with the morningness-eveningness parametric phenotype were computed for both samples, then combined for meta-analyses. Delayed sleep and \"eveningness\" were inversely associated with loci in circadian genes NFIL3 (rs2482705) and RORC (rs3828057). A group of haplotypes overlapping BHLHE40 was associated with non-24-hour sleep-wake cycles, and less robustly, with delayed sleep and bipolar disorder (e.g., rs34883305, rs34870629, rs74439275, and rs3750275 were associated with n=37, p=4.58E-09, Bonferroni p=2.95E-06). Bright light and melatonin can palliate circadian disorders, and genetics may clarify the underlying circadian photoperiodic mechanisms. After further replication and identification of the causal polymorphisms, these findings may point to future treatments for DSPS, non-24-hour rhythms, and possibly bipolar disorder or depression.", "title": "" }, { "docid": "72bbd468c00ae45979cce3b771e4c2bf", "text": "Twitter is a popular microblogging and social networking service with over 100 million users. Users create short messages pertaining to a wide variety of topics. Certain topics are highlighted by Twitter as the most popular and are known as “trending topics.” In this paper, we will outline methodologies of detecting and identifying trending topics from streaming data. Data from Twitter’s streaming API will be collected and put into documents of equal duration. Data collection procedures will allow for analysis over multiple timespans, including those not currently associated with Twitter-identified trending topics. Term frequency-inverse document frequency analysis and relative normalized term frequency analysis are performed on the documents to identify the trending topics. Relative normalized term frequency analysis identifies unigrams, bigrams, and trigrams as trending topics, while term frequcny-inverse document frequency analysis identifies unigrams as trending topics.", "title": "" }, { "docid": "d4dc33b15df0a27259180fef3c28b546", "text": "Author name ambiguity is one of the problems that decrease the quality and reliability of information retrieved from digital libraries. Existing methods have tried to solve this problem by predefining a feature set based on expert’s knowledge for a specific dataset. In this paper, we propose a new approach which uses deep neural network to learn features automatically for solving author name ambiguity. Additionally, we propose the general system architecture for author name disambiguation on any dataset. We evaluate the proposed method on a dataset containing Vietnamese author names. The results show that this method significantly outperforms other methods that use predefined feature set. The proposed method achieves 99.31% in terms of accuracy. Prediction error rate decreases from 1.83% to 0.69%, i.e., it decreases by 1.14%, or 62.3% relatively compared with other methods that use predefined feature set (Table 3).", "title": "" }, { "docid": "afc97b142e1891b3cf0fb2a049b3e1cd", "text": "This study is designed to determine the relationship between job redesign, employee empowerment and intent to quit measured by affective organizational commitment among survivors of organizational restructuring and downsizing. It focused on middle level managers and employees in supervisory positions because survivors of this group are often called upon to assume expanded roles, functions and responsibilities in a post restructuring and downsizing environment. The results show statistically significant positive relationships between job redesign, empowerment and affective commitment. It therefore, provides empirical data to support theoretical models for managing and mitigating survivors’ intent to quit and subsequent voluntary turnover among survivors of organizational restructuring and downsizing. The implications of these findings, which suggest expanded roles for job redesign and employee empowerment, are discussed.", "title": "" }, { "docid": "d74c287c60b404961fc1775ddffc7d46", "text": "Numerous dietary compounds, ubiquitous in fruits, vegetables and spices have been isolated and evaluated during recent years for their therapeutic potential. These compounds include flavonoid and non-flavonoid polyphenols, which describe beneficial effects against a variety of ailments. The notion that these plant products have health promoting effects emerged because their intake was related to a reduced incidence of cancer, cardiovascular, neurological, respiratory, and age-related diseases. Exposure of the body to a stressful environment challenges cell survival and increases the risk of chronic disease developing. The polyphenols afford protection against various stress-induced toxicities through modulating intercellular cascades which inhibit inflammatory molecule synthesis, the formation of free radicals, nuclear damage and induce antioxidant enzyme expression. These responses have the potential to increase life expectancy. The present review article focuses on curcumin, resveratrol, and flavonoids and seeks to summarize their anti-inflammatory, cytoprotective and DNA-protective properties.", "title": "" } ]
scidocsrr
b36e98ef15c9b9e28e08bba5a7f06d42
A New Trust Reputation System for E-Commerce Applications
[ { "docid": "7a180e503a0b159d545047443524a05a", "text": "We present two methods for determining the sentiment expressed by a movie review. The semantic orientation of a review can be positive, negative, or neutral. We examine the effect of valence shifters on classifying the reviews. We examine three types of valence shifters: negations, intensifiers, and diminishers. Negations are used to reverse the semantic polarity of a particular term, while intensifiers and diminishers are used to increase and decrease, respectively, the degree to which a term is positive or negative. The first method classifies reviews based on the number of positive and negative terms they contain. We use the General Inquirer to identify positive and negative terms, as well as negation terms, intensifiers, and diminishers. We also use positive and negative terms from other sources, including a dictionary of synonym differences and a very large Web corpus. To compute corpus-based semantic orientation values of terms, we use their association scores with a small group of positive and negative terms. We show that extending the term-counting method with contextual valence shifters improves the accuracy of the classification. The second method uses a Machine Learning algorithm, Support Vector Machines. We start with unigram features and then add bigrams that consist of a valence shifter and another word. The accuracy of classification is very high, and the valence shifter bigrams slightly improve it. The features that contribute to the high accuracy are the words in the lists of positive and negative terms. Previous work focused on either the term-counting method or the Machine Learning method. We show that combining the two methods achieves better results than either method alone.", "title": "" }, { "docid": "02ac566cb1b11c3a3fe0edfde7181c32", "text": "During the last decade text mining has become a widely used discipline utilizing statistical and machine learning methods. We present the tm package which provides a framework for text mining applications within R. We give a survey on text mining facilities in R and explain how typical application tasks can be carried out using our framework. We present techniques for count-based analysis methods, text clustering, text classification and string kernels.", "title": "" }, { "docid": "c1c3b9393dd375b241f69f3f3cbf5acd", "text": "The purpose of trust and reputation systems is to strengthen the quality of markets and communities by providing an incentive for good behaviour and quality services, and by sanctioning bad behaviour and low quality services. However, trust and reputation systems will only be able to produce this effect when they are sufficiently robust against strategic manipulation or direct attacks. Currently, robustness analysis of TRSs is mostly done through simple simulated scenarios implemented by the TRS designers themselves, and this can not be considered as reliable evidence for how these systems would perform in a realistic environment. In order to set robustness requirements it is important to know how important robustness really is in a particular community or market. This paper discusses research challenges for trust and reputation systems, and proposes a research agenda for developing sound and reliable robustness principles and mechanisms for trust and reputation systems.", "title": "" } ]
[ { "docid": "b4622c9a168cd6e6f852bcc640afb4b3", "text": "New developments in osteotomy techniques and methods of fixation have caused a revival of interest of osteotomies around the knee. The current consensus on the indications, patient selection and the factors influencing the outcome after high tibial osteotomy is presented. This paper highlights recent research aimed at joint pressure redistribution, fixation stability and bone healing that has led to improved surgical techniques and a decrease of post-operative time to full weight-bearing.", "title": "" }, { "docid": "80e4748abbb22d2bfefa5e5cbd78fb86", "text": "A reimplementation of the UNIX file system is described. The reimplementation provides substantially higher throughput rates by using more flexible allocation policies that allow better locality of reference and can be adapted to a wide range of peripheral and processor characteristics. The new file system clusters data that is sequentially accessed and provides tw o block sizes to allo w fast access to lar ge files while not wasting large amounts of space for small files. File access rates of up to ten times f aster than the traditional UNIX file system are e xperienced. Longneeded enhancements to the programmers’ interface are discussed. These include a mechanism to place advisory locks on files, extensions of the name space across file systems, the ability to use long file names, and provisions for administrati ve control of resource usage. Revised February 18, 1984 CR", "title": "" }, { "docid": "2891ce3327617e9e957488ea21e9a20c", "text": "Recently, remote healthcare systems have received increasing attention in the last decade, explaining why intelligent systems with physiology signal monitoring for e-health care are an emerging area of development. Therefore, this study adopts a system which includes continuous collection and evaluation of multiple vital signs, long-term healthcare, and a cellular connection to a medical center in emergency case and it transfers all acquired raw data by the internet in normal case. The proposed system can continuously acquire four different physiological signs, for example, ECG, SpO2, temperature, and blood pressure and further relayed them to an intelligent data analysis scheme to diagnose abnormal pulses for exploring potential chronic diseases. The proposed system also has a friendly web-based interface for medical staff to observe immediate pulse signals for remote treatment. Once abnormal event happened or the request to real-time display vital signs is confirmed, all physiological signs will be immediately transmitted to remote medical server through both cellular networks and internet. Also data can be transmitted to a family member's mobile phone or doctor's phone through GPRS. A prototype of such system has been successfully developed and implemented, which will offer high standard of healthcare with a major reduction in cost for our society.", "title": "" }, { "docid": "d26ce319db7b1583347d34ff8251fbc0", "text": "The study of metacognition can shed light on some fundamental issues about consciousness and its role in behavior. Metacognition research concerns the processes by which people self reflect on their own cognitive and memory processes (monitoring), and how they put their metaknowledge to use in regulating their information processing and behavior (control). Experimental research on metacognition has addressed the following questions: First, what are the bases of metacognitive judgments that people make in monitoring their learning, remembering, and performance? Second, how valid are such judgments and what are the factors that affect the correspondence between subjective and objective indexes of knowing? Third, what are the processes that underlie the accuracy and inaccuracy of metacognitive judgments? Fourth, how does the output of metacognitive monitoring contribute to the strategic regulation of learning and remembering? Finally, how do the metacognitive processes of monitoring and control affect actual performance? Research addressing these questions is reviewed, emphasizing its implication for issues concerning consciousness, in particular, the genesis of subjective experience, the function of self-reflective consciousness, and the cause-and-effect relation between subjective experience and behavior.", "title": "" }, { "docid": "8b1bd5243d4512324e451a780c1ec7d3", "text": "If you get the printed book in on-line book store, you may also find the same problem. So, you must move store to store and search for the available there. But, it will not happen here. The book that we will offer right here is the soft file concept. This is what make you can easily find and get this fundamentals of computer security by reading this site. We offer you the best product, always and always.", "title": "" }, { "docid": "9e11598c99b0345525e9df897e108e9c", "text": "A new shielding scheme, active shielding, is proposed for reducing delays on interconnects. As opposed to conventional (passive) shielding, the active shielding approach helps to speed up signal propagation on a wire by ensuring in-phase switching of adjacent nets. Results show that the active shielding scheme improves performance by up to 16% compared to passive shields and up to 29% compared to unshielded wires. When signal slopes at the end of the line are compared, savings of up to 38% and 27% can be achieved when compared to passive shields and unshielded wires, respectively.", "title": "" }, { "docid": "2a811ac141a9c5fb0cea4b644b406234", "text": "Leadership is a process influence between leaders and subordinates where a leader attempts to influence the behaviour of subordinates to achieve the organizational goals. Organizational success in achieving its goals and objectives depends on the leaders of the organization and their leadership styles. By adopting the appropriate leadership styles, leaders can affect employee job satisfaction, commitment and productivity. Two hundred Malaysian executives working in public sectors voluntarily participated in this study. Two types of leadership styles, namely, transactional and transformational were found to have direct relationships with employees’ job satisfaction. The results showed that transformational leadership style has a stronger relationship with job satisfaction. This implies that transformational leadership is deemed suitable for managing government organizations. Implications of the findings were discussed further.", "title": "" }, { "docid": "808ee7b581a0b359e1e43346dddb3751", "text": "In timeseries classification, shapelets are subsequences of timeseries with high discriminative power. Existing methods perform a combinatorial search for shapelet discovery. Even with speedup heuristics such as pruning, clustering, and dimensionality reduction, the search remains computationally expensive. In this paper, we take an entirely different approach and reformulate the shapelet discovery task as a numerical optimization problem. In particular, the shapelet positions are learned by combining the generalized eigenvector method and fused lasso regularizer to encourage a sparse and blocky solution. Extensive experimental results show that the proposed method is orders of magnitudes faster than the state-of-the-art shapelet-based methods, while achieving comparable or even better classification accuracy.", "title": "" }, { "docid": "a219afda822413bbed34a21145807b47", "text": "In this work, the author implemented a NOVEL technique of multiple input multiple output (MIMO) orthogonal frequency division multiplexing (OFDM) based on space frequency block coding (SF-BC). Where, the implemented code is designed based on the QOC using the techniques of the reconfigurable antennas. The proposed system is implemented using MATLAB program, and the results showing best performance of a wireless communications system of higher coding gain and diversity.", "title": "" }, { "docid": "ecf8cd68405d9c1c9c741ebbbc374faa", "text": "Rapid development has promoted the 3D land use in the urban environment with the increasing requirements of the complex interweaving, such as dwellings, commercial areas, public transportation and urban utilities and infrastructure.3D cadastral object are features which concern unban planning, land resource and real estate of municipalities, whether they are on, obove or below the earth’s surface. In essence, the 3D cadastral objects are content and partition of urban geographic space, and they aim at registering legal status and property rights associated with land and other real estates or properties (Guo, Ying, 2010). It has become a huge challenge for governments to manage 3D land space breaking through the traditional 2D information system, which needs the support of 3D techniques.", "title": "" }, { "docid": "4e55d02fdd8ff4c5739cc433f4f15e9b", "text": "muchine, \" a progrum f o r uutomuticully generating syntacticully correct progrums (test cusrs> f o r checking compiler front ends. The notion of \" clynumic grammur \" is introduced und is used in a syntax-defining notution thut procides f o r context-sensitiuity. Exurnples demonstrute use of the syntax machine. The \" syntax machine \" discussed here automatically generates random test cases for any suitably defined programming language.' The test cases it produces are syntactically valid programs. But they are not \" meaningful, \" and if an attempt is made to execute them, the results are unpredictable and uncheckable. For this reason, they are less valuable than handwritten test cases. However, as an inexhaustible source of new test material, the syntax machine has shown itself to be a valuable tool. In the following sections, we characterize the use of this tool in testing different types of language processors, introduce the concept of \" dynamic grammar \" of a programming language, outline the structure of the system, and show what the syntax machine does by means of some examples. Test cases Test cases for a language processor are programs written following the rules of the language, as documented. The test cases, when processed, should give known results. If this does not happen, then either the processor or its documentation is in error. We can distinguish three categories of language processors and assess the usefulness of the syntax machine for testing them. For an interpreter, the syntax machine test cases are virtually useless,", "title": "" }, { "docid": "96c14e4c9082920edb835e85ce99dc21", "text": "When filling out privacy-related forms in public places such as hospitals or clinics, people usually are not aware that the sound of their handwriting leaks personal information. In this paper, we explore the possibility of eavesdropping on handwriting via nearby mobile devices based on audio signal processing and machine learning. By presenting a proof-of-concept system, WritingHacker, we show the usage of mobile devices to collect the sound of victims' handwriting, and to extract handwriting-specific features for machine learning based analysis. WritingHacker focuses on the situation where the victim's handwriting follows certain print style. An attacker can keep a mobile device, such as a common smart-phone, touching the desk used by the victim to record the audio signals of handwriting. Then the system can provide a word-level estimate for the content of the handwriting. To reduce the impacts of various writing habits and writing locations, the system utilizes the methods of letter clustering and dictionary filtering. Our prototype system's experimental results show that the accuracy of word recognition reaches around 50% - 60% under certain conditions, which reveals the danger of privacy leakage through the sound of handwriting.", "title": "" }, { "docid": "e6dd43c6e5143c519b40ab423b403193", "text": "Tables and forms are a very common way to organize information in structured documents. Their recognition is fundamental for the recognition of the documents. Indeed, the physical organization of a table or a form gives a lot of information concerning the logical meaning of the content. This chapter presents the different tasks that are related to the recognition of tables and forms and the associated well-known methods and remaining B. Coüasnon ( ) IRISA/INSA de Rennes, Rennes Cedex, France e-mail: couasnon@irisa.fr A. Lemaitre IRISA/Université Rennes 2, Rennes Cedex, France e-mail:couasnon@irisa.fr D. Doermann, K. Tombre (eds.), Handbook of Document Image Processing and Recognition, DOI 10.1007/978-0-85729-859-1 20, © Springer-Verlag London 2014 647 648 B. Coüasnon and A. Lemaitre challenges. Three main tasks are pointed out: the detection of tables in heterogeneous documents; the classification of tables and forms, according to predefined models; and the recognition of table and form contents. The complexity of these three tasks is related to the kind of studied document: image-based document or digital-born documents. At last, this chapter will introduce some existing systems for table and form analysis.", "title": "" }, { "docid": "ca9be32beeb516e8b62a35550d63a399", "text": "This paper examines the complex relationship that exists between poverty and natural resource degradation in developing countries. The rural poor are often concentrated in fragile, or less favorable, environmental areas. Consequently, their livelihoods can be intimately dependent on natural resource use and ecosystem services. The relationship between poverty and natural resource degradation may depend on a complex range of choices and tradeoffs available to the poor, which in the absence of capital, labor, and land markets, is affected by their access to outside employment and any natural resource endowments. The paper develops a poverty–environment model to characterize some of these linkages, and concludes by discussing policy implications and avenues for further research.", "title": "" }, { "docid": "17f719b2bfe2057141e367afe39d7b28", "text": "Identification of cancer subtypes plays an important role in revealing useful insights into disease pathogenesis and advancing personalized therapy. The recent development of high-throughput sequencing technologies has enabled the rapid collection of multi-platform genomic data (e.g., gene expression, miRNA expression, and DNA methylation) for the same set of tumor samples. Although numerous integrative clustering approaches have been developed to analyze cancer data, few of them are particularly designed to exploit both deep intrinsic statistical properties of each input modality and complex cross-modality correlations among multi-platform input data. In this paper, we propose a new machine learning model, called multimodal deep belief network (DBN), to cluster cancer patients from multi-platform observation data. In our integrative clustering framework, relationships among inherent features of each single modality are first encoded into multiple layers of hidden variables, and then a joint latent model is employed to fuse common features derived from multiple input modalities. A practical learning algorithm, called contrastive divergence (CD), is applied to infer the parameters of our multimodal DBN model in an unsupervised manner. Tests on two available cancer datasets show that our integrative data analysis approach can effectively extract a unified representation of latent features to capture both intra- and cross-modality correlations, and identify meaningful disease subtypes from multi-platform cancer data. In addition, our approach can identify key genes and miRNAs that may play distinct roles in the pathogenesis of different cancer subtypes. Among those key miRNAs, we found that the expression level of miR-29a is highly correlated with survival time in ovarian cancer patients. These results indicate that our multimodal DBN based data analysis approach may have practical applications in cancer pathogenesis studies and provide useful guidelines for personalized cancer therapy.", "title": "" }, { "docid": "a1b20560bbd6124db8fc8b418cd1342c", "text": "Feature selection is often an essential data processing step prior to applying a learning algorithm The re moval of irrelevant and redundant information often improves the performance of machine learning algo rithms There are two common approaches a wrapper uses the intended learning algorithm itself to evaluate the usefulness of features while a lter evaluates fea tures according to heuristics based on general charac teristics of the data The wrapper approach is generally considered to produce better feature subsets but runs much more slowly than a lter This paper describes a new lter approach to feature selection that uses a correlation based heuristic to evaluate the worth of fea ture subsets When applied as a data preprocessing step for two common machine learning algorithms the new method compares favourably with the wrapper but re quires much less computation", "title": "" }, { "docid": "63ce782345f9814e57b801db773e77ba", "text": "Depression is a serious illness that affects millions of people globally. In recent years, the task of automatic depression detection from speech has gained popularity. However, several challenges remain, including which features provide the best discrimination between classes or depression levels. Thus far, most research has focused on extracting features from the speech signal. However, the speech production system is complex and depression has been shown to affect many linguistic properties, including phonetics, semantics, and syntax. Therefore, we argue that researchers should look beyond the acoustic properties of speech by building features that capture syntactic structure and semantic content. We provide a comparative analyses of various features for depression detection. Using the same corpus, we evaluate how a system built on text-based features compares to a speech-based system. We find that a combination of features drawn from both speech and text lead to the best system performance.", "title": "" }, { "docid": "5b382b27257cdb333b7e709c8138580f", "text": "Proton++ is a declarative multitouch framework that allows developers to describe multitouch gestures as regular expressions of touch event symbols. It builds on the Proton framework by allowing developers to incorporate custom touch attributes directly into the gesture description. These custom attributes increase the expressivity of the gestures, while preserving the benefits of Proton: automatic gesture matching, static analysis of conflict detection, and graphical gesture creation. We demonstrate Proton++'s flexibility with several examples: a direction attribute for describing trajectory, a pinch attribute for detecting when touches move towards one another, a touch area attribute for simulating pressure, an orientation attribute for selecting menu items, and a screen location attribute for simulating hand ID. We also use screen location to simulate user ID and enable simultaneous recognition of gestures by multiple users. In addition, we show how to incorporate timing into Proton++ gestures by reporting touch events at a regular time interval. Finally, we present a user study that suggests that users are roughly four times faster at interpreting gestures written using Proton++ than those written in procedural event-handling code commonly used today.", "title": "" }, { "docid": "0909789d0f2ad990ec7f530546cf56b1", "text": "The outlier detection problem has important applications in the field of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimensional domains in which the data can contain hundreds of dimensions. Many recent algorithms use concepts of proximity in order to find outliers based on their relationship to the rest of the data. However, in high dimensional space, the data is sparse and the notion of proximity fails to retain its meaningfulness. In fact, the sparsity of high dimensional data implies that every point is an almost equally good outlier from the perspective of proximity-based definitions. Consequently, for high dimensional data, the notion of finding meaningful outliers becomes substantially more complex and non-obvious. In this paper, we discuss new techniques for outlier detection which find the outliers by studying the behavior of projections from the data set.", "title": "" }, { "docid": "49f1d3ebaf3bb3e575ac3e40101494d9", "text": "This paper discusses the current status of research on fraud detection undertaken a.s part of the European Commissionfunded ACTS ASPECT (Advanced Security for Personal Communications Technologies) project, by Royal Holloway University of London. Using a recurrent neural network technique, we uniformly distribute prototypes over Toll Tickets. sampled from the U.K. network operator, Vodafone. The prototypes, which continue to adapt to cater for seasonal or long term trends, are used to classify incoming Toll Tickets to form statistical behaviour proFdes covering both the short and long-term past. These behaviour profiles, maintained as probability distributions, comprise the input to a differential analysis utilising a measure known as the HeUinger distance[5] between them as an alarm criteria. Fine tuning the system to minimise the number of false alarms poses a significant ask due to the low fraudulent/non fraudulent activity ratio. We benefit from using unsupervised learning in that no fraudulent examples ate requited for training. This is very relevant considering the currently secure nature of GSM where fraud scenarios, other than Subscription Fraud, have yet to manifest themselves. It is the aim of ASPECT to be prepared for the would-be fraudster for both GSM and UMTS, Introduction When a mobile originated phone call is made or various inter-call criteria are met he cells or switches that a mobile phone is communicating with produce information pertaining to the call attempt. These data records, for billing purposes, are referred to as Toll Tickets. Toll Tickets contain a wealth of information about the call so that charges can be made to the subscriber. By considering well studied fraud indicators these records can also be used to detect fraudulent activity. By this we mean i terrogating a series of recent Toll Tickets and comparing a function of the various fields with fixed criteria, known as triggers. A trigger, if activated, raises an alert status which cumulatively would lead to investigation by the network operator. Some xample fraud indicators are that of a new subscriber making long back-to-back international calls being indicative of direct call selling or short back-to-back calls to a single land number indicating an attack on a PABX system. Sometimes geographical information deduced from the cell sites visited in a call can indicate cloning. This can be detected through setting a velocity trap. Fixed trigger criteria can be set to catch such extremes of activity, but these absolute usage criteria cannot trap all types of fraud. An alternative approach to the problem is to perform a differential analysis. Here we develop behaviour profiles relating to the mobile phone’s activity and compare its most recent activities with a longer history of its usage. Techniques can then be derived to determine when the mobile phone’s behaviour changes ignificantly. One of the most common indicators of fraud is a significant change in behaviour. The performance expectations of such a system must be of prime concern when developing any fraud detection strategy. To implement a real time fraud detection tool on the Vodafone network in the U.K, it was estimated that, on average, the system would need to be able to process around 38 Toll Tickets per second. This figure varied with peak and off-peak usage and also had seasonal trends. The distribution of the times that calls are made and the duration of each call is highly skewed. Considering all calls that are made in the U.K., including the use of supplementary services, we found the average call duration to be less than eight seconds, hardly time to order a pizza. In this paper we present one of the methods developed under ASPECT that tackles the problem of skewed distributions and seasonal trends using a recurrent neural network technique that is based around unsupervised learning. We envisage this technique would form part of a larger fraud detection suite that also comprises a rule based fraud detection tool and a neural network fraud detection tool that uses supervised learning on a multi-layer perceptron. Each of the systems has its strengths and weaknesses but we anticipate that the hybrid system will combine their strengths. 9 From: AAAI Technical Report WS-97-07. Compilation copyright © 1997, AAAI (www.aaai.org). All rights reserved.", "title": "" } ]
scidocsrr
8e56dac384d7de01f5b5bb10228c1401
Chained Multi-stream Networks Exploiting Pose, Motion, and Appearance for Action Classification and Detection
[ { "docid": "4b33d61fce948b8c7942ca6180765a59", "text": "We propose in this paper a fully automated deep model, which learns to classify human actions without using any prior knowledge. The first step of our scheme, based on the extension of Convolutional Neural Networks to 3D, automatically learns spatio-temporal features. A Recurrent Neural Network is then trained to classify each sequence considering the temporal evolution of the learned features for each timestep. Experimental results on the KTH dataset show that the proposed approach outperforms existing deep models, and gives comparable results with the best related works.", "title": "" }, { "docid": "5b4e2380172b90c536eb974268a930b6", "text": "This paper addresses the problem of road scene segmentation in conventional RGB images by exploiting recent advances in semantic segmentation via convolutional neural networks (CNNs). Segmentation networks are very large and do not currently run at interactive frame rates. To make this technique applicable to robotics we propose several architecture refinements that provide the best trade-off between segmentation quality and runtime. This is achieved by a new mapping between classes and filters at the expansion side of the network. The network is trained end-to-end and yields precise road/lane predictions at the original input resolution in roughly 50ms. Compared to the state of the art, the network achieves top accuracies on the KITTI dataset for road and lane segmentation while providing a 20× speed-up. We demonstrate that the improved efficiency is not due to the road segmentation task. Also on segmentation datasets with larger scene complexity, the accuracy does not suffer from the large speed-up.", "title": "" } ]
[ { "docid": "575852c428dbdffc2ec736412bf0c75e", "text": "Advancements in additive manufacturing techniques, printed electronics, and nanomaterials have made it possible for the cost-effective fabrication of sensors and systems. Low-cost sensors for continuous and real time monitoring of physical and chemical parameters will directly impact the energy-efficiency, safety, and manufacturing challenges of diverse technology sectors. In this paper, we present the design, printing, and characterization of a two-port surface acoustic wave (SAW) integrated on LiNbO3 substrate. The aerosol jet printer was used for direct-writing of interdigitated transducers for SAW devices with center frequency in the range of 40–87 MHz. The linear response of a temperature sensor based on the SAW design shows promise for direct-writing of environmental sensors on low-temperature substrates.", "title": "" }, { "docid": "b6a045abb9881abafae097e29f866745", "text": "AIMS AND OBJECTIVES\nUnderstanding the processes by which nurses administer medication is critical to the minimization of medication errors. This study investigates nurses' views on the factors contributing to medication errors in the hope of facilitating improvements to medication administration processes.\n\n\nDESIGN AND METHODS\nA focus group of nine Registered Nurses discussed medication errors with which they were familiar as a result of both their own experiences and of literature review. The group, along with other researchers, then developed a semi-structured questionnaire consisting of three parts: narrative description of the error, the nurse's background and contributing factors. After the contributing factors had been elicited and verified with eight categories and 34 conditions, additional Registered Nurses were invited to participate by recalling one of the most significant medication errors that they had experienced and identifying contributing factors from those listed on the questionnaire. Identities of the hospital, patient and participants involved in the study remain confidential.\n\n\nRESULTS\nOf the 72 female nurses who responded, 55 (76.4%) believed more than one factor contributed to medication errors. 'Personal neglect' (86.1%), 'heavy workload' (37.5%) and 'new staff' (37.5%) were the three main factors in the eight categories. 'Need to solve other problems while administering drugs,''advanced drug preparation without rechecking,' and 'new graduate' were the top three of the 34 conditions. Medical wards (36.1%) and intensive care units (33.3%) were the two most error-prone places. The errors common to the two were 'wrong dose' (36.1%) and 'wrong drug' (26.4%). Antibiotics (38.9%) were the most commonly misadministered drugs.\n\n\nCONCLUSIONS\nAlthough the majority of respondents considered nurse's personal neglect as the leading factor in medication errors, analysis indicated that additional factors involving the health care system, patients' conditions and doctors' prescriptions all contributed to administration errors.\n\n\nRELEVANCE TO CLINICAL PRACTICE\nIdentification of the main factors and conditions contributing to medication errors allows clinical nurses and administration systems to eliminate situations that promote errors and to incorporate changes that minimize them, creating a safer patient environment.", "title": "" }, { "docid": "7e004a7b6a39ff29176dd19a07c15448", "text": "All humans will become presbyopic as part of the aging process where the eye losses the ability to focus at different depths. Progressive additive lenses (PALs) allow a person to focus on objects located at near versus far by combing lenses of different strengths within the same spectacle. However, it is unknown why some patients easily adapt to wearing these lenses while others struggle and complain of vertigo, swim, and nausea as well as experience difficulties with balance. Sixteen presbyopes (nine who adapted to PALs and seven who had tried but could not adapt) participated in this study. This research investigated vergence dynamics and its adaptation using a short-term motor learning experiment to asses the ability to adapt. Vergence dynamics were on average faster and the ability to change vergence dynamics was also greater for presbyopes who adapted to progressive lenses compared to those who could not. Data suggest that vergence dynamics and its adaptation may be used to predict which patients will easily adapt to progressive lenses and discern those who will have difficulty.", "title": "" }, { "docid": "890a3fede570ee6777c0af7332aa0d8d", "text": "As mobile instant messaging has become a major means of communication with the widespread use of smartphones, emoticons, symbols that are meant to indicate particular emotions in instant messages, have also developed into various forms. The primary purpose of this study is to classify the usage patterns of emoticons focusing on a particular variant known as \"stickers\" to observe individual and social characteristics of emoticon use and reinterpret the meaning of emoticons in instant messages. A qualitative approach with an in-depth semi-structured interview was used to uncover the motive in using emoticon stickers. The study suggests that besides using emoticon stickers for expressing emotions, users may have other motives: strategic and functional purposes.", "title": "" }, { "docid": "c8f8df96501d0786262ebb7630c73594", "text": "In this paper, a grouping genetic algorithm based approach is proposed for dividing stocks into groups and mining a set of stock portfolios, namely group stock portfolio. Each chromosome consists of three parts. Grouping and stock parts are used to indicate how to divide stocks into groups. Stock portfolio part is used to represent the purchased stocks and their purchased units. The fitness of each chromosome is evaluated by the group balance and the portfolio satisfaction. The group balance is utilized to make the groups represented by the chromosome have as similar number of stocks as possible. The portfolio satisfaction is used to evaluate the goodness of profits and satisfaction of investor's requests of all possible portfolio combinations that can generate from a chromosome. Experiments on a real data were also made to show the effectiveness of the proposed approach.", "title": "" }, { "docid": "339bfb7f54ce8202de1a4079097a6f8d", "text": "This article reviews research from published studies on the association between nutrition among school-aged children and their performance in school and on tests of cognitive functioning. Each reviewed article is accompanied by a brief description of its research methodology and outcomes. Articles are separated into 4 categories: food insufficiency, iron deficiency and supplementation, deficiency and supplementation of micronutrients, and the importance of breakfast. Research shows that children with iron deficiencies sufficient to cause anemia are at a disadvantage academically. Their cognitive performance seems to improve with iron therapy. A similar association and improvement with therapy is not found with either zinc or iodine deficiency, according to the reviewed articles. There is no evidence that population-wide vitamin and mineral supplementation will lead to improved academic performance. Food insufficiency is a serious problem affecting children’s ability to learn, but its relevance to US populations needs to be better understood. Research indicates that school breakfast programs seem to improve attendance rates and decrease tardiness. Among severely undernourished populations, school breakfast programs seem to improve academic performance and cognitive functioning. (J Sch Health. 2005;75(6):199-213) Parents, educators, and health professionals have long touted the association between what our children eat and their school performance. Evidence for this correlation is not always apparent, and biases on both sides of the argument sometimes override data when this topic is discussed. Understanding existing evidence linking students’ dietary intake and their ability to learn is a logical first step in developing school food service programs, policies, and curricula on nutrition and in guiding parents of school-aged children. The National Coordinating Committee on School Health and Safety (NCCSHS) comprises representatives of several federal departments and nongovernmental organizations working to develop and enhance coordinated school health programs. The NCCSHS has undertaken a project to enhance awareness of evidence linking child health and school performance and identifying gaps in our knowledge. NCCSHS has conducted a search of peerreviewed, published research reporting on the relationship between students’ health and academic performance. In addition to nutrition, NCCSHS has sponsored research reviews of the association between academic performance and asthma, diabetes, sickle cell anemia, sleep, obesity, and physical activity. SELECTION OF ARTICLES Articles meeting the following specific characteristics were selected. (1) Subjects were school-aged children (5 to 18 years), (2) article was published after 1980 in a peerreviewed journal, and (3) findings included at least 1 of the following outcome measures: school attendance, academic achievement, a measure of cognitive ability (such as general intelligence, memory), and attention. Students’ level of attention was only acceptable as an outcome measure for purposes of inclusion in this review, if attention was measured objectively in the school environment. Studies of the impact of nutritional intake in children prior to school age were not included. Studies were identified using MedLine and similar Internet-based searches. If a full article could not be retrieved, but a detailed abstract was available, the research was included. Outcomes other than academic achievement, attendance, and cognitive ability, although considered major by the authors, may not be described at all or are only briefly alluded to in the tables of research descriptions.", "title": "" }, { "docid": "03097e1239e5540fe1ec45729d1cbbc2", "text": "Policy gradient is an efficient technique for improving a policy in a reinforcement learning setting. However, vanilla online variants are on-policy only and not able to take advantage of off-policy data. In this paper we describe a new technique that combines policy gradient with off-policy Q-learning, drawing experience from a replay buffer. This is motivated by making a connection between the fixed points of the regularized policy gradient algorithm and the Q-values. This connection allows us to estimate the Q-values from the action preferences of the policy, to which we apply Q-learning updates. We refer to the new technique as ‘PGQ’, for policy gradient and Q-learning. We also establish an equivalency between action-value fitting techniques and actor-critic algorithms, showing that regularized policy gradient techniques can be interpreted as advantage function learning algorithms. We conclude with some numerical examples that demonstrate improved data efficiency and stability of PGQ. In particular, we tested PGQ on the full suite of Atari games and achieved performance exceeding that of both asynchronous advantage actor-critic (A3C) and Q-learning.", "title": "" }, { "docid": "cf867b46e3a2b1f5938e4ceb4d6c6f74", "text": "Over the past two decades a relatively large number of studies have investigated the functional neuroanatomy of posttraumatic stress disorder (PTSD). However, findings are often inconsistent, thus challenging traditional neurocircuitry models of PTSD. As evidence mounts that cognition and behavior is an emergent property of interacting brain networks, the question arises whether PTSD can be understood by examining dysfunction in large-scale, spatially distributed neural networks. We used the activation likelihood estimation quantitative meta-analytic technique to synthesize findings across functional neuroimaging studies of PTSD that either used a non-trauma (N=20) or trauma-exposed (N=19) comparison control group. In line with neurocircuitry models, our findings support hyperactive amygdala and hypoactive medial prefrontal regions, but suggest hyperactive hippocampi. Characterization of additional regions under a triple network model showed functional alterations that largely overlapped with the salience network, central executive network, and default network. However, heterogeneity was observed within and across the neurocircuitry and triple network models, and between results based on comparisons to non-trauma and trauma-exposed control groups. Nonetheless, these results warrant further exploration of the neurocircuitry and large-scale network models in PTSD using connectivity analyses.", "title": "" }, { "docid": "026a0651177ee631a80aaa7c63a1c32f", "text": "This paper is an introduction to natural language interfaces to databases (Nlidbs). A brief overview of the history of Nlidbs is rst given. Some advantages and disadvantages of Nlidbs are then discussed, comparing Nlidbs to formal query languages, form-based interfaces, and graphical interfaces. An introduction to some of the linguistic problems Nlidbs have to confront follows, for the beneet of readers less familiar with computational linguistics. The discussion then moves on to Nlidb architectures, porta-bility issues, restricted natural language input systems (including menu-based Nlidbs), and Nlidbs with reasoning capabilities. Some less explored areas of Nlidb research are then presented, namely database updates, meta-knowledge questions, temporal questions, and multi-modal Nlidbs. The paper ends with reeections on the current state of the art.", "title": "" }, { "docid": "fa1a6afff63a91c084aa8b2197479bed", "text": "Conventional wisdom in deep learning states that increasing depth improves expressiveness but complicates optimization. This paper suggests that, sometimes, increasing depth can speed up optimization. The effect of depth on optimization is decoupled from expressiveness by focusing on settings where additional layers amount to overparameterization – linear neural networks, a wellstudied model. Theoretical analysis, as well as experiments, show that here depth acts as a preconditioner which may accelerate convergence. Even on simple convex problems such as linear regression with `p loss, p > 2, gradient descent can benefit from transitioning to a non-convex overparameterized objective, more than it would from some common acceleration schemes. We also prove that it is mathematically impossible to obtain the acceleration effect of overparametrization via gradients of any regularizer.", "title": "" }, { "docid": "7633171605190f4d5b643b3155ecf288", "text": "Effective robot manipulation requires a vision system which can extract features of the environment which determine what manipulation actions are possible. There is existing work in this direction under the broad banner of recognising “affordances”. We are particularly interested in possibilities for actions afforded by relationships among pairs of objects. For example if an object is “inside” another or “on top” of another. For this there is a need for a vision system which can recognise such relationships in a scene. We use an approach in which a vision system first segments an image, and then considers a pair of objects to determine their physical relationship. The system extracts surface patches for each object in the segmented image, and then compiles various histograms from looking at relationships between the surface patches of one object and those of the other object. From these histograms a classifier is trained to recognise the relationship between a pair of objects. Our results identify the most promising ways to construct histograms in order to permit classification of physical relationships with high accuracy. This work is important for manipulator robots who may be presented with novel scenes and must identify the salient physical relationships in order to plan manipulation activities.", "title": "" }, { "docid": "34a21bf5241d8cc3a7a83e78f8e37c96", "text": "A current-biased voltage-programmed (CBVP) pixel circuit for active-matrix organic light-emitting diode (AMOLED) displays is proposed. The pixel circuit can not only ensure an accurate and fast compensation for the threshold voltage variation and degeneration of the driving TFT and the OLED, but also provide the OLED with a negative bias during the programming period. The negative bias prevents the OLED from a possible light emitting during the programming period and potentially suppresses the degradation of the OLED.", "title": "" }, { "docid": "0fd4268e53504d296f4cbe8330928759", "text": "Wireless sensor networks, which are used for monitoring large-scale linear structures, are having a significant importance due to its implementation and low cost maintenance. The main challenges that this technology faces are the location and automatic identification of thousands of nodes that are part of a linear large-scale infrastructure, with minimum processing and low power consumption of the nodes. This paper proposes an automatic identification and location mechanism of the nodes that are part of a linear structure using link-level processes and the IEEE 802.15.4 protocol. This mechanism improves the reliability in the allocation process of identifiers without using routing protocols to minimize the number of sent messages, also the computation process is done at the nodes, and therefore it reduces energy consumption. The proposed algorithm is evaluated using a prototype, for which we present initial performance analysis results focusing on delay. The implementation results confirm that with the proposed algorithm we obtain automatic allocations of identifiers.", "title": "" }, { "docid": "176dc97bd2ce3c1fd7d3a8d6913cff70", "text": "Packet broadcasting is a form of data communications architecture which can combine the features of packet switching with those of broadcast channels for data communication networks. Much of the basic theory of packet broadcasting has been presented as a byproduct in a sequence of papers with a distinctly practical emphasis. In this paper we provide a unified presentation of packet broadcasting theory. In Section I1 we introduce the theory of packet broadcasting data networks. In Section I11 we provide some theoretical results dealing with the performance of a packet broadcasting network when the users of the network have a variety of data rates. In Section IV we deal with packet broadcasting networks distributed in space, and in Section V we derive some properties of power-limited packet broadcasting channels,showing that the throughput of such channels can approach that of equivalent point-to-point channels.", "title": "" }, { "docid": "2c1604c1592b974c78568bbe2f71485c", "text": "BACKGROUND\nA self-rated measure of health anxiety should be sensitive across the full range of intensity (from mild concern to frank hypochondriasis) and should differentiate people suffering from health anxiety from those who have actual physical illness but who are not excessively concerned about their health. It should also encompass the full range of clinical symptoms characteristic of clinical hypochondriasis. The development and validation of such a scale is described.\n\n\nMETHOD\nThree studies were conducted. First, the questionnaire was validated by comparing the responses of patients suffering from hypochondriasis with those suffering from hypochondriasis and panic disorder, panic disorder, social phobia and non-patient controls. Secondly, a state version of the questionnaire was administered to patients undergoing cognitive-behavioural treatment or wait-list in order to examine the measure's sensitivity to change. In the third study, a shortened version was developed and validated in similar types of sample, and in a range of samples of people seeking medical help for physical illness.\n\n\nRESULTS\nThe scale was found to be reliable and to have a high internal consistency. Hypochondriacal patients scored significantly higher than anxiety disorder patients, including both social phobic patients and panic disorder patients as well as normal controls. In the second study, a 'state' version of the scale was found to be sensitive to treatment effects, and to correlate very highly with a clinician rating based on an interview of present clinical state. A development and refinement of the scale (intended to reflect more fully the range of symptoms of and reactions to hypochondriasis) was found to be reliable and valid. A very short (14 item) version of the scale was found to have comparable properties to the full length scale.\n\n\nCONCLUSIONS\nThe HAI is a reliable and valid measure of health anxiety. It is likely to be useful as a brief screening instrument, as there is a short form which correlates highly with the longer version.", "title": "" }, { "docid": "f447d9aadcaa4fb56f951838f84eb6af", "text": "A systematic method for developing isolated buck-boost (IBB) converters is proposed in this paper, and single-stage power conversion, soft-switching operation, and high-efficiency performance can be achieved with the proposed family of converters. On the basis of a nonisolated two-switch buck-boost converter, the proposed IBB converters are generated by replacing the dc buck-cell and boost-cell in the non-IBB converter with the ac buck-cell and boost-cell, respectively. Furthermore, a family of semiactive rectifiers (SARs) is proposed to serve as the secondary rectification circuit for the IBB converters, which helps to extend the converter voltage gain and reduce the voltage stresses on the devices in the rectification circuit. Hence, the efficiency is improved by employing a transformer with a smaller turns ratio and reduced parasitic parameters, by using low-voltage rating MOSFETs and diodes with better switching and conduction performances. A full-bridge IBB converter is proposed and analyzed in detail as an example. The phase-shift modulation strategy is applied to the full-bridge IBB converter to achieve IBB conversion. Moreover, soft-switching performance of all active switches and diodes can be achieved over a wide load and voltage range by the proposed converter and control strategy. A 380-V-output prototype is fabricated to verify the effectiveness of the proposed family of IBB converters, the SARs, and the control strategies.", "title": "" }, { "docid": "c7351e8ce6d32b281d5bd33b245939c6", "text": "In TREC 2002 the Berkeley group participated only in the English-Arabic cross-language retrieval (CLIR) track. One Arabic monolingual run and three English-Arabic cross-language runs were submitted. Our approach to the crosslanguage retrieval was to translate the English topics into Arabic using online English-Arabic machine translation systems. The four official runs are named as BKYMON, BKYCL1, BKYCL2, and BKYCL3. The BKYMON is the Arabic monolingual run, and the other three runs are English-to-Arabic cross-language runs. This paper reports on the construction of an Arabic stoplist and two Arabic stemmers, and the experiments on Arabic monolingual retrieval, English-to-Arabic cross-language retrieval.", "title": "" }, { "docid": "c7b1a143bb1dd01840c0fa78d9af61b6", "text": "The use of wearable sensors for home monitoring provides an effective means of inferring a patient’s level of activity. However, wearable sensors have intrinsic ambiguities that prevent certain activities to be recognized accurately. The purpose of this paper is to introduce a robust framework for enhanced activity recognition by integrating an ear-worn activity recognition (e-AR) sensor with ambient blob-based vision sensors. Accelerometer information from the e-AR is fused with features extracted from the vision sensor by using a Gaussian Mixture Model Bayes classifier. The experimental results showed a significant improvement of the classification accuracy compared to the use of the e-AR sensor alone. Keywords— blob sensor, wearable sensor, sensor fusion, activity recognition", "title": "" }, { "docid": "b64e9e994730a0a530801c6f22d52cd1", "text": "The environment of the city is surrounded by a lot of radio frequency (RF) energy that is broadcasted by diverse wireless systems. In order to enhance the value of the energy more than the channels to communicate, the ambient RF energy harvesting system was designed to harvest and recycle the energy for many applications such as battery chargers, sensor devices and portable devices. The main element of the ambient RF energy harvesting system is a rectenna that is the combination of an antenna and a rectifying circuit. Even though the ambient RF energy is widely broadcasted with many systems, the energy is extremely low. Therefore, the high performance of the antenna and the rectifying circuit has to be designed for supporting the small incident power; also the number of frequency channels of the rectenna can enhance the performance and support different harvesting locations. This paper proposes a dual-band rectifier for RF energy harvesting systems that was designed to operate at 2.1 GHz and 2.45 GHz. The first channel can provide the maximum efficiency of 24% with 1.9 V of the output voltage at 10 dBm of input power. On the other hand, a maximum efficiency of 18% and 1.7 V of the output voltage can be achieved by the second channel at 10 dBm of input power.", "title": "" } ]
scidocsrr
492f7220fe4063f99776054b7db6dcc4
Comparative study of machine learning algorithms for breast cancer detection and diagnosis
[ { "docid": "0b6a3b143dfccd7ca9ea09f7fa5b5e8c", "text": "Cancer has been characterized as a heterogeneous disease consisting of many different subtypes. The early diagnosis and prognosis of a cancer type have become a necessity in cancer research, as it can facilitate the subsequent clinical management of patients. The importance of classifying cancer patients into high or low risk groups has led many research teams, from the biomedical and the bioinformatics field, to study the application of machine learning (ML) methods. Therefore, these techniques have been utilized as an aim to model the progression and treatment of cancerous conditions. In addition, the ability of ML tools to detect key features from complex datasets reveals their importance. A variety of these techniques, including Artificial Neural Networks (ANNs), Bayesian Networks (BNs), Support Vector Machines (SVMs) and Decision Trees (DTs) have been widely applied in cancer research for the development of predictive models, resulting in effective and accurate decision making. Even though it is evident that the use of ML methods can improve our understanding of cancer progression, an appropriate level of validation is needed in order for these methods to be considered in the everyday clinical practice. In this work, we present a review of recent ML approaches employed in the modeling of cancer progression. The predictive models discussed here are based on various supervised ML techniques as well as on different input features and data samples. Given the growing trend on the application of ML methods in cancer research, we present here the most recent publications that employ these techniques as an aim to model cancer risk or patient outcomes.", "title": "" } ]
[ { "docid": "2a4e5635e2c15ce8ed84e6e296c4bbf4", "text": "The games with a purpose paradigm proposed by Luis von Ahn [9] is a new approach for game design where useful but boring tasks, like labeling a random image found in the web, are packed within a game to make them entertaining. But there are not only large numbers of internet users that can be used as voluntary data producers but legions of mobile device owners, too. In this paper we describe the design of a location-based mobile game with a purpose: CityExplorer. The purpose of this game is to produce geospatial data that is useful for non-gaming applications like a location-based service. From the analysis of four use case studies of CityExplorer we report that such a purposeful game is entertaining and can produce rich geospatial data collections.", "title": "" }, { "docid": "4287db8deb3c4de5d7f2f5695c3e2e70", "text": "The brain is complex and dynamic. The spatial scales of interest to the neurobiologist range from individual synapses (approximately 1 microm) to neural circuits (centimeters); the timescales range from the flickering of channels (less than a millisecond) to long-term memory (years). Remarkably, fluorescence microscopy has the potential to revolutionize research on all of these spatial and temporal scales. Two-photon excitation (2PE) laser scanning microscopy allows high-resolution and high-sensitivity fluorescence microscopy in intact neural tissue, which is hostile to traditional forms of microscopy. Over the last 10 years, applications of 2PE, including microscopy and photostimulation, have contributed to our understanding of a broad array of neurobiological phenomena, including the dynamics of single channels in individual synapses and the functional organization of cortical maps. Here we review the principles of 2PE microscopy, highlight recent applications, discuss its limitations, and point to areas for future research and development.", "title": "" }, { "docid": "9b086872cad65b92237696ec3a48550f", "text": "Memory-augmented neural networks (MANNs) refer to a class of neural network models equipped with external memory (such as neural Turing machines and memory networks). These neural networks outperform conventional recurrent neural networks (RNNs) in terms of learning long-term dependency, allowing them to solve intriguing AI tasks that would otherwise be hard to address. This paper concerns the problem of quantizing MANNs. Quantization is known to be effective when we deploy deep models on embedded systems with limited resources. Furthermore, quantization can substantially reduce the energy consumption of the inference procedure. These benefits justify recent developments of quantized multilayer perceptrons, convolutional networks, and RNNs. However, no prior work has reported the successful quantization of MANNs. The in-depth analysis presented here reveals various challenges that do not appear in the quantization of the other networks. Without addressing them properly, quantized MANNs would normally suffer from excessive quantization error which leads to degraded performance. In this paper, we identify memory addressing (specifically, content-based addressing) as the main reason for the performance degradation and propose a robust quantization method for MANNs to address the challenge. In our experiments, we achieved a computation-energy gain of 22× with 8-bit fixed-point and binary quantization compared to the floating-point implementation. Measured on the bAbI dataset, the resulting model, named the quantized MANN (Q-MANN), improved the error rate by 46% and 30% with 8-bit fixed-point and binary quantization, respectively, compared to the MANN quantized using conventional techniques.", "title": "" }, { "docid": "e4893b639d75a6650756927d36fa37f8", "text": "BACKGROUND\nThe length of stay (LOS) is an important indicator of the efficiency of hospital management. Reduction in the number of inpatient days results in decreased risk of infection and medication side effects, improvement in the quality of treatment, and increased hospital profit with more efficient bed management. The purpose of this study was to determine which factors are associated with length of hospital stay, based on electronic health records, in order to manage hospital stay more efficiently.\n\n\nMATERIALS AND METHODS\nResearch subjects were retrieved from a database of patients admitted to a tertiary general university hospital in South Korea between January and December 2013. Patients were analyzed according to the following three categories: descriptive and exploratory analysis, process pattern analysis using process mining techniques, and statistical analysis and prediction of LOS.\n\n\nRESULTS\nOverall, 55% (25,228) of inpatients were discharged within 4 days. The department of rehabilitation medicine (RH) had the highest average LOS at 15.9 days. Of all the conditions diagnosed over 250 times, diagnoses of I63.8 (cerebral infarction, middle cerebral artery), I63.9 (infarction of middle cerebral artery territory) and I21.9 (myocardial infarction) were associated with the longest average hospital stay and high standard deviation. Patients with these conditions were also more likely to be transferred to the RH department for rehabilitation. A range of variables, such as transfer, discharge delay time, operation frequency, frequency of diagnosis, severity, bed grade, and insurance type was significantly correlated with the LOS.\n\n\nCONCLUSIONS\nAccurate understanding of the factors associating with the LOS and progressive improvements in processing and monitoring may allow more efficient management of the LOS of inpatients.", "title": "" }, { "docid": "9e2f1e5f74fbb856f4d6196203d4c23c", "text": "This paper summarises the experiences of UNICEF India in tackling the problem of high fluoride content in rural drinking water supply sources, using household-based defluoridation filter using activated alumina. Since 1991, UNICEF supported the research work for development of the technology by the Department of Chemistry, Indian Institute of Technology (IIT), Kanpur. This resulted in pilot projects on Domestic Defluoridation Units in the states of Andhra Pradesh and Rajasthan during 1996-2002. Gradually a demand for these filters has grown and the private sector is gradually becoming interested.", "title": "" }, { "docid": "980ad058a2856048765f497683557386", "text": "Hierarchical reinforcement learning (HRL) has recently shown promising advances on speeding up learning, improving the exploration, and discovering intertask transferable skills. Most recent works focus on HRL with two levels, i.e., a master policy manipulates subpolicies, which in turn manipulate primitive actions. However, HRL with multiple levels is usually needed in many real-world scenarios, whose ultimate goals are highly abstract, while their actions are very primitive. Therefore, in this paper, we propose a diversity-driven extensible HRL (DEHRL), where an extensible and scalable framework is built and learned levelwise to realize HRL with multiple levels. DEHRL follows a popular assumption: diverse subpolicies are useful, i.e., subpolicies are believed to be more useful if they are more diverse. However, existing implementations of this diversity assumption usually have their own drawbacks, which makes them inapplicable to HRL with multiple levels. Consequently, we further propose a novel diversity-driven solution to achieve this assumption in DEHRL. Experimental studies evaluate DEHRL with five baselines from four perspectives in two domains; the results show that DEHRL outperforms the state-of-the-art baselines in all four aspects.", "title": "" }, { "docid": "a249375471d58592f1911f2a285aa945", "text": "The existing state-of-the-art in the field of intrusion detection systems (IDSs) generally involves some use of machine learning algorithms. However, the computer security community is growing increasingly aware that a sophisticated adversary could target the learning module of these IDSs in order to circumvent future detections. Consequently, going forward, robustness of machine-learning based IDSs against adversarial manipulation (i.e., poisoning) will be the key factor for the overall success of these systems in the real world. In our work, we focus on adaptive IDSs that use anomaly-based detection to identify malicious activities in an information system. To be able to evaluate the susceptibility of these IDSs to deliberate adversarial poisoning, we have developed a novel framework for their performance testing under adversarial contamination. We have also studied the viability of using deep autoencoders in the detection of anomalies in adaptive IDSs, as well as their overall robustness against adversarial poisoning. Our experimental results show that our proposed autoencoder-based IDS outperforms a generic PCA-based counterpart by more than 15% in terms of detection accuracy. The obtained results concerning the detection ability of the deep autoencoder IDS under adversarial contamination, compared to that of the PCA-based IDS, are also encouraging, with the deep autoencoder IDS maintaining a more stable detection in parallel to limiting the contamination of its training dataset to just bellow 2%.", "title": "" }, { "docid": "6a6191695c948200658ad6020f21f203", "text": "Given a random pair of images, an arbitrary style transfer method extracts the feel from the reference image to synthesize an output based on the look of the other content image. Recent arbitrary style transfer methods transfer second order statistics from reference image onto content image via a multiplication between content image features and a transformation matrix, which is computed from features with a pre-determined algorithm. These algorithms either require computationally expensive operations, or fail to model the feature covariance and produce artifacts in synthesized images. Generalized from these methods, in this work, we derive the form of transformation matrix theoretically and present an arbitrary style transfer approach that learns the transformation matrix with a feed-forward network. Our algorithm is highly efficient yet allows a flexible combination of multi-level styles while preserving content affinity during style transfer process. We demonstrate the effectiveness of our approach on four tasks: artistic style transfer, video and photo-realistic style transfer as well as domain adaptation, including comparisons with the stateof-the-art methods.", "title": "" }, { "docid": "c23976667414fd4786ac1d71363ee04d", "text": "More and more sensitive information is transmitted and stored in computer networks. Security has become a critical issue. As traditional cryptographic systems are now vulnerable to attacks, DNA based cryptography has been identified as a promising technology because of the vast parallelism and extraordinary information density. While a body of research has proposed the DNA based encryption algorithm, no research has provided solutions to distribute complex and long secure keys. This paper introduces a Hamming code and a block cipher mechanism to ensure secure transmission of a secure key. The research overcomes the limitation on the length of the secure key represented by DNA strands. Therefore it proves that real biological DNA strands are useful for encryption computing. To evaluate our method, we apply the block cipher mechanism to optimize a DNA-based implementation of a conventional symmetric encryption algorithm, described as “yet another encryption algorithm”. Moreover, a maximum length matching algorithm is developed to provide immunity against frequency attacks.", "title": "" }, { "docid": "e5048285c2616e9bfb28accd91629187", "text": "Hidden Markov Models (HMMs) are learning methods for pattern recognition. The probabilistic HMMs have been one of the most used techniques based on the Bayesian model. First-order probabilistic HMMs were adapted to the theory of belief functions such that Bayesian probabilities were replaced with mass functions. In this paper, we present a second-order Hidden Markov Model using belief functions. Previous works in belief HMMs have been focused on the first-order HMMs. We extend them to the second-order model.", "title": "" }, { "docid": "309e020e38f4a9286cef5aaba33a78a5", "text": "Brain-machine interface (BMI) systems convert neural signals from motor regions of the brain into control signals to guide prosthetic devices. The ultimate goal of BMIs is to improve the quality of life for people with paralysis by providing direct neural control of prosthetic arms or computer cursors. While considerable research over the past 15 years has led to compelling BMI demonstrations, there remain several challenges to achieving clinically viable BMI systems. In this review, we focus on the challenge of increasing BMI performance and robustness. We review and highlight key aspects of intracortical BMI decoder design, which is central to the conversion of neural signals into prosthetic control signals, and discuss emerging opportunities to improve intracortical BMI decoders. This is one of the primary research opportunities where information systems engineering can directly impact the future success of BMIs.", "title": "" }, { "docid": "1cf5ffbd1929b1d6d475cdfabeb9bf2a", "text": "In this paper we concern ourselves with the problem of minimizing leakage power in CMOS circuits consisting of AOI (and-or-invert) gates as they operate in stand-by mode or an idle mode waiting for other circuits to complete their operation. It is known that leakage power due to subthreshold leakage current in transistors in the OFF state is dependent on the input vector applied. Therefore, we try to compute an input vector that can be applied to the circuit in stand-by mode so that the power loss due to sub-threshold leakage current is the minimum possible. We employ a integer linear programming (ILP) approach to solve the problem of minimizing leakage by first obtaining a good lower bound (estimate) on the minimum leakage power and then rounding the solution to actually obtain an input vector that causes low leakage. The chief advantage of this technique as opposed to others in the literature is that it invariably provides us with a good idea about the quality of the input vector found.", "title": "" }, { "docid": "a575c136fa021d7efe1f00ebdaf12740", "text": "Most works in automatic music generation have addressed so far specific tasks. Such a reductionist approach has been extremely successful and some of these tasks have been solved once and for all. However, few works have addressed the issue of generating automatically fully fledged music material, of human-level quality. In this article, we report on a specific experiment in holistic music generation: the reorchestration of Beethoven’s Ode to Joy, the European anthem, in seven styles. These reorchestrations were produced with algorithms developed in the Flow Machines project and within a short time frame. We stress the benefits of having had such a challenging and unifying goal, and the interesting problems and challenges it raised along the way.", "title": "" }, { "docid": "050dd71858325edd4c1a42fc1a25de95", "text": "This paper presents Disco, a prototype for supporting knowledge workers in exploring, reviewing and sorting collections of textual data. The goal is to facilitate, accelerate and improve the discovery of information. To this end, it combines Semantic Relatedness techniques with a review workflow developed in a tangible environment. Disco uses a semantic model that is leveraged on-line in the course of search sessions, and accessed through natural hand-gesture, in a simple and intuitive way.", "title": "" }, { "docid": "e173580f0dd327c78fd0b16b234112a1", "text": "Multi-view data is very popular in real-world applications, as different view-points and various types of sensors help to better represent data when fused across views or modalities. Samples from different views of the same class are less similar than those with the same view but different class. We consider a more general case that prior view information of testing data is inaccessible in multi-view learning. Traditional multi-view learning algorithms were designed to obtain multiple view-specific linear projections and would fail without this prior information available. That was because they assumed the probe and gallery views were known in advance, so the correct view-specific projections were to be applied in order to better learn low-dimensional features. To address this, we propose a Low-Rank Common Subspace (LRCS) for multi-view data analysis, which seeks a common low-rank linear projection to mitigate the semantic gap among different views. The low-rank common projection is able to capture compatible intrinsic information across different views and also well-align the within-class samples from different views. Furthermore, with a low-rank constraint on the view-specific projected data and that transformed by the common subspace, the within-class samples from multiple views would concentrate together. Different from the traditional supervised multi-view algorithms, our LRCS works in a weakly supervised way, where only the view information gets observed. Such a common projection can make our model more flexible when dealing with the problem of lacking prior view information of testing data. Two scenarios of experiments, robust subspace learning and transfer learning, are conducted to evaluate our algorithm. Experimental results on several multi-view datasets reveal that our proposed method outperforms state-of-the-art, even when compared with some supervised learning methods.", "title": "" }, { "docid": "929640bc4813841f1a220e31da3bd631", "text": "In this paper, a U-slot rectangular microstrip patch antenna is designed in order to overcome the narrowband characteristic and gain broader band. The antenna has dual-band characteristics, so it has wider operating bandwidth. The antenna works at Ku-band and the center frequency is 16GHz. The characteristics are analyzed and optimized with Ansoft HFSS, the simulation results show that the absolute bandwidth and gain of the antenna unit are 2.7GHz and 8.1dB, and of the antenna array are 3.1GHz and 14.4dB. The relative bandwidth reaches to 19.4%, which is much wider than the general bandwidth of about 1% to 7%.", "title": "" }, { "docid": "797166b4c68bcdc7a8860462117e2051", "text": "In this paper we propose a novel feature descriptor Extended Co-occurrence HOG (ECoHOG) and integrate it with dense point trajectories demonstrating its usefulness in fine grained activity recognition. This feature is inspired by original Co-occurrence HOG (CoHOG) that is based on histograms of occurrences of pairs of image gradients in the image. Instead relying only on pure histograms we introduce a sum of gradient magnitudes of co-occurring pairs of image gradients in the image. This results in giving the importance to the object boundaries and straightening the difference between the moving foreground and static background. We also couple ECoHOG with dense point trajectories extracted using optical flow from video sequences and demonstrate that they are extremely well suited for fine grained activity recognition. Using our feature we outperform state of the art methods in this task and provide extensive quantitative evaluation.", "title": "" }, { "docid": "15b26ceb3a81f4af6233ab8a36f66d3f", "text": "The number of web images has been explosively growing due to the development of network and storage technology. These images make up a large amount of current multimedia data and are closely related to our daily life. To efficiently browse, retrieve and organize the web images, numerous approaches have been proposed. Since the semantic concepts of the images can be indicated by label information, automatic image annotation becomes one effective technique for image management tasks. Most existing annotation methods use image features that are often noisy and redundant. Hence, feature selection can be exploited for a more precise and compact representation of the images, thus improving the annotation performance. In this paper, we propose a novel feature selection method and apply it to automatic image annotation. There are two appealing properties of our method. First, it can jointly select the most relevant features from all the data points by using a sparsity-based model. Second, it can uncover the shared subspace of original features, which is beneficial for multi-label learning. To solve the objective function of our method, we propose an efficient iterative algorithm. Extensive experiments are performed on large image databases that are collected from the web. The experimental results together with the theoretical analysis have validated the effectiveness of our method for feature selection, thus demonstrating its feasibility of being applied to web image annotation.", "title": "" }, { "docid": "820f67fa3521ee4af7da0e022a8d0be3", "text": "The visual appearance of rain is highly complex. Unlike the particles that cause other weather conditions such as haze and fog, rain drops are large and visible to the naked eye. Each drop refracts and reflects both scene radiance and environmental illumination towards an observer. As a result, a spatially distributed ensemble of drops moving at high velocities (rain) produces complex spatial and temporal intensity fluctuations in images and videos. To analyze the effects of rain, it is essential to understand the visual appearance of a single rain drop. In this paper, we develop geometric and photometric models for the refraction through, and reflection (both specular and internal) from, a rain drop. Our geometric and photometric models show that each rain drop behaves like a wide-angle lens that redirects light from a large field of view towards the observer. From this, we observe that in spite of being a transparent object, the brightness of the drop does not depend strongly on the brightness of the background. Our models provide the fundamental tools to analyze the complex effects of rain. Thus, we believe our work has implications for vision in bad weather as well as for efficient rendering of rain in computer graphics.", "title": "" } ]
scidocsrr
b90e8bd7d85f80f775164813f51dba3b
Learning To Use Formulas To Solve Simple Arithmetic Problems
[ { "docid": "5a46d347e83aec7624dde84ecdd5302c", "text": "This paper presents a new algorithm to automatically solve algebra word problems. Our algorithm solves a word problem via analyzing a hypothesis space containing all possible equation systems generated by assigning the numbers in the word problem into a set of equation system templates extracted from the training data. To obtain a robust decision surface, we train a log-linear model to make the margin between the correct assignments and the false ones as large as possible. This results in a quadratic programming (QP) problem which can be efficiently solved. Experimental results show that our algorithm achieves 79.7% accuracy, about 10% higher than the state-of-the-art baseline (Kushman et al., 2014).", "title": "" }, { "docid": "fa6f272026605bddf1b18c8f8234dba6", "text": "tion can machines think? by replacing it with another, namely can a machine pass the imitation game (the Turing test). In the years since, this test has been criticized as being a poor replacement for the original enquiry (for example, Hayes and Ford [1995]), which raises the question: what would a better replacement be? In this article, we argue that standardized tests are an effective and practical assessment of many aspects of machine intelligence, and should be part of any comprehensive measure of AI progress. While a crisp definition of machine intelligence remains elusive, we can enumerate some general properties we might expect of an intelligent machine. The list is potentially long (for example, Legg and Hutter [2007]), but should at least include the ability to (1) answer a wide variety of questions, (2) answer complex questions, (3) demonstrate commonsense and world knowledge, and (4) acquire new knowledge scalably. In addition, a suitable test should be clearly measurable, graduated (have a variety of levels of difficulty), not gameable, ambitious but realistic, and motivating. There are many other requirements we might add (for example, capabilities in robotics, vision, dialog), and thus any comprehensive measure of AI is likely to require a battery of different tests. However, standardized tests meet a surprising number of requirements, including the four listed, and thus should be a key component of a future battery of tests. As we will show, the tests require answering a wide variety of questions, including those requiring commonsense and world knowledge. In addition, they meet all the practical requirements, a huge advantage for any component of a future test of AI. Articles", "title": "" }, { "docid": "ceb0a6ed0dd50b0a9f2973674f23f3bd", "text": "This paper presents a semantic parsing and reasoning approach to automatically solving math word problems. A new meaning representation language is designed to bridge natural language text and math expressions. A CFG parser is implemented based on 9,600 semi-automatically created grammar rules. We conduct experiments on a test set of over 1,500 number word problems (i.e., verbally expressed number problems) and yield 95.4% precision and 60.2% recall.", "title": "" }, { "docid": "2bb78e27f9546b938caf8be04f1a8b99", "text": "While there has been an explosion of impressive, datadriven AI applications in recent years, machines still largely lack a deeper understanding of the world to answer questions that go beyond information explicitly stated in text, and to explain and discuss those answers. To reach this next generation of AI applications, it is imperative to make faster progress in areas of knowledge, modeling, reasoning, and language. Standardized tests have often been proposed as a driver for such progress, with good reason: Many of the questions require sophisticated understanding of both language and the world, pushing the boundaries of AI, while other questions are easier, supporting incremental progress. In Project Aristo at the Allen Institute for AI, we are working on a specific version of this challenge, namely having the computer pass Elementary School Science and Math exams. Even at this level there is a rich variety of problems and question types, the most difficult requiring significant progress in AI. Here we propose this task as a challenge problem for the community, and are providing supporting datasets. Solutions to many of these problems would have a major impact on the field so we encourage you: Take the Aristo Challenge!", "title": "" } ]
[ { "docid": "feca1bd8b881f3d550f0f0912913081f", "text": "There is an ever-increasing interest in the development of automatic medical diagnosis systems due to the advancement in computing technology and also to improve the service by medical community. The knowledge about health and disease is required for reliable and accurate medical diagnosis. Diabetic Retinopathy (DR) is one of the most common causes of blindness and it can be prevented if detected and treated early. DR has different signs and the most distinctive are microaneurysm and haemorrhage which are dark lesions and hard exudates and cotton wool spots which are bright lesions. Location and structure of blood vessels and optic disk play important role in accurate detection and classification of dark and bright lesions for early detection of DR. In this article, we propose a computer aided system for the early detection of DR. The article presents algorithms for retinal image preprocessing, blood vessel enhancement and segmentation and optic disk localization and detection which eventually lead to detection of different DR lesions using proposed hybrid fuzzy classifier. The developed methods are tested on four different publicly available databases. The presented methods are compared with recently published methods and the results show that presented methods outperform all others.", "title": "" }, { "docid": "d4f47babcd5840a3f2b5614244835c94", "text": "This paper presents new in-line pseudoelliptic bandpass filters with nonresonating nodes. Microwave bandpass filters based on dual- and triple-mode cavities are introduced. In each case, the transmission zeros (TZs) are individually generated and controlled by dedicated resonators. Dual- and triple-mode cavities are kept homogeneous and contain no coupling or tuning elements. A third-order filter with a TZ extracted at its center is designed by cascading two dual-mode cavities. A direct design technique of this filter is introduced and shown to produce accurate initial designs for narrow-band cases. A six-pole filter is designed by cascading two triple-mode cavities. Measured results are presented to demonstrate the validity of this novel approach.", "title": "" }, { "docid": "290ded425fe91bb0898a0e2fd815d575", "text": "We introduce the concept of the point cloud database, a new kind of database system aimed primarily towards scientific applications. Many scientific observations, experiments, feature extraction algorithms and large-scale simulations produce enormous amounts of data that are better represented as sparse (but often highly-clustered) points in a k-dimensional (k ≲ 10) metric space than on a multi-dimensional grid. Dimensionality reduction techniques, such as principal components, are also widely-used to project high dimensional data into similarly low dimensional spaces. Analysis techniques developed to work on multi-dimensional data points are usually implemented as in-memory algorithms and need to be modified to work in distributed cluster environments and on large amounts of disk-resident data. We conclude that the relational model, with certain additions, is appropriate for point clouds, but point cloud databases must also provide unique set of spatial search and proximity join operators, indexing schemes, and query language constructs that make them a distinct class of database systems.", "title": "" }, { "docid": "9d2da629538fa901677c6b646b5f2cf6", "text": "We present a new implementation of the Floyd-Warshall AllPairs Shortest Paths algorithm on CUDA. Our algorithm runs approximately 5 times faster than the previously best reported algorithm. In order to achieve this speedup, we applied a new technique to reduce usage of on-chip shared memory and allow the CUDA scheduler to more effectively hide instruction latency.", "title": "" }, { "docid": "1a65b9d35bce45abeefe66882dcf4448", "text": "Data is nowadays an invaluable resource, indeed it guides all business decisions in most of the computer-aided human activities. Threats to data integrity are thus of paramount relevance, as tampering with data may maliciously affect crucial business decisions. This issue is especially true in cloud computing environments, where data owners cannot control fundamental data aspects, like the physical storage of data and the control of its accesses. Blockchain has recently emerged as a fascinating technology which, among others, provides compelling properties about data integrity. Using the blockchain to face data integrity threats seems to be a natural choice, but its current limitations of low throughput, high latency, and weak stability hinder the practical feasibility of any blockchain-based solutions. In this paper, by focusing on a case study from the European SUNFISH project, which concerns the design of a secure by-design cloud federation platform for the public sector, we precisely delineate the actual data integrity needs of cloud computing environments and the research questions to be tackled to adopt blockchain-based databases. First, we detail the open research questions and the difficulties inherent in addressing them. Then, we outline a preliminary design of an effective blockchain-based database for cloud computing environments.", "title": "" }, { "docid": "b939227b7de6ef57c2d236fcb01b7bfc", "text": "We propose a speed estimation method with human body accelerations measured on the chest by a tri-axial accelerometer. To estimate the speed we segmented the acceleration signal into strides measuring stride time, and applied two neural networks into the patterns parameterized from each stride calculating stride length. The first neural network determines whether the subject walks or runs, and the second neural network with different node interactions according to the subject's status estimates stride length. Walking or running speed is calculated with the estimated stride length divided by the measured stride time. The neural networks were trained by patterns obtained from 15 subjects and then validated by 2 untrained subjects' patterns. The result shows good agreement between actual and estimated speeds presenting the linear correlation coefficient r = 0.9874. We also applied the method to the real field and track data.", "title": "" }, { "docid": "b1ece089b64d5cca3fcdf875ebf589d1", "text": "This study investigated sex differences in young children's spatial skill. The authors developed a spatial transformation task, which showed a substantial male advantage by age 4 years 6 months. The size of this advantage was no more robust for rotation items than for translation items. This finding contrasts with studies of older children and adults, which report that sex differences are largest on mental rotation tasks. Comparable performance of boys and girls on a vocabulary task indicated that the male advantage on the spatial task was not attributable to an overall intellectual advantage of boys in the sample.", "title": "" }, { "docid": "643599f9b0dcfd270f9f3c55567ed985", "text": "OBJECTIVES\nTo describe a new first-trimester sonographic landmark, the retronasal triangle, which may be useful in the early screening for cleft palate.\n\n\nMETHODS\nThe retronasal triangle, i.e. the three echogenic lines formed by the two frontal processes of the maxilla and the palate visualized in the coronal view of the fetal face posterior to the nose, was evaluated prospectively in 100 consecutive normal fetuses at the time of routine first-trimester sonographic screening at 11 + 0 to 13 + 6 weeks' gestation. In a separate study of five fetuses confirmed postnatally as having a cleft palate, ultrasound images, including multiplanar three-dimensional views, were analyzed retrospectively to review the retronasal triangle.\n\n\nRESULTS\nNone of the fetuses evaluated prospectively was affected by cleft lip and palate. During their first-trimester scan, the retronasal triangle could not be identified in only two fetuses. Reasons for suboptimal visualization of this area included early gestational age at scanning (11 weeks) and persistent posterior position of the fetal face. Of the five cases with postnatal diagnosis of cleft palate, an abnormal configuration of the retronasal triangle was documented in all cases on analysis of digitally stored three-dimensional volumes.\n\n\nCONCLUSIONS\nThis study demonstrates the feasibility of incorporating evaluation of the retronasal triangle into the routine evaluation of the fetal anatomy at 11 + 0 to 13 + 6 weeks' gestation. Because fetuses with cleft palate have an abnormal configuration of the retronasal triangle, focused examination of the midface, looking for this area at the time of the nuchal translucency scan, may facilitate the early detection of cleft palate in the first trimester.", "title": "" }, { "docid": "4bdfc78c5a6b960a012d8d87c9bc182e", "text": "The purpose of our article is to evaluate wood as a construction material in terms of the energy required for its construction and operation, compared to other types of construction materials. First, the role of construction and material manufacturing is evaluated within the full life cycle energy and CO2 emissions of a building, concluding that the issue of embodied energy justifi es the use of less energy intensive materials. Then the article reviews the literature dealing with the energy requirements of wood based construction, in order to establish whether the use of this natural, low density construction material is more energy effi cient than using brick, reinforced concrete and steel structures. According to our analysis, the vast majority of the studies found that the embodied energy is signifi cantly lower in wood based construction when compared to inorganic materials. According to several authors, wood construction could save much energy and signifi cantly reduce the emissions related to the building sector on the national level. Carbon sequestration, and the related mitigation of the global climate change effect, can be signifi cant if the share of durable wooden buildings can be increased in the market, using sustainably produced raw materials that are handled responsibly at the end of their lifetime. Some confl icting studies make important points concerning the heat storage, recycling and on-site labour demands related to these structures. These sources contribute to a deeper understanding of the issue, but do not alter the basic conclusions concerning the benefi ts of wood based construction. Some important aspects of wood extraction, manufacturing and construction that can help minimising the embodied energy of wood based structures are also discussed in the study.", "title": "" }, { "docid": "1339549c6e013e6e573fc5bdbe077d12", "text": "Auction-style pricing policies can effectively reflect the underlying trends in demand and supply for the cloud resources, and thereby attracted a research interest recently. In particular, a desirable cloud auction design should be (1) online to timely reflect the fluctuation of supply-demand relations, (2) expressive to support the heterogeneous user demands, and (3) truthful to discourage users from cheating behaviors. Meeting these requirements simultaneously is non-trivial, and most existing auction mechanism designs do not directly apply. To meet these goals, this paper conducts the first work on a framework for truthful online cloud auctions where users with heterogeneous demands could come and leave on the fly. Concretely speaking, we first design a novel bidding language, wherein users' heterogeneous requirement on their desired allocation time, application type, and even how they value among different possible allocations can be flexibly and concisely expressed. Besides, building on top of our bidding language we propose COCA, an incentive-Compatible (truthful) Online Cloud Auction mechanism. To ensure truthfulness with heterogenous and online user demand, the design of COCA is driven by a monotonic payment rule and a utility-maximizing allocation rule. Moreover, our theoretical analysis shows that the worst-case performance of COCA can be well-bounded, and our further discussion shows that COCA performs well when some other important factors in online auction design are taken into consideration. Finally, in simulations the performance of COCA is seen to be comparable to the well-known off-line Vickrey-Clarke-Groves (VCG) mechanism [19].", "title": "" }, { "docid": "bdd56cd8b9ec6dcdc6ff87fa5bed80ac", "text": "The battery is a fundamental component of electric vehicles, which represent a step forward towards sustainable mobility. Lithium chemistry is now acknowledged as the technology of choice for energy storage in electric vehicles. However, several research points are still open. They include the best choice of the cell materials and the development of electronic circuits and algorithms for a more effective battery utilization. This paper initially reviews the most interesting modeling approaches for predicting the battery performance and discusses the demanding requirements and standards that apply to ICs and systems for battery management. Then, a general and flexible architecture for battery management implementation and the main techniques for state-of-charge estimation and charge balancing are reported. Finally, we describe the design and implementation of an innovative BMS, which incorporates an almost fully-integrated active charge equalizer.", "title": "" }, { "docid": "e0f4670762f2df2b6e9af3d86ec62e2b", "text": "We address the task of pixel-level hand detection in the context of ego-centric cameras. Extracting hand regions in ego-centric videos is a critical step for understanding hand-object manipulation and analyzing hand-eye coordination. However, in contrast to traditional applications of hand detection, such as gesture interfaces or sign-language recognition, ego-centric videos present new challenges such as rapid changes in illuminations, significant camera motion and complex hand-object manipulations. To quantify the challenges and performance in this new domain, we present a fully labeled indoor/outdoor ego-centric hand detection benchmark dataset containing over 200 million labeled pixels, which contains hand images taken under various illumination conditions. Using both our dataset and a publicly available ego-centric indoors dataset, we give extensive analysis of detection performance using a wide range of local appearance features. Our analysis highlights the effectiveness of sparse features and the importance of modeling global illumination. We propose a modeling strategy based on our findings and show that our model outperforms several baseline approaches.", "title": "" }, { "docid": "0e45e57b4e799ebf7e8b55feded7e9e1", "text": "IMPORTANCE\nIt is increasingly evident that Parkinson disease (PD) is not a single entity but rather a heterogeneous neurodegenerative disorder.\n\n\nOBJECTIVE\nTo evaluate available evidence, based on findings from clinical, imaging, genetic and pathologic studies, supporting the differentiation of PD into subtypes.\n\n\nEVIDENCE REVIEW\nWe performed a systematic review of articles cited in PubMed between 1980 and 2013 using the following search terms: Parkinson disease, parkinsonism, tremor, postural instability and gait difficulty, and Parkinson disease subtypes. The final reference list was generated on the basis of originality and relevance to the broad scope of this review.\n\n\nFINDINGS\nSeveral subtypes, such as tremor-dominant PD and postural instability gait difficulty form of PD, have been found to cluster together. Other subtypes also have been identified, but validation by subtype-specific biomarkers is still lacking.\n\n\nCONCLUSIONS AND RELEVANCE\nSeveral PD subtypes have been identified, but the pathogenic mechanisms underlying the observed clinicopathologic heterogeneity in PD are still not well understood. Further research into subtype-specific diagnostic and prognostic biomarkers may provide insights into mechanisms of neurodegeneration and improve epidemiologic and therapeutic clinical trial designs.", "title": "" }, { "docid": "f05f4c731c6ae024026dbde007bf5b38", "text": "While the first two functions are essential to switching power supplies, the latter has universal applications. Mixed-signal circuits, for instance, typically incur clock-synchronized load-current events that are faster than any active power supply circuit can supply, and do so while only surviving small variations in voltage. The result of these transient current excursions is noisy voltages, be they supply lines or data links. Capacitors are used to mitigate these effects, to supply and/or shunt the transient currents the power supply circuit is not quick enough to deliver, which is why a typical high performance system is sprinkled with many nanoand micro-Farad capacitors.", "title": "" }, { "docid": "b4b66392aec0c4e00eb6b1cabbe22499", "text": "ADJ: Adjectives that occur with the NP CMC: Orthographic features of the NP CPL: Phrases that occur with the NP VERB: Verbs that appear with the NP Task: Predict whether a noun phrase (NP) belongs to a category (e.g. “city”) Category # Examples animal 20,733 beverage 18,932 bird 19,263 bodypart 21,840 city 21,778 disease 21,827 drug 20,452 fish 19,162 food 19,566 fruit 18,911 muscle 21,606 person 21,700 protein 21,811 river 21,723 vegetable 18,826", "title": "" }, { "docid": "19eec7fce652aa9d8299c71b0a8e8bec", "text": "To the Editor: Health care professionals have expressed concerns about the quality and veracity of information individuals receive from Internet-based sources. One area of controversy is the use of Internet sites to communicate information on immunization. YouTube is a video-sharing Internet Web site created in 2005 that provides free video streaming. It allows users to share multimedia clips that contain information related to the risks and benefits of immunization. To our knowledge, no studies have examined the content of these videos. We conducted a descriptive study to characterize the available information about immunization on YouTube. Methods. On February 20, 2007, we searched YouTube (www.youtube.com) using the keywords vaccination and immunization. We included all unique videos with Englishlanguage content that contained any message about human immunization. We extracted information on the type of video, clip length, and scientific claims made by the video. We measured the users’ interaction with these videos using view counts and the viewer reviews indicated by the starrating system from 1 star (poor) to 5 stars (awesome). Videos were categorized as negative if the main message of the video portrayed immunization negatively (eg, emphasized the risk of immunization, advocated against immunizing, promoted distrust in vaccine science, made allegations of conspiracy or collusion between supporters of vaccination and manufacturers). Videos were categorized as positive if the central message supported immunization, portraying it positively (eg, described the benefits and safety of immunizing, described immunization as a social good, or encouraged people to receive immunizations). Positive videos were labeled as public service announcements if they were made by governmental agencies or nongovernmental organizations to provide information about immunization as a service to the public. Videos were categorized as ambiguous if they either contained a debate or were ambivalent (ie, a beneficial or social good was countered by negative experiences such as anxious parents and crying infants). The scientific claims made by the videos were classified as substantiated or unsubstantiated/contradicts using as a reference standard the 2006 Canadian Immunization Guide and its human papillomavirus (HPV) vaccine and thimerosal updates, which were the most current guidelines available at the time of the search. All videos were analyzed independently by 2 researchers (J.K. and V.P.G.) and disagreements were resolved by an arbitrator (K.W.). Results. We identified and analyzed 153 videos. The weighted statistic for agreement on classification of videos was 0.93. Seventy-three (48%) of the videos were positive, 49 (32%) were negative, and 31 (20%) were ambiguous (TABLE 1). Compared with positive videos, negative videos were more likely to receive a rating, and they had a higher mean star rating and more views. Among the positive videos, public service announcements received the lowest mean (SD) ratings (2.6 [1.6] stars) and the fewest views (median, 213; interquartile range, 114-409). The most commonly discussed vaccine topic was general childhood vaccines (38 videos [25% of the total]). The most commonly discussed specific vaccine was the HPV vaccine (36 videos [24% of the total]); 20 of these were positive, 4 of which were industrysponsored. Of the HPV vaccine-related videos, 24 specifically referred to Merck or Gardasil. Of the negative videos, 22 (45%) conveyed messages that contradicted the reference standard. None of the positive videos made scientific statements that contradicted the reference standard. TABLE 2 lists the 5 most frequent topics and the scientific claims made. Comment. Approximately half of the videos posted were not explicitly supportive of immunization, and information in negative videos often contradicted the reference standard. The video ratings and view counts suggest the presence of a community of YouTube users critical of immunization. Clinicians therefore need to be", "title": "" }, { "docid": "6ac202a4897d400a60b72dc660ead142", "text": "This paper proposes a simple yet highly accurate system for the recognition or unconstrained handwritten numerals. It starts with an examination of the basic characteristic loci (CL) features used along with a nearest neighbor classifier achieving a recognition rate of 90.5%. We then illustrate how the basic CL implementation can be extended and used in conjunction with a multilayer perception neural network classifier to increase the recognition rate to 98%. This proposed recognition system was tested on a totally unconstrained handwritten numeral database while training it with only 600 samples exclusive from the test set. An accuracy exceeding 98% is also expected if a larger training set is used. Lastly, to demonstrate the effectiveness of the system its performance is also compared to that of some other common recognition schemes. These systems use moment Invariants as features along with nearest neighbor classification schemes.", "title": "" }, { "docid": "562b8653722f9b2cce55a400ad415286", "text": "India is a land of different weather conditions and versatile soils. Every year Indian farmers are facing the problem of sudden rain in their areas without any correct weather forecast which leads to damage of the already grown crops. The second major problem pertaining to Indian farmers is the lack of sufficient knowledge about their soil. The soil forecasting of how the soil structure is changing day by day due to different weather condition and other external factors, and which crop will be optimally suited to be grown in such soil are some of the problems common to the farmers. This paper makes an attempt as an assessment in proposing the solution and at the same time develops a prototype of a device using IoT for the use of the farmers on Indian agricultural land. The solution proposed will have a centralized data server to analyze the data and report to the farmer the precautionary steps to be taken in advance for the safety of the crops. The solution proposed will have eco-friendly energy management through the solar plant and wind energy which make the IoT device more portable and at the same time makes implementable in any rural areas of India.", "title": "" }, { "docid": "510d755b31fc5ec908d5325b40f30078", "text": "This study tested a model of the development of incongruity-resolution and nonsense humor during adulthood. Subjects were 4,292 14- to 66-year-old Germans. Twenty jokes and cartoons representing structure-based humor categories of incongruity resolution and nonsense were rated for funniness and aversiveness. Humor structure preferences were also assessed with a direct comparison task. The results generally confirmed the hypotheses. Incongruity-resolution humor increased in funniness and nonsense humor decreased in funniness among progressively older subjects after the late teens. Aversiveness of both forms of humor generally decreased over the ages sampled. Age differences in humor appreciation were strongly correlated with age differences in conservatism. An especially strong parallel was found between age differences in appreciation of incongruity-resolution humor and age differences in conservatism.", "title": "" }, { "docid": "84b018fa45e06755746309014854bb9a", "text": "For years, ontologies have been known in computer science as consensual models of domains of discourse, usually implemented as formal definitions of the relevant conceptual entities. Researchers have written much about the potential benefits of using them, and most of us regard ontologies as central building blocks of the semantic Web and other semantic systems. Unfortunately, the number and quality of actual, \"non-toy\" ontologies available on the Web today is remarkably low. This implies that the semantic Web community has yet to build practically useful ontologies for a lot of relevant domains in order to make the semantic Web a reality. Theoretically minded advocates often assume that the lack of ontologies is because the \"stupid business people haven't realized ontologies' enormous benefits.\" As a liberal market economist, the author assumes that humans can generally figure out what's best for their well-being, at least in the long run, and that they act accordingly. In other words, the fact that people haven't yet created as many useful ontologies as the ontology research community would like might indicate either unresolved technical limitations or the existence of sound rationales for why individuals refrain from building them - or both. Indeed, several social and technical difficulties exist that put a brake on developing and eventually constrain the space of possible ontologies", "title": "" } ]
scidocsrr
3b6e4ee96e772aa285bb60aaef279662
Statistical binary patterns and post-competitive representation for pattern recognition
[ { "docid": "acf4f5fa5ae091b5e72869213deb643e", "text": "A key ingredient in the design of visual object classification systems is the identification of relevant class specific aspects while being robust to intra-class variations. While this is a necessity in order to generalize beyond a given set of training images, it is also a very difficult problem due to the high variability of visual appearance within each class. In the last years substantial performance gains on challenging benchmark datasets have been reported in the literature. This progress can be attributed to two developments: the design of highly discriminative and robust image features and the combination of multiple complementary features based on different aspects such as shape, color or texture. In this paper we study several models that aim at learning the correct weighting of different features from training data. These include multiple kernel learning as well as simple baseline methods. Furthermore we derive ensemble methods inspired by Boosting which are easily extendable to several multiclass setting. All methods are thoroughly evaluated on object classification datasets using a multitude of feature descriptors. The key results are that even very simple baseline methods, that are orders of magnitude faster than learning techniques are highly competitive with multiple kernel learning. Furthermore the Boosting type methods are found to produce consistently better results in all experiments. We provide insight of when combination methods can be expected to work and how the benefit of complementary features can be exploited most efficiently.", "title": "" }, { "docid": "7543a1640df29e6f4adef7c49a54fe2a", "text": "In this work, we investigate a new ranking method for principal component analysis (PCA). Instead of sorting the principal components in decreasing order of the corresponding eigenvalues, we propose the idea of using the discriminant weights given by separating hyperplanes to select among the principal components the most discriminant ones. The method is not restricted to any particular probability density function of the sample groups because it can be based on either a parametric or non-parametric separating hyperplane approach. In addition, the number of meaningful discriminant directions is not limited to the number of groups, providing additional information to understand group differences extracted from high-dimensional problems. To evaluate the discriminant principal components, separation tasks have been performed using face images and three different databases. Our experimental results have shown that the principal components selected by the separating hyperplanes allow robust reconstruction and interpretation of the data, as well as higher recognition rates using less linear features in situations where the differences between the sample groups are subtle and consequently most difficult for the standard and state-of-the-art PCA selection methods. 2009 Elsevier B.V. All rights reserved.", "title": "" } ]
[ { "docid": "edc0641b716b9538e86425047a1dd29a", "text": "A great deal of work has been published over the past decade on the application of neural networks to stockmarket trading. Individual researchers have developed their own techniques for designing and testing these neural networks, and this presents a difficulty when trying to learn lessons and compare results. This paper aims to present a methodology for designing robust mechanical trading systems using soft computing technologies, such as artificial neural networks. This methodology describes the key steps involved in creating a neural network for use in stockmarket trading, and places particular emphasis on designing these steps to suit the real-world constraints the neural network will eventually operate in. Such a common methodology brings with it a transparency and clarity that should ensure that previously published results are both reliable and reusable.", "title": "" }, { "docid": "2ac3946e06fd0c293f8a58274561239f", "text": "This work presents and experimentally evaluates novel POSFET (Piezoelectric Oxide Semiconductor Field Effect Transistor) devices based tactile sensing arrays. The arrays, primarily developed for the robotic applications, consist of 5 × 5 POSFET touch sensing devices or taxels. The POSFET touch sensing devices are developed by spin coating piezoelectric polymer P(VDF-TrFE) film on the gate area of MOS devices and polarizing the film in situ. To detect contact events, the taxels utilize the contact forces induced change in the polarization level (and hence change in the induced channel current) of piezoelectric polymer. Both, individual taxels and the array are designed to match spatio-temporal performance of the human fingertips. Experimental results demonstrate that the POSFET tactile sensing arrays presented here are able to detect complex dynamic contact events such as rolling of an object.", "title": "" }, { "docid": "21ad29105c4b6772b05156afd33ac145", "text": "High resolution Digital Surface Models (DSMs) produced from airborne laser-scanning or stereo satellite images provide a very useful source of information for automated 3D building reconstruction. In this paper an investigation is reported about extraction of 3D building models from high resolution DSMs and orthorectified images produced from Worldview-2 stereo satellite imagery. The focus is on the generation of 3D models of parametric building roofs, which is the basis for creating Level Of Detail 2 (LOD2) according to the CityGML standard. In particular the building blocks containing several connected buildings with tilted roofs are investigated and the potentials and limitations of the modeling approach are discussed. The edge information extracted from orthorectified image has been employed as additional source of information in 3D reconstruction algorithm. A model driven approach based on the analysis of the 3D points of DSMs in a 2D projection plane is proposed. Accordingly, a building block is divided into smaller parts according to the direction and number of existing ridge lines for parametric building reconstruction. The 3D model is derived for each building part, and finally, a complete parametric model is formed by merging the 3D models of the individual building parts and adjusting the nodes after the merging step. For the remaining building parts that do not contain ridge lines, a prismatic model using polygon approximation of the corresponding boundary pixels is derived and merged to the parametric models to shape the final model of the building. A qualitative and quantitative assessment of the proposed method for the automatic reconstruction of buildings with parametric roofs is then provided by comparing the final model with the existing surface model as well as some field measurements. Remote Sens. 2013, 5 1682", "title": "" }, { "docid": "29fb93c9d7858b855816d62c90e3c789", "text": "Systematic reviews, a cornerstone of evidence-based medicine, are not produced quickly enough to support clinical practice. The cost of production, availability of the requisite expertise and timeliness are often quoted as major contributors for the delay. This detailed survey of the state of the art of information systems designed to support or automate individual tasks in the systematic review, and in particular systematic reviews of randomized controlled clinical trials, reveals trends that see the convergence of several parallel research projects.We surveyed literature describing informatics systems that support or automate the processes of systematic review or each of the tasks of the systematic review. Several projects focus on automating, simplifying and/or streamlining specific tasks of the systematic review. Some tasks are already fully automated while others are still largely manual. In this review, we describe each task and the effect that its automation would have on the entire systematic review process, summarize the existing information system support for each task, and highlight where further research is needed for realizing automation for the task. Integration of the systems that automate systematic review tasks may lead to a revised systematic review workflow. We envisage the optimized workflow will lead to system in which each systematic review is described as a computer program that automatically retrieves relevant trials, appraises them, extracts and synthesizes data, evaluates the risk of bias, performs meta-analysis calculations, and produces a report in real time.", "title": "" }, { "docid": "115ebc84b27fbf2195dbf6a5b0eebac5", "text": "This paper presents an automatic system for fire detection in video sequences. There are several previous methods to detect fire, however, all except two use spectroscopy or particle sensors. The two that use visual information suffer from the inability to cope with a moving camera or a moving scene. One of these is not able to work on general data, such as movie sequences. The other is too simplistic and unrestrictive in determining what is considered fire; so that it can be used reliably only in aircraft dry bays. We propose a system that uses color and motion information computed from video sequences to locate fire. This is done by first using an approach that is based upon creating a Gaussian-smoothed color histogram to detect the fire-colored pixels, and then using a temporal variation of pixels to determine which of these pixels are actually fire pixels. Next, some spurious fire pixels are automatically removed using an erode operation, and some missing fire pixels are found using region growing method. Unlike the two previous vision-based methods for fire detection, our method is applicable to more areas because of its insensitivity to camera motion. Two specific applications not possible with previous algorithms are the recognition of fire in the presence of global camera motion or scene motion and the recognition of fire in movies for possible use in an automatic rating system. We show that our method works in a variety of conditions, and that it can automatically determine when it has insufficient information.", "title": "" }, { "docid": "fd543534d6a9cf10abb2f073cec41fdb", "text": "Article history: Available online 26 October 2012 We present an O ( √ n log n)-approximation algorithm for the problem of finding the sparsest spanner of a given directed graph G on n vertices. A spanner of a graph is a sparse subgraph that approximately preserves distances in the original graph. More precisely, given a graph G = (V , E) with nonnegative edge lengths d : E → R 0 and a stretch k 1, a subgraph H = (V , E H ) is a k-spanner of G if for every edge (s, t) ∈ E , the graph H contains a path from s to t of length at most k · d(s, t). The previous best approximation ratio was Õ (n2/3), due to Dinitz and Krauthgamer (STOC ’11). We also improve the approximation ratio for the important special case of directed 3-spanners with unit edge lengths from Õ ( √ n ) to O (n1/3 log n). The best previously known algorithms for this problem are due to Berman, Raskhodnikova and Ruan (FSTTCS ’10) and Dinitz and Krauthgamer. The approximation ratio of our algorithm almost matches Dinitz and Krauthgamer’s lower bound for the integrality gap of a natural linear programming relaxation. Our algorithm directly implies an O (n1/3 log n)-approximation for the 3-spanner problem on undirected graphs with unit lengths. An easy O ( √ n )-approximation algorithm for this problem has been the best known for decades. Finally, we consider the Directed Steiner Forest problem: given a directed graph with edge costs and a collection of ordered vertex pairs, find a minimum-cost subgraph that contains a path between every prescribed pair. We obtain an approximation ratio of O (n2/3+ ) for any constant > 0, which improves the O (n · min(n4/5,m2/3)) ratio due to Feldman, Kortsarz and Nutov (JCSS’12). © 2012 Elsevier Inc. All rights reserved.", "title": "" }, { "docid": "47ea90e34fc95a941bc127ad8ccd2ca9", "text": "The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time. In practice, timely dealing with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions—this in essence defines cyber threat intelligence notion. However, such an intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyse, and interpret cyber attack evidences. In this introductory chapter we first discuss the notion of cyber threat intelligence and its main challenges and opportunities, and then briefly introduce the chapters of the book which either address the identified challenges or present opportunistic solutions to provide threat intelligence.", "title": "" }, { "docid": "f4720df58360b726bf2a128547f6d9d1", "text": "Iris texture is commonly thought to be highly discriminative between eyes and stable over individual lifetime, which makes iris particularly suitable for personal identification. However, iris texture also contains more information related to genes, which has been demonstrated by successful use of ethnic and gender classification based on iris. In this paper, we propose a novel ethnic classification method based on supervised codebook optimizing and Locality-constrained Linear Coding (LLC). The optimized codebook is composed of codes which are distinctive or mutual. Iris images from Asian and non-Asian are classified into two classes in experiments. Extensive experimental results show that the proposed method achieves encouraging classification rate and largely improves the ethnic classification performance comparing to existing algorithms.", "title": "" }, { "docid": "72a01822f817e238812f9722629cf4dc", "text": "Machine learning is increasingly used in high impact applications such as prediction of hospital re-admission, cancer screening or bio-medical research applications. As predictions become increasingly accurate, practitioners may be interested in identifying actionable changes to inputs in order to alter their class membership. For example, a doctor might want to know what changes to a patient’s status would predict him/her to not be re-admitted to the hospital soon. Szegedy et al. (2013b) demonstrated that identifying such changes can be very hard in image classification tasks. In fact, tiny, imperceptible changes can result in completely different predictions without any change to the true class label of the input. In this paper we ask the question if we can make small but meaningful changes in order to truly alter the class membership of images from a source class to a target class. To this end we propose deep manifold traversal, a method that learns the manifold of natural images and provides an effective mechanism to move images from one area (dominated by the source class) to another (dominated by the target class).The resulting algorithm is surprisingly effective and versatile. It allows unrestricted movements along the image manifold and only requires few images from source and target to identify meaningful changes. We demonstrate that the exact same procedure can be used to change an individual’s appearance of age, facial expressions or even recolor black and white images.", "title": "" }, { "docid": "dc33e4c6352c885fb27e08fa1c310fb3", "text": "Association rule mining algorithm is used to extract relevant information from database and transmit into simple and easiest form. Association rule mining is used in large set of data. It is used for mining frequent item sets in the database or in data warehouse. It is also one type of data mining procedure. In this paper some of the association rule mining algorithms such as apriori, partition, FP-growth, genetic algorithm etc., can be analyzed for generating frequent itemset in an effective manner. These association rule mining algorithms may differ depend upon their performance and effective pattern generation. So, this paper may concentrate on some of the algorithms used to generate efficient frequent itemset using some of association rule mining algorithms.", "title": "" }, { "docid": "7b98376798289947db86b2dde815da61", "text": "This paper presents a new approach to design a sliding mode controller for a class of mismatched uncertain systems. A method is proposed for the design of a switching surface in the presence of mismatched uncertainties. A design method for a sliding mode observer based on high gain is also proposed in this paper to reconstruct the states of the system for the implementation of sliding mode control. The design technique is simple and computationally efficient. A control problem for the slosh-free motion of a container is considered as the representative of a typical class of systems. A simple pendulum model is considered to represent the lateral slosh. The validity of the proposed scheme is demonstrated by simulation along with the experimental results.", "title": "" }, { "docid": "b9ed2e2f3367dcd2d1dee3d313016609", "text": "OBJECTIVES\nTo describe the clinical characteristics and the role of chemotherapy in endodermal sinus tumor of the vagina.\n\n\nMETHOD\nTwo patients with endodermal sinus tumor of the vagina were presented focusing on the clinical manifestations and outcome of the chemotherapy.\n\n\nRESULTS\nPatient's age was quite young, 2 and 3 years old respectively. Vaginal bleeding and a polypoid and fragile tumor of the vagina were main clinical features. Elevated serum alpha-FP was found before chemotherapy and dropped dramatically to normal if the tumor was sensitive to chemotherapy. Diagnosis was made by pathology and alpha-FP immunohistochemical staining. Both two patient was well responded to cisplatin vincristine bleomycin (PVB) and cisplatin etoposide bleomycin (PEB) chemotherapy. Clinical and pathological complete remission was obtained after 2-3 courses of chemotherapy without radical surgery and radiotherapy.\n\n\nCONCLUSIONS\nEndodermal sinus tumor of vagina in infant was very sensitive to the chemotherapy. Serum alpha-FP was very useful in diagnosis and monitoring of the disease.", "title": "" }, { "docid": "3a68175de0dbc4c89b66678976898d1f", "text": "The rapid accumulation of data in social media (in million and billion scales) has imposed great challenges in information extraction, knowledge discovery, and data mining, and texts bearing sentiment and opinions are one of the major categories of user generated data in social media. Sentiment analysis is the main technology to quickly capture what people think from these text data, and is a research direction with immediate practical value in big data era. Learning such techniques will allow data miners to perform advanced mining tasks considering real sentiment and opinions expressed by users in additional to the statistics calculated from the physical actions (such as viewing or purchasing records) user perform, which facilitates the development of real-world applications. However, the situation that most tools are limited to the English language might stop academic or industrial people from doing research or products which cover a wider scope of data, retrieving information from people who speak different languages, or developing applications for worldwide users. More specifically, sentiment analysis determines the polarities and strength of the sentiment-bearing expressions, and it has been an important and attractive research area. In the past decade, resources and tools have been developed for sentiment analysis in order to provide subsequent vital applications, such as product reviews, reputation management, call center robots, automatic public survey, etc. However, most of these resources are for the English language. Being the key to the understanding of business and government issues, sentiment analysis resources and tools are required for other major languages, e.g., Chinese. In this tutorial, audience can learn the skills for retrieving sentiment from texts in another major language, Chinese, to overcome this obstacle. The goal of this tutorial is to introduce the proposed sentiment analysis technologies and datasets in the literature, and give the audience the opportunities to use resources and tools to process Chinese texts from the very basic preprocessing, i.e., word segmentation and part of speech tagging, to sentiment analysis, i.e., applying sentiment dictionaries and obtaining sentiment scores, through step-by-step instructions and a hand-on practice. The basic processing tools are from CKIP Participants can download these resources, use them and solve the problems they encounter in this tutorial. This tutorial will begin from some background knowledge of sentiment analysis, such as how sentiment are categorized, where to find available corpora and which models are commonly applied, especially for the Chinese language. Then a set of basic Chinese text processing tools for word segmentation, tagging and parsing will be introduced for the preparation of mining sentiment and opinions. After bringing the idea of how to pre-process the Chinese language to the audience, I will describe our work on compositional Chinese sentiment analysis from words to sentences, and an application on social media text (Facebook) as an example. All our involved and recently developed related resources, including Chinese Morphological Dataset, Augmented NTU Sentiment Dictionary (ANTUSD), E-hownet with sentiment information, Chinese Opinion Treebank, and the CopeOpi Sentiment Scorer, will also be introduced and distributed in this tutorial. The tutorial will end by a hands-on session of how to use these materials and tools to process Chinese sentiment.", "title": "" }, { "docid": "a60436a4b4152fbfef04b5c09f740636", "text": "Detection of surgical instruments plays a key role in ensuring patient safety in minimally invasive surgery. In this paper, we present a novel method for 2D vision-based recognition and pose estimation of surgical instruments that generalizes to different surgical applications. At its core, we propose a novel scene model in order to simultaneously recognize multiple instruments as well as their parts. We use a Convolutional Neural Network architecture to embody our model and show that the cross-entropy loss is well suited to optimize its parameters which can be trained in an end-to-end fashion. An additional advantage of our approach is that instrument detection at test time is achieved while avoiding the need for scale-dependent sliding window evaluation. This allows our approach to be relatively parameter free at test time and shows good performance for both instrument detection and tracking. We show that our approach surpasses state-of-the-art results on in-vivo retinal microsurgery image data, as well as ex-vivo laparoscopic sequences.", "title": "" }, { "docid": "9a57dfbbd233c851ae972403c67c35d5", "text": "It is well established that women’s preferences for masculinity are contingent on their own market-value and the duration of the sought relationship, but few studies have investigated similar effects in men. Here, we tested whether men’s attractiveness predicts their preferences for feminine face shape in women when judging for longand short-term relationship partners. We found that attractive men expressed a stronger preference for facial femininity compared to less attractive men. The relationship was evident when men judged women for a short-term, but not for a long-term, relationship. These findings suggest that market-value may influence men’s preferences for feminine characteristics in women’s faces and indicate that men’s preferences may be subject to facultative variation to a greater degree than was previously thought. 2010 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "e985d20f75d29c24fda39135e0e54636", "text": "Software testing is a highly complex and time consu ming activityIt is even difficult to say when tes ing is complete. The effective combination of black box (external) a nd white box (internal) testing is known as Gray-bo x testing. Gray box testing is a powerful idea if one knows something about how the product works on the inside; one can test it b etter, even from the outside. Gray box testing is not black box testing, because the tester does know some of the internal workings of the software under test. It is not to be confused with white box testing, testi ng approach that attempts to cover the internals of the product in detail. Gray box testing is a test strategy based partly on internal s. This paper will present all the three methodolog y Black-box, White-box, Graybox and how this method has been applied to validat e cri ical software systems. KeywordsBlack-box, White-box, Gray-box or Grey-box Introduction In most software projects, testing is not given the necessary attention. Statistics reveal that the ne arly 30-40% of the effort goes into testing irrespective of the type of project; h ardly any time is allocated for testing. The comput er industry is changing at a very rapid pace. In order to keep pace with a rapidly ch anging computer industry, software test must develo p methods to verify and validate software for all aspects of the product li fecycle. Test case design techniques can be broadly split into two main categories: Black box & White box. Black box + White box = Gray Box Spelling: Note that Gray is also spelt as Grey. Hence Gray Box Testing and Grey Box Testing mean the same. Gray Box testing is a technique to test the applica tion with limited knowledge of the internal working s of an application. In software testing, the term the more you know the be tter carries a lot of weight when testing an applic ation. Mastering the domain of a system always gives the t ester an edge over someone with limited domain know ledge. Unlike black box testing, where the tester only tests the applicatio n's user interface, in Gray box testing, the tester has access to design documents and the database. Having this knowledge, the tester is able to better prepare test data and test scena rios when making the test plan. The gray-box testing goes mainly with the testing of web applications b ecause it considers high-level development, operati ng environment, and compatibility conditions. During b lack-box or white-box analysis it is harder to iden tify problems, related to endto-end data flow. Context-specific problems, associ ated with web site testing are usually found during gray-box verifying. Bridge between Black Box and White Box – ISSN 2277-1956/V2N1-175-185 Testing Methods Fig 1: Classification 1. Black Box Testing Black box testing is a software testing techniques in which looking at the internal code structure, implementation details and knowledge of internal pa ths of the software. testing is based entirely on the software requireme nts and specifications. Black box testing is best suited for rapid test sce nario testing and quick Web Service Services provides quick feedback on the functional re diness of operations t better suited for operations that have enumerated necessary. It is used for finding the following errors: 1. Incorrect or missing functions 2. Interface errors 3. Errors in data structures or External database access 4. Performance errors 5. Initialization and termination errors Example A tester, without knowledge of the internal structu res of a website, tests the web pages by using a br owse ; providing inputs (clicks, keystrokes) and verifying the outputs agai nst the expected outcome. Levels Applicable To Black Box testing method is applicable to all levels of the software testing process: Testing, and Acceptance Testing. The higher the level, and hence the bigger and more c mplex the box, the mo method comes into use. Black Box Testing Techniques Following are some techniques that can be used for esigning black box tests. Equivalence partitioning Equivalence Partitioning is a software test design technique that involves selecting representative values from each partition as test data. Boundary Value Analysis Boundary Value Analysis is a software test design t echnique that involves determination of boundaries for selecting values that are at the boundaries and jus t inside/outside of the boundaries as test data. Cause Effect Graphing Cause Effect Graphing is a software test design tec hnique that involves identifying the cases (input c onditions) and conditions), producing a CauseEffect Graph, and generating test cases accordingly . Gray Box Testing Technique", "title": "" }, { "docid": "bdf9fa05c3c2e14dabb37dc380ae30fd", "text": "The decomposition of a music audio signal into its vocal and backing track components is analogous to image-toimage translation, where a mixed spectrogram is transformed into its constituent sources. We propose a novel application of the U-Net architecture — initially developed for medical imaging — for the task of source separation, given its proven capacity for recreating the fine, low-level detail required for high-quality audio reproduction. Through both quantitative evaluation and subjective assessment, experiments demonstrate that the proposed algorithm achieves state-of-the-art performance.", "title": "" }, { "docid": "c3e2ceebd3868dd9fff2a87fdd339dce", "text": "Augmented Reality (AR) holds unique and promising potential to bridge between real-world activities and digital experiences, allowing users to engage their imagination and boost their creativity. We propose the concept of Augmented Creativity as employing ar on modern mobile devices to enhance real-world creative activities, support education, and open new interaction possibilities. We present six prototype applications that explore and develop Augmented Creativity in different ways, cultivating creativity through ar interactivity. Our coloring book app bridges coloring and computer-generated animation by allowing children to create their own character design in an ar setting. Our music apps provide a tangible way for children to explore different music styles and instruments in order to arrange their own version of popular songs. In the gaming domain, we show how to transform passive game interaction into active real-world movement that requires coordination and cooperation between players, and how ar can be applied to city-wide gaming concepts. We employ the concept of Augmented Creativity to authoring interactive narratives with an interactive storytelling framework. Finally, we examine how Augmented Creativity can provide a more compelling way to understand complex concepts, such as computer programming.", "title": "" }, { "docid": "3bba11a3b1b65b1c96099f1b7445954b", "text": "The term gut-liver axis is used to highlight the close anatomical and functional relationship between the intestine and the liver. The intestine has a highly specialized epithelial membrane which regulates transport across the mucosa. Due to dysbiosis, impairment of the intestinal barrier and altered immunity status, bacterial products can reach the liver through the portal vein, where they are recognized by specific receptors, activate the immune system and lead to a proinflammatory response. Gut microbiota and bacterial translocation play an important role in the pathogenesis of chronic liver diseases, including alcoholic and non-alcoholic fatty liver disease, cirrhosis, and its complications, such as portal hypertension, spontaneous bacterial peritonitis and hepatic encephalopaty. The gut microbiota also plays a critical role as a modulator of bile acid metabolism which can also influence intestinal permeability and portal hypertension through the farnesoid-X receptor. On the other hand, cirrhosis and portal hypertension affect the microbiota and increase translocation, leading to a \"chicken and egg\" situation, where translocation increases portal pressure, and vice versa. A myriad of therapies targeting gut microbiota have been evaluated specifically in patients with chronic liver disease. Further studies targeting intestinal microbiota and its possible hemodynamic and metabolic effects are needed. This review summarizes the current knowledge about the role of gut microbiota in the pathogenesis of chronic liver diseases and portal hypertension.", "title": "" }, { "docid": "f981f9a15062f4187dfa7ac71f19d54a", "text": "Background\nSoccer is one of the most widely played sports in the world. However, soccer players have an increased risk of lower limb injury. These injuries may be caused by both modifiable and non-modifiable factors, justifying the adoption of an injury prevention program such as the Fédération Internationale de Football Association (FIFA) 11+. The purpose of this study was to evaluate the efficacy of the FIFA 11+ injury prevention program for soccer players.\n\n\nMethodology\nThis meta-analysis was based on the PRISMA 2015 protocol. A search using the keywords \"FIFA,\" \"injury prevention,\" and \"football\" found 183 articles in the PubMed, MEDLINE, LILACS, SciELO, and ScienceDirect databases. Of these, 6 studies were selected, all of which were randomized clinical trials.\n\n\nResults\nThe sample consisted of 6,344 players, comprising 3,307 (52%) in the intervention group and 3,037 (48%) in the control group. The FIFA 11+ program reduced injuries in soccer players by 30%, with an estimated relative risk of 0.70 (95% confidence interval, 0.52-0.93, p = 0.01). In the intervention group, 779 (24%) players had injuries, while in the control group, 1,219 (40%) players had injuries. However, this pattern was not homogeneous throughout the studies because of clinical and methodological differences in the samples. This study showed no publication bias.\n\n\nConclusion\nThe FIFA 11+ warm-up program reduced the risk of injury in soccer players by 30%.", "title": "" } ]
scidocsrr
2a7eb157a26fbd8d97ee39ca8d717fe0
Mining criminal networks from unstructured text documents
[ { "docid": "a1d167f6c1c1d574e8e5c0c6cba2c775", "text": "Hypothesis generation, a crucial initial step for making scientific discoveries, relies on prior knowledge, experience and intuition. Chance connections made between seemingly distinct subareas sometimes turn out to be fruitful. The goal in text mining is to assist in this process by automatically discovering a small set of interesting hypotheses from a suitable text collection. In this paper we present open and closed text mining algorithms that are built within the discovery framework established by Swanson and Smalheiser. Our algorithms represent topics using metadata profiles. When applied to MEDLINE these are MeSH based profiles. We present experiments that demonstrate the effectiveness of our algorithms. Specifically, our algorithms generate ranked term lists where the key terms representing novel relationships between topics are ranked high.", "title": "" }, { "docid": "902b1d774e89adae23d9b8396327532e", "text": "A new generation of data mining tools and applications work to unearth hidden patterns in large volumes of crime data.", "title": "" }, { "docid": "55b405991dc250cd56be709d53166dca", "text": "In Data Mining, the usefulness of association rules is strongly limited by the huge amount of delivered rules. To overcome this drawback, several methods were proposed in the literature such as item set concise representations, redundancy reduction, and post processing. However, being generally based on statistical information, most of these methods do not guarantee that the extracted rules are interesting for the user. Thus, it is crucial to help the decision-maker with an efficient post processing step in order to reduce the number of rules. This paper proposes a new interactive approach to prune and filter discovered rules. First, we propose to use ontologies in order to improve the integration of user knowledge in the post processing task. Second, we propose the Rule Schema formalism extending the specification language proposed by Liu et al. for user expectations. Furthermore, an interactive framework is designed to assist the user throughout the analyzing task. Applying our new approach over voluminous sets of rules, we were able, by integrating domain expert knowledge in the post processing step, to reduce the number of rules to several dozens or less. Moreover, the quality of the filtered rules was validated by the domain expert at various points in the interactive process. KeywordsClustering, classification, and association rules, interactive data exploration and discovery, knowledge management applications.", "title": "" } ]
[ { "docid": "80f1c8b99de81b9b1220b4178d126042", "text": "Indigenous groups offer alternative knowledge and perspectives based on their own locally developed practices of resource use. We surveyed the international literature to focus on the role of Traditional Ecological Knowledge in monitoring, responding to, and managing ecosystem processes and functions, with special attention to ecological resilience. Case studies revealed that there exists a diversity of local or traditional practices for ecosystem management. These include multiple species management, resource rotation, succession management, landscape patchiness management, and other ways of responding to and managing pulses and ecological surprises. Social mechanisms behind these traditional practices include a number of adaptations for the generation, accumulation, and transmission of knowledge; the use of local institutions to provide leaders/stewards and rules for social regulation; mechanisms for cultural internalization of traditional practices; and the development of appropriate world views and cultural values. Some traditional knowledge and management systems were characterized by the use of local ecological knowledge to interpret and respond to feedbacks from the environment to guide the direction of resource management. These traditional systems had certain similarities to adaptive management with its emphasis on feedback learning, and its treatment of uncertainty and unpredictability intrinsic to all ecosystems.", "title": "" }, { "docid": "bc58f2f9f6f5773f5f8b2696d9902281", "text": "Software development is a complicated process and requires careful planning to produce high quality software. In large software development projects, release planning may involve a lot of unique challenges. Due to time, budget and some other constraints, potentially there are many problems that may possibly occur. Subsequently, project managers have been trying to identify and understand release planning, challenges and possible resolutions which might help them in developing more effective and successful software products. This paper presents the findings from an empirical study which investigates release planning challenges. It takes a qualitative approach using interviews and observations with practitioners and project managers at five large software banking projects in Informatics Services Corporation (ISC) in Iran. The main objective of this study is to explore and increase the understanding of software release planning challenges in several software companies in a developing country. A number of challenges were elaborated and discussed in this study within the domain of software banking projects. These major challenges are classified into two main categories: the human-originated including people cooperation, disciplines and abilities; and the system-oriented including systematic approaches, resource constraints, complexity, and interdependency among the systems.", "title": "" }, { "docid": "d319a17ad2fa46e0278e0b0f51832f4b", "text": "Automatic Essay Assessor (AEA) is a system that utilizes information retrieval techniques such as Latent Semantic Analysis (LSA), Probabilistic Latent Semantic Analysis (PLSA), and Latent Dirichlet Allocation (LDA) for automatic essay grading. The system uses learning materials and relatively few teacher-graded essays for calibrating the scoring mechanism before grading. We performed a series of experiments using LSA, PLSA and LDA for document comparisons in AEA. In addition to comparing the methods on a theoretical level, we compared the applicability of LSA, PLSA, and LDA to essay grading with empirical data. The results show that the use of learning materials as training data for the grading model outperforms the k-NN-based grading methods. In addition to this, we found that using LSA yielded slightly more accurate grading than PLSA and LDA. We also found that the division of the learning materials in the training data is crucial. It is better to divide learning materials into sentences than paragraphs.", "title": "" }, { "docid": "cf299917f1de627e5d09ea943ab92157", "text": "Discovering hyponym relations among domain-specific terms is a fundamental task in taxonomy learning and knowledge acquisition. However, the great diversity of various domain corpora and the lack of labeled training sets make this task very challenging for conventional methods that are based on text content. The hyperlink structure of Wikipedia article pages was found to contain recurring network motifs in this study, indicating the probability of a hyperlink being a hyponym hyperlink. Hence, a novel hyponym relation extraction approach based on the network motifs of Wikipedia hyperlinks was proposed. This approach automatically constructs motif-based features from the hyperlink structure of a domain; every hyperlink is mapped to a 13-dimensional feature vector based on the 13 types of three-node motifs. The approach extracts structural information from Wikipedia and heuristically creates a labeled training set. Classification models were determined from the training sets for hyponym relation extraction. Two experiments were conducted to validate our approach based on seven domain-specific datasets obtained from Wikipedia. The first experiment, which utilized manually labeled data, verified the effectiveness of the motif-based features. The second experiment, which utilized an automatically labeled training set of different domains, showed that the proposed approach performs better than the approach based on lexico-syntactic patterns and achieves comparable result to the approach based on textual features. Experimental results show the practicability and fairly good domain scalability of the proposed approach.", "title": "" }, { "docid": "5c29083624be58efa82b4315976f8dc2", "text": "This paper presents a structured ordinal measure method for video-based face recognition that simultaneously lear ns ordinal filters and structured ordinal features. The problem is posed as a non-convex integer program problem that includes two parts. The first part learns stable ordinal filters to project video data into a large-margin ordinal space . The second seeks self-correcting and discrete codes by balancing the projected data and a rank-one ordinal matrix in a structured low-rank way. Unsupervised and supervised structures are considered for the ordinal matrix. In addition, as a complement to hierarchical structures, deep feature representations are integrated into our method to enhance coding stability. An alternating minimization metho d is employed to handle the discrete and low-rank constraints , yielding high-quality codes that capture prior structures well. Experimental results on three commonly used face video databases show that our method with a simple voting classifier can achieve state-of-the-art recognition ra tes using fewer features and samples.", "title": "" }, { "docid": "6615eff178f12e0d5c357fb92c493c7e", "text": "A novel aperture stacked patch (ASP) antenna with circular polarization is proposed. The antenna consists of four parasitic patches, each one being rotated by an angle of 30° relative to its adjacent patches. The proposed antenna has achieved a simultaneous axial ratio <;3 dB and voltage standing wave ratio (VSWR) <;2 bandwidth of 33.6% (7.2-10.11 GHz) in the single element and 36.15% (7.1-10.2 GHz) in a 2 × 1-element array configuration. The antenna behavior is explained by a thorough parameter study together with fabrication and measurement.", "title": "" }, { "docid": "357ae5590fb6f11fbd210baced2fc4ee", "text": "To achieve the best results from an OCR system, the pre-processing steps must be performed with a high degree of accuracy and reliability. There are two critically important steps in the OCR pre-processing phase. First, blocks must be extracted from each page of the scanned document. Secondly, all blocks resulting from the first step must be arranged in the correct order. One of the most notable techniques for block ordering in the second step is the recursive x-y cut (RXYC) algorithm. This technique works accurately only when applied to documents with a simple page layout but it causes incorrect block ordering when applied to documents with complex page layouts. This paper proposes a modified recursive x-y cut algorithm for solving block ordering problems for documents with complex page layouts. This proposed algorithm can solve problems such as (1) the overlapping block problem; (2) the blocks overlay problem, and (3) the L-Shaped block problem.", "title": "" }, { "docid": "f20f8dee5d7a576d1ffd5932afcdc0c5", "text": "Stock market prediction is the act of trying to determine the future value of a company stock or other financial instrument traded on a financial exchange. The successful prediction of a stock's future price will maximize investor’s gains. This paper proposes a machine learning model to predict stock market price. The proposed algorithm integrates Particle swarm optimization (PSO) and least square support vector machine (LS-SVM). The PSO algorithm is employed to optimize LS-SVM to predict the daily stock prices. Proposed model is based on the study of stocks historical data and technical indicators. PSO algorithm selects best free parameters combination for LS-SVM to avoid over-fitting and local minima problems and improve prediction accuracy. The proposed model was applied and evaluated using thirteen benchmark financials datasets and compared with artificial neural network with Levenberg-Marquardt (LM) algorithm. The obtained results showed that the proposed model has better prediction accuracy and the potential of PSO algorithm in optimizing LS-SVM.", "title": "" }, { "docid": "ceb02ddf8b2085d67ccf27c3c5b57dfd", "text": "We present a novel latent embedding model for learning a compatibility function between image and class embeddings, in the context of zero-shot classification. The proposed method augments the state-of-the-art bilinear compatibility model by incorporating latent variables. Instead of learning a single bilinear map, it learns a collection of maps with the selection, of which map to use, being a latent variable for the current image-class pair. We train the model with a ranking based objective function which penalizes incorrect rankings of the true class for a given image. We empirically demonstrate that our model improves the state-of-the-art for various class embeddings consistently on three challenging publicly available datasets for the zero-shot setting. Moreover, our method leads to visually highly interpretable results with clear clusters of different fine-grained object properties that correspond to different latent variable maps.", "title": "" }, { "docid": "0e796ac2c27a1811eaafb8e3a65c7d59", "text": "When dealing with large graphs, such as those that arise in the context of online social networks, a subset of nodes may be labeled. These labels can indicate demographic values, interest, beliefs or other characteristics of the nodes (users). A core problem is to use this information to extend the labeling so that all nodes are assigned a label (or labels). In this chapter, we survey classification techniques that have been proposed for this problem. We consider two broad categories: methods based on iterative application of traditional classifiers using graph information as features, and methods which propagate the existing labels via random walks. We adopt a common perspective on these methods to highlight the similarities between different approaches within and across the two categories. We also describe some extensions and related directions to the central problem of node classification.", "title": "" }, { "docid": "cbb41bdd23a34b3531d2980dfc2211bf", "text": "Examined bones were obtained from eight adult African giant rats, Cricetomys gambianus Waterhouse. Animals used had an average body mass of 730.00 ± 41.91 gm and body length of 67.20 ± 0.05 cm. The vertebral formula was found to be C7, T13, L6, S4, Ca31-36. The lowest and highest points of the cervicothoracic curvature were at C5 and T2, respectively. The spinous process of the axis was the largest in the cervical group while others were sharp and pointed. The greatest diameter of the vertebral canal was at the atlas (0.8 cm) and the lowest at the caudal sacral bones (2 mm). The diameter of the vertebral foramen was the largest at C1 and the smallest at the S4; the foramina were negligibly indistinct caudal to the sacral vertebrae. There were 13 pairs of ribs. The first seven pairs were sternal, and six pairs were asternal of which the last 2-3 pairs were floating ribs. The sternum was composed of deltoid-shaped manubrium sterni, four sternebrae, and a slender processus xiphoideus. No sex-related differences were observed. The vertebral column is adapted for strong muscular attachment and actions helping the rodent suited for speed, agility, dexterity, and strength which might enable it to overpower prey and escape predation.", "title": "" }, { "docid": "82b03b45a093fb6342e92602c437741b", "text": "Human-like path planning is still a challenging task for automated vehicles. Imitation learning can teach these vehicles to learn planning from human demonstration. In this work, we propose to formulate the planning stage as a convolutional neural network (CNN). Thus, we can employ well established CNN techniques to learn planning from imitation. With the proposed method, we train a network for planning in complex traffic situations from both simulated and real world data. The resulting planning network exhibits human-like path generation.", "title": "" }, { "docid": "173c0124ac81cfe8fa10fbdc20a1a094", "text": "This paper presents a new approach to compare fuzzy numbers using α-distance. Initially, the metric distance on the interval numbers based on the convex hull of the endpoints is proposed and it is extended to fuzzy numbers. All the properties of the α-distance are proved in details. Finally, the ranking of fuzzy numbers by the α-distance is discussed. In addition, the proposed method is compared with some known ones, the validity of the new method is illustrated by applying its to several group of fuzzy numbers.", "title": "" }, { "docid": "e86c2af47c55a574aecf474f95fb34d3", "text": "This paper presents a novel way to address the extrinsic calibration problem for a system composed of a 3D LIDAR and a camera. The relative transformation between the two sensors is calibrated via a nonlinear least squares (NLS) problem, which is formulated in terms of the geometric constraints associated with a trihedral object. Precise initial estimates of NLS are obtained by dividing it into two sub-problems that are solved individually. With the precise initializations, the calibration parameters are further refined by iteratively optimizing the NLS problem. The algorithm is validated on both simulated and real data, as well as a 3D reconstruction application. Moreover, since the trihedral target used for calibration can be either orthogonal or not, it is very often present in structured environments, making the calibration convenient.", "title": "" }, { "docid": "7f82ff12310f74b17ba01cac60762a8c", "text": "For worst case parameter mismatch, modest levels of unbalance are predicted through the use of minimum gate decoupling, dynamic load lines with high Q values, common source inductance or high yield screening. Each technique is evaluated in terms of current unbalance, transition energy, peak turn-off voltage and parasitic oscillations, as appropriate, for various pulse duty cycles and frequency ranges.", "title": "" }, { "docid": "70b481d263ecb5c46d211e4414b63b85", "text": "S ome years ago I interviewed the chief executive officer of a successful Thai manufacturing firm as part of a pilot survey project. While trying to figure out a good way to quantify the firm’s experience with government regulations and corruption in the foreign trade sector, the CEO exclaimed: “I hope to be reborn as a custom official.” When a well-paid CEO wishes for a job with low official pay in the government sector, corruption is almost surely a problem! The most devastating forms of corruption include the diversion and outright theft of funds for public programs and the damage caused by firms and individuals that pay bribes to avoid health and safety regulations intended to benefit the public. Examples abound. A conservative estimate is that the former President of Zaire, Mobutu Sese Seko, looted the treasury of some $5 billion—an amount equal to the country’s entire external debt at the time he was ousted in 1997. The funds allegedly embezzled by the former presidents of Indonesia and Philippines, Mohamed Suharto and Ferdinand Marcos, are estimated to be two and seven times higher (Transparency International, 2004). In the Goldenberg scam in Kenya in the early 1990s, the Goldenberg firm received as much as $1 billion from the government as part of an export compensation scheme for fictitious exports of commodities of which Kenya either produced little (gold) or nothing at all (diamonds) (“Public Inquiry into Kenya Gold Scam,” 2003). An internal IMF report found that nearly $1 billion of oil revenues, or $77 per capita, vanished from Angolan state coffers in 2001 alone (Pearce, 2002). This amount was about three times the value of the humanitarian aid received by Angola in 2001—in a country where three-quarters of the population survives on less than $1 a day and where one", "title": "" }, { "docid": "eb218a1d8b7cbcd895dd0cd8cfcf9d80", "text": "Caring is considered as the essence of nursing and is the basic factor that distinguishes between nurses and other health professions. The literature is rich of previous studies that focused on perceptions of nurses toward nurse caring behaviors, but less studywas applied in pediatric nurses in different settings. Aim of the study:evaluate the effect of application of Watson caring theory for nurses in pediatric critical care unit. Method(s): A convenience sample of 70 nurses of Pediatric Critical Care Unit in El-Menoufya University Hospital and educational hospital in ShebenElkom.were completed the demographics questionnaire, and the Caring Behavior Assessment (CBA) questionnaire,medical record to collect medical data regarding children characteristics such as age and diagnosis, Interviewing questionnaire for nurses regarding their barrier to less interest of comfort behavior such as doing doctor order, Shortage of nursing staff, Large number of patients, Heavy workloads, Secretarial jobs for nurses and Emotional stress. Results: more thantwothirds of nurses in study group and majority of control group had age less than 30 years, there were highly statistically significant difference related to mean scores for Caring Behavior Assessment (CBA) as rated by nurses in pretest (1.4750 to 2.0750) than in posttest (3.5 to 4.55). Also, near to two-thirds (64.3%) of the nurses stated that doing doctor order act as a barrier to apply this theory. In addition, there were a statistical significance difference between educational qualifications of nurses and a Supportive\\ protective\\corrective environment subscale with mean score for master degree 57.0000, also between years of experiences and human needs assistance. Conclusion: Program instructions for all nurses to apply Watson Caring theory for children in pediatric critical care unit were successful and effective and this study provided evidence for application of this theory for different departments in all settings. Recommendations: It was recommended that In-service training programs for nurses about caring behavior and its different areas, with special emphasis on communication are needed to improve their own behaviors in all aspects of the caring behaviors for all health care settings. Motivating hospital authorities to recruit more nurses, then, the nurses would be able to have more care that is direct. Consequently, the amount and the quality of nurse-child communication and opportunities for patient education would increase, this in turn improve child's outcome.", "title": "" }, { "docid": "facf85be0ae23eacb7e7b65dd5c45b33", "text": "We review evidence for partially segregated networks of brain areas that carry out different attentional functions. One system, which includes parts of the intraparietal cortex and superior frontal cortex, is involved in preparing and applying goal-directed (top-down) selection for stimuli and responses. This system is also modulated by the detection of stimuli. The other system, which includes the temporoparietal cortex and inferior frontal cortex, and is largely lateralized to the right hemisphere, is not involved in top-down selection. Instead, this system is specialized for the detection of behaviourally relevant stimuli, particularly when they are salient or unexpected. This ventral frontoparietal network works as a 'circuit breaker' for the dorsal system, directing attention to salient events. Both attentional systems interact during normal vision, and both are disrupted in unilateral spatial neglect.", "title": "" }, { "docid": "d4c19a8e4e51ede55ce62a3bcc3df5ad", "text": "The daily average PM2.5 concentration forecast is a leading component nowadays in air quality research, which is necessary to perform in order to assess the impact of air on the health and welfare of every living being. The present work is aimed at analyzing and benchmarking a neural-network approach to the prediction of average PM2.5 concentrations. The model thus obtained will be indispensable, as a control tool, for the purpose of preventing dangerous situations that may arise. To this end we have obtained data and measurements based on samples taken during the early hours of the day. Results from three different topologies of neural networks were compared so as to identify their potential uses, or rather, their strengths and weaknesses: Multilayer Perceptron (MLP), Radial Basis Function (RBF) and Square Multilayer Perceptron (SMLP). Moreover, two classical models were built (a persistence model and a linear regression), so as to compare their results with the ones provided by the neural network models. The results clearly demonstrated that the neural approach not only outperformed the classical models but also showed fairly similar values among different topologies. Moreover, a differential behavior in terms of stability and length of the training phase emerged during testing as well. The RBF shows up to be the network with the shortest training times, combined with a greater stability during the prediction stage, thus characterizing this topology as an ideal solution for its use in environmental applications instead of the widely used and less effective MLP. 2004 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "ebc3bc7b74b7e24ec629ca1a659a5093", "text": "OBJECTIVE. In this study, we examined the effectiveness of using weighted vests for improving attention, impulse control, and on-task behavior in children with attention deficit hyperactivity disorder (ADHD). METHOD. In a randomized, two-period crossover design, 110 children with ADHD were measured using the Conners' Continuous Performance Test-II (CPT-II) task. RESULTS. In the weighted vest condition, the participants did show significant improvement in all three attentional variables of the CPT-II task, including inattention; speed of processing and responding; consistency of executive management; and three of four on-task behaviors, including off task, out of seat, and fidgets. No significant improvements in impulse control and automatic vocalizations were found. CONCLUSION. Although wearing a weighted vest is not a cure-all strategy, our findings support the use of the weighted vest to remedy attentional and on-task behavioral problems of children with ADHD.", "title": "" } ]
scidocsrr
a3806c15a59a38d67c2afb089204d87c
Modeling affordances using Bayesian networks
[ { "docid": "9448a075257110d47c0fefa521aa34c1", "text": "We present a developmental perspective of robot learning that uses affordances as the link between sensory-motor coordination and imitation. The key concept is a general model for affordances able to learn the statistical relations between actions, object properties and the effects of actions on objects. Based on the learned affordances, it is possible to perform simple imitation games providing both task interpretation and planning capabilities. To evaluate the approach, we provide results of affordance learning with a real robot and simple imitation games with people.", "title": "" } ]
[ { "docid": "a9768bced10c55345f116d7d07d2bc5a", "text": "In this paper, we propose a variety of distance measures for hesitant fuzzy sets, based on which the corresponding similarity measures can be obtained. We investigate the connections of the aforementioned distance measures and further develop a number of hesitant ordered weighted distance measures and hesitant ordered weighted similarity measures. They can alleviate the influence of unduly large (or small) deviations on the aggregation results by assigning them low (or high) weights. Several numerical examples are provided to illustrate these distance and similarity measures. 2011 Elsevier Inc. All rights reserved.", "title": "" }, { "docid": "ab50f458d919ba3ac3548205418eea62", "text": "Department of Microbiology, School of Life Sciences, Bharathidasan University, Tiruchirappali 620 024, Tamilnadu, India. Department of Medical Biotechnology, Sri Ramachandra University, Porur, Chennai 600 116, Tamilnadu, India. CAS Marine Biology, Annamalai University, Parangipettai 608 502, Tamilnadu, India. Department of Zoology, DDE, Annamalai University, Annamalai Nagar 608 002, Tamilnadu, India Asian Pacific Journal of Tropical Disease (2012)S291-S295", "title": "" }, { "docid": "2c0b3b58da77cc217e4311142c0aa196", "text": "In this paper, we show that the hinge loss can be interpreted as the neg-log-likelihood of a semi-parametric model of posterior probabilities. From this point of view, SVMs represent the parametric component of a semi-parametric model fitted by a maximum a posteriori estimation procedure. This connection enables to derive a mapping from SVM scores to estimated posterior probabilities. Unlike previous proposals, the suggested mapping is interval-valued, providing a set of posterior probabilities compatible with each SVM score. This framework offers a new way to adapt the SVM optimization problem to unbalanced classification, when decisions result in unequal (asymmetric) losses. Experiments show improvements over state-of-the-art procedures.", "title": "" }, { "docid": "f66ce6fb4675091de36b3e64e4fb52a5", "text": "Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited. The goal of this paper is to better understand the behavioral factors that may increase one’s susceptibility for complying with a phisher’s request for personal information. Using past research on deception detection, a research model was developed to help explain compliant phishing responses. The model was tested using a field study in which each participant received a phishing e-mail asking for sensitive information. It was found that four behavioral factors were influential as to whether the phishing e-mails were answered with sensitive information. The paper concludes by suggesting that the behavioral aspect of susceptible users be integrated into the current tools and materials used in antiphishing efforts. Key WoRds and phRases: computer-mediated deception, electronic mail fraud, Internet security, interpersonal deception theory, phishing. The inTeRneT has opened up a WealTh of oppoRTuniTies for individuals and businesses to expand the reach and range of their personal and commercial transactions, but these 274 WRIghT aND MaRETT openings have also created a venue for a number of computer security issues that must be addressed. Investments in security hardware and software are now fundamental parts of a company’s information technology (IT) budget. also, security policies are continually developed and refined to reduce technical vulnerabilities. however, the frequent use of Internet technologies by corporations can also introduce new vulnerabilities. One recent phenomenon that exploits end users’ carelessness is phishing. Phishing uses obfuscation of both e-mails and Web sites to trick Web users into complying with a request for personal information [5, 27]. The deceitful people behind the scam, the “phishers,” are then able to use the personal information for a number of illicit activities, ranging from individual identity theft to the theft of a company’s intellectual property. according to some estimates, phishing results in close to $50 billion of damage to U.S. consumers and businesses a year [49, 71]. In 2007, phishing attacks increased and some 3 million adults lost over $3 billion in the 12 months ending in august 2007 [29]. although some reports indicate that the annual financial damage is not rising dramatically from year to year, the number of reported victims is increasing at a significant rate [35]. Phishing continues to be a very real problem for Web users in all walks of life. Consistent with the “fishing” homonym, phishing attacks are often described by using a “bait-and-hook” metaphor [70]. The “bait” consists of a mass e-mail submission sent to a large number of random and unsuspecting recipients. The message strongly mimics the look and feel of a legitimate business, including the use of familiar logos and slogans. The e-mail often requests the recipient’s aid in correcting a technical problem with his or her user account, ostensibly by confirming or “resupplying” a user ID, a password, a credit card number, or other personal information. The message typically encourages recipients to visit a bogus Web site (the “hook”) that is similar in appearance to an actual corporate Web site, except that user-supplied information is not sent to the legitimate company’s Web server, but to a server of the phisher’s choosing. The phishing effort is relatively low in terms of cost and risk for the phishers. Further, phishers may reside in international locations that place them out of reach of authorities in the victim’s jurisdiction, making prosecution much more difficult [33]. Phishers are rarely apprehended and prosecuted for the fraud they commit. Developing methods for detecting phishing before any damage is inflicted is a priority, and several approaches for detection have resulted from the effort. Technical countermeasures, such as e-mail filtering and antiphishing toolbars, successfully detect phishing attempts in about 35 percent of cases [84]. Updating fraud definitions, flagging bogus Web sites, and preventing false alarms from occurring continues to challenge individual users and IT departments alike. an automated comparison of the design, layout, and style characteristics between authentic and fraudulent Web sites has been shown to be more promising than a simple visual inspection made by a visitor, but an up-to-date registry of valid and invalid Web sites must be available for such a method to be practical [55]. Because of ineffective technological methods of prevention, much of the responsibility for detecting phishing lies with the end user, and an effective strategy for guarding against phishing should include both technological and human detectors. however, prior research has shown that, like technology, people ThE INFlUENCES OF ExPERIENTIal aND DISPOSITIONal FaCTORS IN PhIShINg 275 are also limited in terms of detecting the fraud once they are coerced into visiting a bogus Web site [19]. Once the message recipient chooses to visit a fraudulent Web site, he or she is unlikely to detect the fraudulent nature of the request and the “hook” will have been set. In order to prevent users from sending sensitive information to phishers, educating and training e-mail users about fraud prevention and detection at the “bait” stage must be considered the first line of defense [53]. The goal of this paper is to better understand, given the large number of phishing attempts and the vast amount of attention given to phishing in the popular press, why users of online applications such as e-mail and instant messaging still fall prey to these fraudulent efforts.", "title": "" }, { "docid": "33ce6e07bc4031f1b915e32769d5c984", "text": "MOTIVATION\nDIYABC is a software package for a comprehensive analysis of population history using approximate Bayesian computation on DNA polymorphism data. Version 2.0 implements a number of new features and analytical methods. It allows (i) the analysis of single nucleotide polymorphism data at large number of loci, apart from microsatellite and DNA sequence data, (ii) efficient Bayesian model choice using linear discriminant analysis on summary statistics and (iii) the serial launching of multiple post-processing analyses. DIYABC v2.0 also includes a user-friendly graphical interface with various new options. It can be run on three operating systems: GNU/Linux, Microsoft Windows and Apple Os X.\n\n\nAVAILABILITY\nFreely available with a detailed notice document and example projects to academic users at http://www1.montpellier.inra.fr/CBGP/diyabc CONTACT: estoup@supagro.inra.fr Supplementary information: Supplementary data are available at Bioinformatics online.", "title": "" }, { "docid": "5e6209b4017039a809f605d0847a57af", "text": "Bag-of-ngrams (BoN) models are commonly used for representing text. One of the main drawbacks of traditional BoN is the ignorance of n-gram’s semantics. In this paper, we introduce the concept of Neural Bag-of-ngrams (Neural-BoN), which replaces sparse one-hot n-gram representation in traditional BoN with dense and rich-semantic n-gram representations. We first propose context guided n-gram representation by adding n-grams to word embeddings model. However, the context guided learning strategy of word embeddings is likely to miss some semantics for text-level tasks. Text guided ngram representation and label guided n-gram representation are proposed to capture more semantics like topic or sentiment tendencies. Neural-BoN with the latter two n-gram representations achieve state-of-the-art results on 4 documentlevel classification datasets and 6 semantic relatedness categories. They are also on par with some sophisticated DNNs on 3 sentence-level classification datasets. Similar to traditional BoN, Neural-BoN is efficient, robust and easy to implement. We expect it to be a strong baseline and be used in more real-world applications.", "title": "" }, { "docid": "df3b0590054fb3056ed82247d01bc951", "text": "Understanding nonverbal behaviors in human machine interaction is a complex and challenge task. One of the key aspects is to recognize human emotion states accurately. This paper presents our effort to the Audio/Visual Emotion Challenge (AVEC'14), whose goal is to predict the continuous values of the emotion dimensions arousal, valence and dominance at each moment in time. The proposed method utilizes deep belief network based models to recognize emotion states from audio and visual modalities. Firstly, we employ temporal pooling functions in the deep neutral network to encode dynamic information in the features, which achieves the first time scale temporal modeling. Secondly, we combine the predicted results from different modalities and emotion temporal context information simultaneously. The proposed multimodal-temporal fusion achieves temporal modeling for the emotion states in the second time scale. Experiments results show the efficiency of each key point of the proposed method and competitive results are obtained", "title": "" }, { "docid": "57332cd7472707617e864d196ff454ef", "text": "Vehicle platoons are fully automated vehicles driving in close proximity of each other, where both distance keeping and steering is under automatic control. This paper is aiming at a variant of vehicle platoons, where the lateral control is using forward looking sensors, i.e. camera, radar. Such a system solution implies that the vehicle dynamics are coupled together laterally, in contrast to the classical look-down solutions. For such a platoon, lateral string stability is an important property that the controller needs to guarantee. This article proposes a method for designing such a distributed controller. It also examines the effect of model uncertainties on the lateral string stability of the platoon for the proposed method.", "title": "" }, { "docid": "6e07b4d373b340512e06520c3aecd80c", "text": "Text mining has found a variety of applications in diverse domains. Of late, prolific work is reported in using text mining techniques to solve problems in financial domain. The objective of this paper is to provide a state-of-the-art survey of various applications of Text mining to finance. These applications are categorized broadly into FOREX rate prediction, stock market prediction, customer relationship management (CRM) and cyber security. Since finance is a service industry, these problems are paramount in operational and customer growth aspects. We reviewed 89 research papers that appeared during the period 2000-2016, highlighted some of the issues, gaps, key challenges in this area and proposed some future research directions. Finally, this review can be extremely useful to budding researchers in this area, as many open problems are highlighted.", "title": "" }, { "docid": "a252ec33139d9489133b91c2551a694f", "text": "The lucrative rewards of security penetrations into large organizations have motivated the development and use of many sophisticated rootkit techniques to maintain an attacker's presence on a compromised system. Due to the evasive nature of such infections, detecting these rootkit infestations is a problem facing modern organizations. While many approaches to this problem have been proposed, various drawbacks that range from signature generation issues, to coverage, to performance, prevent these approaches from being ideal solutions.\n In this paper, we present Blacksheep, a distributed system for detecting a rootkit infestation among groups of similar machines. This approach was motivated by the homogenous natures of many corporate networks. Taking advantage of the similarity amongst the machines that it analyses, Blacksheep is able to efficiently and effectively detect both existing and new infestations by comparing the memory dumps collected from each host.\n We evaluate Blacksheep on two sets of memory dumps. One set is taken from virtual machines using virtual machine introspection, mimicking the deployment of Blacksheep on a cloud computing provider's network. The other set is taken from Windows XP machines via a memory acquisition driver, demonstrating Blacksheep's usage under more challenging image acquisition conditions. The results of the evaluation show that by leveraging the homogeneous nature of groups of computers, it is possible to detect rootkit infestations.", "title": "" }, { "docid": "50d42d832a0cd04becdaa26cc33a9782", "text": "The performance of Fingerprint recognition system depends on minutiae which are extracted from raw fingerprint image. Often the raw fingerprint image captured from a scanner may not be of good quality, which leads to inaccurate extraction of minutiae. Hence it is essential to preprocess the fingerprint image before extracting the reliable minutiae for matching of two fingerprint images. Image enhancement technique followed by minutiae extraction completes the fingerprint recognition process. Fingerprint recognition process with a matcher constitutes Fingerprint recognition system ASIC implementation of image enhancement technique for fingerprint recognition process using Cadence tool is proposed. Further, the result obtained from hardware design is compared with that of software using MatLab tool.", "title": "" }, { "docid": "1e56ff2af1b76571823d54d1f7523b49", "text": "Open-source intelligence offers value in information security decision making through knowledge of threats and malicious activities that potentially impact business. Open-source intelligence using the internet is common, however, using the darknet is less common for the typical cybersecurity analyst. The challenges to using the darknet for open-source intelligence includes using specialized collection, processing, and analysis tools. While researchers share techniques, there are few publicly shared tools; therefore, this paper explores an open-source intelligence automation toolset that scans across the darknet connecting, collecting, processing, and analyzing. It describes and shares the tools and processes to build a secure darknet connection, and then how to collect, process, store, and analyze data. Providing tools and processes serves as an on-ramp for cybersecurity intelligence analysts to search for threats. Future studies may refine, expand, and deepen this paper's toolset framework. © 2 01 7 T he SA NS In sti tut e, Au tho r R eta ins Fu ll R igh ts © 2017 The SANS Institute Author retains full rights. Data Mining in the Dark 2 Nafziger, Brian", "title": "" }, { "docid": "1da19f806430077f7ad957dbeb0cb8d1", "text": "BACKGROUND\nTo date, periorbital melanosis is an ill-defined entity. The condition has been stated to be darkening of the skin around the eyes, dark circles, infraorbital darkening and so on.\n\n\nAIMS\nThis study was aimed at exploring the nature of pigmentation in periorbital melanosis.\n\n\nMETHODS\nOne hundred consecutive patients of periorbital melanosis were examined and investigated to define periorbital melanosis. Extent of periorbital melanosis was determined by clinical examination. Wood's lamp examination was performed in all the patients to determine the depth of pigmentation. A 2-mm punch biopsy was carried out in 17 of 100 patients.\n\n\nRESULTS\nIn 92 (92%) patients periorbital melanosis was an extension of pigmentary demarcation line over the face (PDL-F).\n\n\nCONCLUSION\nPeriorbital melanosis and pigmentary demarcation line of the face are not two different conditions; rather they are two different manifestations of the same disease.", "title": "" }, { "docid": "77749f228ebcadfbff9202ee17225752", "text": "Temporal object detection has attracted significant attention, but most popular detection methods cannot leverage rich temporal information in videos. Very recently, many algorithms have been developed for video detection task, yet very few approaches can achieve real-time online object detection in videos. In this paper, based on the attention mechanism and convolutional long short-term memory (ConvLSTM), we propose a temporal single-shot detector (TSSD) for real-world detection. Distinct from the previous methods, we take aim at temporally integrating pyramidal feature hierarchy using ConvLSTM, and design a novel structure, including a low-level temporal unit as well as a high-level one for multiscale feature maps. Moreover, we develop a creative temporal analysis unit, namely, attentional ConvLSTM, in which a temporal attention mechanism is specially tailored for background suppression and scale suppression, while a ConvLSTM integrates attention-aware features across time. An association loss and a multistep training are designed for temporal coherence. Besides, an online tubelet analysis (OTA) is exploited for identification. Our framework is evaluated on ImageNet VID dataset and 2DMOT15 dataset. Extensive comparisons on the detection and tracking capability validate the superiority of the proposed approach. Consequently, the developed TSSD-OTA achieves a fast speed and an overall competitive performance in terms of detection and tracking. Finally, a real-world maneuver is conducted for underwater object grasping.", "title": "" }, { "docid": "ddf56804605fd0957316979af50f010a", "text": "In this work, we provide an overview of our previously published works on incorporating demand uncertainty in midterm planning of multisite supply chains. A stochastic programming based approach is described to model the planning process as it reacts to demand realizations unfolding over time. In the proposed bilevel-framework, the manufacturing decisions are modeled as ‘here-and-now’ decisions, which are made before demand realization. Subsequently, the logistics decisions are postponed in a ‘waitand-see’ mode to optimize in the face of uncertainty. In addition, the trade-off between customer satisfaction level and production costs is also captured in the model. The proposed model provides an effective tool for evaluating and actively managing the exposure of an enterprises assets (such as inventory levels and profit margins) to market uncertainties. The key features of the proposed framework are highlighted through a supply chain planning case study. # 2003 Elsevier Science Ltd. All rights reserved.", "title": "" }, { "docid": "125655821a44bbce2646157c8465e345", "text": "Due to its wide applicability, the problem of semi-supervised classification is attracting increasing attention in machine learning. Semi-Supervised Support Vector Machines (S3VMs) are based on applying the margin maximization principle to both labeled and unlabeled examples. Unlike SVMs, their formulation leads to a non-convex optimization problem. A suite of algorithms have recently been proposed for solving S3VMs. This paper reviews key ideas in this literature. The performance and behavior of various S3VM algorithms is studied together, under a common experimental setting.", "title": "" }, { "docid": "deb1c65a6e2dfb9ab42f28c74826309c", "text": "Large knowledge bases consisting of entities and relationships between them have become vital sources of information for many applications. Most of these knowledge bases adopt the Semantic-Web data model RDF as a representation model. Querying these knowledge bases is typically done using structured queries utilizing graph-pattern languages such as SPARQL. However, such structured queries require some expertise from users which limits the accessibility to such data sources. To overcome this, keyword search must be supported. In this paper, we propose a retrieval model for keyword queries over RDF graphs. Our model retrieves a set of subgraphs that match the query keywords, and ranks them based on statistical language models. We show that our retrieval model outperforms the-state-of-the-art IR and DB models for keyword search over structured data using experiments over two real-world datasets.", "title": "" }, { "docid": "0e32cef3d4f4e6bd23a3004a44b138a6", "text": "There have been some works that learn a lexicon together with the corpus to improve the word embeddings. However, they either model the lexicon separately but update the neural networks for both the corpus and the lexicon by the same likelihood, or minimize the distance between all of the synonym pairs in the lexicon. Such methods do not consider the relatedness and difference of the corpus and the lexicon, and may not be the best optimized. In this paper, we propose a novel method that considers the relatedness and difference of the corpus and the lexicon. It trains word embeddings by learning the corpus to predicate a word and its corresponding synonym under the context at the same time. For polysemous words, we use a word sense disambiguation filter to eliminate the synonyms that have different meanings for the context. To evaluate the proposed method, we compare the performance of the word embeddings trained by our proposed model, the control groups without the filter or the lexicon, and the prior works in the word similarity tasks and text classification task. The experimental results show that the proposed model provides better embeddings for polysemous words and improves the performance for text classification.", "title": "" }, { "docid": "f1d11ef2739e02af2a95cbc93036bf43", "text": "Extended Collaborative Less-is-More Filtering xCLiMF is a learning to rank model for collaborative filtering that is specifically designed for use with data where information on the level of relevance of the recommendations exists, e.g. through ratings. xCLiMF can be seen as a generalization of the Collaborative Less-is-More Filtering (CLiMF) method that was proposed for top-N recommendations using binary relevance (implicit feedback) data. The key contribution of the xCLiMF algorithm is that it builds a recommendation model by optimizing Expected Reciprocal Rank, an evaluation metric that generalizes reciprocal rank in order to incorporate user feedback with multiple levels of relevance. Experimental results on real-world datasets show the effectiveness of xCLiMF, and also demonstrate its advantage over CLiMF when more than two levels of relevance exist in the data.", "title": "" }, { "docid": "b7387928fe8307063cafd6723c0dd103", "text": "We introduce learned attention models into the radio machine learning domain for the task of modulation recognition by leveraging spatial transformer networks and introducing new radio domain appropriate transformations. This attention model allows the network to learn a localization network capable of synchronizing and normalizing a radio signal blindly with zero knowledge of the signal's structure based on optimization of the network for classification accuracy, sparse representation, and regularization. Using this architecture we are able to outperform our prior results in accuracy vs signal to noise ratio against an identical system without attention, however we believe such an attention model has implication far beyond the task of modulation recognition.", "title": "" } ]
scidocsrr
a22e3ee7da53c0b8fe9336622d42fa38
A character-based convolutional neural network for language-agnostic Twitter sentiment analysis
[ { "docid": "062c970a14ac0715ccf96cee464a4fec", "text": "A goal of statistical language modeling is to learn the joint probability function of sequences of words in a language. This is intrinsically difficult because of the curse of dimensionality: a word sequence on which the model will be tested is likely to be different from all the word sequences seen during training. Traditional but very successful approaches based on n-grams obtain generalization by concatenating very short overlapping sequences seen in the training set. We propose to fight the curse of dimensionality by learning a distributed representation for words which allows each training sentence to inform the model about an exponential number of semantically neighboring sentences. The model learns simultaneously (1) a distributed representation for each word along with (2) the probability function for word sequences, expressed in terms of these representations. Generalization is obtained because a sequence of words that has never been seen before gets high probability if it is made of words that are similar (in the sense of having a nearby representation) to words forming an already seen sentence. Training such large models (with millions of parameters) within a reasonable time is itself a significant challenge. We report on experiments using neural networks for the probability function, showing on two text corpora that the proposed approach significantly improves on state-of-the-art n-gram models, and that the proposed approach allows to take advantage of longer contexts.", "title": "" }, { "docid": "fabc65effd31f3bb394406abfa215b3e", "text": "Statistical learning theory was introduced in the late 1960's. Until the 1990's it was a purely theoretical analysis of the problem of function estimation from a given collection of data. In the middle of the 1990's new types of learning algorithms (called support vector machines) based on the developed theory were proposed. This made statistical learning theory not only a tool for the theoretical analysis but also a tool for creating practical algorithms for estimating multidimensional functions. This article presents a very general overview of statistical learning theory including both theoretical and algorithmic aspects of the theory. The goal of this overview is to demonstrate how the abstract learning theory established conditions for generalization which are more general than those discussed in classical statistical paradigms and how the understanding of these conditions inspired new algorithmic approaches to function estimation problems. A more detailed overview of the theory (without proofs) can be found in Vapnik (1995). In Vapnik (1998) one can find detailed description of the theory (including proofs).", "title": "" } ]
[ { "docid": "ff272c41a811b6e0031d6e90a895f919", "text": "Three-dimensional reconstruction of dynamic scenes is an important prerequisite for applications like mobile robotics or autonomous driving. While much progress has been made in recent years, imaging conditions in natural outdoor environments are still very challenging for current reconstruction and recognition methods. In this paper, we propose a novel unified approach which reasons jointly about 3D scene flow as well as the pose, shape and motion of vehicles in the scene. Towards this goal, we incorporate a deformable CAD model into a slanted-plane conditional random field for scene flow estimation and enforce shape consistency between the rendered 3D models and the parameters of all superpixels in the image. The association of superpixels to objects is established by an index variable which implicitly enables model selection. We evaluate our approach on the challenging KITTI scene flow dataset in terms of object and scene flow estimation. Our results provide a prove of concept and demonstrate the usefulness of our method.", "title": "" }, { "docid": "6c9acb831bc8dc82198aef10761506be", "text": "In the context of civil rights law, discrimination refers to unfair or unequal treatment of people based on membership to a category or a minority, without regard to individual merit. Rules extracted from databases by data mining techniques, such as classification or association rules, when used for decision tasks such as benefit or credit approval, can be discriminatory in the above sense. In this paper, the notion of discriminatory classification rules is introduced and studied. Providing a guarantee of non-discrimination is shown to be a non trivial task. A naive approach, like taking away all discriminatory attributes, is shown to be not enough when other background knowledge is available. Our approach leads to a precise formulation of the redlining problem along with a formal result relating discriminatory rules with apparently safe ones by means of background knowledge. An empirical assessment of the results on the German credit dataset is also provided.", "title": "" }, { "docid": "14e6cf0e85c184f85ae0ae6202246d91", "text": "The use of probiotics for human and animal health is continuously increasing. The probiotics used in humans commonly come from dairy foods, whereas the sources of probiotics used in animals are often the animals' own digestive tracts. Increasingly, probiotics from sources other than milk products are being selected for use in people who are lactose intolerant. These sources are non-dairy fermented foods and beverages, non-dairy and non-fermented foods such as fresh fruits and vegetables, feces of breast-fed infants and human breast milk. The probiotics that are used in both humans and animals are selected in stages; after the initial isolation of the appropriate culture medium, the probiotics must meet important qualifications, including being non-pathogenic acid and bile-tolerant strains that possess the ability to act against pathogens in the gastrointestinal tract and the safety-enhancing property of not being able to transfer any antibiotic resistance genes to other bacteria. The final stages of selection involve the accurate identification of the probiotic species.", "title": "" }, { "docid": "b56f65fd08c8b6a9fe9ff05441ff8734", "text": "While symbolic parsers can be viewed as deduction systems, t his view is less natural for probabilistic parsers. We present a view of parsing as directed hypergraph analysis which naturally covers both symbolic and probabilistic parsing. We illustrate the approach by showing how a dynamic extension of Dijkstra’s algorithm can be used to construct a probabilistic chart parser with an O(n3) time bound for arbitrary PCFGs, while preserving as much of t he flexibility of symbolic chart parsers as allowed by the inher ent ordering of probabilistic dependencies.", "title": "" }, { "docid": "cb67ffc6559d42628022994961179208", "text": "Accurate and reliable brain tumor segmentation is a critical component in cancer diagnosis, treatment planning, and treatment outcome evaluation. Build upon successful deep learning techniques, a novel brain tumor segmentation method is developed by integrating fully convolutional neural networks (FCNNs) and Conditional Random Fields (CRFs) in a unified framework to obtain segmentation results with appearance and spatial consistency. We train a deep learning based segmentation model using 2D image patches and image slices in following steps: 1) training FCNNs using image patches; 2) training CRFs as Recurrent Neural Networks (CRF-RNN) using image slices with parameters of FCNNs fixed; and 3) fine-tuning the FCNNs and the CRF-RNN using image slices. Particularly, we train 3 segmentation models using 2D image patches and slices obtained in axial, coronal and sagittal views respectively, and combine them to segment brain tumors using a voting based fusion strategy. Our method could segment brain images slice-by-slice, much faster than those based on image patches. We have evaluated our method based on imaging data provided by the Multimodal Brain Tumor Image Segmentation Challenge (BRATS) 2013, BRATS 2015 and BRATS 2016. The experimental results have demonstrated that our method could build a segmentation model with Flair, T1c, and T2 scans and achieve competitive performance as those built with Flair, T1, T1c, and T2 scans.", "title": "" }, { "docid": "efb81d85abcf62f4f3747a58154c5144", "text": "Visual signals in a video can be divided into content and motion. While content specifies which objects are in the video, motion describes their dynamics. Based on this prior, we propose the Motion and Content decomposed Generative Adversarial Network (MoCoGAN) framework for video generation. The proposed framework generates a video by mapping a sequence of random vectors to a sequence of video frames. Each random vector consists of a content part and a motion part. While the content part is kept fixed, the motion part is realized as a stochastic process. To learn motion and content decomposition in an unsupervised manner, we introduce a novel adversarial learning scheme utilizing both image and video discriminators. Extensive experimental results on several challenging datasets with qualitative and quantitative comparison to the state-of-the-art approaches, verify effectiveness of the proposed framework. In addition, we show that MoCoGAN allows one to generate videos with same content but different motion as well as videos with different content and same motion. Our code is available at https://github.com/sergeytulyakov/mocogan.", "title": "" }, { "docid": "4424a73177671ce5f1abcd304e546434", "text": "Photorealistic frontal view synthesis from a single face image has a wide range of applications in the field of face recognition. Although data-driven deep learning methods have been proposed to address this problem by seeking solutions from ample face data, this problem is still challenging because it is intrinsically ill-posed. This paper proposes a Two-Pathway Generative Adversarial Network (TP-GAN) for photorealistic frontal view synthesis by simultaneously perceiving global structures and local details. Four landmark located patch networks are proposed to attend to local textures in addition to the commonly used global encoderdecoder network. Except for the novel architecture, we make this ill-posed problem well constrained by introducing a combination of adversarial loss, symmetry loss and identity preserving loss. The combined loss function leverages both frontal face distribution and pre-trained discriminative deep face models to guide an identity preserving inference of frontal views from profiles. Different from previous deep learning methods that mainly rely on intermediate features for recognition, our method directly leverages the synthesized identity preserving image for downstream tasks like face recognition and attribution estimation. Experimental results demonstrate that our method not only presents compelling perceptual results but also outperforms state-of-theart results on large pose face recognition.", "title": "" }, { "docid": "51fb43ac979ce0866eb541adc145ba70", "text": "In many cooperatively breeding species, group members form a dominance hierarchy or queue to inherit the position of breeder. Models aimed at understanding individual variation in helping behavior, however, rarely take into account the effect of dominance rank on expected future reproductive success and thus the potential direct fitness costs of helping. Here we develop a kin-selection model of helping behavior in multimember groups in which only the highest ranking individual breeds. Each group member can invest in the dominant’s offspring at a cost to its own survivorship. The model predicts that lower ranked subordinates, who have a smaller probability of inheriting the group, should work harder than higher ranked subordinates. This prediction holds regardless of whether the intrinsic mortality rate of subordinates increases or decreases with rank. The prediction does not necessarily hold, however, where the costs of helping are higher for lower ranked individuals: a situation that may be common in vertebrates. The model makes two further testable predictions: that the helping effort of an individual of given rank should be lower in larger groups, and the reproductive success of dominants should be greater where group members are more closely related. Empirical evidence for these predictions is discussed. We argue that the effects of rank on stable helping effort may explain why attempts to correlate individual helping effort with relatedness in cooperatively breeding species have met with limited success.", "title": "" }, { "docid": "3f4c1474f79a4d3b179d2a8391719d5f", "text": "An unresolved challenge for all kind of temporal data is the reliable anomaly detection, especially when adaptability is required in the case of non-stationary time series or when the nature of future anomalies is unknown or only vaguely defined. Most of the current anomaly detection algorithms follow the general idea to classify an anomaly as a significant deviation from the prediction. In this paper we present a comparative study where several online anomaly detection algorithms are compared on the large Yahoo Webscope S5 anomaly benchmark. We show that a relatively Simple Online Regression Anomaly Detector (SORAD) is quite successful compared to other anomaly detectors. We discuss the importance of several adaptive and online elements of the algorithm and their influence on the overall anomaly detection accuracy.", "title": "" }, { "docid": "4c2b22c651aa4cc40807cc92a044a008", "text": "Robotic grasping is very sensitive to how accurate is the pose estimation of the object to grasp. Even a small error in the estimated pose may cause the planned grasp to fail. Several methods for robust grasp planning exploit the object geometry or tactile sensor feedback. However, object pose range estimation introduces specific uncertainties that can also be exploited to choose more robust grasps. We present a grasp planning method that explicitly considers the uncertainties on the visually-estimated object pose. We assume a known shape (e.g. primitive shape or triangle mesh), observed as a –possibly sparse– point cloud. The measured points are usually not uniformly distributed over the surface as the object is seen from a particular viewpoint; additionally this non-uniformity can be the result of heterogeneous textures over the object surface, when using stereo-vision algorithms based on robust feature-point matching. Consequently the pose estimation may be more accurate in some directions and contain unavoidable ambiguities. The proposed grasp planner is based on a particle filter to estimate the object probability distribution as a discrete set. We show that, for grasping, some ambiguities are less unfavorable so the distribution can be used to select robust grasps. Some experiments are presented with the humanoid robot iCub and its stereo cameras.", "title": "" }, { "docid": "74686e9acab0a4d41c87cadd7da01889", "text": "Automatic analysis of biomedical time series such as electroencephalogram (EEG) and electrocardiographic (ECG) signals has attracted great interest in the community of biomedical engineering due to its important applications in medicine. In this work, a simple yet effective bag-of-words representation that is able to capture both local and global structure similarity information is proposed for biomedical time series representation. In particular, similar to the bag-of-words model used in text document domain, the proposed method treats a time series as a text document and extracts local segments from the time series as words. The biomedical time series is then represented as a histogram of codewords, each entry of which is the count of a codeword appeared in the time series. Although the temporal order of the local segments is ignored, the bag-of-words representation is able to capture high-level structural information because both local and global structural information are well utilized. The performance of the bag-of-words model is validated on three datasets extracted from real EEG and ECG signals. The experimental results demonstrate that the proposed method is not only insensitive to parameters of the bag-of-words model such as local segment length and codebook size, but also robust to noise.", "title": "" }, { "docid": "7e557091d8cfe6209b1eda3b664ab551", "text": "With the increasing penetration of mobile phones, problematic use of mobile phone (PUMP) deserves attention. In this study, using a path model we examined the relationship between depression and PUMP, with motivations as mediators. Findings suggest that depressed people may rely on mobile phone to alleviate their negative feelings and spend more time on communication activities via mobile phone, which in turn can deteriorate into PUMP. However, face-to-face communication with others played a moderating role, weakening the link between use of mobile phone for communication activities and dete-", "title": "" }, { "docid": "9f005054e640c2db97995c7540fe2034", "text": "Attack detection is usually approached as a classification problem. However, standard classification tools often perform poorly, because an adaptive attacker can shape his attacks in response to the algorithm. This has led to the recent interest in developing methods for adversarial classification, but to the best of our knowledge, there have been a very few prior studies that take into account the attacker’s tradeoff between adapting to the classifier being used against him with his desire to maintain the efficacy of his attack. Including this effect is a key to derive solutions that perform well in practice. In this investigation, we model the interaction as a game between a defender who chooses a classifier to distinguish between attacks and normal behavior based on a set of observed features and an attacker who chooses his attack features (class 1 data). Normal behavior (class 0 data) is random and exogenous. The attacker’s objective balances the benefit from attacks and the cost of being detected while the defender’s objective balances the benefit of a correct attack detection and the cost of false alarm. We provide an efficient algorithm to compute all Nash equilibria and a compact characterization of the possible forms of a Nash equilibrium that reveals intuitive messages on how to perform classification in the presence of an attacker. We also explore qualitatively and quantitatively the impact of the non-attacker and underlying parameters on the equilibrium strategies.", "title": "" }, { "docid": "9fd3321922a73539210cb5b73d8d5d9c", "text": "This paper presents a new model for controlling information flow in systems with mutual distrust and decentralized authority. The model allows users to share information with distrusted code (e.g., downloaded applets), yet still control how that code disseminates the shared information to others. The model improves on existing multilevel security models by allowing users to declassify information in a decentralized way, and by improving support for fine-grained data sharing. The paper also shows how static program analysis can be used to certify proper information flows in this model and to avoid most run-time information flow checks.", "title": "" }, { "docid": "2710a25b3cf3caf5ebd5fb9f08c9e5e3", "text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.", "title": "" }, { "docid": "4287b25e6e80d16d3d19f69bece2dfcc", "text": "Short ranges and limited field-of-views in semi-passive radio frequency identification (RFID) tags are the most prominent obstacles that limit the number of RFID applications relying on backscatter modulation to exchange data between a reader and a tag. We propose a retrodirective array structure that, if equipped on a tag, can increase the field-of-view and the coverage area of RFID systems by making the tag insensitive to its orientation with respect to one or more RFID readers. In this article, we derive and experimentally validate the conditions under which a rat-race coupler is retrodirective. The performance of the fabricated passive retrodirective structure is evaluated through the retrodirective ideality factor (RIF) amounting to a value of 1.003, which is close to the ideal RIF of one. The article ends with a discussion on how the proposed design can improve current RFID systems from a communication perspective.", "title": "" }, { "docid": "67544e71b45acb84923a3db84534a377", "text": "The precision of point-of-gaze (POG) estimation during a fixation is an important factor in determining the usability of a noncontact eye-gaze tracking system for real-time applications. The objective of this paper is to define and measure POG fixation precision, propose methods for increasing the fixation precision, and examine the improvements when the methods are applied to two POG estimation approaches. To achieve these objectives, techniques for high-speed image processing that allow POG sampling rates of over 400 Hz are presented. With these high-speed POG sampling rates, the fixation precision can be improved by filtering while maintaining an acceptable real-time latency. The high-speed sampling and digital filtering techniques developed were applied to two POG estimation techniques, i.e., the highspeed pupil-corneal reflection (HS P-CR) vector method and a 3-D model-based method allowing free head motion. Evaluation on the subjects has shown that when operating at 407 frames per second (fps) with filtering, the fixation precision for the HS P-CR POG estimation method was improved by a factor of 5.8 to 0.035deg (1.6 screen pixels) compared to the unfiltered operation at 30 fps. For the 3-D POG estimation method, the fixation precision was improved by a factor of 11 to 0.050deg (2.3 screen pixels) compared to the unfiltered operation at 30 fps.", "title": "" }, { "docid": "5d48b6fcc1d8f1050b5b5dc60354fedb", "text": "The latency in the current neural based dialogue state tracking models prohibits them from being used efficiently for deployment in production systems, albeit their highly accurate performance. This paper proposes a new scalable and accurate neural dialogue state tracking model, based on the recently proposed Global-Local Self-Attention encoder (GLAD) model by Zhong et al. (2018) which uses global modules to share parameters between estimators for different types (called slots) of dialogue states, and uses local modules to learn slot-specific features. By using only one recurrent networks with global conditioning, compared to (1 + # slots) recurrent networks with global and local conditioning used in the GLAD model, our proposed model reduces the latency in training and inference times by 35% on average, while preserving performance of belief state tracking, by 97.38% on turn request and 88.51% on joint goal and accuracy. Evaluation on Multi-domain dataset (Multi-WoZ) also demonstrates that our model outperforms GLAD on turn inform and joint goal accuracy.", "title": "" }, { "docid": "fe38b44457f89bcb63aabe65babccd03", "text": "Single sample face recognition have become an important problem because of the limitations on the availability of gallery images. In many real-world applications such as passport or driver license identification, there is only a single facial image per subject available. The variations between the single gallery face image and the probe face images, captured in unconstrained environments, make the single sample face recognition even more difficult. In this paper, we present a fully automatic face recognition system robust to most common face variations in unconstrained environments. Our proposed system is capable of recognizing faces from non-frontal views and under different illumination conditions using only a single gallery sample for each subject. It normalizes the face images for both in-plane and out-of-plane pose variations using an enhanced technique based on active appearance models (AAMs). We improve the performance of AAM fitting, not only by training it with in-the-wild images and using a powerful optimization technique, but also by initializing the AAM with estimates of the locations of the facial landmarks obtained by a method based on flexible mixture of parts. The proposed initialization technique results in significant improvement of AAM fitting to non-frontal poses and makes the normalization process robust, fast and reliable. Owing to the proper alignment of the face images, made possible by this approach, we can use local feature descriptors, such as Histograms of Oriented Gradients (HOG), for matching. The use of HOG features makes the system robust against illumination variations. In order to improve the discriminating information content of the feature vectors, we also extract Gabor features from the normalized face images and fuse them with HOG features using Canonical Correlation Analysis (CCA). Experimental results performed on various databases outperform the state-of-the-art methods and show the effectiveness of our proposed method in normalization and recognition of face images obtained in unconstrained environments.", "title": "" } ]
scidocsrr
8cb7a552bede83ab496868c160895e99
Two people walk into a bar: dynamic multi-party social interaction with a robot agent
[ { "docid": "1836291f68e18f8975803f6acbb302be", "text": "We review key challenges of developing spoken dialog systems that can engage in interactions with one or multiple participants in relatively unconstrained environments. We outline a set of core competencies for open-world dialog, and describe three prototype systems. The systems are built on a common underlying conversational framework which integrates an array of predictive models and component technologies, including speech recognition, head and pose tracking, probabilistic models for scene analysis, multiparty engagement and turn taking, and inferences about user goals and activities. We discuss the current models and showcase their function by means of a sample recorded interaction, and we review results from an observational study of open-world, multiparty dialog in the wild.", "title": "" }, { "docid": "8a56b4d4f69466aee0d5eff0c09cd514", "text": "This paper explores how a robot’s physical presence affects human judgments of the robot as a social partner. For this experiment, participants collaborated on simple book-moving tasks with a humanoid robot that was either physically present or displayed via a live video feed. Multiple tasks individually examined the following aspects of social interaction: greetings, cooperation, trust, and personal space. Participants readily greeted and cooperated with the robot whether present physically or in live video display. However, participants were more likely both to fulfill an unusual request and to afford greater personal space to the robot when it was physically present, than when it was shown on live video. The same was true when the live video displayed robot’s gestures were augmented with disambiguating 3-D information. Questionnaire data support these behavioral findings and also show that participants had an overall more positive interaction with the physically present", "title": "" } ]
[ { "docid": "6eb8e1a391398788d9b4be294b8a70d1", "text": "To improve software quality, researchers and practitioners have proposed static analysis tools for various purposes (e.g., detecting bugs, anomalies, and vulnerabilities). Although many such tools are powerful, they typically need complete programs where all the code names (e.g., class names, method names) are resolved. In many scenarios, researchers have to analyze partial programs in bug fixes (the revised source files can be viewed as a partial program), tutorials, and code search results. As a partial program is a subset of a complete program, many code names in partial programs are unknown. As a result, despite their syntactical correctness, existing complete-code tools cannot analyze partial programs, and existing partial-code tools are limited in both their number and analysis capability. Instead of proposing another tool for analyzing partial programs, we propose a general approach, called GRAPA, that boosts existing tools for complete programs to analyze partial programs. Our major insight is that after unknown code names are resolved, tools for complete programs can analyze partial programs with minor modifications. In particular, GRAPA locates Java archive files to resolve unknown code names, and resolves the remaining unknown code names from resolved code names. To illustrate GRAPA, we implement a tool that leverages the state-of-the-art tool, WALA, to analyze Java partial programs. We thus implemented the first tool that is able to build system dependency graphs for partial programs, complementing existing tools. We conduct an evaluation on 8,198 partial-code commits from four popular open source projects. Our results show that GRAPA fully resolved unknown code names for 98.5% bug fixes, with an accuracy of 96.1% in total. Furthermore, our results show the significance of GRAPA's internal techniques, which provides insights on how to integrate with more complete-code tools to analyze partial programs.", "title": "" }, { "docid": "d62c2e7ca3040900d04f83ef4f99de4f", "text": "Manual classification of brain tumor is time devastating and bestows ambiguous results. Automatic image classification is emergent thriving research area in medical field. In the proposed methodology, features are extracted from raw images which are then fed to ANFIS (Artificial neural fuzzy inference system).ANFIS being neuro-fuzzy system harness power of both hence it proves to be a sophisticated framework for multiobject classification. A comprehensive feature set and fuzzy rules are selected to classify an abnormal image to the corresponding tumor type. This proposed technique is fast in execution, efficient in classification and easy in implementation.", "title": "" }, { "docid": "f1255742f2b1851457dd92ad97db7c8e", "text": "Model transformations are frequently applied in business process modeling to bridge between languages on a different level of abstraction and formality. In this paper, we define a transformation between BPMN which is developed to enable business user to develop readily understandable graphical representations of business processes and YAWL, a formal workflow language that is able to capture all of the 20 workflow patterns reported. We illustrate the transformation challenges and present a suitable transformation algorithm. The benefit of the transformation is threefold. Firstly, it clarifies the semantics of BPMN via a mapping to YAWL. Secondly, the deployment of BPMN business process models is simplified. Thirdly, BPMN models can be analyzed with YAWL verification tools.", "title": "" }, { "docid": "bd1ab7a30b4478a6320e5cad4698c2b4", "text": "Corresponding Author: Jing Wang Boston University, Boston, MA, USA Email: jwa222@bu.edu Abstract: Non-inferiority of a diagnostic test to the standard is a common issue in medical research. For instance, we may be interested in determining if a new diagnostic test is noninferior to the standard reference test because the new test might be inexpensive to the extent that some small inferior margin in sensitivity or specificity may be acceptable. Noninferiority trials are also found to be useful in clinical trials, such as image studies, where the data are collected in pairs. Conventional noninferiority trials for paired binary data are designed with a fixed sample size and no interim analysis is allowed. Adaptive design which allows for interim modifications of the trial becomes very popular in recent years and are widely used in clinical trials because of its efficiency. However, to our knowledge there is no adaptive design method available for noninferiority trial with paired binary data. In this study, we developed an adaptive design method for non-inferiority trials with paired binary data, which can also be used for superiority trials when the noninferiority margin is set to zero. We included a trial example and provided the SAS program for the design simulations.", "title": "" }, { "docid": "0df2f2c6e7d9c16a767cb5630244ec35", "text": "Alim Samat 1,2,*, Paolo Gamba 3, Jilili Abuduwaili 1,2, Sicong Liu 4 and Zelang Miao 5 1 State Key Laboratory of Desert and Oasis Ecology, Xinjiang Institute of Ecology and Geography, Chinese Academy of Sciences, Urumqi 830011, China; jilil@ms.xjb.ac.cn 2 Chinese Academy of Sciences Research Center for Ecology and Environment of Central Asia, Urumqi 830011, China 3 Department of Electrical, Computer and Biomedical Engineering, University of Pavia, 27100 Pavia, Italy; paolo.gamba@unipv.it 4 College of Surveying and Geoinformatics, Tongji University, Shanghai 200092, China; sicongliu.rs@gmail.com 5 Department of Land Surveying and Geo-Informatics, Hong Kong Polytechnic University, Kowloon, Hong Kong 999077, China; cumtzlmiao@gmail.com * Correspondence: alim.smt@gmail.com; Tel.: +86-991-788-5432", "title": "" }, { "docid": "5e3d770390e03445c079c05a097fb891", "text": "Electronic Commerce has increased the global reach of small and medium scale enterprises (SMEs); its acceptance as an IT infrastructure depends on the users’ conscious assessment of the influencing constructs as depicted in Technology Acceptance Model (TAM), Theory of Reasoned Action (TRA), Theory of Planned Behaviour (TPB), and Technology-Organization-Environment (T-O-E) model. The original TAM assumes the constructs of perceived usefulness (PU) and perceived ease of use (PEOU); TPB perceived behavioural control and subjective norms; and T-O-E firm’s size, consumer readiness, trading partners’ readiness, competitive pressure, and scope of business operation. This paper reviewed and synthesized the constructs of these models and proposed an improved TAM through T-O-E. The improved TAM and T-O-E integrated more constructs than the original TAM, T-O-E, TPB, and IDT, leading to eighteen propositions to promote and facilitate future research, and to guide explanation and prediction of IT adoption in an organized system. The integrated constructscompany mission, individual difference factors, perceived trust, and perceived service quality improve existing knowledge on EC acceptance and provide bases for informed decision(s).", "title": "" }, { "docid": "816b2ed7d4b8ce3a8fc54e020bc2f712", "text": "As a standardized communication protocol, OPC UA is the main focal point with regard to information exchange in the ongoing initiative Industrie 4.0. But there are also considerations to use it within the Internet of Things. The fact that currently no open reference implementation can be used in research for free represents a major problem in this context. The authors have the opinion that open source software can stabilize the ongoing theoretical work. Recent efforts to develop an open implementation for OPC UA were not able to meet the requirements of practical and industrial automation technology. This issue is addressed by the open62541 project which is presented in this article including an overview of its application fields and main research issues.", "title": "" }, { "docid": "e247a8ae2a83150d83a8248ec96a4708", "text": "Benjamin Beck’s definition of tool use has served the field of animal cognition well for over 25 years (Beck 1980, Animal Tool Behavior: the Use and Manufacture of Tools, New York, Garland STPM). This article proposes a new, more explanatory definition that accounts for tool use in terms of two complementary subcategories of behaviours: behaviours aimed at altering a target object by mechanical means and behaviours that mediate the flow of information between the tool user and the environment or other organisms in the environment. The conceptual foundation and implications of the new definition are contrasted with those of existing definitions, particularly Beck’s. The new definition is informally evaluated with respect to a set of scenarios that highlights differences from Beck’s definition as well as those of others in the literature.", "title": "" }, { "docid": "aac3060a199b016e38be800c213c9dba", "text": "In this paper, we investigate the use of electroencephalograhic signals for the purpose of recognizing unspoken speech. The term unspoken speech refers to the process in which a subject imagines speaking a given word without moving any articulatory muscle or producing any audible sound. Early work by Wester (Wester, 2006) presented results which were initially interpreted to be related to brain activity patterns due to the imagination of pronouncing words. However, subsequent investigations lead to the hypothesis that the good recognition performance might instead have resulted from temporal correlated artifacts in the brainwaves since the words were presented in blocks. In order to further investigate this hypothesis, we run a study with 21 subjects, recording 16 EEG channels using a 128 cap montage. The vocabulary consists of 5 words, each of which is repeated 20 times during a recording session in order to train our HMM-based classifier. The words are presented in blockwise, sequential, and random order. We show that the block mode yields an average recognition rate of 45.50%, but it drops to chance level for all other modes. Our experiments suggest that temporal correlated artifacts were recognized instead of words in block recordings and back the above-mentioned hypothesis.", "title": "" }, { "docid": "566913d3a3d2e8fe24d6f5ff78440b94", "text": "We describe a Digital Advertising System Simulation (DASS) for modeling advertising and its impact on user behavior. DASS is both flexible and general, and can be applied to research on a wide range of topics, such as digital attribution, ad fatigue, campaign optimization, and marketing mix modeling. This paper introduces the basic DASS simulation framework and illustrates its application to digital attribution. We show that common position-based attribution models fail to capture the true causal effects of advertising across several simple scenarios. These results lay a groundwork for the evaluation of more complex attribution models, and the development of improved models.", "title": "" }, { "docid": "a2adeb9448c699bbcbb10d02a87e87a5", "text": "OBJECTIVE\nTo quantify the presence of health behavior theory constructs in iPhone apps targeting physical activity.\n\n\nMETHODS\nThis study used a content analysis of 127 apps from Apple's (App Store) Health & Fitness category. Coders downloaded the apps and then used an established theory-based instrument to rate each app's inclusion of theoretical constructs from prominent behavior change theories. Five common items were used to measure 20 theoretical constructs, for a total of 100 items. A theory score was calculated for each app. Multiple regression analysis was used to identify factors associated with higher theory scores.\n\n\nRESULTS\nApps were generally observed to be lacking in theoretical content. Theory scores ranged from 1 to 28 on a 100-point scale. The health belief model was the most prevalent theory, accounting for 32% of all constructs. Regression analyses indicated that higher priced apps and apps that addressed a broader activity spectrum were associated with higher total theory scores.\n\n\nCONCLUSION\nIt is not unexpected that apps contained only minimal theoretical content, given that app developers come from a variety of backgrounds and many are not trained in the application of health behavior theory. The relationship between price and theory score corroborates research indicating that higher quality apps are more expensive. There is an opportunity for health and behavior change experts to partner with app developers to incorporate behavior change theories into the development of apps. These future collaborations between health behavior change experts and app developers could foster apps superior in both theory and programming possibly resulting in better health outcomes.", "title": "" }, { "docid": "ede1f31a32e59d29ee08c64c1a6ed5f7", "text": "There are different approaches to the problem of assigning each word of a text with a parts-of-speech tag, which is known as Part-Of-Speech (POS) tagging. In this paper we compare the performance of a few POS tagging techniques for Bangla language, e.g. statistical approach (n-gram, HMM) and transformation based approach (Brill’s tagger). A supervised POS tagging approach requires a large amount of annotated training corpus to tag properly. At this initial stage of POS-tagging for Bangla, we have very limited resource of annotated corpus. We tried to see which technique maximizes the performance with this limited resource. We also checked the performance for English and tried to conclude how these techniques might perform if we can manage a substantial amount of annotated corpus.", "title": "" }, { "docid": "122fe53f1e745480837a23b68e62540a", "text": "The images degraded by fog suffer from poor contrast. In order to remove fog effect, a Contrast Limited Adaptive Histogram Equalization (CLAHE)-based method is presented in this paper. This method establishes a maximum value to clip the histogram and redistributes the clipped pixels equally to each gray-level. It can limit the noise while enhancing the image contrast. In our method, firstly, the original image is converted from RGB to HSI. Secondly, the intensity component of the HSI image is processed by CLAHE. Finally, the HSI image is converted back to RGB image. To evaluate the effectiveness of the proposed method, we experiment with a color image degraded by fog and apply the edge detection to the image. The results show that our method is effective in comparison with traditional methods. KeywordsCLAHE, fog, degraded, remove, color image, HSI, edge detection.", "title": "" }, { "docid": "d7b77fae980b3bc26ffb4917d6d093c1", "text": "This work presents a combination of a teach-and-replay visual navigation and Monte Carlo localization methods. It improves a reliable teach-and-replay navigation method by replacing its dependency on precise dead-reckoning by introducing Monte Carlo localization to determine robot position along the learned path. In consequence, the navigation method becomes robust to dead-reckoning errors, can be started from at any point in the map and can deal with the ‘kidnapped robot’ problem. Furthermore, the robot is localized with MCL only along the taught path, i.e. in one dimension, which does not require a high number of particles and significantly reduces the computational cost. Thus, the combination of MCL and teach-and-replay navigation mitigates the disadvantages of both methods. The method was tested using a P3-AT ground robot and a Parrot AR.Drone aerial robot over a long indoor corridor. Experiments show the validity of the approach and establish a solid base for continuing this work.", "title": "" }, { "docid": "7d0a7073733f8393478be44d820e89ae", "text": "Modeling user-item interaction patterns is an important task for personalized recommendations. Many recommender systems are based on the assumption that there exists a linear relationship between users and items while neglecting the intricacy and non-linearity of real-life historical interactions. In this paper, we propose a neural network based recommendation model (NeuRec) that untangles the complexity of user-item interactions and establish an integrated network to combine non-linear transformation with latent factors. We further design two variants of NeuRec: userbased NeuRec and item-based NeuRec, by focusing on different aspects of the interaction matrix. Extensive experiments on four real-world datasets demonstrated their superior performances on personalized ranking task.", "title": "" }, { "docid": "76f68e1741a4022ce987d1b5da6fb0ff", "text": "Transfer in reinforcement learning is a novel research area that focuses on the development of methods to transfer knowledge from a se t of source tasks to a target task. Whenever the tasks are similar, the transferred knowledge can be used by a learning algorithm to solve the target task and sign ifica tly improve its performance (e.g., by reducing the number of samples needed to achieve a nearly optimal performance). In this chapter we provide a formaliz ation of the general transfer problem, we identify the main settings which have b e n investigated so far, and we review the most important approaches to transfer in re inforcement learning.", "title": "" }, { "docid": "888e55e684cd3fa4f09473672fc0a865", "text": "Node-link diagrams are an effective and popular visualization approach for depicting hierarchical structures and for showing parent-child relationships. In this paper, we present the results of an eye tracking experiment investigating traditional, orthogonal, and radial node-link tree layouts as a piece of empirical basis for choosing between those layouts. Eye tracking was used to identify visual exploration behaviors of participants that were asked to solve a typical hierarchy exploration task by inspecting a static tree diagram: finding the least common ancestor of a given set of marked leaf nodes. To uncover exploration strategies, we examined fixation points, duration, and saccades of participants' gaze trajectories. For the non-radial diagrams, we additionally investigated the effect of diagram orientation by switching the position of the root node to each of the four main orientations. We also recorded and analyzed correctness of answers as well as completion times in addition to the eye movement data. We found out that traditional and orthogonal tree layouts significantly outperform radial tree layouts for the given task. Furthermore, by applying trajectory analysis techniques we uncovered that participants cross-checked their task solution more often in the radial than in the non-radial layouts.", "title": "" }, { "docid": "c55c4fed2a96f9be539fec42de857d0c", "text": "This paper presents a new inertial power generator for scavenging low-frequency nonperiodic vibrations called the Parametric Frequency-Increased Generator (PFIG). The PFIG utilizes three magnetically coupled mechanical structures to initiate high-frequency mechanical oscillations in an electromechanical transducer. The fixed internal displacement and dynamics of the PFIG allow it to operate more effectively than resonant generators when the ambient vibration amplitude is higher than the internal displacement limit of the device. The design, fabrication, and testing of an electromagnetic PFIG are discussed. The developed PFIG can generate a peak power of 163 μW and an average power of 13.6 μW from an input acceleration of 9.8 m/s2 at 10 Hz, and it can operate at frequencies up to 65 Hz, giving it an unprecedented operating bandwidth and versatility. The internal volume of the generator is 2.12 cm3 (3.75 cm3 including the casing). The harvester has a volume figure of merit of 0.068% and a bandwidth figure of merit of 0.375%. These values, although seemingly low, are the highest reported in the literature for a device of this size and operating in the difficult frequency range of ≤ 20 Hz.", "title": "" }, { "docid": "32faa5a14922d44101281c783cf6defb", "text": "A novel multifocus color image fusion algorithm based on the quaternion wavelet transform (QWT) is proposed in this paper, aiming at solving the image blur problem. The proposed method uses a multiresolution analysis procedure based on the quaternion wavelet transform. The performance of the proposed fusion scheme is assessed by some experiments, and the experimental results show that the proposed method is effective and performs better than the existing fusion methods.", "title": "" }, { "docid": "0fc051613dd8ac7b555a85f0ed2cccbc", "text": "BACKGROUND\nAtezolizumab is a humanised antiprogrammed death-ligand 1 (PD-L1) monoclonal antibody that inhibits PD-L1 and programmed death-1 (PD-1) and PD-L1 and B7-1 interactions, reinvigorating anticancer immunity. We assessed its efficacy and safety versus docetaxel in previously treated patients with non-small-cell lung cancer.\n\n\nMETHODS\nWe did a randomised, open-label, phase 3 trial (OAK) in 194 academic or community oncology centres in 31 countries. We enrolled patients who had squamous or non-squamous non-small-cell lung cancer, were 18 years or older, had measurable disease per Response Evaluation Criteria in Solid Tumors, and had an Eastern Cooperative Oncology Group performance status of 0 or 1. Patients had received one to two previous cytotoxic chemotherapy regimens (one or more platinum based combination therapies) for stage IIIB or IV non-small-cell lung cancer. Patients with a history of autoimmune disease and those who had received previous treatments with docetaxel, CD137 agonists, anti-CTLA4, or therapies targeting the PD-L1 and PD-1 pathway were excluded. Patients were randomly assigned (1:1) to intravenously receive either atezolizumab 1200 mg or docetaxel 75 mg/m2 every 3 weeks by permuted block randomisation (block size of eight) via an interactive voice or web response system. Coprimary endpoints were overall survival in the intention-to-treat (ITT) and PD-L1-expression population TC1/2/3 or IC1/2/3 (≥1% PD-L1 on tumour cells or tumour-infiltrating immune cells). The primary efficacy analysis was done in the first 850 of 1225 enrolled patients. This study is registered with ClinicalTrials.gov, number NCT02008227.\n\n\nFINDINGS\nBetween March 11, 2014, and April 29, 2015, 1225 patients were recruited. In the primary population, 425 patients were randomly assigned to receive atezolizumab and 425 patients were assigned to receive docetaxel. Overall survival was significantly longer with atezolizumab in the ITT and PD-L1-expression populations. In the ITT population, overall survival was improved with atezolizumab compared with docetaxel (median overall survival was 13·8 months [95% CI 11·8-15·7] vs 9·6 months [8·6-11·2]; hazard ratio [HR] 0·73 [95% CI 0·62-0·87], p=0·0003). Overall survival in the TC1/2/3 or IC1/2/3 population was improved with atezolizumab (n=241) compared with docetaxel (n=222; median overall survival was 15·7 months [95% CI 12·6-18·0] with atezolizumab vs 10·3 months [8·8-12·0] with docetaxel; HR 0·74 [95% CI 0·58-0·93]; p=0·0102). Patients in the PD-L1 low or undetectable subgroup (TC0 and IC0) also had improved survival with atezolizumab (median overall survival 12·6 months vs 8·9 months; HR 0·75 [95% CI 0·59-0·96]). Overall survival improvement was similar in patients with squamous (HR 0·73 [95% CI 0·54-0·98]; n=112 in the atezolizumab group and n=110 in the docetaxel group) or non-squamous (0·73 [0·60-0·89]; n=313 and n=315) histology. Fewer patients had treatment-related grade 3 or 4 adverse events with atezolizumab (90 [15%] of 609 patients) versus docetaxel (247 [43%] of 578 patients). One treatment-related death from a respiratory tract infection was reported in the docetaxel group.\n\n\nINTERPRETATION\nTo our knowledge, OAK is the first randomised phase 3 study to report results of a PD-L1-targeted therapy, with atezolizumab treatment resulting in a clinically relevant improvement of overall survival versus docetaxel in previously treated non-small-cell lung cancer, regardless of PD-L1 expression or histology, with a favourable safety profile.\n\n\nFUNDING\nF. Hoffmann-La Roche Ltd, Genentech, Inc.", "title": "" } ]
scidocsrr
130d198e2811a56148735b62373a75a0
End-to-End Incremental Learning
[ { "docid": "41a0681812527ef288ac4016550e53dd", "text": "Supervised learning using deep convolutional neural network has shown its promise in large-scale image classification task. As a building block, it is now well positioned to be part of a larger system that tackles real-life multimedia tasks. An unresolved issue is that such model is trained on a static snapshot of data. Instead, this paper positions the training as a continuous learning process as new classes of data arrive. A system with such capability is useful in practical scenarios, as it gradually expands its capacity to predict increasing number of new classes. It is also our attempt to address the more fundamental issue: a good learning system must deal with new knowledge that it is exposed to, much as how human do.\n We developed a training algorithm that grows a network not only incrementally but also hierarchically. Classes are grouped according to similarities, and self-organized into levels. The newly added capacities are divided into component models that predict coarse-grained superclasses and those return final prediction within a superclass. Importantly, all models are cloned from existing ones and can be trained in parallel. These models inherit features from existing ones and thus further speed up the learning. Our experiment points out advantages of this approach, and also yields a few important open questions.", "title": "" } ]
[ { "docid": "b42f3575dad9615a40f491291661e7c5", "text": "Novel neural models have been proposed in recent years for learning under domain shift. Most models, however, only evaluate on a single task, on proprietary datasets, or compare to weak baselines, which makes comparison of models difficult. In this paper, we re-evaluate classic general-purpose bootstrapping approaches in the context of neural networks under domain shifts vs. recent neural approaches and propose a novel multi-task tri-training method that reduces the time and space complexity of classic tri-training. Extensive experiments on two benchmarks are negative: while our novel method establishes a new state-of-the-art for sentiment analysis, it does not fare consistently the best. More importantly, we arrive at the somewhat surprising conclusion that classic tri-training, with some additions, outperforms the state of the art. We conclude that classic approaches constitute an important and strong baseline.", "title": "" }, { "docid": "ea4c62866699e239a277c62501cccd11", "text": "The oil, aqueous infusion and decoction of oregano (Origanum vulgare), of the family Limiaceae, were asessed for antibacterial activity against 11 different genera of Gram–ve bacilli viz., Aeromonas hydrophila, Citrobacter sp., Enterobacter aerogenese, Escherichia coli, Flavobacterium sp., Klebsiella ozaenae, K. pneumoniae, Proteus mirabilis, Pseudomonas aeruginosa, Salmonella typhi, S. paratyphi B, Serratia marcescens and Shigella dysenteriae, by disc diffusion method. Oregano oil exhibited the highest activity against Citrobacter species with mean zone of inhibition of 24.0 mm ± 0.5. The aqueous infusion also showed significant inhibitory activity against Klebsiella pneumoniae (20.1 mm ± 6.1 SD), Klebsiella ozaenae (19.5 mm ± 0.5 SD) and Enterobacter aerogenes (18.0 mm). Besides, all isolates were found resistant to the aqueous decoction of oregano seeds.", "title": "" }, { "docid": "df0be45b6db0de70acb6bbf44e7898aa", "text": "The paper focuses on conservation agriculture (CA), defined as minimal soil disturbance (no-till, NT) and permanent soil cover (mulch) combined with rotations, as a more sustainable cultivation system for the future. Cultivation and tillage play an important role in agriculture. The benefits of tillage in agriculture are explored before introducing conservation tillage (CT), a practice that was borne out of the American dust bowl of the 1930s. The paper then describes the benefits of CA, a suggested improvement on CT, where NT, mulch and rotations significantly improve soil properties and other biotic factors. The paper concludes that CA is a more sustainable and environmentally friendly management system for cultivating crops. Case studies from the rice-wheat areas of the Indo-Gangetic Plains of South Asia and the irrigated maize-wheat systems of Northwest Mexico are used to describe how CA practices have been used in these two environments to raise production sustainably and profitably. Benefits in terms of greenhouse gas emissions and their effect on global warming are also discussed. The paper concludes that agriculture in the next decade will have to sustainably produce more food from less land through more efficient use of natural resources and with minimal impact on the environment in order to meet growing population demands. Promoting and adopting CA management systems can help meet this goal.", "title": "" }, { "docid": "65e273d046a8120532d8cd04bcadca56", "text": "This paper explores the relationship between domain scheduling in avirtual machine monitor (VMM) and I/O performance. Traditionally, VMM schedulers have focused on fairly sharing the processor resources among domains while leaving the scheduling of I/O resources as asecondary concern. However, this can resultin poor and/or unpredictable application performance, making virtualization less desirable for applications that require efficient and consistent I/O behavior.\n This paper is the first to study the impact of the VMM scheduler on performance using multiple guest domains concurrently running different types of applications. In particular, different combinations of processor-intensive, bandwidth-intensive, andlatency-sensitive applications are run concurrently to quantify the impacts of different scheduler configurations on processor and I/O performance. These applications are evaluated on 11 different scheduler configurations within the Xen VMM. These configurations include a variety of scheduler extensions aimed at improving I/O performance. This cross product of scheduler configurations and application types offers insight into the key problems in VMM scheduling for I/O and motivates future innovation in this area.", "title": "" }, { "docid": "0315f0355168a78bdead8d06d5f571b4", "text": "Machine learning techniques are increasingly being applied to clinical text that is already captured in the Electronic Health Record for the sake of delivering quality care. Applications for example include predicting patient outcomes, assessing risks, or performing diagnosis. In the past, good results have been obtained using classical techniques, such as bag-of-words features, in combination with statistical models. Recently however Deep Learning techniques, such as Word Embeddings and Recurrent Neural Networks, have shown to possibly have even greater potential. In this work, we apply several Deep Learning and classical machine learning techniques to the task of predicting violence incidents during psychiatric admission using clinical text that is already registered at the start of admission. For this purpose, we use a novel and previously unexplored dataset from the Psychiatry Department of the University Medical Center Utrecht in The Netherlands. Results show that predicting violence incidents with state-of-the-art performance is possible, and that using Deep Learning techniques provides a relatively small but consistent improvement in performance. We finally discuss the potential implication of our findings for the psychiatric practice.", "title": "" }, { "docid": "a11a5cb713feedbe2165ea7470eddfb8", "text": "End-to-end trained neural networks (NNs) are a compelling approach to autonomous vehicle control because of their ability to learn complex tasks without manual engineering of rule-based decisions. However, challenging road conditions, ambiguous navigation situations, and safety considerations require reliable uncertainty estimation for the eventual adoption of full-scale autonomous vehicles. Bayesian deep learning approaches provide a way to estimate uncertainty by approximating the posterior distribution of weights given a set of training data. Dropout training in deep NNs approximates Bayesian inference in a deep Gaussian process and can thus be used to estimate model uncertainty. In this paper, we propose a Bayesian NN for end-to-end control that estimates uncertainty by exploiting feature map correlation during training. This approach achieves improved model fits, as well as tighter uncertainty estimates, than traditional element-wise dropout. We evaluate our algorithms on a challenging dataset collected over many different road types, times of day, and weather conditions, and demonstrate how uncertainties can be used in conjunction with a human controller in a parallel autonomous setting.", "title": "" }, { "docid": "d6586a261e22e9044425cb27462c3435", "text": "In this work, we develop a planner for high-speed navigation in unknown environments, for example reaching a goal in an unknown building in minimum time, or flying as fast as possible through a forest. This planning task is challenging because the distribution over possible maps, which is needed to estimate the feasibility and cost of trajectories, is unknown and extremely hard to model for real-world environments. At the same time, the worst-case assumptions that a receding-horizon planner might make about the unknown regions of the map may be overly conservative, and may limit performance. Therefore, robots must make accurate predictions about what will happen beyond the map frontiers to navigate as fast as possible. To reason about uncertainty in the map, we model this problem as a POMDP and discuss why it is so difficult given that we have no accurate probability distribution over real-world environments. We then present a novel method of predicting collision probabilities based on training data, which compensates for the missing environment distribution and provides an approximate solution to the POMDP. Extending our previous work, the principal result of this paper is that by using a Bayesian non-parametric learning algorithm that encodes formal safety constraints as a prior over collision probabilities, our planner seamlessly reverts to safe behavior when it encounters a novel environment for which it has no relevant training data. This strategy generalizes our method across all environment types, including those for which we have training data as well as those for which we do not. In familiar environment types with dense training data, we show an 80% speed improvement compared to a planner that is constrained to guarantee safety. In experiments, our planner has reached over 8 m/s in unknown cluttered indoor spaces. Video of our experimental demonstration is available at http://groups.csail.mit.edu/ rrg/bayesian_learning_high_speed_nav.", "title": "" }, { "docid": "9b52a659fb6383e92c5968a082b01b71", "text": "The internet of things (IoT) has a variety of application domains, including smart homes. This paper analyzes distinct IoT security and privacy features, including security requirements, threat models, and attacks from the smart home perspective. Further, this paper proposes an intelligent collaborative security management model to minimize security risk. The security challenges of the IoT for a smart home scenario are encountered, and a comprehensive IoT security management for smart homes has been proposed.", "title": "" }, { "docid": "eff17ece2368b925f0db8e18ea0fc897", "text": "Blockchain, as the backbone technology of the current popular Bitcoin digital currency, has become a promising decentralized data management framework. Although blockchain has been widely adopted in many applications (e.g., finance, healthcare, and logistics), its application in mobile services is still limited. This is due to the fact that blockchain users need to solve preset proof-of-work puzzles to add new data (i.e., a block) to the blockchain. Solving the proof of work, however, consumes substantial resources in terms of CPU time and energy, which is not suitable for resource-limited mobile devices. To facilitate blockchain applications in future mobile Internet of Things systems, multiple access mobile edge computing appears to be an auspicious solution to solve the proof-of-work puzzles for mobile users. We first introduce a novel concept of edge computing for mobile blockchain. Then we introduce an economic approach for edge computing resource management. Moreover, a prototype of mobile edge computing enabled blockchain systems is presented with experimental results to justify the proposed concept.", "title": "" }, { "docid": "79101cf8d241e2fcb96138ad48b32406", "text": "In this paper we discuss the benefits and the limitations, as well as different implementation options for smooth immersion into a HMD-based IVE. We evaluated our concept in a preliminary user study, in which we have tested users' awareness, reality judgment and experience in the IVE, when using different transition techniques to enter it. Our results show that a smooth transition to the IVE improves the awareness of the user and may increase the perceived interactivity of the system.", "title": "" }, { "docid": "d9b19dd523fd28712df61384252d331c", "text": "Purpose – The purpose of this paper is to examine the ways in which governments build social media and information and communication technologies (ICTs) into e-government transparency initiatives, to promote collaboration with members of the public and the ways in members of the public are able to employ the same social media to monitor government activities. Design/methodology/approach – This study used an iterative strategy that involved conducting a literature review, content analysis, and web site analysis, offering multiple perspectives on government transparency efforts, the role of ICTs and social media in these efforts, and the ability of e-government initiatives to foster collaborative transparency through embedded ICTs and social media. Findings – The paper identifies key initiatives, potential impacts, and future challenges for collaborative e-government as a means of transparency. Originality/value – The paper is one of the first to examine the interrelationships between ICTs, social media, and collaborative e-government to facilitate transparency.", "title": "" }, { "docid": "aa3332930b0c0f94d3dde10d40b9a420", "text": "1. Motivation and Goals. Œe success of data mining and search technologies is largely aŠributed to the ecient and e‚ective analysis of structured data. Œe construction of a well-structured, machine-actionable database from raw data sources is o‰en the premise of consequent applications. Meanwhile, the ability of mining and reasoning over such constructed databases is at the core of powering various downstream applications on web and mobile devices. Recently, we have witnessed a signi€cant amount of interests in building large-scale knowledge bases (KBs) from massive, unstructured data sources (e.g., Wikipedia-based methods such as DBpedia [9], YAGO [19], Wikidata [22], automated systems like Snowball [1], KnowItAll [5], NELL [4] and DeepDive [15], and opendomain approaches like Open IE [2] and Universal Schema [14]); as well as mining and reasoning over such knowledge bases to empower a wide variety of intelligent services, including question answering [6], recommender systems [3] and semantic search [8]. Automated construction, mining and reasoning of the knowledge bases have become possible as research advances in many related areas such as information extraction, natural language processing, data mining, search, machine learning, databases and data integration. However, there are still substantial scienti€c and engineering challenges in advancing and integrating such relevant methodologies. Œe goal of this proposed workshop is to gather together leading experts from industry and academia to share their visions about the €eld, discuss latest research results, and exchange exciting ideas. With a focus on invited talks and position papers, the workshop aims to provide a vivid forum of discussion about knowledge base-related research. 2. Relevance to WSDM. Knowledge base construction, mining and reasoning is closely related to a wide variety of applications in WSDM, including web search, question answering, and recommender systems. Building a high-quality knowledge base from", "title": "" }, { "docid": "e4dd72a52d4961f8d4d8ee9b5b40d821", "text": "Social media users spend several hours a day to read, post and search for news on microblogging platforms. Social media is becoming a key means for discovering news. However, verifying the trustworthiness of this information is becoming even more challenging. In this study, we attempt to address the problem of rumor detection and belief investigation on Twitter. Our definition of rumor is an unverifiable statement, which spreads misinformation or disinformation. We adopt a supervised rumors classification task using the standard dataset. By employing the Tweet Latent Vector (TLV) feature, which creates a 100-d vector representative of each tweet, we increased the rumor retrieval task precision up to 0.972. We also introduce the belief score and study the belief change among the rumor posters between 2010 and 2016.", "title": "" }, { "docid": "80ff93b5f2e0ff3cff04c314e28159fc", "text": "In the past 30 years there has been a growing body of research using different methods (behavioural, electrophysiological, neuropsychological, TMS and imaging studies) asking whether processing words from different grammatical classes (especially nouns and verbs) engage different neural systems. To date, however, each line of investigation has provided conflicting results. Here we present a review of this literature, showing that once we take into account the confounding in most studies between semantic distinctions (objects vs. actions) and grammatical distinction (nouns vs. verbs), and the conflation between studies concerned with mechanisms of single word processing and those studies concerned with sentence integration, the emerging picture is relatively clear-cut: clear neural separability is observed between the processing of object words (nouns) and action words (typically verbs), grammatical class effects emerge or become stronger for tasks and languages imposing greater processing demands. These findings indicate that grammatical class per se is not an organisational principle of knowledge in the brain; rather, all the findings we review are compatible with two general principles described by typological linguistics as underlying grammatical class membership across languages: semantic/pragmatic, and distributional cues in language that distinguish nouns from verbs. These two general principles are incorporated within an emergentist view which takes these constraints into account.", "title": "" }, { "docid": "3bc34f3ef98147015e2ad94a6c615348", "text": "Objective methods for assessing perceptual image quality traditionally attempt to quantify the visibility of errors (differences) between a distorted image and a reference image using a variety of known properties of the human visual system. Under the assumption that human visual perception is highly adapted for extracting structural information from a scene, we introduce an alternative complementary framework for quality assessment based on the degradation of structural information. As a specific example of this concept, we develop a Structural Similarity Index and demonstrate its promise through a set of intuitive examples, as well as comparison to both subjective ratings and state-of-the-art objective methods on a database of images compressed with JPEG and JPEG2000. A MatLab implementation of the proposed algorithm is available online at http://www.cns.nyu.edu/~lcv/ssim/. Keywords— Image quality assessment, perceptual quality, human visual system, error sensitivity, structural similarity, structural information, image coding, JPEG, JPEG2000", "title": "" }, { "docid": "e737bb31bb7dbb6dbfdfe0fd01bfe33c", "text": "Cannabidiol (CBD) is a non-psychotomimetic phytocannabinoid derived from Cannabis sativa. It has possible therapeutic effects over a broad range of neuropsychiatric disorders. CBD attenuates brain damage associated with neurodegenerative and/or ischemic conditions. It also has positive effects on attenuating psychotic-, anxiety- and depressive-like behaviors. Moreover, CBD affects synaptic plasticity and facilitates neurogenesis. The mechanisms of these effects are still not entirely clear but seem to involve multiple pharmacological targets. In the present review, we summarized the main biochemical and molecular mechanisms that have been associated with the therapeutic effects of CBD, focusing on their relevance to brain function, neuroprotection and neuropsychiatric disorders.", "title": "" }, { "docid": "b3881be74f7338038b53dc6ddfa1183d", "text": "Molecular chaperones, ubiquitin ligases and proteasome impairment have been implicated in several neurodegenerative diseases, including Alzheimer's and Parkinson's disease, which are characterized by accumulation of abnormal protein aggregates (e.g. tau and alpha-synuclein respectively). Here we report that CHIP, an ubiquitin ligase that interacts directly with Hsp70/90, induces ubiquitination of the microtubule associated protein, tau. CHIP also increases tau aggregation. Consistent with this observation, diverse of tau lesions in human postmortem tissue were found to be immunopositive for CHIP. Conversely, induction of Hsp70 through treatment with either geldanamycin or heat shock factor 1 leads to a decrease in tau steady-state levels and a selective reduction in detergent insoluble tau. Furthermore, 30-month-old mice overexpressing inducible Hsp70 show a significant reduction in tau levels. Together these data demonstrate that the Hsp70/CHIP chaperone system plays an important role in the regulation of tau turnover and the selective elimination of abnormal tau species. Hsp70/CHIP may therefore play an important role in the pathogenesis of tauopathies and also represents a potential therapeutic target.", "title": "" }, { "docid": "5f36e4130459cac6cb6b2b42135ca5d5", "text": "The term idiolect refers to the unique and distinctive use of language of an individual and it is the theoretical foundation of Authorship Attribution. In this paper we are focusing on learning distributed representations (embeddings) of social media users that reflect their writing style. These representations can be considered as stylistic fingerprints of the authors. We are exploring the performance of the two main flavours of distributed representations, namely embeddings produced by Neural Probabilistic Language models (such as word2vec) and matrix factorization (such as GloVe).", "title": "" }, { "docid": "7882a3a5796052253db44cbb76f2e1eb", "text": "The discovery of regulated cell death presents tantalizing possibilities for gaining control over the life–death decisions made by cells in disease. Although apoptosis has been the focus of drug discovery for many years, recent research has identified regulatory mechanisms and signalling pathways for previously unrecognized, regulated necrotic cell death routines. Distinct critical nodes have been characterized for some of these alternative cell death routines, whereas other cell death routines are just beginning to be unravelled. In this Review, we describe forms of regulated necrotic cell death, including necroptosis, the emerging cell death modality of ferroptosis (and the related oxytosis) and the less well comprehended parthanatos and cyclophilin D-mediated necrosis. We focus on small molecules, proteins and pathways that can induce and inhibit these non-apoptotic forms of cell death, and discuss strategies for translating this understanding into new therapeutics for certain disease contexts.", "title": "" }, { "docid": "7509fb44b404e92abe5d4b41d108822c", "text": "Theory predicts, and recent empirical studies have shown, that the diversity of plant species determines the diversity of associated herbivores and mediates ecosystem processes, such as aboveground net primary productivity (ANPP). However, an often-overlooked component of plant diversity, namely population genotypic diversity, may also have wide-ranging effects on community structure and ecosystem processes. We showed experimentally that increasing population genotypic diversity in a dominant old-field plant species, Solidago altissima, determined arthropod diversity and community structure and increased ANPP. The effects of genotypic diversity on arthropod diversity and ANPP were comparable to the effects of plant species diversity measured in other studies.", "title": "" } ]
scidocsrr
039c2f4c28425f2cb5ffd946e23ec965
Research on attention memory networks as a model for learning natural language inference
[ { "docid": "b4ab51818d868b2f9796540c71a7bd17", "text": "We propose a simple neural architecture for natural language inference. Our approach uses attention to decompose the problem into subproblems that can be solved separately, thus making it trivially parallelizable. On the Stanford Natural Language Inference (SNLI) dataset, we obtain state-of-the-art results with almost an order of magnitude fewer parameters than previous work and without relying on any word-order information. Adding intra-sentence attention that takes a minimum amount of order into account yields further improvements.", "title": "" }, { "docid": "87f0a390580c452d77fcfc7040352832", "text": "• J. Wieting, M. Bansal, K. Gimpel, K. Livescu, and D. Roth. 2015. From paraphrase database to compositional paraphrase model and back. TACL. • K. S. Tai, R. Socher, and C. D. Manning. 2015. Improved semantic representations from treestructured long short-term memory networks. ACL. • W. Yin and H. Schutze. 2015. Convolutional neural network for paraphrase identification. NAACL. The product also streams internet radio and comes with a 30-day free trial for realnetworks' rhapsody music subscription. The device plays internet radio streams and comes with a 30-day trial of realnetworks rhapsody music service. Given two sentences, measure their similarity:", "title": "" } ]
[ { "docid": "8e520ad94c7555b9bb1546786b532adb", "text": "We propose Machines Talking To Machines (M2M), a framework combining automation and crowdsourcing to rapidly bootstrap endto-end dialogue agents for goal-oriented dialogues in arbitrary domains. M2M scales to new tasks with just a task schema and an API client from the dialogue system developer, but it is also customizable to cater to task-specific interactions. Compared to the Wizard-of-Oz approach for data collection, M2M achieves greater diversity and coverage of salient dialogue flows while maintaining the naturalness of individual utterances. In the first phase, a simulated user bot and a domain-agnostic system bot converse to exhaustively generate dialogue “outlines”, i.e. sequences of template utterances and their semantic parses. In the second phase, crowd workers provide contextual rewrites of the dialogues to make the utterances more natural while preserving their meaning. The entire process can finish within a few hours. We propose a new corpus of 3,000 dialogues spanning 2 domains collected with M2M, and present comparisons with popular dialogue datasets on the quality and diversity of the surface forms and dialogue flows.", "title": "" }, { "docid": "c4eb18f167ca7349b62a9907ba95c404", "text": "High-grade glioma is the most aggressive and severe brain tumor that leads to death of almost 50% patients in 1-2 years. Thus, accurate prognosis for glioma patients would provide essential guidelines for their treatment planning. Conventional survival prediction generally utilizes clinical information and limited handcrafted features from magnetic resonance images (MRI), which is often time consuming, laborious and subjective. In this paper, we propose using deep learning frameworks to automatically extract features from multi-modal preoperative brain images (i.e., T1 MRI, fMRI and DTI) of high-grade glioma patients. Specifically, we adopt 3D convolutional neural networks (CNNs) and also propose a new network architecture for using multi-channel data and learning supervised features. Along with the pivotal clinical features, we finally train a support vector machine to predict if the patient has a long or short overall survival (OS) time. Experimental results demonstrate that our methods can achieve an accuracy as high as 89.9% We also find that the learned features from fMRI and DTI play more important roles in accurately predicting the OS time, which provides valuable insights into functional neuro-oncological applications.", "title": "" }, { "docid": "b899a5effd239f1548128786d5ae3a8f", "text": "As fault diagnosis and prognosis systems in aerospace applications become more capable, the ability to utilize information supplied by them becomes increasingly important. While certain types of vehicle health data can be effectively processed and acted upon by crew or support personnel, others, due to their complexity or time constraints, require either automated or semi-automated reasoning. Prognostics-enabled Decision Making (PDM) is an emerging research area that aims to integrate prognostic health information and knowledge about the future operating conditions into the process of selecting subsequent actions for the system. The newly developed PDM algorithms require suitable software and hardware platforms for testing under realistic fault scenarios. The paper describes the development of such a platform, based on the K11 planetary rover prototype. A variety of injectable fault modes are being investigated for electrical, mechanical, and power subsystems of the testbed, along with methods for data collection and processing. In addition to the hardware platform, a software simulator with matching capabilities has been developed. The simulator allows for prototyping and initial validation of the algorithms prior to their deployment on the K11. The simulator is also available to the PDM algorithms to assist with the reasoning process. A reference set of diagnostic, prognostic, and decision making algorithms is also described, followed by an overview of the current test scenarios and the results of their execution on the simulator. Edward Balaban et.al. This is an open-access article distributed under the terms of the Creative Commons Attribution 3.0 United States License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.", "title": "" }, { "docid": "ff0644de5cd474dbd858c96bb4c76fd9", "text": "With the growth of the Internet of Things, many insecure embedded devices are entering into our homes and businesses. Some of these web-connected devices lack even basic security protections such as secure password authentication. As a result, thousands of IoT devices have already been infected with malware and enlisted into malicious botnets and many more are left vulnerable to exploitation. In this paper we analyze the practical security level of 16 popular IoT devices from high-end and low-end manufacturers. We present several low-cost black-box techniques for reverse engineering these devices, including software and fault injection based techniques for bypassing password protection. We use these techniques to recover device rmware and passwords. We also discover several common design aws which lead to previously unknown vulnerabilities. We demonstrate the e ectiveness of our approach by modifying a laboratory version of the Mirai botnet to automatically include these devices. We also discuss how to improve the security of IoT devices without signi cantly increasing their cost.", "title": "" }, { "docid": "05622842ebd89777570d7dc3c36a0693", "text": "Online antisocial behavior, such as cyberbullying, harassment, and trolling, is a widespread problem that threatens free discussion and has negative physical and mental health consequences for victims and communities. While prior work has proposed automated methods to identify hostile comments in online discussions, these methods work retrospectively on comments that have already been posted, making it difficult to intervene before an interaction escalates. In this paper we instead consider the problem of forecasting future hostilities in online discussions, which we decompose into two tasks: (1) given an initial sequence of non-hostile comments in a discussion, predict whether some future comment will contain hostility; and (2) given the first hostile comment in a discussion, predict whether this will lead to an escalation of hostility in subsequent comments. Thus, we aim to forecast both the presence and intensity of hostile comments based on linguistic and social features from earlier comments. To evaluate our approach, we introduce a corpus of over 30K annotated Instagram comments from over 1,100 posts. Our approach is able to predict the appearance of a hostile comment on an Instagram post ten or more hours in the future with an AUC of .82 (task 1), and can furthermore distinguish between high and low levels of future hostility with an AUC of .91 (task 2).", "title": "" }, { "docid": "27cc510f79a4ed76da42046b49bbb9fd", "text": "This article reports the orthodontic treatment ofa 25-year-old female patient whose chief complaint was the inclination of the maxillary occlusal plane in front view. The individualized vertical placement of brackets is described. This placement made possible a symmetrical occlusal plane to be achieved in a rather straightforward manner without the need for further technical resources.", "title": "" }, { "docid": "472ff656dc35c5ed37aae6e3a82e3192", "text": "Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.", "title": "" }, { "docid": "3dd4bfe71c3c141d9538e3b3eb72e8e1", "text": "This paper identifies a problem with the usual procedure for L2-regularization parameter estimation in a domain adaptation setting. In such a setting, there are differences between the distributions generating the training data (source domain) and the test data (target domain). The usual cross-validation procedure requires validation data, which can not be obtained from the unlabeled target data. The problem is that if one decides to use source validation data, the regularization parameter is underestimated. One possible solution is to scale the source validation data through importance weighting, but we show that this correction is not sufficient. We conclude the paper with an empirical analysis of the effect of several importance weight estimators on the estimation of the regularization parameter.", "title": "" }, { "docid": "4eff2dc30d4b0031dec8be5dda3157d8", "text": "We introduce a scheme for molecular simulations, the deep potential molecular dynamics (DPMD) method, based on a many-body potential and interatomic forces generated by a carefully crafted deep neural network trained with ab initio data. The neural network model preserves all the natural symmetries in the problem. It is first-principles based in the sense that there are no ad hoc components aside from the network model. We show that the proposed scheme provides an efficient and accurate protocol in a variety of systems, including bulk materials and molecules. In all these cases, DPMD gives results that are essentially indistinguishable from the original data, at a cost that scales linearly with system size.", "title": "" }, { "docid": "068381a40679de50f0a8cdb4be50a2a2", "text": "The extreme learning machine (ELM) was recently proposed as a unifying framework for different families of learning algorithms. The classical ELM model consists of a linear combination of a fixed number of nonlinear expansions of the input vector. Learning in ELM is hence equivalent to finding the optimal weights that minimize the error on a dataset. The update works in batch mode, either with explicit feature mappings or with implicit mappings defined by kernels. Although an online version has been proposed for the former, no work has been done up to this point for the latter, and whether an efficient learning algorithm for online kernel-based ELM exists remains an open problem. By explicating some connections between nonlinear adaptive filtering and ELM theory, in this brief, we present an algorithm for this task. In particular, we propose a straightforward extension of the well-known kernel recursive least-squares, belonging to the kernel adaptive filtering (KAF) family, to the ELM framework. We call the resulting algorithm the kernel online sequential ELM (KOS-ELM). Moreover, we consider two different criteria used in the KAF field to obtain sparse filters and extend them to our context. We show that KOS-ELM, with their integration, can result in a highly efficient algorithm, both in terms of obtained generalization error and training time. Empirical evaluations demonstrate interesting results on some benchmarking datasets.", "title": "" }, { "docid": "babe00fba5a009b116f7b8d438146447", "text": "The ability to predict cyber incidents before they occur will help mitigate malicious activities and their impact. This is a challenging task and a departure from intrusion detection where observables of malicious activities are analyzed. Since there is no direct observable before the cyber incident actually happens, the predictive analysis need to be based on non-conventional signals that may or may not be directly related to the potential victim entity. This paper presents our preliminary findings through the use of Bayesian classifier to process signals drawn from global events and social media. The preliminary results show promising prediction performance for an anonymized organization even though the signals are not specific to that organization.", "title": "" }, { "docid": "4d752dd2c6ede734246d8b9bc47a9a7d", "text": "Precise localization of robots is imperative for their safe and autonomous navigation in both indoor and outdoor environments. In outdoor scenarios, the environment typically undergoes significant perceptual changes and requires robust methods for accurate localization. Monocular camera-based approaches provide an inexpensive solution to such challenging problems compared to 3D LiDAR-based methods. Recently, approaches have leveraged deep convolutional neural networks (CNNs) to perform place recognition and they turn out to outperform traditional handcrafted features under challenging perceptual conditions. In this paper, we propose an approach for directly regressing a 6-DoF camera pose using CNNs and a single monocular RGB image. We leverage the idea of transfer learning for training our network as this technique has shown to perform better when the number of training samples are not very high. Furthermore, we propose novel data augmentation in 3D space for additional pose coverage which leads to more accurate localization. In contrast to the traditional visual metric localization approaches, our resulting map size is constant with respect to the database. During localization, our approach has a constant time complexity of O(1) and is independent of the database size and runs in real-time at ∼80 Hz using a single GPU. We show the localization accuracy of our approach on publicly available datasets and that it outperforms CNN-based state-of-the-art methods.", "title": "" }, { "docid": "beca7993e709b58788a4513893b14413", "text": "We present a micro-traffic simulation (named “DeepTraffic”) where the perception, control, and planning systems for one of the cars are all handled by a single neural network as part of a model-free, off-policy reinforcement learning process. The primary goal of DeepTraffic is to make the hands-on study of deep reinforcement learning accessible to thousands of students, educators, and researchers in order to inspire and fuel the exploration and evaluation of DQN variants and hyperparameter configurations through large-scale, open competition. This paper investigates the crowd-sourced hyperparameter tuning of the policy network that resulted from the first iteration of the DeepTraffic competition where thousands of participants actively searched through the hyperparameter space with the objective of their neural network submission to make it onto the top-10 leaderboard.", "title": "" }, { "docid": "55a29653163bdf9599bf595154a99a25", "text": "The effect of the steel slag aggregate aging on mechanical properties of the high performance concrete is analysed in the paper. The effect of different aging periods of steel slag aggregate on mechanical properties of high performance concrete is studied. It was observed that properties of this concrete are affected by the steel slag aggregate aging process. The compressive strength increases with an increase in the aging period of steel slag aggregate. The flexural strength, Young’s modulus, and impact strength of concrete, increase at the rate similar to that of the compressive strength. The workability and the abrasion loss of concrete decrease with an increase of the steel slag aggregate aging period.", "title": "" }, { "docid": "6ef90f2f628215fcf6ad18d6f5cea9e9", "text": "In this paper we will propose a simple modification of standard homomorphic filtering technique and thus significantly improve face recognition performance on images with difficult illumination conditions. We will also give a detailed theoretical description of a homomorphic filter and compare our proposed method to common illumination compensation techniques used in face recognition literature. The comparisons will be performed on standard grayscale FERET database and this will, in addition, be the first evaluation of homomorphic filter on this database. Results will show that our method yields significantly better identification results than standard illumination compensation methods currently used in face recognition.", "title": "" }, { "docid": "834a0c043799097579441a0ca4713eea", "text": "As users pan and zoom, display content can disappear into off-screen space, particularly on small-screen devices. The clipping of locations, such as relevant places on a map, can make spatial cognition tasks harder. Halo is a visualization technique that supports spatial cognition by showing users the location of off-screen objects. Halo accomplishes this by surrounding off-screen objects with rings that are just large enough to reach into the border region of the display window. From the portion of the ring that is visible on-screen, users can infer the off-screen location of the object at the center of the ring. We report the results of a user study comparing Halo with an arrow-based visualization technique with respect to four types of map-based route planning tasks. When using the Halo interface, users completed tasks 16-33% faster, while there were no significant differences in error rate for three out of four tasks in our study.", "title": "" }, { "docid": "56785d7f01cb2e1ab8754cbb931a9d0b", "text": "This paper describes an online dynamic security assessment scheme for large-scale interconnected power systems using phasor measurements and decision trees. The scheme builds and periodically updates decision trees offline to decide critical attributes as security indicators. Decision trees provide online security assessment and preventive control guidelines based on real-time measurements of the indicators from phasor measurement units. The scheme uses a new classification method involving each whole path of a decision tree instead of only classification results at terminal nodes to provide more reliable security assessment results for changes in system conditions. The approaches developed are tested on a 2100-bus, 2600-line, 240-generator operational model of the Entergy system. The test results demonstrate that the proposed scheme is able to identify key security indicators and give reliable and accurate online dynamic security predictions.", "title": "" }, { "docid": "35470a422cdb3a287d45797e39c04637", "text": "In this paper, we propose a method to recognize food images which include multiple food items considering co-occurrence statistics of food items. The proposed method employs a manifold ranking method which has been applied to image retrieval successfully in the literature. In the experiments, we prepared co-occurrence matrices of 100 food items using various kinds of data sources including Web texts, Web food blogs and our own food database, and evaluated the final results obtained by applying manifold ranking. As results, it has been proved that co-occurrence statistics obtained from a food photo database is very helpful to improve the classification rate within the top ten candidates.", "title": "" }, { "docid": "bbb8aa996db018efd862066153f7549c", "text": "Introduction Strategic Positioning and effective communication are the two most important “mantras” guiding brand success in today’s competitive marketing environment. Corporate are ensuring all possible efforts to promote their brands and to grab the customer’s mind share. The impetus is on attracting the customer’s attention and developing positive associations not just to influence recall but also to induce trial and eventually effect purchase decisions.", "title": "" }, { "docid": "2d686ca335954077a59f77898de9a333", "text": "Information and communication technologies (ICT) can be instrumental in progressing towards smarter city environments, which improve city services, sustainability, and citizens’ quality of life. Smart City software platforms can support the development and integration of Smart City applications. However, the ICT community must overcome current technological and scientific challenges before these platforms can be widely adopted. This article surveys the state of the art in software platforms for Smart Cities. We analyzed 23 projects concerning the most used enabling technologies, as well as functional and non-functional requirements, classifying them into four categories: Cyber-Physical Systems, Internet of Things, Big Data, and Cloud Computing. Based on these results, we derived a reference architecture to guide the development of next-generation software platforms for Smart Cities. Finally, we enumerated the most frequently cited open research challenges and discussed future opportunities. This survey provides important references to help application developers, city managers, system operators, end-users, and Smart City researchers make project, investment, and research decisions.", "title": "" } ]
scidocsrr
c37a7503fb84a00eb7d28c48e967a0fd
PROMISE: An End-to-End Design of a Programmable Mixed-Signal Accelerator for Machine-Learning Algorithms
[ { "docid": "621ae81c61bbeb4804045b3a038980d2", "text": "A multi-functional in-memory inference processor integrated circuit (IC) in a 65-nm CMOS process is presented. The prototype employs a deep in-memory architecture (DIMA), which enhances both energy efficiency and throughput over conventional digital architectures via simultaneous access of multiple rows of a standard 6T bitcell array (BCA) per precharge, and embedding column pitch-matched low-swing analog processing at the BCA periphery. In doing so, DIMA exploits the synergy between the dataflow of machine learning (ML) algorithms and the SRAM architecture to reduce the dominant energy cost due to data movement. The prototype IC incorporates a 16-kB SRAM array and supports four commonly used ML algorithms—the support vector machine, template matching, <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>-nearest neighbor, and the matched filter. Silicon measured results demonstrate simultaneous gains (dot product mode) in energy efficiency of 10<inline-formula> <tex-math notation=\"LaTeX\">$\\times $ </tex-math></inline-formula> and in throughput of 5.3<inline-formula> <tex-math notation=\"LaTeX\">$\\times $ </tex-math></inline-formula> leading to a 53<inline-formula> <tex-math notation=\"LaTeX\">$\\times $ </tex-math></inline-formula> reduction in the energy-delay product with negligible (<inline-formula> <tex-math notation=\"LaTeX\">$\\le $ </tex-math></inline-formula>1%) degradation in the decision-making accuracy, compared with the conventional 8-b fixed-point single-function digital implementations.", "title": "" } ]
[ { "docid": "9bbf3500233a900188987349ecbd6218", "text": "Terpene synthases catalyze the conversion of linear prenyl-diphosphates to a multitude of hydrocarbon skeletons with often high regioand stereoselectivity. These remarkable enzymes all rely on a shared fold for activity, namely, the class I terpene cyclase fold. Recent work has illuminated the catalytic strategy used by these enzymes to catalyze the arguably most complex chemical reactions found in Nature. Terpene synthases catalyze the formation of a reactive carbocation and provide a template for the cyclization reactions while at the same time providing the necessary stability of the carbocationic reaction intermediates as well as strictly controlling water access.", "title": "" }, { "docid": "a1b91f78786d44cdadc6da0c2ecc2d1f", "text": "Availability of an explainable deep learning model that can be applied to practical real world scenarios and in turn, can consistently, rapidly and accurately identify specific and minute traits in applicable fields of biological sciences, is scarce. Here we consider one such real world example viz., accurate identification, classification and quantification of biotic and abiotic stresses in crop research and production. Up until now, this has been predominantly done manually by visual inspection and require specialized training. However, such techniques are hindered by subjectivity resulting from interand intra-rater cognitive variability. Here, we demonstrate the ability of a machine learning framework to identify and classify a diverse set of foliar stresses in the soybean plant with remarkable accuracy. We also present an explanation mechanism using gradientweighted class activation mapping that isolates the visual symptoms used by the model to make predictions. This unsupervised identification of unique visual symptoms for each stress provides a quantitative measure of stress severity, allowing for identification, classification and quantification in one framework. The learnt model appears to be agnostic to species and make good predictions for other (non-soybean) species, demonstrating an ability of transfer learning. Disciplines Agriculture | Agronomy and Crop Sciences | Computer-Aided Engineering and Design Comments This is a pre-print made available through arxiv: https://arxiv.org/abs/1710.08619. Authors Sambuddha Ghosal, David Blystone, Asheesh K. Singh, Baskar Ganapathysubramanian, Arti Singh, and Soumik Sarkar This article is available at Iowa State University Digital Repository: https://lib.dr.iastate.edu/agron_pubs/540 Interpretable Deep Learning applied to Plant Stress Phenotyping Sambuddha Ghosal Department of Mechanical Engineering Iowa State University sghosal@iastate.edu David Blystone Department of Agronomy Iowa State University blystone@iastate.edu Asheesh K. Singh Department of Agronomy Iowa State University singhak@iastate.edu Baskar Ganapathysubramanian Department of Mechanical Engineering Iowa State University baskarg@iastate.edu Arti Singh Department of Agronomy Iowa State University arti@iastate.edu Soumik Sarkar Department of Mechanical Engineering Iowa State University soumiks@iastate.edu", "title": "" }, { "docid": "518d8e621e1239a94f50be3d5e2982f9", "text": "With a number of emerging biometric applications there is a dire need of less expensive authentication technique which can authenticate even if the input image is of low resolution and low quality. Foot biometric has both the physiological and behavioral characteristics still it is an abandoned field. The reason behind this is, it involves removal of shoes and socks while capturing the image and also dirty feet makes the image noisy. Cracked heels is also a reason behind noisy images. Physiological and behavioral biometric characteristics makes it a great alternative to computational intensive algorithms like fingerprint, palm print, retina or iris scan [1] and face. On one hand foot biometric has minutia features which is considered totally unique. The uniqueness of minutiae feature is already tested in fingerprint analysis [2]. On the other hand it has geometric features like hand geometry which also give satisfactory results in recognition. We can easily apply foot biometrics at those places where people inherently remove their shoes, like at holy places such as temples and mosque people remove their shoes before entering from the perspective of faith, and also remove shoes at famous monuments such as The Taj Mahal, India from the perspective of cleanliness and preservation. Usually these are the places with a strong foot fall and high risk security due to chaotic crowd. Most of the robbery, theft, terrorist attacks, are happening at these places. One very fine example is Akshardham attack in September 2002. Hence we can secure these places using low cost security algorithms based on footprint recognition.", "title": "" }, { "docid": "712ce2aaf021d863c02a4de6b3596bf4", "text": "A spatial outlier is a spatial referenced object whose non-spatial attribute values are significantly different from those of other spatially referenced objects in its spatial neighborhood. It represents locations that are significantly different from their neighborhoods even though they may not be significantly different from the entire population. Here we adopt this definition to spatio-temporal domain and define a spatialtemporal outlier (STO) to be a spatial-temporal referenced object whose thematic attribute values are significantly different from those of other spatially and temporally referenced objects in its spatial or/and temporal neighborhood. Identification of STOs can lead to the discovery of unexpected, interesting, and implicit knowledge, such as local instability. Many methods have been recently proposed to detect spatial outliers, but how to detect the temporal outliers or spatial-temporal outliers has been seldom discussed. In this paper we propose a hybrid approach which integrates several data mining methods such as clustering, aggregation and comparisons to detect the STOs by evaluating the change between consecutive spatial and temporal scales. INTRODUCTION Outliers are data objects that appear inconsistent with respect to the remainder of the database (Barnett and Lewis, 1994). While in many cases these can be anomalies or noise, sometimes these represent rare or unusual events to be investigated further. In general, direct methods for outlier detection include distribution-based, depth-based and distancebased approaches. Distribution-based approaches use standard statistical distribution, depth-based technique map data objects into an m-dimensional information space (where m is the number of attribute) and distance-based approaches calculate the proportion of database objects that are a specified distance from a target object (Ng, 2001). A spatial outlier is a spatial referenced object whose non-spatial attribute values are significantly different from those of other spatially referenced objects in its spatial neighborhood. It represents locations that are significantly different from their neighborhoods even though they may not be significantly different from the entire population (Shekhar et al, 2003). Identification of spatial outliers can lead to the discovery of unexpected, interesting, and implicit knowledge, such as local instability. Many methods have been recently proposed to detect spatial outliers by the distributionbased approach. These methods can be broadly classified into two categories, namely 1-D (linear) outlier detection methods and multi-dimensional outlier detection methods (Shekhar et al, 2003). The 1-D outlier detection algorithms consider the statistical distribution of non-spatial attribute values, ignoring the spatial relationships between items.", "title": "" }, { "docid": "a3345ad4a18be52b478d3e75cf05a371", "text": "In the course of the routine use of NMR as an aid for organic chemistry, a day-to-day problem is the identification of signals deriving from common contaminants (water, solvents, stabilizers, oils) in less-than-analytically-pure samples. This data may be available in the literature, but the time involved in searching for it may be considerable. Another issue is the concentration dependence of chemical shifts (especially 1H); results obtained two or three decades ago usually refer to much more concentrated samples, and run at lower magnetic fields, than today’s practice. We therefore decided to collect 1H and 13C chemical shifts of what are, in our experience, the most popular “extra peaks” in a variety of commonly used NMR solvents, in the hope that this will be of assistance to the practicing chemist.", "title": "" }, { "docid": "a5e7a1e5900dc7c8b5047efee6f1268e", "text": "Google Hacking continues to be abused by attackers to find vulnerable websites on current Internet. Through searching specific terms of vulnerabilities in search engines, attackers can easily and automatically find a lot of vulnerable websites in a large scale. However, less work has been done to study the characteristics of vulnerabilities targeted by Google Hacking (e.g., what kind of vulnerabilities are typically targeted by Google Hacking? What kind of vulnerabilities usually have a large victim population? What is the impact of Google Hacking and how easy to defend against Google Hacking?). In this paper, we conduct the first quantitative characterization study of Google Hacking. Starting from 997 Google Dorks used in Google Hacking, we collect a total of 305,485 potentially vulnerable websites, and 6,301 verified vulnerable websites. From these vulnerabilities and potentially vulnerable websites, we study the characteristics of vulnerabilities targeted by Google Hacking from different perspectives. We find that web-related CVE vulnerabilities may not fully reflect the tastes of Google Hacking. Our results show that only a few specially chosen vulnerabilities are exploited in Google Hacking. Specifically, attackers only target on certain categories of vulnerabilities and prefer vulnerabilities with high severity score but low attack complexity. Old vulnerabilities are also preferred in Google Hacking. To defend against the Google Hacking, simply modifying few keywords in web pages can defeat 65.5 % of Google Hacking attacks.", "title": "" }, { "docid": "fb0bd3cd264454499638283de90549cb", "text": "A common type of memory error in the Linux kernel is using uninitialized variables (uninitialized use). Uninitialized uses not only cause undefined behaviors but also impose a severe security risk if an attacker takes control of the uninitialized variables. However, reliably exploiting uninitialized uses on the kernel stack has been considered infeasible until now since the code executed prior to triggering the vulnerability must leave an attacker-controlled pattern on the stack. Therefore, uninitialized uses are largely overlooked and regarded as undefined behaviors, rather than security vulnerabilities. In particular, full memorysafety techniques (e.g., SoftBound+CETS) exclude uninitialized use as a prevention target, and widely used systems such as OpenSSL even use uninitialized memory as a randomness source. In this paper, we propose a fully automated targeted stackspraying approach for the Linux kernel that reliably facilitates the exploitation of uninitialized uses. Our targeted stack-spraying includes two techniques: (1) a deterministic stack spraying technique that suitably combines tailored symbolic execution and guided fuzzing to identify kernel inputs that user-mode programs can use to deterministically guide kernel code paths and thereby leave attacker-controlled data on the kernel stack, and (2) an exhaustive memory spraying technique that uses memory occupation and pollution to reliably control a large region of the kernel stack. We show that our targeted stackspraying approach allows attackers to reliably control more than 91% of the Linux kernel stack, which, in combination with uninitialized-use vulnerabilities, suffices for a privilege escalation attack. As a countermeasure, we propose a compiler-based mechanism that initializes potentially unsafe pointer-type fields with almost no performance overhead. Our results show that uninitialized use is a severe attack vector that can be readily exploited with targeted stack-spraying, so future memory-safety techniques should consider it a prevention target, and systems should not use uninitialized memory as a randomness source.", "title": "" }, { "docid": "481d2a79b436c51a927b3ec578597360", "text": "This paper presents a novel research problem, Comparative Document Analysis (CDA), that is, joint discovery of commonalities and differences between two individual documents (or two sets of documents) in a large text corpus. Given any pair of documents from a (background) document collection, CDA aims to automatically identify sets of quality phrases to summarize the commonalities of both documents and highlight the distinctions of each with respect to the other informatively and concisely. Our solution uses a general graph-based framework to derive novel measures on phrase semantic commonality and pairwise distinction, where the background corpus is used for computing phrase-document semantic relevance. We use the measures to guide the selection of sets of phrases by solving two joint optimization problems. A scalable iterative algorithm is developed to integrate the maximization of phrase commonality or distinction measure with the learning of phrase-document semantic relevance. Experiments on large text corpora from two different domains---scientific papers and news---demonstrate the effectiveness and robustness of the proposed framework on comparing documents. Analysis on a 10GB+ text corpus demonstrates the scalability of our method, whose computation time grows linearly as the corpus size increases. Our case study on comparing news articles published at different dates shows the power of the proposed method on comparing sets of documents.", "title": "" }, { "docid": "ee727069682d1ed5181f05327e96aced", "text": "The problem of place recognition appears in different mobile robot navigation problems including localization, SLAM, or change detection in dynamic environments. Whereas this problem has been studied intensively in the context of robot vision, relatively few approaches are available for three-dimensional range data. In this paper, we present a novel and robust method for place recognition based on range images. Our algorithm matches a given 3D scan against a database using point features and scores potential transformations by comparing significant points in the scans. A further advantage of our approach is that the features allow for a computation of the relative transformations between scans which is relevant for registration processes. Our approach has been implemented and tested on different 3D data sets obtained outdoors. In several experiments we demonstrate the advantages of our approach also in comparison to existing techniques.", "title": "" }, { "docid": "3f24525276e36ea087a04cb79ee25a95", "text": "We consider the problem of estimating the geographic locations of nodes in a wireless sensor network where most sensors are without an effective self-positioning functionality. We propose LSVM-a novel solution with the following merits. First, LSVM localizes the network based on mere connectivity information (that is, hop counts only) and therefore is simple and does not require specialized ranging hardware or assisting mobile devices as in most existing techniques. Second, LSVM is based on Support Vector Machine (SVM) learning. Although SVM is a classification method, we show its applicability to the localization problem and prove that the localization error can be upper bounded by any small threshold given an appropriate training data size. Third, LSVM addresses the border and coverage-hole problems effectively. Last but not least, LSVM offers fast localization in a distributed manner with efficient use of processing and communication resources. We also propose a modified version of mass-spring optimization to further improve the location estimation in LSVM. The promising performance of LSVM is exhibited by our simulation study.", "title": "" }, { "docid": "3d4afb9ed09fbb6200175e2440b56755", "text": "A brief account is given of the discovery of abscisic acid (ABA) in roots and root caps of higher plants as well as the techniques by which ABA may be demonstrated in these tissues. The remainder of the review is concerned with examining the rôle of ABA in the regulation of root growth. In this regard, it is well established that when ABA is supplied to roots their elongation is usually inhibited, although at low external concentrations a stimulation of growth may also be found. Fewer observations have been directed at exploring the connection between root growth and the level of naturally occurring, endogenous ABA. Nevertheless, the evidence here also suggests that ABA is an inhibitory regulator of root growth. Moreover, ABA appears to be involved in the differential growth that arises in response to a gravitational stimulus. Recent reports that deny a rôle for ABA in root gravitropism are considered inconclusive. The response of roots to osmotic stress and the changes in ABA levels which ensue, are summarised; so are the interrelations between ABA and other hormones, particularly auxin (e.g. indoleacetic acid); both are considered in the context of the root growth and development. Quantitative changes in auxin and ABA levels may together provide the root with a flexible means of regulating its growth.", "title": "" }, { "docid": "f8f8b43d78b361caee537d043e385b16", "text": "We demonstrate the value of collecting semantic parse labels for knowledge base question answering. In particular, (1) unlike previous studies on small-scale datasets, we show that learning from labeled semantic parses significantly improves overall performance, resulting in absolute 5 point gain compared to learning from answers, (2) we show that with an appropriate user interface, one can obtain semantic parses with high accuracy and at a cost comparable or lower than obtaining just answers, and (3) we have created and shared the largest semantic-parse labeled dataset to date in order to advance research in question answering.", "title": "" }, { "docid": "6140255e69aa292bf8c97c9ef200def7", "text": "Food production requires application of fertilizers containing phosphorus, nitrogen and potassium on agricultural fields in order to sustain crop yields. However modern agriculture is dependent on phosphorus derived from phosphate rock, which is a non-renewable resource and current global reserves may be depleted in 50–100 years. While phosphorus demand is projected to increase, the expected global peak in phosphorus production is predicted to occur around 2030. The exact timing of peak phosphorus production might be disputed, however it is widely acknowledged within the fertilizer industry that the quality of remaining phosphate rock is decreasing and production costs are increasing. Yet future access to phosphorus receives little or no international attention. This paper puts forward the case for including long-term phosphorus scarcity on the priority agenda for global food security. Opportunities for recovering phosphorus and reducing demand are also addressed together with institutional challenges. 2009 Published by Elsevier Ltd.", "title": "" }, { "docid": "7e6573b3e080481949a2b45eb6c68a42", "text": "We study the problem of minimizing the sum of a smooth convex function and a convex blockseparable regularizer and propose a new randomized coordinate descent method, which we call ALPHA. Our method at every iteration updates a random subset of coordinates, following an arbitrary distribution. No coordinate descent methods capable to handle an arbitrary sampling have been studied in the literature before for this problem. ALPHA is a remarkably flexible algorithm: in special cases, it reduces to deterministic and randomized methods such as gradient descent, coordinate descent, parallel coordinate descent and distributed coordinate descent – both in nonaccelerated and accelerated variants. The variants with arbitrary (or importance) sampling are new. We provide a complexity analysis of ALPHA, from which we deduce as a direct corollary complexity bounds for its many variants, all matching or improving best known bounds.", "title": "" }, { "docid": "75e5480b6a319e1c879eba50604a4f91", "text": "Quantum circuits are time-dependent diagrams describing the process of quantum computation. Usually, a quantum algorithm must be mapped into a quantum circuit. Optimal synthesis of quantum circuits is intractable, and heuristic methods must be employed. With the use of heuristics, the optimality of circuits is no longer guaranteed. In this paper, we consider a local optimization technique based on templates to simplify and reduce the depth of nonoptimal quantum circuits. We present and analyze templates in the general case and provide particular details for the circuits composed of NOT, CNOT, and controlled-sqrt-of-NOT gates. We apply templates to optimize various common circuits implementing multiple control Toffoli gates and quantum Boolean arithmetic circuits. We also show how templates can be used to compact the number of levels of a quantum circuit. The runtime of our implementation is small, whereas the reduction in the number of quantum gates and number of levels is significant.", "title": "" }, { "docid": "98502b68821d19cc170355545ae82749", "text": "Many prediction problems, such as those that arise in the context of robotics, have a simplifying underlying structure that, if known, could accelerate learning. In this paper, we present a strategy for learning a set of neural network modules that can be combined in different ways. We train different modular structures on a set of related tasks and generalize to new tasks by composing the learned modules in new ways. By reusing modules to generalize we achieve combinatorial generalization, akin to the ”infinite use of finite means” displayed in language. Finally, we show this improves performance in two robotics-related problems.", "title": "" }, { "docid": "6856397af72015066bbcdbed888b9816", "text": "Article history: Received 16 September 2007 Received in revised form 1 July 2008 Accepted 16 September 2008 Available online 5 November 2008", "title": "" }, { "docid": "7db1b7cb31b1b2a3594f38a5b0a9ce0a", "text": "The new biological effect of picosecond pulsed electric fields (psPEFs) has elicited the interest of researchers. A pulse generator based on an avalanche transistorized Marx circuit has been proposed. However, the problem of reflection in the transmission of the generated picosecond pulse based on this circuit has not received much attention and remains unresolved. In this paper, a compact picosecond pulse generator based on microstrip transmission theory was developed. A partial matching model based on microstrip transmission line theory was also proposed to eliminate reflection, and a series inductor was utilized to optimize pulse waveform. Through simulation studies and preliminary experimental tests, a pulse optimized with 1015 V amplitude, 620-ps width, and 10-kHz high stability repetition rate was generated. This pulse generator can be used with microelectrodes in cell experiments to explore the biological effect mechanism of psPEF.", "title": "" }, { "docid": "bdae5947d44e14ba49ffa5b10e5345df", "text": "As the technology is developing with a huge rate, the functionality of smartphone is also getting higher. But the smartphones have some resource constraints like processing power, battery capacity, limited bandwidth for connecting to the Internet, etc. Therefore, to improve the performance of smartphone in terms of processing power, battery and memory, the technology namely, augmented execution is the best solution in the mobile cloud computing (MCC) scenario. Mobile cloud computing works as the combination of mobile computing and cloud computing. Augmented execution alleviates the problem of resource scarcity of smartphone. To get the benefits from the resource-abundant clouds, massive computation intensive tasks are partitioned and migrated to the cloud side for the execution. After executing the task at the cloud side, the results are sent back to the smartphone. This method is called as the computation offloading. The given survey paper focuses on the partitioning techniques in mobile cloud computing.", "title": "" } ]
scidocsrr
8f987fc6af07b2a7a901591d1269a9d0
Eye Movement-Based Human-Computer Interaction Techniques : Toward Non-Command Interfaces
[ { "docid": "074fb5576ea24d6ffb44924fd2b50cff", "text": "I treat three related subjects: virtual-worlds research—the construction of real-time 3-D illusions by computer graphics; some observations about interfaces to virtual worlds; and the coming application of virtual-worlds techniques to the enhancement of scientific computing.\nWe need to design generalized interfaces for visualizing, exploring, and steering scientific computations. Our interfaces must be direct-manipulation, not command-string; interactive, not batch; 3-D, not 2-D; multisensory, not just visual.\nWe need generalized research results for 3-D interactive interfaces. More is known than gets reported, because of a reluctance to share “unproven” results. I propose a shells-of-certainty model for such knowledge.", "title": "" } ]
[ { "docid": "8d3e93e59a802535e9d5ef7ca7ace362", "text": "Marching along the DARPA SyNAPSE roadmap, IBM unveils a trilogy of innovations towards the TrueNorth cognitive computing system inspired by the brain's function and efficiency. Judiciously balancing the dual objectives of functional capability and implementation/operational cost, we develop a simple, digital, reconfigurable, versatile spiking neuron model that supports one-to-one equivalence between hardware and simulation and is implementable using only 1272 ASIC gates. Starting with the classic leaky integrate-and-fire neuron, we add: (a) configurable and reproducible stochasticity to the input, the state, and the output; (b) four leak modes that bias the internal state dynamics; (c) deterministic and stochastic thresholds; and (d) six reset modes for rich finite-state behavior. The model supports a wide variety of computational functions and neural codes. We capture 50+ neuron behaviors in a library for hierarchical composition of complex computations and behaviors. Although designed with cognitive algorithms and applications in mind, serendipitously, the neuron model can qualitatively replicate the 20 biologically-relevant behaviors of a dynamical neuron model.", "title": "" }, { "docid": "cbe1dc1b56716f57fca0977383e35482", "text": "This project explores a novel experimental setup towards building spoken, multi-modally rich, and human-like multiparty tutoring agent. A setup is developed and a corpus is collected that targets the development of a dialogue system platform to explore verbal and nonverbal tutoring strategies in multiparty spoken interactions with embodied agents. The dialogue task is centered on two participants involved in a dialogue aiming to solve a card-ordering game. With the participants sits a tutor that helps the participants perform the task and organizes and balances their interaction. Different multimodal signals captured and auto-synchronized by different audio-visual capture technologies were coupled with manual annotations to build a situated model of the interaction based on the participants personalities, their temporally-changing state of attention, their conversational engagement and verbal dominance, and the way these are correlated with the verbal and visual feedback, turn-management, and conversation regulatory actions generated by the tutor. At the end of this chapter we discuss the potential areas of research and developments this work opens and some of the challenges that lie in the road ahead.", "title": "" }, { "docid": "089808010a2925a7eaca71736fbabcaf", "text": "In this paper we describe two methods for estimating the motion parameters of an image sequence. For a sequence of images, the global motion can be described by independent motion models. On the other hand, in a sequence there exist as many as \u000e pairwise relative motion constraints that can be solve for efficiently. In this paper we show how to linearly solve for consistent global motion models using this highly redundant set of constraints. In the first case, our method involves estimating all available pairwise relative motions and linearly fitting a global motion model to these estimates. In the second instance, we exploit the fact that algebraic (ie. epipolar) constraints between various image pairs are all related to each other by the global motion model. This results in an estimation method that directly computes the motion of the sequence by using all possible algebraic constraints. Unlike using reprojection error, our optimisation method does not solve for the structure of points resulting in a reduction of the dimensionality of the search space. Our algorithms are used for both 3D camera motion estimation and camera calibration. We provide real examples of both applications.", "title": "" }, { "docid": "8aa305f217314d60ed6c9f66d20a7abf", "text": "The circadian timing system drives daily rhythmic changes in drug metabolism and controls rhythmic events in cell cycle, DNA repair, apoptosis, and angiogenesis in both normal tissue and cancer. Rodent and human studies have shown that the toxicity and anticancer activity of common cancer drugs can be significantly modified by the time of administration. Altered sleep/activity rhythms are common in cancer patients and can be disrupted even more when anticancer drugs are administered at their most toxic time. Disruption of the sleep/activity rhythm accelerates cancer growth. The complex circadian time-dependent connection between host, cancer and therapy is further impacted by other factors including gender, inter-individual differences and clock gene polymorphism and/or down regulation. It is important to take circadian timing into account at all stages of new drug development in an effort to optimize the therapeutic index for new cancer drugs. Better measures of the individual differences in circadian biology of host and cancer are required to further optimize the potential benefit of chronotherapy for each individual patient.", "title": "" }, { "docid": "7d23d8d233a3fc7ff75edf361acbe642", "text": "The diagnosis and treatment of chronic patellar instability caused by trochlear dysplasia can be challenging. A dysplastic trochlea leads to biomechanical and kinematic changes that often require surgical correction when symptomatic. In the past, trochlear dysplasia was classified using the 4-part Dejour classification system. More recently, new classification systems have been proposed. Future studies are needed to investigate long-term outcomes after trochleoplasty.", "title": "" }, { "docid": "a4741a4d6e01902f252b5a6fb59eb64b", "text": "Scan and segmented scan algorithms are crucial building blocks for a great many data-parallel algorithms. Segmented scan and related primitives also provide the necessary support for the flattening transform, which allows for nested data-parallel programs to be compiled into flat data-parallel languages. In this paper, we describe the design of efficient scan and segmented scan parallel primitives in CUDA for execution on GPUs. Our algorithms are designed using a divide-and-conquer approach that builds all scan primitives on top of a set of primitive intra-warp scan routines. We demonstrate that this design methodology results in routines that are simple, highly efficient, and free of irregular access patterns that lead to memory bank conflicts. These algorithms form the basis for current and upcoming releases of the widely used CUDPP library.", "title": "" }, { "docid": "8f1d27581e7a83e378129e4287c64bd9", "text": "Online social media plays an increasingly significant role in shaping the political discourse during elections worldwide. In the 2016 U.S. presidential election, political campaigns strategically designed candidacy announcements on Twitter to produce a significant increase in online social media attention. We use large-scale online social media communications to study the factors of party, personality, and policy in the Twitter discourse following six major presidential campaign announcements for the 2016 U.S. presidential election. We observe that all campaign announcements result in an instant bump in attention, with up to several orders of magnitude increase in tweets. However, we find that Twitter discourse as a result of this bump in attention has overwhelmingly negative sentiment. The bruising criticism, driven by crosstalk from Twitter users of opposite party affiliations, is organized by hashtags such as #NoMoreBushes and #WhyImNotVotingForHillary. We analyze how people take to Twitter to criticize specific personality traits and policy positions of presidential candidates.", "title": "" }, { "docid": "2717779fa409f10f3a509e398dc24233", "text": "Hallyu refers to the phenomenon of Korean popular culture which came into vogue in Southeast Asia and mainland China in late 1990s. Especially, hallyu is very popular among young people enchanted with Korean music (K-pop), dramas (K-drama), movies, fashion, food, and beauty in China, Taiwan, Hong Kong, and Vietnam, etc. This cultural phenomenon has been closely connected with multi-layered transnational movements of people, information and capital flows in East Asia. Since the 15 century, East and West have been the two subjects of cultural phenomena. Such East–West dichotomy was articulated by Westerners in the scholarly tradition known as “Orientalism.”During the Age of Exploration (1400–1600), West didn’t only take control of East by military force, but also created a new concept of East/Orient, as Edward Said analyzed it expertly in his masterpiece Orientalism in 1978. Throughout the history of imperialism for nearly 4-5 centuries, west was a cognitive subject, but East was an object being recognized by the former. Accordingly, “civilization and modernization” became the exclusive properties of which West had copyright (?!), whereas East was a “sub-subject” to borrow or even plagiarize from Western standards. In this sense, (making) modern history in East Asia was a compulsive imitation of Western civilization or a catch-up with the West in other wards. Thus, it is interesting to note that East Asian people, after gaining economic power through “compressed modernization,” are eager to be main agents of their cultural activities in and through the enjoyment of East Asian popular culture in a postmodern era. In this transition from Westerncentered into East Asian-based popular culture, they are no longer sub-subjects of modernity.", "title": "" }, { "docid": "2dc23ce5b1773f12905ebace6ef221a5", "text": "With the increasing demand for higher data rates and more reliable service capabilities for wireless devices, wireless service providers are facing an unprecedented challenge to overcome a global bandwidth shortage. Early global activities on beyond fourth-generation (B4G) and fifth-generation (5G) wireless communication systems suggest that millimeter-wave (mmWave) frequencies are very promising for future wireless communication networks due to the massive amount of raw bandwidth and potential multigigabit-per-second (Gb/s) data rates [1]?[3]. Both industry and academia have begun the exploration of the untapped mmWave frequency spectrum for future broadband mobile communication networks. In April 2014, the Brooklyn 5G Summit [4], sponsored by Nokia and the New York University (NYU) WIRELESS research center, drew global attention to mmWave communications and channel modeling. In July 2014, the IEEE 802.11 next-generation 60-GHz study group was formed to increase the data rates to over 20 Gb/s in the unlicensed 60-GHz frequency band while maintaining backward compatibility with the emerging IEEE 802.11ad wireless local area network (WLAN) standard [5].", "title": "" }, { "docid": "c2791d704241b604f7f064d1b1077c36", "text": "Stemming is an operation that splits a word into the constituent root part and affix without doing complete morphological analysis. It is used to improve the performance of spelling checkers and information retrieval applications, where morphological analysi would be too computationally expensive. For spelling checkers specifically, using stemming may drastically reduce the dictionary size, often a bottleneck for mobile and embedded devices. This paper presents a computationally inexpensive stemming algorithm for Bengali, which handles suffix removal in a domain independent way. The evaluation of the proposed algorithm in a Bengali spelling checker indicates that it can be effectively used in information retrieval applications in general.", "title": "" }, { "docid": "b6a8f45bd10c30040ed476b9d11aa908", "text": "PixelCNNs are a recently proposed class of powerful generative models with tractable likelihood. Here we discuss our implementation of PixelCNNs which we make available at https://github.com/openai/pixel-cnn. Our implementation contains a number of modifications to the original model that both simplify its structure and improve its performance. 1) We use a discretized logistic mixture likelihood on the pixels, rather than a 256-way softmax, which we find to speed up training. 2) We condition on whole pixels, rather than R/G/B sub-pixels, simplifying the model structure. 3) We use downsampling to efficiently capture structure at multiple resolutions. 4) We introduce additional short-cut connections to further speed up optimization. 5) We regularize the model using dropout. Finally, we present state-of-the-art log likelihood results on CIFAR-10 to demonstrate the usefulness of these modifications.", "title": "" }, { "docid": "219ed374347b81553d3208ad1dfb80ad", "text": "Various metabolic disorders are associated with changes in inflammatory tone. Among the latest advances in the metabolism field, the discovery that gut microorganisms have a major role in host metabolism has revealed the possibility of a plethora of associations between gut bacteria and numerous diseases. However, to date, few mechanisms have been clearly established. Accumulating evidence indicates that the endocannabinoid system and related bioactive lipids strongly contribute to several physiological processes and are a characteristic of obesity, type 2 diabetes mellitus and inflammation. In this Review, we briefly define the gut microbiota as well as the endocannabinoid system and associated bioactive lipids. We discuss existing literature regarding interactions between gut microorganisms and the endocannabinoid system, focusing specifically on the triad of adipose tissue, gut bacteria and the endocannabinoid system in the context of obesity and the development of fat mass. We highlight gut-barrier function by discussing the role of specific factors considered to be putative 'gate keepers' or 'gate openers', and their role in the gut microbiota–endocannabinoid system axis. Finally, we briefly discuss data related to the different pharmacological strategies currently used to target the endocannabinoid system, in the context of cardiometabolic disorders and intestinal inflammation.", "title": "" }, { "docid": "2172e78731ee63be5c15549e38c4babb", "text": "The design of a low-cost low-power ring oscillator-based truly random number generator (TRNG) macrocell, which is suitable to be integrated in smart cards, is presented. The oscillator sampling technique is exploited, and a tetrahedral oscillator with large jitter has been employed to realize the TRNG. Techniques to improve the statistical quality of the ring oscillatorbased TRNGs' bit sequences have been presented and verified by simulation and measurement. A postdigital processor is added to further enhance the randomness of the output bits. Fabricated in the HHNEC 0.13-μm standard CMOS process, the proposed TRNG has an area as low as 0.005 mm2. Powered by a single 1.8-V supply voltage, the TRNG has a power consumption of 40 μW. The bit rate of the TRNG after postprocessing is 100 kb/s. The proposed TRNG has been made into an IP and successfully applied in an SD card for encryption application. The proposed TRNG has passed the National Institute of Standards and Technology tests and Diehard tests.", "title": "" }, { "docid": "e643f7f29c2e96639a476abb1b9a38b1", "text": "Weather forecasting has been one of the most scientifically and technologically challenging problem around the world. Weather data is one of the meteorological data that is rich with important information, which can be used for weather prediction We extract knowledge from weather historical data collected from Indian Meteorological Department (IMD) Pune. From the collected weather data comprising of 36 attributes, only 7 attributes are most relevant to rainfall prediction. We made data preprocessing and data transformation on raw weather data set, so that it shall be possible to work on Bayesian, the data mining, prediction model used for rainfall prediction. The model is trained using the training data set and has been tested for accuracy on available test data. The meteorological centers uses high performance computing and supercomputing power to run weather prediction model. To address the issue of compute intensive rainfall prediction model, we proposed and implemented data intensive model using data mining technique. Our model works with good accuracy and takes moderate compute resources to predict the rainfall. We have used Bayesian approach to prove our model for rainfall prediction, and found to be working well with good accuracy.", "title": "" }, { "docid": "45940a48b86645041726120fb066a1fa", "text": "For large state-space Markovian Decision Problems MonteCarlo planning is one of the few viable approaches to find near-optimal solutions. In this paper we introduce a new algorithm, UCT, that applies bandit ideas to guide Monte-Carlo planning. In finite-horizon or discounted MDPs the algorithm is shown to be consistent and finite sample bounds are derived on the estimation error due to sampling. Experimental results show that in several domains, UCT is significantly more efficient than its alternatives.", "title": "" }, { "docid": "5ae4b1d4ef00afbde49edfaa2728934b", "text": "A wideband, low loss inline transition from microstrip line to rectangular waveguide is presented. This transition efficiently couples energy from a microstrip line to a ridge and subsequently to a TE10 waveguide. This unique structure requires no mechanical pressure for electrical contact between the microstrip probe and the ridge because the main planar circuitry and ridge sections are placed on a single housing. The measured insertion loss for back-to-back transition is 0.5 – 0.7 dB (0.25 – 0.35 dB/transition) in the band 50 – 72 GHz.", "title": "" }, { "docid": "ddf09617b266d483d5e3ab3dcb479b69", "text": "Writing a research article can be a daunting task, and often, writers are not certain what should be included and how the information should be conveyed. Fortunately, scientific and engineering journal articles follow an accepted format. They contain an introduction which includes a statement of the problem, a literature review, and a general outline of the paper, a methods section detailing the methods used, separate or combined results, discussion and application sections, and a final summary and conclusions section. Here, each of these elements is described in detail using examples from the published literature as illustration. Guidance is also provided with respect to style, getting started, and the revision/review process.", "title": "" }, { "docid": "5b03f69a2e7a21e5e1144080b604af2e", "text": "The rise of graph-structured data such as social networks, regulatory networks, citation graphs, and functional brain networks, in combination with resounding success of deep learning in various applications, has brought the interest in generalizing deep learning models to non-Euclidean domains. In this paper, we introduce a new spectral domain convolutional architecture for deep learning on graphs. The core ingredient of our model is a new class of parametric rational complex functions (Cayley polynomials) allowing to efficiently compute spectral filters on graphs that specialize on frequency bands of interest. Our model generates rich spectral filters that are localized in space, scales linearly with the size of the input data for sparsely connected graphs, and can handle different constructions of Laplacian operators. Extensive experimental results show the superior performance of our approach, in comparison to other spectral domain convolutional architectures, on spectral image classification, community detection, vertex classification, and matrix completion tasks.", "title": "" }, { "docid": "76753fe26a2ed69c5b7099009c9a094f", "text": "A total of 82 strains of presumptive Aeromonas spp. were identified biochemically and genetically (16S rDNA-RFLP). The strains were isolated from 250 samples of frozen fish (Tilapia, Oreochromis niloticus niloticus) purchased in local markets in Mexico City. In the present study, we detected the presence of several genes encoding for putative virulence factors and phenotypic activities that may play an important role in bacterial infection. In addition, we studied the antimicrobial patterns of those strains. Molecular identification demonstrated that the prevalent species in frozen fish were Aeromonas salmonicida (67.5%) and Aeromonas bestiarum (20.9%), accounting for 88.3% of the isolates, while the other strains belonged to the species Aeromonas veronii (5.2%), Aeromonas encheleia (3.9%) and Aeromonas hydrophila (2.6%). Detection by polymerase chain reaction (PCR) of genes encoding putative virulence factors common in Aeromonas, such as aerolysin/hemolysin, lipases including the glycerophospholipid-cholesterol acyltransferase (GCAT), serine protease and DNases, revealed that they were all common in these strains. Our results showed that first generation quinolones and second and third generation cephalosporins were the drugs with the best antimicrobial effect against Aeromonas spp. In Mexico, there have been few studies on Aeromonas and its putative virulence factors. The present work therefore highlights an important incidence of Aeromonas spp., with virulence potential and antimicrobial resistance, isolated from frozen fish intended for human consumption in Mexico City.", "title": "" } ]
scidocsrr
d20ee5fba86a814522db8b64606f8b5e
Migrant mothers, left-behind fathers: the negotiation of gender subjectivities in Indonesia and the Philippines
[ { "docid": "2da67ed8951caf3388ca952465d61b37", "text": "As a significant supplier of labour migrants, Southeast Asia presents itself as an important site for the study of children in transnational families who are growing up separated from at least one migrant parent and sometimes cared for by 'other mothers'. Through the often-neglected voices of left-behind children, we investigate the impact of parental migration and the resulting reconfiguration of care arrangements on the subjective well-being of migrants' children in two Southeast Asian countries, Indonesia and the Philippines. We theorise the child's position in the transnational family nexus through the framework of the 'care triangle', representing interactions between three subject groups- 'left-behind' children, non-migrant parents/other carers; and migrant parent(s). Using both quantitative (from 1010 households) and qualitative (from 32 children) data from a study of child health and migrant parents in Southeast Asia, we examine relationships within the caring spaces both of home and of transnational spaces. The interrogation of different dimensions of care reveals the importance of contact with parents (both migrant and nonmigrant) to subjective child well-being, and the diversity of experiences and intimacies among children in the two study countries.", "title": "" } ]
[ { "docid": "513224bb1034217b058179f3805dd37f", "text": "Existing work on subgraph isomorphism search mainly focuses on a-query-at-a-time approaches: optimizing and answering each query separately. When multiple queries arrive at the same time, sequential processing is not always the most efficient. In this paper, we study multi-query optimization for subgraph isomorphism search. We first propose a novel method for efficiently detecting useful common subgraphs and a data structure to organize them. Then we propose a heuristic algorithm based on the data structure to compute a query execution order so that cached intermediate results can be effectively utilized. To balance memory usage and the time for cached results retrieval, we present a novel structure for caching the intermediate results. We provide strategies to revise existing single-query subgraph isomorphism algorithms to seamlessly utilize the cached results, which leads to significant performance improvement. Extensive experiments verified the effectiveness of our solution.", "title": "" }, { "docid": "9cf1791f7d73f7e2471b27dd7667e023", "text": "We address the scalability issues in low-rank matrix learning problems. Usually these problems resort to solving nuclear norm regularized optimization problems (NNROPs), which often suffer from high computational complexities if based on existing solvers, especially in large-scale settings. Based on the fact that the optimal solution matrix to an NNROP is often low rank, we revisit the classic mechanism of low-rank matrix factorization, based on which we present an active subspace algorithm for efficiently solving NNROPs by transforming large-scale NNROPs into small-scale problems. The transformation is achieved by factorizing the large solution matrix into the product of a small orthonormal matrix (active subspace) and another small matrix. Although such a transformation generally leads to nonconvex problems, we show that a suboptimal solution can be found by the augmented Lagrange alternating direction method. For the robust PCA (RPCA) (Candès, Li, Ma, & Wright, 2009) problem, a typical example of NNROPs, theoretical results verify the suboptimality of the solution produced by our algorithm. For the general NNROPs, we empirically show that our algorithm significantly reduces the computational complexity without loss of optimality.", "title": "" }, { "docid": "571c7cb6e0670539a3effbdd65858d2a", "text": "When writing software, developers often employ abbreviations in identifier names. In fact, some abbreviations may never occur with the expanded word, or occur more often in the code. However, most existing program comprehension and search tools do little to address the problem of abbreviations, and therefore may miss meaningful pieces of code or relationships between software artifacts. In this paper, we present an automated approach to mining abbreviation expansions from source code to enhance software maintenance tools that utilize natural language information. Our scoped approach uses contextual information at the method, program, and general software level to automatically select the most appropriate expansion for a given abbreviation. We evaluated our approach on a set of 250 potential abbreviations and found that our scoped approach provides a 57% improvement in accuracy over the current state of the art.", "title": "" }, { "docid": "8dc9170093a0317fff3971b18f758ff3", "text": "In many Web applications, such as blog classification and new-sgroup classification, labeled data are in short supply. It often happens that obtaining labeled data in a new domain is expensive and time consuming, while there may be plenty of labeled data in a related but different domain. Traditional text classification ap-proaches are not able to cope well with learning across different domains. In this paper, we propose a novel cross-domain text classification algorithm which extends the traditional probabilistic latent semantic analysis (PLSA) algorithm to integrate labeled and unlabeled data, which come from different but related domains, into a unified probabilistic model. We call this new model Topic-bridged PLSA, or TPLSA. By exploiting the common topics between two domains, we transfer knowledge across different domains through a topic-bridge to help the text classification in the target domain. A unique advantage of our method is its ability to maximally mine knowledge that can be transferred between domains, resulting in superior performance when compared to other state-of-the-art text classification approaches. Experimental eval-uation on different kinds of datasets shows that our proposed algorithm can improve the performance of cross-domain text classification significantly.", "title": "" }, { "docid": "dd7a87be674da00360de58df77bf980a", "text": "This paper presents an overview of single-pass interferometric Synthetic Aperture Radar (SAR) missions employing two or more satellites flying in a close formation. The simultaneous reception of the scattered radar echoes from different viewing directions by multiple spatially distributed antennas enables the acquisition of unique Earth observation products for environmental and climate monitoring. After a short introduction to the basic principles and applications of SAR interferometry, designs for the twin satellite missions TanDEM-X and Tandem-L are presented. The primary objective of TanDEM-X (TerraSAR-X add-on for Digital Elevation Measurement) is the generation of a global Digital Elevation Model (DEM) with unprecedented accuracy as the basis for a wide range of scientific research as well as for commercial DEM production. This goal is achieved by enhancing the TerraSAR-X mission with a second TerraSAR-X like satellite that will be launched in spring 2010. Both satellites act then as a large single-pass SAR interferometer with the opportunity for flexible baseline selection. Building upon the experience gathered with the TanDEM-X mission design, the fully polarimetric L-band twin satellite formation Tandem-L is proposed. Important objectives of this highly capable interferometric SAR mission are the global acquisition of three-dimensional forest structure and biomass inventories, large-scale measurements of millimetric displacements due to tectonic shifts, and systematic observations of glacier movements. The sophisticated mission concept and the high data-acquisition capacity of Tandem-L will moreover provide a unique data source to systematically observe, analyze, and quantify the dynamics of a wide range of additional processes in the bio-, litho-, hydro-, and cryosphere. By this, Tandem-L will be an essential step to advance our understanding of the Earth system and its intricate dynamics. Enabling technologies and techniques are described in detail. An outlook on future interferometric and tomographic concepts and developments, including multistatic SAR systems with multiple receivers, is provided.", "title": "" }, { "docid": "539a25209bf65c8b26cebccf3e083cd0", "text": "We study the problem of web search result diversification in the case where intent based relevance scores are available. A diversified search result will hopefully satisfy the information need of user-L.s who may have different intents. In this context, we first analyze the properties of an intent-based metric, ERR-IA, to measure relevance and diversity altogether. We argue that this is a better metric than some previously proposed intent aware metrics and show that it has a better correlation with abandonment rate. We then propose an algorithm to rerank web search results based on optimizing an objective function corresponding to this metric and evaluate it on shopping related queries.", "title": "" }, { "docid": "79fdfee8b42fe72a64df76e64e9358bc", "text": "An algorithm is described to solve multiple-phase optimal control problems using a recently developed numerical method called the Gauss pseudospectral method. The algorithm is well suited for use in modern vectorized programming languages such as FORTRAN 95 and MATLAB. The algorithm discretizes the cost functional and the differential-algebraic equations in each phase of the optimal control problem. The phases are then connected using linkage conditions on the state and time. A large-scale nonlinear programming problem (NLP) arises from the discretization and the significant features of the NLP are described in detail. A particular reusable MATLAB implementation of the algorithm, called GPOPS, is applied to three classical optimal control problems to demonstrate its utility. The algorithm described in this article will provide researchers and engineers a useful software tool and a reference when it is desired to implement the Gauss pseudospectral method in other programming languages.", "title": "" }, { "docid": "b75f793f4feac0b658437026d98a1e8b", "text": "From a certain (admittedly narrow) perspective, one of the annoying features of natural language is the ubiquitous syntactic ambiguity. For a computational model intended to assign syntactic descriptions to natural language text, this seem like a design defect. In general, when context and lexical content are taken into account, such syntactic ambiguity can be resolved: sentences used in context show, for the most part, little ambiguity. But the grammar provides many alternative analyses, and gives little guidance about resolving the ambiguity. Prepositional phrase attachment is the canonical case of structural ambiguity, as in the time worn example,", "title": "" }, { "docid": "9b42c1b58bb7b74bdcf09c7556800ad5", "text": "In this paper, we propose a method to find the safest path between two locations, based on the geographical model of crime intensities. We consider the police records and news articles for finding crime density of different areas of the city. It is essential to consider news articles as there is a significant delay in updating police crime records. We address this problem by updating the crime intensities based on current news feeds. Based on the updated crime intensities, we identify the safest path. It is this real time updation of crime intensities which makes our model way better than the models that are presently in use. Our model would also inform the user of crime sprees in a particular area thereby ensuring that user avoids these crime hot spots.", "title": "" }, { "docid": "59ba83e88085445e3bcf009037af6617", "text": "— We examine the relationship between resource abundance and several indicators of human welfare. Consistent with the existing literature on the relationship between resource abundance and economic growth we find that, given an initial income level, resource-intensive countries tend to suffer lower levels of human development. While we find only weak support for a direct link between resources and welfare, there is an indirect link that operates through institutional quality. There are also significant differences in the effects that resources have on different measures of institutional quality. These results imply that the ‘‘resource curse’’ is a more encompassing phenomenon than previously considered, and that key differences exist between the effects of different resource types on various aspects of governance and human welfare. 2005 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "68bc2abd13bcd19566eed66f0031c934", "text": "As DRAM density keeps increasing, more rows need to be protected in a single refresh with the constant refresh number. Since no memory access is allowed during a refresh, the refresh penalty is no longer trivial and can result in significant performance degradation. To mitigate the refresh penalty, a Concurrent-REfresh-Aware Memory system (CREAM) is proposed in this work so that memory access and refresh can be served in parallel. The proposed CREAM architecture distinguishes itself with the following key contributions: (1) Under a given DRAM power budget, sub-rank-level refresh (SRLR) is developed to reduce refresh power and the saved power is used to enable concurrent memory access; (2) sub-array-level refresh (SALR) is also devised to effectively lower the probability of the conflict between memory access and refresh; (3) In addition, novel sub-array level refresh scheduling schemes, such as sub-array round-robin and dynamic scheduling, are designed to further improve the performance. A quasi-ROR interface protocol is proposed so that CREAM is fully compatible with JEDEC-DDR standard with negligible hardware overhead and no extra pin-out. The experimental results show that CREAM can improve the performance by 12.9% and 7.1% over the conventional DRAM and the Elastic-Refresh DRAM memory, respectively.", "title": "" }, { "docid": "73edaa7319dcf225c081f29146bbb385", "text": "Sign language is a specific area of human gesture communication and a full-edged complex language that is used by various deaf communities. In Bangladesh, there are many deaf and dumb people. It becomes very difficult to communicate with them for the people who are unable to understand the Sign Language. In this case, an interpreter can help a lot. So it is desirable to make computer to understand the Bangladeshi sign language that can serve as an interpreter. In this paper, a Computer Vision-based Bangladeshi Sign Language Recognition System (BdSL) has been proposed. In this system, separate PCA (Principal Component Analysis) is used for Bengali Vowels and Bengali Numbers recognition. The system is tested for 6 Bengali Vowels and 10 Bengali Numbers.", "title": "" }, { "docid": "3292af68a03deb0cffcf3b701e1c0f63", "text": "Limitations imposed by the traditional practice in financial institutions of running risk analysis on the desktop mean many rely on models which assume a “normal” Gaussian distribution of events which can seriously underestimate the real risk. In this paper, we propose an alternative service which uses the elastic capacities of Cloud Computing to escape the limitations of the desktop and produce accurate results more rapidly. The Business Intelligence as a Service (BIaaS) in the Cloud has a dual-service approach to compute risk and pricing for financial analysis. In the first type of BIaaS service uses three APIs to simulate the Heston Model to compute the risks and asset prices, and computes the volatility (unsystematic risks) and the implied volatility (systematic risks) which can be tracked down at any time. The second type of BIaaS service uses two APIs to provide business analytics for stock market analysis, and compute results in the visualised format, so that stake holders without prior knowledge can understand. A full case study with two sets of experiments is presented to support the validity and originality of BIaaS. Additional three examples are used to support accuracy of the predicted stock index movement as a result of the use of Heston Model and its associated APIs. We describe the architecture of deployment, together with examples and results which show how our approach improves risk and investment analysis and maintaining accuracy and efficiency whilst improving performance over desktops.", "title": "" }, { "docid": "f6264315a5bbf32b9fa21488b4c80f03", "text": "into empirical, corpus-based learning approaches to natural language processing (NLP). Most empirical NLP work to date has focused on relatively low-level language processing such as part-ofspeech tagging, text segmentation, and syntactic parsing. The success of these approaches has stimulated research in using empirical learning techniques in other facets of NLP, including semantic analysis—uncovering the meaning of an utterance. This article is an introduction to some of the emerging research in the application of corpusbased learning techniques to problems in semantic interpretation. In particular, we focus on two important problems in semantic interpretation, namely, word-sense disambiguation and semantic parsing.", "title": "" }, { "docid": "28f61d005f1b53ad532992e30b9b9b71", "text": "We propose a method for nonlinear residual echo suppression that consists of extracting spectral features from the far-end signal, and using an artificial neural network to model the residual echo magnitude spectrum from these features. We compare the modeling accuracy achieved by realizations with different features and network topologies, evaluating the mean squared error of the estimated residual echo magnitude spectrum. We also present a low complexity real-time implementation combining an offline-trained network with online adaptation, and investigate its performance in terms of echo suppression and speech distortion for real mobile phone recordings.", "title": "" }, { "docid": "45d6563b2b4c64bb11ad65c3cff0d843", "text": "The performance of single cue object tracking algorithms may degrade due to complex nature of visual world and environment challenges. In recent past, multicue object tracking methods using single or multiple sensors such as vision, thermal, infrared, laser, radar, audio, and RFID are explored to a great extent. It was acknowledged that combining multiple orthogonal cues enhance tracking performance over single cue methods. The aim of this paper is to categorize multicue tracking methods into single-modal and multi-modal and to list out new trends in this field via investigation of representative work. The categorized works are also tabulated in order to give detailed overview of latest advancement. The person tracking datasets are analyzed and their statistical parameters are tabulated. The tracking performance measures are also categorized depending upon availability of ground truth data. Our review gauges the gap between reported work and future demands for object tracking.", "title": "" }, { "docid": "40ab6e98dbf02235b882ea56a8675bba", "text": "BACKGROUND\nThe lowering of cholesterol concentrations in individuals at high risk of cardiovascular disease improves outcome. No study, however, has assessed benefits of cholesterol lowering in the primary prevention of coronary heart disease (CHD) in hypertensive patients who are not conventionally deemed dyslipidaemic.\n\n\nMETHODS\nOf 19342 hypertensive patients (aged 40-79 years with at least three other cardiovascular risk factors) randomised to one of two antihypertensive regimens in the Anglo-Scandinavian Cardiac Outcomes Trial, 10305 with non-fasting total cholesterol concentrations 6.5 mmol/L or less were randomly assigned additional atorvastatin 10 mg or placebo. These patients formed the lipid-lowering arm of the study. We planned follow-up for an average of 5 years, the primary endpoint being non-fatal myocardial infarction and fatal CHD. Data were analysed by intention to treat.\n\n\nFINDINGS\nTreatment was stopped after a median follow-up of 3.3 years. By that time, 100 primary events had occurred in the atorvastatin group compared with 154 events in the placebo group (hazard ratio 0.64 [95% CI 0.50-0.83], p=0.0005). This benefit emerged in the first year of follow-up. There was no significant heterogeneity among prespecified subgroups. Fatal and non-fatal stroke (89 atorvastatin vs 121 placebo, 0.73 [0.56-0.96], p=0.024), total cardiovascular events (389 vs 486, 0.79 [0.69-0.90], p=0.0005), and total coronary events (178 vs 247, 0.71 [0.59-0.86], p=0.0005) were also significantly lowered. There were 185 deaths in the atorvastatin group and 212 in the placebo group (0.87 [0.71-1.06], p=0.16). Atorvastatin lowered total serum cholesterol by about 1.3 mmol/L compared with placebo at 12 months, and by 1.1 mmol/L after 3 years of follow-up.\n\n\nINTERPRETATION\nThe reductions in major cardiovascular events with atorvastatin are large, given the short follow-up time. These findings may have implications for future lipid-lowering guidelines.", "title": "" }, { "docid": "ff345d732a273577ca0f965b92e1bbbd", "text": "Integrated circuit (IC) testing for quality assurance is approaching 50% of the manufacturing costs for some complex mixed-signal IC’s. For many years the market growth and technology advancements in digital IC’s were driving the developments in testing. The increasing trend to integrate information acquisition and digital processing on the same chip has spawned increasing attention to the test needs of mixed-signal IC’s. The recent advances in wireless communications indicate a trend toward the integration of the RF and baseband mixed signal technologies. In this paper we examine the developments in IC testing form the historic, current status and future view points. In separate sections we address the testing developments for digital, mixed signal and RF IC’s. With these reviews as context, we relate new test paradigms that have the potential to fundamentally alter the methods used to test mixed-signal and RF parts.", "title": "" }, { "docid": "f617b8b5c2c5fc7829cbcd0b2e64ed2d", "text": "This paper proposes a novel lifelong learning (LL) approach to sentiment classification. LL mimics the human continuous learning process, i.e., retaining the knowledge learned from past tasks and use it to help future learning. In this paper, we first discuss LL in general and then LL for sentiment classification in particular. The proposed LL approach adopts a Bayesian optimization framework based on stochastic gradient descent. Our experimental results show that the proposed method outperforms baseline methods significantly, which demonstrates that lifelong learning is a promising research direction.", "title": "" }, { "docid": "856012f3cf81a1527916da8a5136ce79", "text": "Folk psychology postulates a spatial unity of self and body, a \"real me\" that resides in one's body and is the subject of experience. The spatial unity of self and body has been challenged by various philosophical considerations but also by several phenomena, perhaps most notoriously the \"out-of-body experience\" (OBE) during which one's visuo-spatial perspective and one's self are experienced to have departed from their habitual position within one's body. Here the authors marshal evidence from neurology, cognitive neuroscience, and neuroimaging that suggests that OBEs are related to a failure to integrate multisensory information from one's own body at the temporo-parietal junction (TPJ). It is argued that this multisensory disintegration at the TPJ leads to the disruption of several phenomenological and cognitive aspects of self-processing, causing illusory reduplication, illusory self-location, illusory perspective, and illusory agency that are experienced as an OBE.", "title": "" } ]
scidocsrr
2cc2e925a6c9e27a96631a977fe00740
Modular Architecture for StarCraft II with Deep Reinforcement Learning
[ { "docid": "a9dfddc3812be19de67fc4ffbc2cad77", "text": "Many real-world problems, such as network packet routing and the coordination of autonomous vehicles, are naturally modelled as cooperative multi-agent systems. There is a great need for new reinforcement learning methods that can efficiently learn decentralised policies for such systems. To this end, we propose a new multi-agent actor-critic method called counterfactual multi-agent (COMA) policy gradients. COMA uses a centralised critic to estimate the Q-function and decentralised actors to optimise the agents’ policies. In addition, to address the challenges of multi-agent credit assignment, it uses a counterfactual baseline that marginalises out a single agent’s action, while keeping the other agents’ actions fixed. COMA also uses a critic representation that allows the counterfactual baseline to be computed efficiently in a single forward pass. We evaluate COMA in the testbed of StarCraft unit micromanagement, using a decentralised variant with significant partial observability. COMA significantly improves average performance over other multi-agent actorcritic methods in this setting, and the best performing agents are competitive with state-of-the-art centralised controllers that get access to the full state.", "title": "" }, { "docid": "d4a0b5558045245a55efbf9b71a84bc3", "text": "A long-standing goal of artificial intelligence is an algorithm that learns, tabula rasa, superhuman proficiency in challenging domains. Recently, AlphaGo became the first program to defeat a world champion in the game of Go. The tree search in AlphaGo evaluated positions and selected moves using deep neural networks. These neural networks were trained by supervised learning from human expert moves, and by reinforcement learning from self-play. Here we introduce an algorithm based solely on reinforcement learning, without human data, guidance or domain knowledge beyond game rules. AlphaGo becomes its own teacher: a neural network is trained to predict AlphaGo’s own move selections and also the winner of AlphaGo’s games. This neural network improves the strength of the tree search, resulting in higher quality move selection and stronger self-play in the next iteration. Starting tabula rasa, our new program AlphaGo Zero achieved superhuman performance, winning 100–0 against the previously published, champion-defeating AlphaGo.", "title": "" }, { "docid": "e45e49fb299659e2e71f5c4eb825aff6", "text": "We propose a lifelong learning system that has the ability to reuse and transfer knowledge from one task to another while efficiently retaining the previously learned knowledgebase. Knowledge is transferred by learning reusable skills to solve tasks in Minecraft, a popular video game which is an unsolved and high-dimensional lifelong learning problem. These reusable skills, which we refer to as Deep Skill Networks, are then incorporated into our novel Hierarchical Deep Reinforcement Learning Network (H-DRLN) architecture using two techniques: (1) a deep skill array and (2) skill distillation, our novel variation of policy distillation (Rusu et al. 2015) for learning skills. Skill distillation enables the HDRLN to efficiently retain knowledge and therefore scale in lifelong learning, by accumulating knowledge and encapsulating multiple reusable skills into a single distilled network. The H-DRLN exhibits superior performance and lower learning sample complexity compared to the regular Deep Q Network (Mnih et al. 2015) in sub-domains of Minecraft.", "title": "" } ]
[ { "docid": "0a7558a172509707b33fcdfaafe0b732", "text": "Cloud computing has established itself as an alternative IT infrastructure and service model. However, as with all logically centralized resource and service provisioning infrastructures, cloud does not handle well local issues involving a large number of networked elements (IoTs) and it is not responsive enough for many applications that require immediate attention of a local controller. Fog computing preserves many benefits of cloud computing and it is also in a good position to address these local and performance issues because its resources and specific services are virtualized and located at the edge of the customer premise. However, data security is a critical challenge in fog computing especially when fog nodes and their data move frequently in its environment. This paper addresses the data protection and the performance issues by 1) proposing a Region-Based Trust-Aware (RBTA) model for trust translation among fog nodes of regions, 2) introducing a Fog-based Privacy-aware Role Based Access Control (FPRBAC) for access control at fog nodes, and 3) developing a mobility management service to handle changes of users and fog devices' locations. The implementation results demonstrate the feasibility and the efficiency of our proposed framework.", "title": "" }, { "docid": "f941c1f5e5acd9865e210b738ff1745a", "text": "We describe a convolutional neural network that learns feature representations for short textual posts using hashtags as a supervised signal. The proposed approach is trained on up to 5.5 billion words predicting 100,000 possible hashtags. As well as strong performance on the hashtag prediction task itself, we show that its learned representation of text (ignoring the hashtag labels) is useful for other tasks as well. To that end, we present results on a document recommendation task, where it also outperforms a number of baselines.", "title": "" }, { "docid": "548f43f2193cffc6711d8a15c00e8c3d", "text": "Dither signals provide an effective way to compensate for nonlinearities in control systems. The seminal works by Zames and Shneydor, and more recently, by Mossaheb, present rigorous tools for systematic design of dithered systems. Their results rely, however, on a Lipschitz assumption relating to nonlinearity, and thus, do not cover important applications with discontinuities. This paper presents initial results on how to analyze and design dither in nonsmooth systems. In particular, it is shown that a dithered relay feedback system can be approximated by a smoothed system. Guidelines are given for tuning the amplitude and the period time of the dither signal, in order to stabilize the nonsmooth system.", "title": "" }, { "docid": "48b2d263a0f547c5c284c25a9e43828e", "text": "This paper presents hierarchical topic models for integrating sentiment analysis with collaborative filtering. Our goal is to automatically predict future reviews to a given author from previous reviews. For this goal, we focus on differentiating author's preference, while previous sentiment analysis models process these review articles without this difference. Therefore, we propose a Latent Evaluation Topic model (LET) that infer each author's preference by introducing novel latent variables into author and his/her document layer. Because these variables distinguish the variety of words in each article by merging similar word distributions, LET incorporates the difference of writers' preferences into sentiment analysis. Consequently LET can determine the attitude of writers, and predict their reviews based on like-minded writers' reviews in the collaborative filtering approach. Experiments on review articles show that the proposed model can reduce the dimensionality of reviews to the low-dimensional set of these latent variables, and is a significant improvement over standard sentiment analysis models and collaborative filtering algorithms.", "title": "" }, { "docid": "8a80b9306082f3cf373e2e638c0ecd0b", "text": "We propose a maximal figure-of-merit (MFoM) learning framework to directly maximize mean average precision (MAP) which is a key performance metric in many multi-class classification tasks. Conventional classifiers based on support vector machines cannot be easily adopted to optimize the MAP metric. On the other hand, classifiers based on deep neural networks (DNNs) have recently been shown to deliver a great discrimination capability in automatic speech recognition and image classification as well. However, DNNs are usually optimized with the minimum cross entropy criterion. In contrast to most conventional classification methods, our proposed approach can be formulated to embed DNNs and MAP into the objective function to be optimized during training. The combination of the proposed maximum MAP (MMAP) technique and DNNs introduces nonlinearity to the linear discriminant function (LDF) in order to increase the flexibility and discriminant power of the original MFoM-trained LDF based classifiers. Tested on both automatic image annotation and audio event classification, the experimental results show consistent improvements of MAP on both datasets when compared with other state-of-the-art classifiers without using MMAP.", "title": "" }, { "docid": "e7a86eeb576d4aca3b5e98dc53fcb52d", "text": "Dictionary methods for cross-language information retrieval give performance below that for mono-lingual retrieval. Failure to translate multi-term phrases has km shown to be one of the factors responsible for the errors associated with dictionary methods. First, we study the importance of phrasaI translation for this approach. Second, we explore the role of phrases in query expansion via local context analysis and local feedback and show how they can be used to significantly reduce the error associated with automatic dictionary translation.", "title": "" }, { "docid": "1530571213fb98e163cb3cf45cfe9cc6", "text": "We explore the properties of byte-level recurrent language models. When given sufficient amounts of capacity, training data, and compute time, the representations learned by these models include disentangled features corresponding to high-level concepts. Specifically, we find a single unit which performs sentiment analysis. These representations, learned in an unsupervised manner, achieve state of the art on the binary subset of the Stanford Sentiment Treebank. They are also very data efficient. When using only a handful of labeled examples, our approach matches the performance of strong baselines trained on full datasets. We also demonstrate the sentiment unit has a direct influence on the generative process of the model. Simply fixing its value to be positive or negative generates samples with the corresponding positive or negative sentiment.", "title": "" }, { "docid": "065417a0c2e82cbd33798de1be98042f", "text": "Deep neural networks usually require large labeled datasets to construct accurate models; however, in many real-world scenarios, such as medical image segmentation, labeling data are a time-consuming and costly human (expert) intelligent task. Semi-supervised methods leverage this issue by making use of a small labeled dataset and a larger set of unlabeled data. In this paper, we present a flexible framework for semi-supervised learning that combines the power of supervised methods that learn feature representations using state-of-the-art deep convolutional neural networks with the deeply embedded clustering algorithm that assigns data points to clusters based on their probability distributions and feature representations learned by the networks. Our proposed semi-supervised learning algorithm based on deeply embedded clustering (SSLDEC) learns feature representations via iterations by alternatively using labeled and unlabeled data points and computing target distributions from predictions. During this iterative procedure, the algorithm uses labeled samples to keep the model consistent and tuned with labeling, as it simultaneously learns to improve feature representation and predictions. The SSLDEC requires a few hyper-parameters and thus does not need large labeled validation sets, which addresses one of the main limitations of many semi-supervised learning algorithms. It is also flexible and can be used with many state-of-the-art deep neural network configurations for image classification and segmentation tasks. To this end, we implemented and tested our approach on benchmark image classification tasks as well as in a challenging medical image segmentation scenario. In benchmark classification tasks, the SSLDEC outperformed several state-of-the-art semi-supervised learning methods, achieving 0.46% error on MNIST with 1000 labeled points and 4.43% error on SVHN with 500 labeled points. In the iso-intense infant brain MRI tissue segmentation task, we implemented SSLDEC on a 3D densely connected fully convolutional neural network where we achieved significant improvement over supervised-only training as well as a semi-supervised method based on pseudo-labeling. Our results show that the SSLDEC can be effectively used to reduce the need for costly expert annotations, enhancing applications, such as automatic medical image segmentation.", "title": "" }, { "docid": "63a548ee4f8857823e4bcc7ccbc31d36", "text": "The growing amounts of textual data require automatic methods for structuring relevant information so that it can be further processed by computers and systematically accessed by humans. The scenario dealt with in this dissertation is known as Knowledge Base Population (KBP), where relational information about entities is retrieved from a large text collection and stored in a database, structured according to a prespecified schema. Most of the research in this dissertation is placed in the context of the KBP benchmark of the Text Analysis Conference (TAC KBP), which provides a test-bed to examine all steps in a complex end-to-end relation extraction setting. In this dissertation a new state of the art for the TAC KBP benchmark was achieved by focussing on the following research problems: (1) The KBP task was broken down into a modular pipeline of sub-problems, and the most pressing issues were identified and quantified at all steps. (2) The quality of semi-automatically generated training data was increased by developing noise-reduction methods, decreasing the influence of false-positive training examples. (3) A focus was laid on fine-grained entity type modelling, entity expansion, entity matching and tagging, to maintain as much recall as possible on the relational argument level. (4) A new set of effective methods for generating training data, encoding features and training relational classifiers was developed and compared with previous state-of-the-art methods.", "title": "" }, { "docid": "3b26f9c91ee0eb76768403fcb9579003", "text": "The major task of network embedding is to learn low-dimensional vector representations of social-network nodes. It facilitates many analytical tasks such as link prediction and node clustering and thus has attracted increasing attention. The majority of existing embedding algorithms are designed for unsigned social networks. However, many social media networks have both positive and negative links, for which unsigned algorithms have little utility. Recent findings in signed network analysis suggest that negative links have distinct properties and added value over positive links. This brings about both challenges and opportunities for signed network embedding. In addition, user attributes, which encode properties and interests of users, provide complementary information to network structures and have the potential to improve signed network embedding. Therefore, in this paper, we study the novel problem of signed social network embedding with attributes. We propose a novel framework SNEA, which exploits the network structure and user attributes simultaneously for network representation learning. Experimental results on link prediction and node clustering with real-world datasets demonstrate the effectiveness of SNEA.", "title": "" }, { "docid": "ea5357c6a936ae63f1660d1d3a9501e7", "text": "DESCARTES’ REDUCTIONIST PRINCIPLE HAS HAD A PROfound influence on medicine. Similar to repairing a clock in which each broken part is fixed in order, investigators have attempted to discover causal relationships among key components of an individual and to treat those components accordingly. For example, if most of the morbidity in patients with diabetes is caused by high blood glucose levels, then control of those levels should return the system to normal and the patient’s health problems should disappear. However, in one recent study this strategy of more intensive glucose control resulted in increased risk of death. Likewise, chemotherapy often initially reduces tumor size but also produces severe adverse effects leading to other complications, including the promotion of secondary tumors. Most important, little evidence exists that more aggressive chemotherapies prolong life for many patients. In fact, chemotherapies may have overall negative effects for some patients. Most medical treatments make sense based on research of specific molecular pathways, so why do unexpected consequences occur after years of treatment? More simply, does the treatment that addresses a specific disease-related component harm the individual as a whole? To address these questions, the conflict between reductionism and complex systems must be analyzed. With increasing technological capabilities, these systems can be examined in continuously smaller components, from organs to cells, cells to chromosomes, and from chromosomes to genes. Paradoxically, the success of science also leads to blind spots in thinking as scientists become increasingly reductionist and determinist. The expectation is that as the resolution of the analysis increases, so too will the quantity and quality of information. High-resolution studies focusing on the building blocks of a biological system provide specific targets on which molecular cures can be based. While the DNA sequence of the human gene set is known, the functions of these genes are not understood in the context ofadynamicnetworkandtheresultant functional relationship tohumandiseases.Mutations inmanygenesareknowntocontribute to cancers in experimental systems, but the common mutationsthatactuallycausecancercannotyetbedetermined. Many therapies such as antibiotics, pacemakers, blood transfusions, and organ transplantation have worked well using classic approaches. In these cases, interventions were successful in treating a specific part of a complex system without triggering system chaos in many patients. However, even for these relatively safe interventions, unpredictable risk factors still exist. For every intervention that works well there are many others that do not, most of which involve complicated pathways and multiple levels of interaction. Even apparent major successes of the past have developed problems, such as the emergence and potential spread of super pathogens resistant to available antibiotic arrays. One common feature of a complex system is its emergent properties—thecollectiveresultofdistinctandinteractiveproperties generated by the interaction of individual components. When parts change, the behavior of a system can sometimes be predicted—but often cannot be if the system exists on the “edge of chaos.” For example, a disconnect exists between the status of the parts (such as tumor response) and the systems behavior(suchasoverall survivalof thepatient).Furthermore, nonlinear responsesof a complexsystemcanundergosudden massive and stochastic changes in response to what may seem minor perturbations. This may occur despite the same system displaying regular and predictable behavior under other conditions. For example, patients can be harmed by an uncommonadverseeffectofacommonlyusedtreatmentwhenthesystemdisplayschaoticbehaviorundersomecircumstances.This stochastic effect is what causes surprise. Given that any medical intervention is a stress to the system and that multiple system levels can respond differently, researchers must consider the stochastic response of the entire human system to drug therapyrather thanfocusingsolelyonthetargetedorganorcell oroneparticularmolecularpathwayorspecificgene.Thesame approachisnecessaryformonitoringtheclinicalsafetyofadrug. Other challenging questions await consideration. Once an entire systemisalteredbydiseaseprogression,howshould the system be restored following replacement of a defective part? If a system is altered, should it be brought back to the previous status, or is there a new standard defining a new stable system?Thedevelopmentofmanydiseasescantakeyears,during which time the system has adapted to function in the altered environment. These changes are not restricted to a few clinicallymonitored factorsbut can involve thewhole system, which now has adapted a new homeostasis with new dynamic interactions. Restoring only a few factors without considering the entire system can often result in further stress to the system, which might trigger a decline in system chaos. For many disease conditions resulting from years of adaptation, gradual", "title": "" }, { "docid": "d7d808e948467a1bb241143233bf8ee2", "text": "We discuss and predict the evolution of Simultaneous Localisation and Mapping (SLAM) into a general geometric and semantic ‘Spatial AI’ perception capability for intelligent embodied devices. A big gap remains between the visual perception performance that devices such as augmented reality eyewear or comsumer robots will require and what is possible within the constraints imposed by real products. Co-design of algorithms, processors and sensors will be needed. We explore the computational structure of current and future Spatial AI algorithms and consider this within the landscape of ongoing hardware developments.", "title": "" }, { "docid": "a6959cc988542a077058e57a5d2c2eff", "text": "A green and reliable method using supercritical fluid extraction (SFE) and molecular distillation (MD) was optimized for the separation and purification of standardized typical volatile components fraction (STVCF) from turmeric to solve the shortage of reference compounds in quality control (QC) of volatile components. A high quality essential oil with 76.0% typical components of turmeric was extracted by SFE. A sequential distillation strategy was performed by MD. The total recovery and purity of prepared STVCF were 97.3% and 90.3%, respectively. Additionally, a strategy, i.e., STVCF-based qualification and quantitative evaluation of major bioactive analytes by multiple calibrated components, was proposed to easily and effectively control the quality of turmeric. Compared with the individual calibration curve method, the STVCF-based quantification method was demonstrated to be credible and was effectively adapted for solving the shortage of reference volatile compounds and improving the QC of typical volatile components in turmeric, especially its functional products.", "title": "" }, { "docid": "f4617250b5654a673219d779952db35f", "text": "Convolutional neural network (CNN) models have achieved tremendous success in many visual detection and recognition tasks. Unfortunately, visual tracking, a fundamental computer vision problem, is not handled well using the existing CNN models, because most object trackers implemented with CNN do not effectively leverage temporal and contextual information among consecutive frames. Recurrent neural network (RNN) models, on the other hand, are often used to process text and voice data due to their ability to learn intrinsic representations of sequential and temporal data. Here, we propose a novel neural network tracking model that is capable of integrating information over time and tracking a selected target in video. It comprises three components: a CNN extracting best tracking features in each video frame, an RNN constructing video memory state, and a reinforcement learning (RL) agent making target location decisions. The tracking problem is formulated as a decision-making process, and our model can be trained with RL algorithms to learn good tracking policies that pay attention to continuous, inter-frame correlation and maximize tracking performance in the long run. We compare our model with an existing neural-network based tracking method and show that the proposed tracking approach works well in various scenarios by performing rigorous validation experiments on artificial video sequences with ground truth. To the best of our knowledge, our tracker is the first neural-network tracker that combines convolutional and recurrent networks with RL algorithms.", "title": "" }, { "docid": "01a4b2be52e379db6ace7fa8ed501805", "text": "The goal of our work is to complete the depth channel of an RGB-D image. Commodity-grade depth cameras often fail to sense depth for shiny, bright, transparent, and distant surfaces. To address this problem, we train a deep network that takes an RGB image as input and predicts dense surface normals and occlusion boundaries. Those predictions are then combined with raw depth observations provided by the RGB-D camera to solve for depths for all pixels, including those missing in the original observation. This method was chosen over others (e.g., inpainting depths directly) as the result of extensive experiments with a new depth completion benchmark dataset, where holes are filled in training data through the rendering of surface reconstructions created from multiview RGB-D scans. Experiments with different network inputs, depth representations, loss functions, optimization methods, inpainting methods, and deep depth estimation networks show that our proposed approach provides better depth completions than these alternatives.", "title": "" }, { "docid": "71022e2197bfb99bd081928cf162f58a", "text": "Ophthalmology and visual health research have received relatively limited attention from the personalized medicine community, but this trend is rapidly changing. Postgenomics technologies such as proteomics are being utilized to establish a baseline biological variation map of the human eye and related tissues. In this context, the choroid is the vascular layer situated between the outer sclera and the inner retina. The choroidal circulation serves the photoreceptors and retinal pigment epithelium (RPE). The RPE is a layer of cuboidal epithelial cells adjacent to the neurosensory retina and maintains the outer limit of the blood-retina barrier. Abnormal changes in choroid-RPE layers have been associated with age-related macular degeneration. We report here the proteome of the healthy human choroid-RPE complex, using reverse phase liquid chromatography and mass spectrometry-based proteomics. A total of 5309 nonredundant proteins were identified. Functional analysis of the identified proteins further pointed to molecular targets related to protein metabolism, regulation of nucleic acid metabolism, transport, cell growth, and/or maintenance and immune response. The top canonical pathways in which the choroid proteins participated were integrin signaling, mitochondrial dysfunction, regulation of eIF4 and p70S6K signaling, and clathrin-mediated endocytosis signaling. This study illustrates the largest number of proteins identified in human choroid-RPE complex to date and might serve as a valuable resource for future investigations and biomarker discovery in support of postgenomics ophthalmology and precision medicine.", "title": "" }, { "docid": "86fdb9b60508f87c0210623879185c8c", "text": "This paper proposes a novel Hierarchical Parsing Net (HPN) for semantic scene parsing. Unlike previous methods, which separately classify each object, HPN leverages global scene semantic information and the context among multiple objects to enhance scene parsing. On the one hand, HPN uses the global scene category to constrain the semantic consistency between the scene and each object. On the other hand, the context among all objects is also modeled to avoid incompatible object predictions. Specifically, HPN consists of four steps. In the first step, we extract scene and local appearance features. Based on these appearance features, the second step is to encode a contextual feature for each object, which models both the scene-object context (the context between the scene and each object) and the interobject context (the context among different objects). In the third step, we classify the global scene and then use the scene classification loss and a backpropagation algorithm to constrain the scene feature encoding. In the fourth step, a label map for scene parsing is generated from the local appearance and contextual features. Our model outperforms many state-of-the-art deep scene parsing networks on five scene parsing databases.", "title": "" }, { "docid": "e685a22b6f7b20fb1289923e86e467c5", "text": "Nowadays, with the growth in the use of search engines, the extension of spying programs and anti -terrorism prevention, several researches focused on text analysis. In this sense, lemmatization and stemming are two common requirements of these researches. They include reducing different grammatical forms of a word and bring them to a common base form. In what follows, we will discuss these treatment methods on arabic text, especially the Khoja Stemmer, show their limits and provide new tools to improve it.", "title": "" }, { "docid": "8a73a42bed30751cbb6798398b81571d", "text": "In this paper, we study the problem of learning image classification models with label noise. Existing approaches depending on human supervision are generally not scalable as manually identifying correct or incorrect labels is time-consuming, whereas approaches not relying on human supervision are scalable but less effective. To reduce the amount of human supervision for label noise cleaning, we introduce CleanNet, a joint neural embedding network, which only requires a fraction of the classes being manually verified to provide the knowledge of label noise that can be transferred to other classes. We further integrate CleanNet and conventional convolutional neural network classifier into one framework for image classification learning. We demonstrate the effectiveness of the proposed algorithm on both of the label noise detection task and the image classification on noisy data task on several large-scale datasets. Experimental results show that CleanNet can reduce label noise detection error rate on held-out classes where no human supervision available by 41.5% compared to current weakly supervised methods. It also achieves 47% of the performance gain of verifying all images with only 3.2% images verified on an image classification task. Source code and dataset will be available at kuanghuei.github.io/CleanNetProject.", "title": "" } ]
scidocsrr
8a3b64c6acff23694691f873559398c2
Neural Networks Approach to the Random Walk Dilemma of Financial Time Series
[ { "docid": "b7597e1f8c8ae4b40f5d7d1fe1f76a38", "text": "In this paper we present a Time-Delay Neural Network (TDNN) approach to phoneme recognition which is characterized by two important properties. 1) Using a 3 layer arrangement of simple computing units, a hierarchy can be constructed that allows for the formation of arbitrary nonlinear decision surfaces. The TDNN learns these decision surfaces automatically using error backpropagation 111. 2) The time-delay arrangement enables the network to discover acoustic-phonetic features and the temporal relationships between them independent of position in time and hence not blurred by temporal shifts", "title": "" } ]
[ { "docid": "97a9e9e85691a1fc461209dd1c636497", "text": "Diversity and plasticity are hallmarks of cells of the monocyte-macrophage lineage. In response to IFNs, Toll-like receptor engagement, or IL-4/IL-13 signaling, macrophages undergo M1 (classical) or M2 (alternative) activation, which represent extremes of a continuum in a universe of activation states. Progress has now been made in defining the signaling pathways, transcriptional networks, and epigenetic mechanisms underlying M1-M2 or M2-like polarized activation. Functional skewing of mononuclear phagocytes occurs in vivo under physiological conditions (e.g., ontogenesis and pregnancy) and in pathology (allergic and chronic inflammation, tissue repair, infection, and cancer). However, in selected preclinical and clinical conditions, coexistence of cells in different activation states and unique or mixed phenotypes have been observed, a reflection of dynamic changes and complex tissue-derived signals. The identification of mechanisms and molecules associated with macrophage plasticity and polarized activation provides a basis for macrophage-centered diagnostic and therapeutic strategies.", "title": "" }, { "docid": "32a45d3c08e24d29ad5f9693253c0e9e", "text": "This paper presents comparative study of high-speed, low-power and low voltage full adder circuits. Our approach is based on XOR-XNOR design full adder circuits in a single unit. A low power and high performance 9T full adder cell using a design style called “XOR (3T)” is discussed. The designed circuit commands a high degree of regularity and symmetric higher density than the conventional CMOS design style as well as it lowers power consumption by using XOR (3T) logic circuits. Gate Diffusion Input (GDI) technique of low-power digital combinatorial circuit design is also described. This technique helps in reducing the power consumption and the area of digital circuits while maintaining low complexity of logic design. This paper analyses, evaluates and compares the performance of various adder circuits. Several simulations conducted using different voltage supplies, load capacitors and temperature variation demonstrate the superiority of the XOR (3T) based full adder designs in term of delay, power and power delay product (PDP) compared to the other full adder circuits. Simulation results illustrate the superiority of the designed adder circuits against the conventional CMOS, TG and Hybrid full adder circuits in terms of power, delay and power delay product (PDP). .", "title": "" }, { "docid": "cde0f2ea11928095e72405ba4ebf9945", "text": "Network debuggers are even more complex Ø Increasingly, network debugging functionality is pushed into the network due to improved switch programmability Ø Existing tools employ complex in-network techniques such as data plane snapshot, per-switch per-packet logs, packet mirroring/sampling, and dynamic rule updates --source: The Gigaspaces blog --source: TechRepublic.com Datacenter networks are complex", "title": "" }, { "docid": "bdf81fccbfa77dadcad43699f815475e", "text": "The objective of this paper is classifying images by the object categories they contain, for example motorbikes or dolphins. There are three areas of novelty. First, we introduce a descriptor that represents local image shape and its spatial layout, together with a spatial pyramid kernel. These are designed so that the shape correspondence between two images can be measured by the distance between their descriptors using the kernel. Second, we generalize the spatial pyramid kernel, and learn its level weighting parameters (on a validation set). This significantly improves classification performance. Third, we show that shape and appearance kernels may be combined (again by learning parameters on a validation set).\n Results are reported for classification on Caltech-101 and retrieval on the TRECVID 2006 data sets. For Caltech-101 it is shown that the class specific optimization that we introduce exceeds the state of the art performance by more than 10%.", "title": "" }, { "docid": "8ca5c14244b33d40bfa35cd0d48f74aa", "text": "This review paper is to give a full picture of fault detection and diagnosis (FDD) in complex systems from the perspective of data processing. As a matter of fact, an FDD system is a data-processing system on the basis of information redundancy, in which the data and human's understanding of the data are two fundamental elements. Human's understanding may be an explicit input-output model representing the relationship among the system's variables. It may also be represented as knowledge implicitly (e.g., the connection weights of a neural network). Therefore, FDD is done through some kind of modeling, signal processing, and intelligence computation. In this paper, a variety of FDD techniques are reviewed within the unified data-processing framework to give a full picture of FDD and achieve a new level of understanding. According to the types of data and how the data are processed, the FDD methods are classified into three categories: model-based online data-driven methods, signal-based methods, and knowledge-based history data-driven methods. An outlook to the possible evolution of FDD in industrial automation, including the hybrid FDD and the emerging networked FDD, are also presented to reveal the future development direction in this field.", "title": "" }, { "docid": "fbddd20271cf134e15b33e7d6201c374", "text": "Authors and publishers who wish their publications to be considered for review in Computational Linguistics should send a copy to the book review editor, Graeme Hirst, Department of Computer Science, University of Toronto, Toronto, Canada M5S 3G4. All relevant books received will be listed, but not all can be reviewed. Technical reports (other than dissertations) will not be listed or reviewed. Authors should be aware that some publishers will not send books for review (even when instructed to do so); authors wishing to enquire as to whether their book has been received for review may contact the book review editor.", "title": "" }, { "docid": "45addba115a5046a9840daf2860e8ddc", "text": "This paper investigates the use of Doppler radar sensor for occupancy monitoring. The feasibility of true presence is explored with Doppler radar occupancy sensors to overcome the limitations of the common occupancy sensors. The common occupancy sensors are more of a motion sensor than a presence detector. Existing cost effective off the shelf System-on-Chip CC2530 RF transceiver is used for developing the radio. The transmitter sends continuous wave signal at 2.405 GHz. Different levels of activity is detected by post-processing sensor signals. Heart and respiratory signals are extracted in order to improve stationary subject detection.", "title": "" }, { "docid": "08768f6cf1305884a735bbe4e7e98474", "text": "Language is sensitive to both semantic and pragmatic effects. To capture both effects, we model language use as a cooperative game between two players: a speaker, who generates an utterance, and a listener, who responds with an action. Specifically, we consider the task of generating spatial references to objects, wherein the listener must accurately identify an object described by the speaker. We show that a speaker model that acts optimally with respect to an explicit, embedded listener model substantially outperforms one that is trained to directly generate spatial descriptions.", "title": "" }, { "docid": "4da9f9dbc434aee99b8a034ea64947cc", "text": "As social networks and the user-generated content that populates them continue to grow in prevalence, size, and influence, understanding how users interact and produce this content becomes increasingly important. Insight into these community dynamics could prove valuable for measuring content trust, providing role-based group recommendations, or evaluating group stability and growth. To this end, we explore user posting behavior on reddit, a large social networking site comprised of many sub-communities in which a user may participate simultaneously. We demonstrate that the well-known \"answer-person\" role is present in the reddit community, provide an exposition on an automated method for identifying this role based solely on user interactions (foregoing expensive content analysis), and show that users rarely exhibit significant participation in more than one communities.", "title": "" }, { "docid": "3c22555a6a515cb5ad510cd5828adfb0", "text": "Petri Nets are a powerful technique for modelling, analysing, and validating all kinds of systems. In order to exploit the full power of Petri nets, different versions of Petri nets and tools need to be used, and, sometimes, we need to combine them with other techniques. This makes it necessary to model the same system in different Petri net formalisms or other notations over and over again. Moreover, systems will often be constructed from standard components so that the modeller would like to build his system from these components. This way, even users with no experience in Petri nets can model systems. In order to help this group of users, the analysis results obtained by Petri net tools or other formal methods must be presented and visualized independently from Petri nets. Component Tools is a platform designed for this purpose. Along with a 3D-visualisation of the behaviour of the system (PNVis), non-experts can build Petri net models and see their model running in (virtual) reality. The tutorial will cover the concepts of ComponentTools as well as the concepts and modelling philosophy of the 3D-visualisation. Moreover, the tutorial will discuss the underlying software technology which makes it easy to implement this kind of tools. In addition to the existing concepts the tutorial will give an overview of ideas for future work and challenging research projects -with the potential for many PhD theses. References E. Kindler and F. Nillies: Petri Nets and the Real World. Petri Net Newsletter 70, Cover Picture Story, pp. 3-8, April 2006. http://www.upb.de/cs/kindler/publications/copies/PRW-PNNL70.pdf E. Kindler and C. Páles: 3D-Visualization of Petri Net Models: Concept and Realization. In: J. Cortadella and W. Reisig (eds.): International Conference on Theory and Application of Petri Nets 2004, 25th International Conference, Bolgna, Italy. Springer, LNCS 3099: 464-473, June 2004. E. Kindler, V. Rubin, and R. Wagner: Component Tools: Application and Integration of Formal Methods. In: Electronic proceedings of the Workshop Object Orientierte Software Entwicklung 2005 (OOSE '05), Satellite event of Net.ObjectDays 2005, Erfurt, Germany, September 2005. http://www.upb.de/cs/kindler/publications/copies/OOSE05.pdf E. Kindler, V. Rubin, and R. Wagner: Component Tools: Integrating Petri nets with other formal methods. International Conference on Theory and Application of Petri Nets 2006, 27th International Conference, Turku, Finland. June 2006. LNCS 4024, pp. 37-56. E. Kindler and R. Wagner: Triple Graph Grammars: Concepts, Extensions, Implementations, and Application Scenarios. Tech. Rep. tr-ri-07-284, Software Engineering Group, Department of Computer Science, University of Paderborn, June 2007. http://www.upb.de/cs/ag-schaefer/Veroeffentlichungen/Quellen/Papers/2007/tr-ri-07-284.pdf", "title": "" }, { "docid": "7bcfeba71527a097594fb34786372ca0", "text": "Feature extraction approach in medical magnetic resonance imaging (MRI) is very important in order to perform diagnostic image analysis [1]. Edge detection is one of the way to extract more information from magnetic resonance images. Edge detection reduces the amount of data and filters out useless information, while protecting the important structural properties in an image [2]. In this paper, we compare Sobel and Canny edge detection method. In order to compare between them, one slice of MRI image tested with both method. Both method of the edge detection operators are implemented with convolution masks. Sobel method with 3x3 masks while canny used adjustable mask. Those masks will determine the quality of the edge. Edges areas represent a strong intensity contrast which is darker or brighter. Keyword: MRI, Edge detection, Canny method", "title": "" }, { "docid": "10807dca4d1c7d3723a27e69ed4bfb11", "text": "We review 100 years of research on performance appraisal and performance management, highlighting the articles published in JAP, but including significant work from other journals as well. We discuss trends in eight substantive areas: (1) scale formats, (2) criteria for evaluating ratings, (3) training, (4) reactions to appraisal, (5) purpose of rating, (6) rating sources, (7) demographic differences in ratings, and (8) cognitive processes, and discuss what we have learned from research in each area. We also focus on trends during the heyday of performance appraisal research in JAP (1970-2000), noting which were more productive and which potentially hampered progress. Our overall conclusion is that JAP's role in this literature has not been to propose models and new ideas, but has been primarily to test ideas and models proposed elsewhere. Nonetheless, we conclude that the papers published in JAP made important contribution to the filed by addressing many of the critical questions raised by others. We also suggest several areas for future research, especially research focusing on performance management. (PsycINFO Database Record", "title": "" }, { "docid": "2f522594c025614bf6c44913e8cc672b", "text": "Electronic-based communication (such as Immersive Virtual Environments; IVEs) may offer new ways of satisfying the need for social connection, but they also provide ways this need can be thwarted. Ostracism, being ignored and excluded, is a common social experience that threatens fundamental human needs (i.e., belonging, control, self-esteem, and meaningful existence). Previous ostracism research has made use of a variety of paradigms, including minimal electronic-based interactions (e.g., Cyberball) and communication (e.g., chatrooms and Short Message Services). These paradigms, however, lack the mundane realism that many IVEs now offer. Further, IVE paradigms designed to measure ostracism may allow researchers to test more nuanced hypotheses about the effects of ostracism. We created an IVE in which ostracism could be manipulated experimentally, emulating a previously validated minimal ostracism paradigm. We found that participants who were ostracized in this IVE experienced the same negative effects demonstrated in other ostracism paradigms, providing, to our knowledge, the first evidence of the negative effects of ostracism in virtual environments. Though further research directly exploring these effects in online virtual environments is needed, this research suggests that individuals encountering ostracism in other virtual environments (such as massively multiplayer online role playing games; MMORPGs) may experience negative effects similar to those of being ostracized in real life. This possibility may have serious implications for individuals who are marginalized in their real life and turn to IVEs to satisfy their need for social connection.", "title": "" }, { "docid": "29975df3948fdc58d8d2adfe2c72103f", "text": "Antibiotic licensing studies remain a problem in neonates. The classical adult clinical syndrome-based licensing studies do not apply to neonates, where sepsis is the most common infection. The main obstacle to conducting neonatal antibiotic trials is a lack of consensus on the definition of neonatal sepsis itself and the selection of appropriate endpoints. This article describes the difficulties of the clinical and laboratory definitions of neonatal sepsis and reviews the varying designs of previous neonatal sepsis trials. The optimal design of future trials of new antibiotics will need to be based on pharmacokinetic/pharmacodynamic parameters, combined with adequately powered clinical studies to determine safety and efficacy.", "title": "" }, { "docid": "8b163324bef9fbe353f27e190788c642", "text": "The paper is concerned with ways in which fair concurrency can be modelled using notations for omega-regular languages languages containing infinite sequences, whose recognizers are modified forms of B~chi or Muller-McNaughton automata. There are charecterization of these languages in terms of recursion equation sets which involve both minimal and maximal fixpoint operators. The class of e-regular languages is closed under a fair concurrency operator. A general method for proving/deciding equivalences between such languages is obtained, derived from Milner's notion of \"simulation\". i. IntIDduction If a construct (C 1 P~ C 2) is understood to call for concurrent interpretation of cormmands, 'fairness' is the constraint On the language involved which guarantees that x:=true; y:=l; ((while x do y:=y+i) par x:=false) always terminates, though without guaranteeing any bound on the value of y when it does so. The constraint appears to present a number of fundamental problems one reason being its association with'unbounded nondetemminism', as exhibited by the value of y in the example, which comes out with a defined, but unbounded value. Apparently this variety of nondeterminism can he given an accurate semantics only by resorting to features such as the use of monotone, non-continuous functions which do not otherwise occur in computation theory. Thus the rich variety of models due to Scott, Plotkin and others is not apparently available, so that satisfactory answers seem to call for a return to more primitive notions. In a previous paper [ii] a semantics was obtained for a primitive programming language with fair concurrency. This involved the use of what are here called m-regular expressions. This paper will he concerned primarily with the theory sumrounding such notations. We hope to discuss practical examples in a later paper, but briefly point out here the sort of r~asoning we would expect to he useful in practice. One would expect that aconstruc t such as While E do C should be associated with an ~-regular expression of the form A~'(: A* + A a~) where A is determined by E and C. And concurrency (the fair merging of command", "title": "" }, { "docid": "5ee5f4450ecc89b684e90e7b846f8365", "text": "This study scrutinizes the predictive relationship between three referral channels, search engine, social medial, and third-party advertising, and online consumer search and purchase. The results derived from vector autoregressive models suggest that the three channels have differential predictive relationship with sale measures. The predictive power of the three channels is also considerably different in referring customers among competing online shopping websites. In the short run, referrals from all three channels have a significantly positive predictive relationship with the focal online store’s sales amount and volume, but having no significant relationship with conversion. Only referrals from search engines to the rival website have a significantly negative predictive relationship with the focal website’s sales and volume. In the long run, referrals from all three channels have a significant positive predictive relationship with the focal website’s sales, conversion and sales volume. In contrast, referrals from all three channels to the competing online stores have a significant negative predictive relationship with the focal website’s sales, conversion and sales volume. Our results also show that search engine referrals explains the most of the variance in sales, while social media referrals explains the most of the variance in conversion and third party ads referrals explains the most of the variance in sales volume. This study offers new insights for IT and marketing practitioners in respect to better and deeper understanding on marketing attribution and how different channels perform in order to optimize the media mix and overall performance.", "title": "" }, { "docid": "72a5db33e2ba44880b3801987b399c3d", "text": "Over the last decade, the ever increasing world-wide demand for early detection of breast cancer at many screening sites and hospitals has resulted in the need of new research avenues. According to the World Health Organization (WHO), an early detection of cancer greatly increases the chances of taking the right decision on a successful treatment plan. The Computer-Aided Diagnosis (CAD) systems are applied widely in the detection and differential diagnosis of many different kinds of abnormalities. Therefore, improving the accuracy of a CAD system has become one of the major research areas. In this paper, a CAD scheme for detection of breast cancer has been developed using deep belief network unsupervised path followed by back propagation supervised path. The construction is back-propagation neural network with Liebenberg Marquardt learning function while weights are initialized from the deep belief network path (DBN-NN). Our technique was tested on the Wisconsin Breast Cancer Dataset (WBCD). The classifier complex gives an accuracy of 99.68% indicating promising results over previously-published studies. The proposed system provides an effective classification model for breast cancer. In addition, we examined the architecture at several train-test partitions. © 2015 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "8a9680ae0d35a1c53773ccf7dcef4df7", "text": "Support Vector Machines SVMs have proven to be highly e ective for learning many real world datasets but have failed to establish them selves as common machine learning tools This is partly due to the fact that they are not easy to implement and their standard imple mentation requires the use of optimization packages In this paper we present simple iterative algorithms for training support vector ma chines which are easy to implement and guaranteed to converge to the optimal solution Furthermore we provide a technique for automati cally nding the kernel parameter and best learning rate Extensive experiments with real datasets are provided showing that these al gorithms compare well with standard implementations of SVMs in terms of generalisation accuracy and computational cost while being signi cantly simpler to implement", "title": "" }, { "docid": "60cc418b3b5a47e8f636b6c54a0a2d5e", "text": "Continued use of petroleum sourced fuels is now widely recognized as unsustainable because of depleting supplies and the contribution of these fuels to the accumulation of carbon dioxide in the environment. Renewable, carbon neutral, transport fuels are necessary for environmental and economic sustainability. Biodiesel derived from oil crops is a potential renewable and carbon neutral alternative to petroleum fuels. Unfortunately, biodiesel from oil crops, waste cooking oil and animal fat cannot realistically satisfy even a small fraction of the existing demand for transport fuels. As demonstrated here, microalgae appear to be the only source of renewable biodiesel that is capable of meeting the global demand for transport fuels. Like plants, microalgae use sunlight to produce oils but they do so more efficiently than crop plants. Oil productivity of many microalgae greatly exceeds the oil productivity of the best producing oil crops. Approaches for making microalgal biodiesel economically competitive with petrodiesel are discussed.", "title": "" } ]
scidocsrr
02bcbf5daa4d06a34c43d2d5c6cfa67a
Enhancing Person Re-identification in a Self-Trained Subspace
[ { "docid": "22650cb6c1470a076fc1dda7779606ec", "text": "This paper addresses the problem of handling spatial misalignments due to camera-view changes or human-pose variations in person re-identification. We first introduce a boosting-based approach to learn a correspondence structure which indicates the patch-wise matching probabilities between images from a target camera pair. The learned correspondence structure can not only capture the spatial correspondence pattern between cameras but also handle the viewpoint or human-pose variation in individual images. We further introduce a global-based matching process. It integrates a global matching constraint over the learned correspondence structure to exclude cross-view misalignments during the image patch matching process, hence achieving a more reliable matching score between images. Experimental results on various datasets demonstrate the effectiveness of our approach.", "title": "" }, { "docid": "0c62db080c7c49a2642eca00c04f92ba", "text": "Dimensionality reduction is one of the important preprocessing steps in high-dimensional data analysis. In this paper, we consider the supervised dimensionality reduction problem where samples are accompanied with class labels. Traditional Fisher discriminant analysis is a popular and powerful method for this purpose. However, it tends to give undesired results if samples in some class form several separate clusters, i.e., multimodal. In this paper, we propose a new dimensionality reduction method called local Fisher discriminant analysis (LFDA), which is a localized variant of Fisher discriminant analysis. LFDA takes local structure of the data into account so the multimodal data can be embedded appropriately. We also show that LFDA can be extended to non-linear dimensionality reduction scenarios by the kernel trick.", "title": "" } ]
[ { "docid": "07cb7c48a534cc002c5088225a540b1e", "text": "OBJECTIVES\nThe Health Information Technology for Economic and Clinical Health (HITECH) Act created incentives for adopting electronic health records (EHRs) for some healthcare organisations, but long-term care (LTC) facilities are excluded from those incentives. There are realisable benefits of EHR adoption in LTC facilities; however, there is limited research about this topic. The purpose of this systematic literature review is to identify EHR adoption factors for LTC facilities that are ineligible for the HITECH Act incentives.\n\n\nSETTING\nWe conducted systematic searches of Cumulative Index of Nursing and Allied Health Literature (CINAHL) Complete via Ebson B. Stephens Company (EBSCO Host), Google Scholar and the university library search engine to collect data about EHR adoption factors in LTC facilities since 2009.\n\n\nPARTICIPANTS\nSearch results were filtered by date range, full text, English language and academic journals (n=22).\n\n\nINTERVENTIONS\nMultiple members of the research team read each article to confirm applicability and study conclusions.\n\n\nPRIMARY AND SECONDARY OUTCOME MEASURES\nResearchers identified common themes across the literature: specifically facilitators and barriers to adoption of the EHR in LTC.\n\n\nRESULTS\nResults identify facilitators and barriers associated with EHR adoption in LTC facilities. The most common facilitators include access to information and error reduction. The most prevalent barriers include initial costs, user perceptions and implementation problems.\n\n\nCONCLUSIONS\nSimilarities span the system selection phases and implementation process; of those, cost was the most common mentioned. These commonalities should help leaders in LTC facilities align strategic decisions to EHR adoption. This review may be useful for decision-makers attempting successful EHR adoption, policymakers trying to increase adoption rates without expanding incentives and vendors that produce EHRs.", "title": "" }, { "docid": "3553d1dc8272bf0366b2688e5107aa3f", "text": "The emergence of the Web 2.0 technology generated a massive amount of raw data by enabling Internet users to post their opinions, reviews, comments on the web. Processing this raw data to extract useful information can be a very challenging task. An example of important information that can be automatically extracted from the users' posts and comments is their opinions on different issues, events, services, products, etc. This problem of Sentiment Analysis (SA) has been studied well on the English language and two main approaches have been devised: corpus-based and lexicon-based. This paper addresses both approaches to SA for the Arabic language. Since there is a limited number of publically available Arabic dataset and Arabic lexicons for SA, this paper starts by building a manually annotated dataset and then takes the reader through the detailed steps of building the lexicon. Experiments are conducted throughout the different stages of this process to observe the improvements gained on the accuracy of the system and compare them to corpus-based approach.", "title": "" }, { "docid": "b93b2c6ccb1b155996d2af3947497497", "text": "This paper surveys the techniques used for designing the most efficient algorithms for finding a maximum cardinality or weighted matching in (general or bipartite) graphs. It also lists some open problems concerning possible improvements in existing algorithms and the existence of fast parallel algorithms for these problems.", "title": "" }, { "docid": "28846c26b51e53e4d42bb49c6d410379", "text": "Social media language contains huge amount and wide variety of nonstandard tokens, created both intentionally and unintentionally by the users. It is of crucial importance to normalize the noisy nonstandard tokens before applying other NLP techniques. A major challenge facing this task is the system coverage, i.e., for any user-created nonstandard term, the system should be able to restore the correct word within its top n output candidates. In this paper, we propose a cognitivelydriven normalization system that integrates different human perspectives in normalizing the nonstandard tokens, including the enhanced letter transformation, visual priming, and string/phonetic similarity. The system was evaluated on both wordand messagelevel using four SMS and Twitter data sets. Results show that our system achieves over 90% word-coverage across all data sets (a 10% absolute increase compared to state-ofthe-art); the broad word-coverage can also successfully translate into message-level performance gain, yielding 6% absolute increase compared to the best prior approach.", "title": "" }, { "docid": "7d0b37434699aa5c3b36de33549a2b68", "text": "In Ethiopia, malaria control has been complicated due to resistance of the parasite to the current drugs. Thus, new drugs are required against drug-resistant Plasmodium strains. Historically, many of the present antimalarial drugs were discovered from plants. This study was, therefore, conducted to document antimalarial plants utilized by Sidama people of Boricha District, Sidama Zone, South Region of Ethiopia. An ethnobotanical survey was carried out from September 2011 to February 2012. Data were collected through semistructured interview and field and market observations. Relative frequency of citation (RFC) was calculated and preference ranking exercises were conducted to estimate the importance of the reported medicinal plants in Boricha District. A total of 42 antimalarial plants belonging to 27 families were recorded in the study area. Leaf was the dominant plant part (59.0%) used in the preparation of remedies and oral (97.4%) was the major route of administration. Ajuga integrifolia scored the highest RFC value (0.80). The results of this study revealed the existence of rich knowledge on the use of medicinal plants in the study area to treat malaria. Thus, an attempt should be made to conserve and evaluate the claimed antimalarial medicinal plants with priority given to those that scored the highest RFC values.", "title": "" }, { "docid": "2d02bf71ee22e062d12ce4ec0b53d4c9", "text": "BACKGROUND\nTherapies that maintain remission for patients with Crohn's disease are essential. Stable remission rates have been demonstrated for up to 2 years in adalimumab-treated patients with moderately to severely active Crohn's disease enrolled in the CHARM and ADHERE clinical trials.\n\n\nAIM\nTo present the long-term efficacy and safety of adalimumab therapy through 4 years of treatment.\n\n\nMETHODS\nRemission (CDAI <150), response (CR-100) and corticosteroid-free remission over 4 years, and maintenance of these endpoints beyond 1 year were assessed in CHARM early responders randomised to adalimumab. Corticosteroid-free remission was also assessed in all adalimumab-randomised patients using corticosteroids at baseline. Fistula healing was assessed in adalimumab-randomised patients with fistula at baseline. As observed, last observation carried forward and a hybrid nonresponder imputation analysis for year 4 (hNRI) were used to report efficacy. Adverse events were reported for any patient receiving at least one dose of adalimumab.\n\n\nRESULTS\nOf 329 early responders randomised to adalimumab induction therapy, at least 30% achieved remission (99/329) or CR-100 (116/329) at year 4 of treatment (hNRI). The majority of patients (54%) with remission at year 1 maintained this endpoint at year 4 (hNRI). At year 4, 16% of patients taking corticosteroids at baseline were in corticosteroid-free remission and 24% of patients with fistulae at baseline had healed fistulae. The incidence rates of adverse events remained stable over time.\n\n\nCONCLUSIONS\nProlonged adalimumab therapy maintained clinical remission and response in patients with moderately to severely active Crohn's disease for up to 4 years. No increased risk of adverse events or new safety signals were identified with long-term maintenance therapy. (clinicaltrials.gov number: NCT00077779).", "title": "" }, { "docid": "67f3426cbcb52a82a9970198d107acfc", "text": "In current conceptualizations of visual attention, selection takes place through integrated competition between recurrently connected visual processing networks. Selection, which facilitates the emergence of a 'winner' from among many potential targets, can be associated with particular spatial locations or object properties, and it can be modulated by both stimulus-driven and goal-driven factors. Recent neurobiological data support this account, revealing the activation of striate and extrastriate brain regions during conditions of competition. In addition, parietal and temporal cortices play a role in selection, biasing the ultimate outcome of the competition.", "title": "" }, { "docid": "2b1e2b90d7fcff0f3b159908d58c0cae", "text": "Existing blind image quality assessment (BIQA) methods are mostly opinion-aware. They learn regression models from training images with associated human subjective scores to predict the perceptual quality of test images. Such opinion-aware methods, however, require a large amount of training samples with associated human subjective scores and of a variety of distortion types. The BIQA models learned by opinion-aware methods often have weak generalization capability, hereby limiting their usability in practice. By comparison, opinion-unaware methods do not need human subjective scores for training, and thus have greater potential for good generalization capability. Unfortunately, thus far no opinion-unaware BIQA method has shown consistently better quality prediction accuracy than the opinion-aware methods. Here, we aim to develop an opinion-unaware BIQA method that can compete with, and perhaps outperform, the existing opinion-aware methods. By integrating the features of natural image statistics derived from multiple cues, we learn a multivariate Gaussian model of image patches from a collection of pristine natural images. Using the learned multivariate Gaussian model, a Bhattacharyya-like distance is used to measure the quality of each image patch, and then an overall quality score is obtained by average pooling. The proposed BIQA method does not need any distorted sample images nor subjective quality scores for training, yet extensive experiments demonstrate its superior quality-prediction performance to the state-of-the-art opinion-aware BIQA methods. The MATLAB source code of our algorithm is publicly available at www.comp.polyu.edu.hk/~cslzhang/IQA/ILNIQE/ILNIQE.htm.", "title": "" }, { "docid": "8e80d35cd01bde9b34651ca14e715171", "text": "A complementary metal-oxide semiconductor (CMOS) single-stage cascode low-noise amplifier (LNA) is presented in this paper. The microwave monolithic integrated circuit (MMIC) is fabricated using digital 90-nm silicon-on-insulator (SOI) technology. All impedance matching and bias elements are implemented on the compact chip, which has a size of 0.6 mm /spl times/ 0.3 mm. The supply voltage and supply current are 2.4 V and 17 mA, respectively. At 35 GHz and 50 /spl Omega/ source/load impedances, a gain of 11.9 dB, a noise figure of 3.6 dB, an output compression point of 4 dBm, an input return loss of 6 dB, and an output return loss of 18 dB are measured. The -3-dB frequency bandwidth ranges from 26 to 42 GHz. All results include the pad parasitics. To the knowledge of the author, the results are by far the best for a silicon-based millimeter-wave LNA reported to date. The LNA is well suited for systems operating in accordance to the local multipoint distribution service (LMDS) standards at 28 and 38 GHz and the multipoint video distribution system (MVDS) standard at 42 GHz.", "title": "" }, { "docid": "250c1a5ac98dc6556bc62cc05555499d", "text": "Smartphones are programmable and equipped with a set of cheap but powerful embedded sensors, such as accelerometer, digital compass, gyroscope, GPS, microphone, and camera. These sensors can collectively monitor a diverse range of human activities and the surrounding environment. Crowdsensing is a new paradigm which takes advantage of the pervasive smartphones to sense, collect, and analyze data beyond the scale of what was previously possible. With the crowdsensing system, a crowdsourcer can recruit smartphone users to provide sensing service. Existing crowdsensing applications and systems lack good incentive mechanisms that can attract more user participation. To address this issue, we design incentive mechanisms for crowdsensing. We consider two system models: the crowdsourcer-centric model where the crowdsourcer provides a reward shared by participating users, and the user-centric model where users have more control over the payment they will receive. For the crowdsourcer-centric model, we design an incentive mechanism using a Stackelberg game, where the crowdsourcer is the leader while the users are the followers. We show how to compute the unique Stackelberg Equilibrium, at which the utility of the crowdsourcer is maximized, and none of the users can improve its utility by unilaterally deviating from its current strategy. For the user-centric model, we design an auction-based incentive mechanism, which is computationally efficient, individually rational, profitable, and truthful. Through extensive simulations, we evaluate the performance and validate the theoretical properties of our incentive mechanisms.", "title": "" }, { "docid": "c3261d1552912642d407b512d08cc6f7", "text": "Four studies apply self-determination theory (SDT; Ryan & Deci, 2000) in investigating motivation for computer game play, and the effects of game play on wellbeing. Studies 1–3 examine individuals playing 1, 2 and 4 games, respectively and show that perceived in-game autonomy and competence are associated with game enjoyment, preferences, and changes in well-being preto post-play. Competence and autonomy perceptions are also related to the intuitive nature of game controls, and the sense of presence or immersion in participants’ game play experiences. Study 4 surveys an on-line community with experience in multiplayer games. Results show that SDT’s theorized needs for autonomy, competence, and relatedness independently predict enjoyment and future game play. The SDT model is also compared with Yee’s (2005) motivation taxonomy of game play motivations. Results are discussed in terms of the relatively unexplored landscape of human motivation within virtual worlds.", "title": "" }, { "docid": "2d94bc7459304885c60c7bf29341fa5d", "text": "Bayesian optimization schemes often rely on Gaussian processes (GP). GP models are very flexible, but are known to scale poorly with the number of training points. While several efficient sparse GP models are known, they have limitations when applied in optimization settings. We propose a novel Bayesian optimization framework that uses sparse online Gaussian processes. We introduce a new updating scheme for the online GP that accounts for our preference during optimization for regions with better performance. We apply this method to optimize the performance of a free-electron laser, and demonstrate empirically that the weighted updating scheme leads to substantial improvements to performance in optimization.", "title": "" }, { "docid": "fb7f0dbfb4d603ff122b95a41ac3a3bc", "text": "Recent studies have demonstrated the efficiency of generative pretraining for English natural language understanding. In this work, we extend this approach to multiple languages and show the effectiveness of cross-lingual pretraining. We propose two methods to learn cross-lingual language models (XLMs): one unsupervised that only relies on monolingual data, and one supervised that leverages parallel data with a new cross-lingual language model objective. We obtain state-of-the-art results on cross-lingual classification, unsupervised and supervised machine translation. On XNLI, our approach pushes the state of the art by an absolute gain of 4.9% accuracy. On unsupervised machine translation, we obtain 34.3 BLEU on WMT’16 German-English, improving the previous state of the art by more than 9 BLEU. On supervised machine translation, we obtain a new state of the art of 38.5 BLEU on WMT’16 Romanian-English, outperforming the previous best approach by more than 4 BLEU. Our code and pretrained models will be made publicly available.", "title": "" }, { "docid": "05d3029a38631e4c0e445731f655b52c", "text": "This paper presents a non-inverting buck-boost based power-factor-correction (PFC) converter operating in the boundary-conduction-mode (BCM) for the wide input-voltage-range applications. Unlike other conventional PFC converters, the proposed non-inverting buck-boost based PFC converter has both step-up and step-down conversion functionalities to provide positive DC output-voltage. In order to reduce the turn-on switching-loss in high frequency applications, the BCM current control is employed to achieve zero current turn-on for the power switches. Besides, the relationships of the power factor versus the voltage conversion ratio between the BCM boost PFC converter and the proposed BCM non-inverting buck-boost PFC converter are also provided. Finally, the 70-watt prototype circuit of the proposed BCM buck-boost based PFC converter is built for the verification of the high frequency and wide input-voltage-range.", "title": "" }, { "docid": "15a079037d3dbb1b08591c0a3c8e0804", "text": "The paper offers an introduction and a road map to the burgeoning literature on two-sided markets. In many industries, platforms court two (or more) sides that use the platform to interact with each other. The platforms’ usage or variable charges impact the two sides’ willingness to trade, and thereby their net surpluses from potential interactions; the platforms’ membership or fixed charges in turn determine the end-users’ presence on the platform. The platforms’ fine design of the structure of variable and fixed charges is relevant only if the two sides do not negotiate away the corresponding usage and membership externalities. The paper first focuses on usage charges and provides conditions for the allocation of the total usage charge (e.g., the price of a call or of a payment card transaction) between the two sides not to be neutral; the failure of the Coase theorem is necessary but not sufficient for two-sidedness. Second, the paper builds a canonical model integrating usage and membership externalities. This model allows us to unify and compare the results obtained in the two hitherto disparate strands of the literature emphasizing either form of externality; and to place existing membership (or indirect) externalities models on a stronger footing by identifying environments in which these models can accommodate usage pricing. We also obtain general results on usage pricing of independent interest. Finally, the paper reviews some key economic insights on platform price and non-price strategies.", "title": "" }, { "docid": "be1bfd488f90deca658937dd20ee0915", "text": "This research examined the effects of hands-free cell phone conversations on simulated driving. The authors found that these conversations impaired driver's reactions to vehicles braking in front of them. The authors assessed whether this impairment could be attributed to a withdrawal of attention from the visual scene, yielding a form of inattention blindness. Cell phone conversations impaired explicit recognition memory for roadside billboards. Eye-tracking data indicated that this was due to reduced attention to foveal information. This interpretation was bolstered by data showing that cell phone conversations impaired implicit perceptual memory for items presented at fixation. The data suggest that the impairment of driving performance produced by cell phone conversations is mediated, at least in part, by reduced attention to visual inputs.", "title": "" }, { "docid": "4fe2467d44337a911f30e652c436db8f", "text": "The use of computer programming in K-12 spread into schools worldwide in the 70s and 80s of the last century, but it disappeared from the educational landscape in the early 90s. With the development of visual programming languages such as Scratch, this movement has emerged again in recent years, as teachers at all educational levels and from different disciplines consider that the use of programming enhances learning in many subjects and allows students to develop important skills. The systematic literature review presented in this article aims to summarize the results of recent research using programming with Scratch in subjects not related to computing and communications, as well as studies analyzing the kind of skills students develop while learning to code in this environment. Although the analyzed papers provide promising results regarding the use of programming as an educational resource, this review highlights the need to conduct more empirical research in classrooms, using larger samples of students that allow to obtain clear conclusions about the types of learning that could be enhanced through programming.", "title": "" }, { "docid": "23583b155fc8ec3301cfef805f568e57", "text": "We address the problem of covering an environment with robots equipped with sensors. The robots are heterogeneous in that the sensor footprints are different. Our work uses the location optimization framework in with three significant extensions. First, we consider robots with different sensor footprints, allowing, for example, aerial and ground vehicles to collaborate. We allow for finite size robots which enables implementation on real robotic systems. Lastly, we extend the previous work allowing for deployment in non convex environments.", "title": "" }, { "docid": "0bce954374d27d4679eb7562350674fc", "text": "Humanoid robotics is attracting the interest of many research groups world-wide. In particular, developing humanoids requires the implementation of manipulation capabilities, which is still a most complex problem in robotics. This paper presents an overview of current activities in the development of humanoid robots, with special focus on manipulation. Then we discuss our current approach to the design and development of anthropomorphic sensorized hand and of anthropomorphic control and sensory-motor coordination schemes. Current achievements in the development of a robotic human hand prosthesis are described, together with preliminary experimental results, as well as in the implementation of biologically-inspired schemes for control and sensory-motor co-ordination in manipulation, derived from models of well-identified human brain areas.", "title": "" } ]
scidocsrr
4578f7e2e5fcf1a997a2819637064854
DRASH: A Data Replication-Aware Scheduler in Geo-Distributed Data Centers
[ { "docid": "8222f36e2aa06eac76085fb120c8edab", "text": "Small jobs, that are typically run for interactive data analyses in datacenters, continue to be plagued by disproportionately long-running tasks called stragglers. In the production clusters at Facebook and Microsoft Bing, even after applying state-of-the-art straggler mitigation techniques, these latency sensitive jobs have stragglers that are on average 8 times slower than the median task in that job. Such stragglers increase the average job duration by 47%. This is because current mitigation techniques all involve an element of waiting and speculation. We instead propose full cloning of small jobs, avoiding waiting and speculation altogether. Cloning of small jobs only marginally increases utilization because workloads show that while the majority of jobs are small, they only consume a small fraction of the resources. The main challenge of cloning is, however, that extra clones can cause contention for intermediate data. We use a technique, delay assignment, which efficiently avoids such contention. Evaluation of our system, Dolly, using production workloads shows that the small jobs speedup by 34% to 46% after state-of-the-art mitigation techniques have been applied, using just 5% extra resources for cloning.", "title": "" } ]
[ { "docid": "298d3280deb3bb326314a7324d135911", "text": "BACKGROUND\nUterine leiomyomas are rarely seen in adolescent and to date nine leiomyoma cases have been reported under age 17. Eight of these have been treated surgically via laparotomic myomectomy.\n\n\nCASE\nA 16-year-old girl presented with a painless, lobulated necrotic mass protruding through the introitus. The mass originated from posterior uterine wall resected using hysteroscopy. Final pathology report revealed a submucous uterine leiomyoma.\n\n\nSUMMARY AND CONCLUSION\nSubmucous uterine leiomyomas may present as a vaginal mass in adolescents and can be safely treated using hysteroscopy.", "title": "" }, { "docid": "5c2e2616982c2de930ed9b0e6719f39f", "text": "This paper is intended to provide a practical overview for clinicians and researchers involved in assessing upper limb function. It considers 25 upper limb assessments used in musculoskeletal care and presents a simple, straightforward comparative review of each. The World Health Organization International Classification on Functioning, Disability and Health (WHO ICF) is used to provide a relative summary of purpose between each assessment. Measurement properties of each assessment are provided, considering the type of data generated, availability of reliability estimates and normative data for the assessment.", "title": "" }, { "docid": "f013f58d995693a79cd986a028faff38", "text": "We present the design and implementation of a system for axiomatic programming, and its application to mathematical software construction. Key novelties include a direct support for user-defined axioms establishing local equalities between types, and overload resolution based on equational theories and user-defined local axioms. We illustrate uses of axioms, and their organization into concepts, in structured generic programming as practiced in computational mathematical systems.", "title": "" }, { "docid": "934160b33f99886f9a72d0b871054101", "text": "One of the common endeavours in engineering applications is outlier detection, which aims to identify inconsistent records from large amounts of data. Although outlier detection schemes in data mining discipline are acknowledged as a more viable solution to efficient identification of anomalies from these data repository, current outlier mining algorithms require the input of domain parameters. These parameters are often unknown, difficult to determine and vary across different datasets containing different cluster features. This paper presents a novel resolution-based outlier notion and a nonparametric outlier-mining algorithm, which can efficiently identify and rank top listed outliers from a wide variety of datasets. The algorithm generates reasonable outlier results by taking both local and global features of a dataset into account. Experiments are conducted using both synthetic datasets and a real life construction equipment dataset from a large road building contractor. Comparison with the current outlier mining algorithms indicates that the proposed algorithm is more effective and can be integrated into a decision support system to serve as a universal detector of potentially inconsistent records.", "title": "" }, { "docid": "37484cdfa29c7021c07f307c695c0a77", "text": "Deep neural networks have shown promising results for various clinical prediction tasks such as diagnosis, mortality prediction, predicting duration of stay in hospital, etc. However, training deep networks – such as those based on Recurrent Neural Networks (RNNs) – requires large labeled data, high computational resources, and significant hyperparameter tuning effort. In this work, we investigate as to what extent can transfer learning address these issues when using deep RNNs to model multivariate clinical time series. We consider transferring the knowledge captured in an RNN trained on several source tasks simultaneously using a large labeled dataset to build the model for a target task with limited labeled data. An RNN pre-trained on several tasks provides generic features, which are then used to build simpler linear models for new target tasks without training task-specific RNNs. For evaluation, we train a deep RNN to identify several patient phenotypes on time series from MIMIC-III database, and then use the features extracted using that RNN to build classifiers for identifying previously unseen phenotypes, and also for a seemingly unrelated task of in-hospital mortality. We demonstrate that (i) models trained on features extracted using pre-trained RNN outperform or, in the worst case, perform as well as task-specific RNNs; (ii) the models using features from pre-trained models are more robust to the size of labeled data than task-specific RNNs; and (iii) features extracted using pre-trained RNN are generic enough and perform better than typical statistical hand-crafted features.", "title": "" }, { "docid": "28fbb71fab5ea16ef52611b31fcf1dfa", "text": "Gamification, an emerging idea for using game design elements and principles to make everyday tasks more engaging, is permeating many different types of information systems. Excitement surrounding gamification results from its many potential organizational benefits. However, few research and design guidelines exist regarding gamified information systems. We therefore write this commentary to call upon information systems scholars to investigate the design and use of gamified information systems from a variety of disciplinary perspectives and theories, including behavioral economics, psychology, social psychology, information systems, etc. We first explicate the idea of gamified information systems, provide real-world examples of successful and unsuccessful systems, and, based on a synthesis of the available literature, present a taxonomy of gamification design elements. We then develop a framework for research and design: its main theme is to create meaningful engagement for users; that is, gamified information systems should be designed to address the dual goals of instrumental and experiential outcomes. Using this framework, we develop a set of design principles and research questions, using a running case to illustrate some of our ideas. We conclude with a summary of opportunities for IS researchers to extend our knowledge of gamified information systems, and, at the same time, advance existing theories.", "title": "" }, { "docid": "4d987e2c0f3f49609f70149460201889", "text": "Estimating count and density maps from crowd images has a wide range of applications such as video surveillance, traffic monitoring, public safety and urban planning. In addition, techniques developed for crowd counting can be applied to related tasks in other fields of study such as cell microscopy, vehicle counting and environmental survey. The task of crowd counting and density map estimation is riddled with many challenges such as occlusions, non-uniform density, intra-scene and inter-scene variations in scale and perspective. Nevertheless, over the last few years, crowd count analysis has evolved from earlier methods that are often limited to small variations in crowd density and scales to the current state-of-the-art methods that have developed the ability to perform successfully on a wide range of scenarios. The success of crowd counting methods in the recent years can be largely attributed to deep learning and publications of challenging datasets. In this paper, we provide a comprehensive survey of recent Convolutional Neural Network (CNN) based approaches that have demonstrated significant improvements over earlier methods that rely largely on hand-crafted representations. First, we briefly review the pioneering methods that use hand-crafted representations and then we delve in detail into the deep learning-based approaches and recently published datasets. Furthermore, we discuss the merits and drawbacks of existing CNN-based approaches and identify promising avenues of research in this rapidly evolving field. c © 2017 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "bec41dd9e724598c8ab47fa1840cad61", "text": "Described here is a case of suicide with the use of a chainsaw. A female suffering from schizophrenia committed suicide by an ingenious use of a chainsaw that resulted in the transection of her cervical spine and spinal cord. The findings of the resulting investigation are described and the mechanism of suicides with the use of a chainsaw is reviewed. A dry bone study was realized to determine the bone sections, the correlation between anatomic lesions and characteristics of chainsaw. The damage of organs and soft tissues is compared according to the kinds of chainsaw used.", "title": "" }, { "docid": "15a56973f3751dbc069fe62cd076682c", "text": "The software QBlade under General Public License is used for analysis and design of wind turbines. QBlade uses the Blade Element Momentum (BEM) method for the simulation of wind turbines and it is integrated with the XFOIL airfoil design and analysis. It is possible to predict wind turbine performance with it. Nowadays, Computational Fluid Dynamics (CFD) is used for optimization and design of turbine application. In this study, Horizontal wind turbine with a rotor diameter of 2 m, was designed and objected to performance analysis by QBlade and Ansys-Fluent. The graphic of the power coefficient vs. tip speed ratio (TSR) was obtained for each result. When the results are compared, the good agreement has been seen.", "title": "" }, { "docid": "9ecf20a9df11e008ddd01c9dea38b942", "text": "A n interest rate swap is a contractual agreement between two parties to exchange a series of interest rate payments without exchanging the underlying debt. The interest rate swap represents one example of a general category of financial instruments known as derivative instruments. In the most general terms, a derivative instrument is an agreement whose value derives from some underlying market return, market price, or price index. The rapid growth of the market for swaps and other derivatives in recent years has spurred considerable controversy over the economic rationale for these instruments. Many observers have expressed alarm over the growth and size of the market, arguing that interest rate swaps and other derivative instruments threaten the stability of financial markets. Recently, such fears have led both legislators and bank regulators to consider measures to curb the growth of the market. Several legislators have begun to promote initiatives to create an entirely new regulatory agency to supervise derivatives trading activity. Underlying these initiatives is the premise that derivative instruments increase aggregate risk in the economy, either by encouraging speculation or by burdening firms with risks that management does not understand fully and is incapable of controlling.1 To be certain, much of this criticism is aimed at many of the more exotic derivative instruments that have begun to appear recently. Nevertheless, it is difficult, if not impossible, to appreciate the economic role of these more exotic instruments without an understanding of the role of the interest rate swap, the most basic of the new generation of financial derivatives.", "title": "" }, { "docid": "055b5012a88d5890eb2445600b1e4ad6", "text": "Wearable devices for fitness tracking and health monitoring have gained considerable popularity and become one of the fastest growing smart devices market. More and more companies are offering integrated health and activity monitoring solutions for fitness trackers. Recently insurances are offering their customers better conditions for health and condition monitoring. However, the extensive sensitive information collected by tracking products and accessibility by third party service providers poses vital security and privacy challenges on the employed solutions. In this paper, we present our security analysis of a representative sample of current fitness tracking products on the market. In particular, we focus on malicious user setting that aims at injecting false data into the cloud-based services leading to erroneous data analytics. We show that none of these products can provide data integrity, authenticity and confidentiality.", "title": "" }, { "docid": "dc1e134f78fe406e79e9be1019226b0e", "text": "The acute phase of sepsis is characterized by a strong inflammatory reaction. At later stages in some patients, immunoparalysis may be encountered, which is associated with a poor outcome. By transcriptional and metabolic profiling of human patients with sepsis, we found that a shift from oxidative phosphorylation to aerobic glycolysis was an important component of initial activation of host defense. Blocking metabolic pathways with metformin diminished cytokine production and increased mortality in systemic fungal infection in mice. In contrast, in leukocytes rendered tolerant by exposure to lipopolysaccharide or after isolation from patients with sepsis and immunoparalysis, a generalized metabolic defect at the level of both glycolysis and oxidative metabolism was apparent, which was restored after recovery of the patients. Finally, the immunometabolic defects in humans were partially restored by therapy with recombinant interferon-γ, which suggested that metabolic processes might represent a therapeutic target in sepsis.", "title": "" }, { "docid": "8d40a30ba43e055cf830af0514f01c9d", "text": "The rapid growth of data size and accessibility in recent years has instigated a shift of philosophy in algorithm design for artificial intelligence. Instead of engineering algorithms by hand, the ability to learn composable systems automatically from massive amounts of data has led to groundbreaking performance in important domains such as computer vision, speech recognition, and natural language processing. The most popular class of techniques used in these domains is called deep learning , and is seeing significant attention from industry. However, these models require incredible amounts of data and compute power to train, and are limited by the need for better hardware acceleration to accommodate scaling beyond current data and model sizes. While the current solution has been to use clusters of graphics processing units (GPU) as general purpose processors (GPGPU), the use of field programmable gate arrays (FPGA) provide an interesting alternative. Current trends in design tools for FPGAs have made them more compatible with the high-level software practices typically practiced in the deep learning community, making FPGAs more accessible to those who build and deploy models. Since FPGA architectures are flexible, this could also allow researchers the ability to explore model-level optimizations beyond what is possible on fixed architectures such as GPUs. As well, FPGAs tend to provide high performance per watt of power consumption, which is of particular importance for application scientists interested in large scale server-based deployment or resource-limited embedded applications. This review takes a look at deep learning and FPGAs from a hardware acceleration perspective, identifying trends and innovations that make these technologies a natural fit, and motivates a discussion on how FPGAs may best serve the needs of the deep learning community moving forward.", "title": "" }, { "docid": "023fa0ac94b2ea1740f1bbeb8de64734", "text": "The establishment of an endosymbiotic relationship typically seems to be driven through complementation of the host's limited metabolic capabilities by the biochemical versatility of the endosymbiont. The most significant examples of endosymbiosis are represented by the endosymbiotic acquisition of plastids and mitochondria, introducing photosynthesis and respiration to eukaryotes. However, there are numerous other endosymbioses that evolved more recently and repeatedly across the tree of life. Recent advances in genome sequencing technology have led to a better understanding of the physiological basis of many endosymbiotic associations. This review focuses on endosymbionts in protists (unicellular eukaryotes). Selected examples illustrate the incorporation of various new biochemical functions, such as photosynthesis, nitrogen fixation and recycling, and methanogenesis, into protist hosts by prokaryotic endosymbionts. Furthermore, photosynthetic eukaryotic endosymbionts display a great diversity of modes of integration into different protist hosts. In conclusion, endosymbiosis seems to represent a general evolutionary strategy of protists to acquire novel biochemical functions and is thus an important source of genetic innovation.", "title": "" }, { "docid": "89f1461f785c0ee8faedaac1fe52af58", "text": "The steel industry is one of the most important and vital Industry of the present and the future. It is the asset of a nation. Steel plants use a tremendous amount of water for waste transfer, cooling and dust control. The steel plants have sintering mills, coke plants, blast furnaces, chemical byproducts and chemical processes, water cooled rolls, pumps, extrusion experiment, transfer lines for sludges and slurries. All these plants use a tremendous amount of water to cool the products and flush the impurities away from the finished stock. Wastewater is generated in huge quantity in steel industries. It contains many dissolved, undisclosed substances and chemicals in the wastewater. The steel industries produce wastewater and sludge during different industrial processes. The development of innovative technologies for treatment of wastewaters from steel industries is a matter of alarming concern for us. Although many research papers have been reported on wastewater pollution control studies, but a very few research work is carried out for treatment of wastewater of steel industries, especially in reference to development of design of industrial effluent Treatment Plants (ETP) system. Another beneficial aspect of this research work will be recycling, reuse of water and sludge from steel industry The whole technologies for treating industrial wastewater can be divided into four categories: Chemical, Physical, Biological and mathematical approaches. Physical treatment methods include sedimentation, Floatation , filtering , stripping, ion – exchange, adsorption and other processes that accomplish removal of dissolved and undisclosed substances without necessarily changing their chemical structure. The mathematical approaches are very useful and more realistic for developing a well operating cost–effective treatment system for industrial wastewater treatment.", "title": "" }, { "docid": "a7d3eb1a880d38f407e8f12f18eff546", "text": "Critical thinking comprises the mental processes, strategies, and representations people use to solve problems, make decisions, and learn new concepts. The study of critical thinking combines the educational, philosophical, and psychological traditions of thought. R. Ennis offers a philosophical taxonomy suggesting that critical thinking results from the interaction of a set of dispositions toward critical thinking with a set of abilities for critical thiuking, while R. Sternberg's psychological taxonomy defines the skills involved in critical thiaking to be of three kinds: metacomponents, performance components, and knowledge-acquisition components. JCLoom's taxonomy of education puts knowledge at the lowest level, followed by comprehension, application, analysis, and synthesis, with evaluation at the highest level. Tests for measuring critical thinking also come from the philosophical and psychological areas. The Matson-Glaser Critical Thinking Appraisal, the Cornell Critical Thinking Test, and the New Jersey Test of Reasoning Skills are derived from the philosophical tradition. The Triarchic Test of Intellectual Skills is psychologically derived, but does not try to separate critical thinking from intelligence. Programs for training critical thieking include Copi's 1978 course in logic, Bransterd and Stein's 1984 course called \"The Ideal Problem Solver,\" Sternberg's 1986 \"Understanding and Increasing Intelligence,' and Whimbey and Lochhead's 1982 \"Problem Solving and Comprehension.' Educators current concern with critical thinking offers students a new chance for developing critical thinking skills, but training must be brought into all aspects of the classroom to be successful. (Tables outlining E.J. Gubbins's Matrix of Thinking Skills, and Sternberg's program for training intellectual skills are appended.) (SRT)", "title": "" }, { "docid": "0a57ff95515faec722f564457453ad55", "text": "Open information extraction (Open IE) was presented as an unrestricted variant of traditional information extraction. It has been gaining substantial attention, manifested by a large number of automatic Open IE extractors and downstream applications. In spite of this broad attention, the Open IE task definition has been lacking – there are no formal guidelines and no large scale gold standard annotation. Subsequently, the various implementations of Open IE resorted to small scale posthoc evaluations, inhibiting an objective and reproducible cross-system comparison. In this work, we develop a methodology that leverages the recent QA-SRL annotation to create a first independent and large scale Open IE annotation,1 and use it to automatically compare the most prominent Open IE systems.", "title": "" }, { "docid": "a93351d3fb9dc69868a11c8655ec1541", "text": "Dry powder inhaler formulations comprising commercial lactose–drug blends can show restricted detachment of drug from lactose during aerosolisation, which can lead to poor fine particle fractions (FPFs) which are suboptimal. The aim of the present study was to investigate whether the crystallisation of lactose from different ethanol/butanol co-solvent mixtures could be employed as a method of altering the FPF of salbutamol sulphate from powder blends. Lactose particles were prepared by an anti-solvent recrystallisation process using various ratios of the two solvents. Crystallised lactose or commercial lactose was mixed with salbutamol sulphate and in vitro deposition studies were performed using a multistage liquid impinger. Solid-state characterisation results showed that commercial lactose was primarily composed of the α-anomer whilst the crystallised lactose samples comprised a α/β mixture containing a lower number of moles of water per mole of lactose compared to the commercial lactose. The crystallised lactose particles were also less elongated and more irregular in shape with rougher surfaces. Formulation blends containing crystallised lactose showed better aerosolisation performance and dose uniformity when compared to commercial lactose. The highest FPF of salbutamol sulphate (38.0 ± 2.5%) was obtained for the lactose samples that were crystallised from a mixture of ethanol/butanol (20:60) compared to a FPF of 19.7 ± 1.9% obtained for commercial lactose. Engineered lactose carriers with modified anomer content and physicochemical properties, when compared to the commercial grade, produced formulations which generated a high FPF.", "title": "" }, { "docid": "8993812bd489fbcb32c242c6adf18c24", "text": "The emergence of big data has stimulated enormous investments into business analytics solutions, but large-scale and reliable empirical evidence about the business value of big data and analytics (BDA) remains scarce. This paper presents the results of an econometric study that analyzes the direction, sign, and magnitude of the relationship between BDA and firm performance based on objective measurements of BDA assets. Using a unique panel data set that contains detailed information about BDA solutions owned by 814 companies during the timeframe from 2008 to 2014, on the one hand, and their financial performance, on the other hand, we estimate the relationship between BDA assets and firm productivity and find that live BDA assets are associated with an average of 3 to 7 percent improvement in firm productivity. Yet, we also find substantial differences in returns from BDA when we consider the industry in which a firm operates: While firms in IT-intensive or highly competitive industries are clearly able to extract value from BDA assets, we did not detect measurable productivity improvement for firms outside these industry groups. Taken together, our findings provide robust empirical evidence for the business value of BDA, but also highlight important boundary conditions.", "title": "" }, { "docid": "0daa16a3f40612946187d6c66ccd96f4", "text": "A 60 GHz frequency band planar diplexer based on Substrate Integrated Waveguide (SIW) technology is presented in this research. The 5th order millimeter wave SIW filter is investigated first, and then the 60 GHz SIW diplexer is designed and been simulated. SIW-microstrip transitions are also included in the final design. The relative bandwidths of up and down channels are 1.67% and 1.6% at 59.8 GHz and 62.2 GHz respectively. Simulation shows good channel isolation, small return losses and moderate insertion losses in pass bands. The diplexer can be easily integrated in millimeter wave integrated circuits.", "title": "" } ]
scidocsrr
58b5ade47ae4cc04654b2487e690c059
Global Laparoscopy Positioning System with a Smart Trocar
[ { "docid": "68f74c4fc9d1afb00ac2ec0221654410", "text": "Most algorithms in 3-D Computer Vision rely on the pinhole camera model because of its simplicity, whereas video optics, especially low-cost wide-angle or fish-eye lens, generate a lot of non-linear distortion which can be critical. To find the distortion parameters of a camera, we use the following fundamental property: a camera follows the pinhole model if and only if the projection of every line in space onto the camera is a line. Consequently, if we find the transformation on the video image so that every line in space is viewed in the transformed image as a line, then we know how to remove the distortion from the image. The algorithm consists of first doing edge extraction on a possibly distorted video sequence, then doing polygonal approximation with a large tolerance on these edges to extract possible lines from the sequence, and then finding the parameters of our distortion model that best transform these edges to segments. Results are presented on real video images, compared with distortion calibration obtained by a full camera calibration method which uses a calibration grid.", "title": "" } ]
[ { "docid": "97da7e7b07775f58c86d26a2b714ba9f", "text": "Nowadays, visual object recognition is one of the key applications for computer vision and deep learning techniques. With the recent development in mobile computing technology, many deep learning framework software support Personal Digital Assistant systems, i.e., smart phones or tablets, allowing developers to conceive innovative applications. In this work, we intend to employ such ICT strategies with the aim of supporting the tourism in an art city: for these reasons, we propose to provide tourists with a mobile application in order to better explore artistic heritage within an urban environment by using just their smartphone's camera. The software solution is based on Google TensorFlow, an innovative deep learning framework mainly designed for pattern recognition tasks. The paper presents our design choices and an early performance evaluation.", "title": "" }, { "docid": "0a1db5c3eb76d4f0f9338bae157226f0", "text": "Reasoning is the fundamental capability which requires knowledge. Various graph models have proven to be very valuable in knowledge representation and reasoning. Recently, explosive data generation and accumulation capabilities have paved way for Big Data and Data Intensive Systems. Knowledge Representation and Reasoning with large and growing data is extremely challenging but crucial for businesses to predict trends and support decision making. Any contemporary, reasonably complex knowledge based system will have to consider this onslaught of data, to use appropriate and sufficient reasoning for semantic processing of information by machines. This paper surveys graph based knowledge representation and reasoning, various graph models such as Conceptual Graphs, Concept Graphs, Semantic Networks, Inference Graphs and Causal Bayesian Networks used for representation and reasoning, common and recent research uses of these graph models, typically in Big Data environment, and the near future needs and challenges for graph based KRR in computing systems. Observations are presented in a table, highlighting suitability of the surveyed graph models for contemporary scenarios.", "title": "" }, { "docid": "73ac084079951348463de3aa619eee58", "text": "Multi Density DBSCAN (Density Based Spatial Clustering of Application with Noise) is an excellent density-based clustering algorithm, which extends DBSCAN algorithm so as to be able to discover the different densities clusters, and retains the advantage of separating noise and finding arbitrary shape clusters. But, because of great memory demand and low calculation efficiency, Multi Density DBSCAN can't deal with large database. Therefore, GCMDDBSCAN is proposed in this paper, and within it 'migration-coefficient' conception is introduced firstly. In GCMDDBSCAN, with the grid technique, the optimization effect of contribution and migration-coefficient, and the efficient SP-tree query index, the runtime is reduced a lot, and the capability of clustering large database is obviously enhanced, at the same time, the accuracy of clustering result is not degraded.", "title": "" }, { "docid": "a32ea25ea3adc455dd3dfd1515c97ae3", "text": "Item-to-item collaborative filtering (aka.item-based CF) has been long used for building recommender systems in industrial settings, owing to its interpretability and efficiency in real-time personalization. It builds a user's profile as her historically interacted items, recommending new items that are similar to the user's profile. As such, the key to an item-based CF method is in the estimation of item similarities. Early approaches use statistical measures such as cosine similarity and Pearson coefficient to estimate item similarities, which are less accurate since they lack tailored optimization for the recommendation task. In recent years, several works attempt to learn item similarities from data, by expressing the similarity as an underlying model and estimating model parameters by optimizing a recommendation-aware objective function. While extensive efforts have been made to use shallow linear models for learning item similarities, there has been relatively less work exploring nonlinear neural network models for item-based CF. In this work, we propose a neural network model named Neural Attentive Item Similarity model (NAIS) for item-based CF. The key to our design of NAIS is an attention network, which is capable of distinguishing which historical items in a user profile are more important for a prediction. Compared to the state-of-the-art item-based CF method Factored Item Similarity Model (FISM) [1] , our NAIS has stronger representation power with only a few additional parameters brought by the attention network. Extensive experiments on two public benchmarks demonstrate the effectiveness of NAIS. This work is the first attempt that designs neural network models for item-based CF, opening up new research possibilities for future developments of neural recommender systems.", "title": "" }, { "docid": "010cfba81f65e6e135efcb0aa3bf5d6c", "text": "Recent studies on cloud-radio access networks (CRANs) assume the availability of a single processor (cloud) capable of managing the entire network performance; inter-cloud interference is treated as background noise. This paper considers the more practical scenario of the downlink of a CRAN formed by multiple clouds, where each cloud is connected to a cluster of multiple-antenna base stations (BSs) via high-capacity wireline backhaul links. The network is composed of several disjoint BSs' clusters, each serving a pre-known set of single-antenna users. To account for both inter- cloud and intra-cloud interference, the paper considers the problem of minimizing the total network power consumption subject to quality of service constraints, by jointly determining the set of active BSs connected to each cloud and the beamforming vectors of every user across the network. The paper solves the problem using Lagrangian duality theory through a dual decomposition approach, which decouples the problem into multiple and independent subproblems, the solution of which depends on the dual optimization problem. The solution then proceeds in updating the dual variables and the active set of BSs at each cloud iteratively. The proposed approach leads to a distributed implementation across the multiple clouds through a reasonable exchange of information between adjacent clouds. The paper further proposes a centralized solution to the problem. Simulation results suggest that the proposed algorithms significantly outperform the conventional per-cloud update solution, especially at high signal-to-interference-plus- noise ratio (SINR) target.", "title": "" }, { "docid": "da129ff6527c7b8af0f34a910051e5ef", "text": "A compact ultra-wideband (UWB) bandpass filter is proposed based on the coplanar-waveguide (CPW) split-mode resonator. By suitably introducing a short-circuited stub to implement the shunt inductance between two quarter wavelength CPW stepped-impedance resonators, a strong magnetic coupling may be realized so that a CPW split-mode resonator may be constructed. Moreover, by properly designing the dual-metal-plane structure, one may accomplish a microstrip-to-CPW feeding mechanism to provide strong enough capacitive coupling for bandwidth enhancement and also introduce an extra electric coupling between input and output ports so that two transmission zeros may be created for selectivity improvement. The implemented UWB filter shows a fractional bandwidth of 116% and two transmission zeros at 1.705 and 11.39 GHz. Good agreement between simulated and measured responses is observed.", "title": "" }, { "docid": "a46721e527f1fefd0380b7c8c40729ca", "text": "The use of game-based learning in the classroom has become more common in recent years. Many game-based learning tools and platforms are based on a quiz concept where the students can score points if they can choose the correct answer among multiple answers. The article describes an experiment where the game-based student response system Kahoot! was compared to a traditional non-gamified student response system, as well as the usage of paper forms for formative assessment. The goal of the experiment was to investigate whether gamified formative assessments improve the students’ engagement, motivation, enjoyment, concentration, and learning. In the experiment, the three different formative assessment tools/methods were used to review and summarize the same topic in three parallel lectures in an IT introductory course. The first method was to have the students complete a paper quiz, and then review the results afterwards using hand raising. The second method was to use the non-gamified student response system Clicker where the students gave their response to a quiz through polling. The third method was to use the game-based student response system Kahoot!. All three lectures were taught in the exact same way, teaching the same syllabus and using the same teacher. The only difference was the method use to summarize the lecture. A total of 384 students participated in the experiment, where 127 subjects did the paper quiz, 175 used the non-gamified student response system, and 82 students using the gamified approach. The gender distribution was 48% female students and 52% male students. Preand a post-test were used to assess the learning outcome of the lectures, and a questionnaire was used to get data on the students’ engagement and motivation. The results show significant improvement in motivation, engagement, enjoyment, and concentration for the gamified approach, but we did not find significant learning improvement.", "title": "" }, { "docid": "0b4c076b80d91eb20ef71e63f17e9654", "text": "Current sports injury reporting systems lack a common conceptual basis. We propose a conceptual foundation as a basis for the recording of health problems associated with participation in sports, based on the notion of impairment used by the World Health Organization. We provide definitions of sports impairment concepts to represent the perspectives of health services, the participants in sports and physical exercise themselves, and sports institutions. For each perspective, the duration of the causative event is used as the norm for separating concepts into those denoting impairment conditions sustained instantly and those developing gradually over time. Regarding sports impairment sustained in isolated events, 'sports injury' denotes the loss of bodily function or structure that is the object of observations in clinical examinations; 'sports trauma' is defined as an immediate sensation of pain, discomfort or loss of functioning that is the object of athlete self-evaluations; and 'sports incapacity' is the sidelining of an athlete because of a health evaluation made by a legitimate sports authority that is the object of time loss observations. Correspondingly, sports impairment caused by excessive bouts of physical exercise is denoted as 'sports disease' (overuse syndrome) when observed by health service professionals during clinical examinations, 'sports illness' when observed by the athlete in self-evaluations, and 'sports sickness' when recorded as time loss from sports participation by a sports body representative. We propose a concerted development effort in this area that takes advantage of concurrent ontology management resources and involves the international sporting community in building terminology systems that have broad relevance.", "title": "" }, { "docid": "d505a0fe73296fe19f0f683773c9520d", "text": "Abstractive text summarization is a complex task whose goal is to generate a concise version of a text without necessarily reusing the sentences from the original source, but still preserving the meaning and the key contents. In this position paper we address this issue by modeling the problem as a sequence to sequence learning and exploiting Recurrent Neural Networks (RNN). Moreover, we discuss the idea of combining RNNs and probabilistic models in a unified way in order to incorporate prior knowledge, such as linguistic features. We believe that this approach can obtain better performance than the state-of-the-art models for generating well-formed summaries.", "title": "" }, { "docid": "734fc66c7c745498ca6b2b7fc6780919", "text": "In this paper, we investigate the use of an unsupervised label clustering technique and demonstrate that it enables substantial improvements in visual relationship prediction accuracy on the Person in Context (PIC) dataset. We propose to group object labels with similar patterns of relationship distribution in the dataset into fewer categories. Label clustering not only mitigates both the large classification space and class imbalance issues, but also potentially increases data samples for each clustered category. We further propose to incorporate depth information as an additional feature into the instance segmentation model. The additional depth prediction path supplements the relationship prediction model in a way that bounding boxes or segmentation masks are unable to deliver. We have rigorously evaluated the proposed techniques and performed various ablation analysis to validate the benefits of them.", "title": "" }, { "docid": "74e4d1886594ecce6d60861bec6ac3d8", "text": "From small voltage regulators to large motor drives, power electronics play a very important role in present day technology. The power electronics market is currently dominated by silicon based devices. However due to inherent limitations of silicon material they are approaching thermal limit in terms of high power and high temperature operation. Performance can only be improved with the development of new power devices with better material properties. Silicon Carbide devices are now gaining popularity as next generation semiconductor devices. Due to its inherent material properties such as high breakdown field, wide band gap, high electron saturation velocity, and high thermal conductivity, they serve as a better alternative to the silicon counterparts. Here an attempt is made to study the unique properties of SiC MOSFET and requirements for designing a gate drive circuit for the same. The switching characteristics of SCH2080KE are analyzed using LTspice by performing double pulse test. Also driver circuit is designed for SiC MOSFET SCH2080KE and its performance is tested by implementing a buck converter.", "title": "" }, { "docid": "8c58b608430e922284d8b4b8cd5cc51d", "text": "At the end of the 19th century, researchers observed that biological substances have frequency- dependent electrical properties and that tissue behaves \"like a capacitor\" [1]. Consequently, in the first half of the 20th century, the permittivity of many types of cell suspensions and tissues was characterized up to frequencies of approximately 100 MHz. From the measurements, conclusions were drawn, in particular, about the electrical properties of the cell membranes, which are the main contributors to the tissue impedance at frequencies below 10 MHz [2]. In 1926, a study found a significant different permittivity for breast cancer tissue compared with healthy tissue at 20 kHz [3]. After World War II, new instrumentation enabled measurements up to 10 GHz, and a vast amount of data on the dielectric properties of different tissue types in the microwave range was published [4]-[6].", "title": "" }, { "docid": "e0fc6fc1425bb5786847c3769c1ec943", "text": "Developing manufacturing simulation models usually requires experts with knowledge of multiple areas including manufacturing, modeling, and simulation software. The expertise requirements increase for virtual factory models that include representations of manufacturing at multiple resolution levels. This paper reports on an initial effort to automatically generate virtual factory models using manufacturing configuration data in standard formats as the primary input. The execution of the virtual factory generates time series data in standard formats mimicking a real factory. Steps are described for auto-generation of model components in a software environment primarily oriented for model development via a graphic user interface. Advantages and limitations of the approach and the software environment used are discussed. The paper concludes with a discussion of challenges in verification and validation of the virtual factory prototype model with its multiple hierarchical models and future directions.", "title": "" }, { "docid": "2f7a63571f8d695d402a546a457470c4", "text": "Why does Deep Learning work? What representations does it capture? How do higher-order representations emerge? We study these questions from the perspective of group theory, thereby opening a new approach towards a theory of Deep learning. One factor behind the recent resurgence of the subject is a key algorithmic step called pretraining: first search for a good generative model for the input samples, and repeat the process one layer at a time. We show deeper implications of this simple principle, by establishing a connection with the interplay of orbits and stabilizers of group actions. Although the neural networks themselves may not form groups, we show the existence of shadow groups whose elements serve as close approximations. Over the shadow groups, the pretraining step, originally introduced as a mechanism to better initialize a network, becomes equivalent to a search for features with minimal orbits. Intuitively, these features are in a way the simplest. Which explains why a deep learning network learns simple features first. Next, we show how the same principle, when repeated in the deeper layers, can capture higher order representations, and why representation complexity increases as the layers get deeper.", "title": "" }, { "docid": "450fdd88aa45a405eace9a5a1e0113f7", "text": "DNN-based cross-modal retrieval has become a research hotspot, by which users can search results across various modalities like image and text. However, existing methods mainly focus on the pairwise correlation and reconstruction error of labeled data. They ignore the semantically similar and dissimilar constraints between different modalities, and cannot take advantage of unlabeled data. This paper proposes Cross-modal Deep Metric Learning with Multi-task Regularization (CDMLMR), which integrates quadruplet ranking loss and semi-supervised contrastive loss for modeling cross-modal semantic similarity in a unified multi-task learning architecture. The quadruplet ranking loss can model the semantically similar and dissimilar constraints to preserve cross-modal relative similarity ranking information. The semi-supervised contrastive loss is able to maximize the semantic similarity on both labeled and unlabeled data. Compared to the existing methods, CDMLMR exploits not only the similarity ranking information but also unlabeled cross-modal data, and thus boosts cross-modal retrieval accuracy.", "title": "" }, { "docid": "54eb416e4bc32654c6e55a58baacd853", "text": "Condom catheters are often used in the management of male urinary incontinence, and are considered to be safe. As condom catheters are placed on the male genitalia, sometimes adequate care is not taken after placement owing to poor medical care of debilitated patients and feelings of embarrassment and shame. Similarly, sometimes the correct size of penile sheath is not used. Strangulation of penis due to condom catheter is a rare condition; only few such cases have been reported in the literature. Proper application and routine care of condom catheters are important in preventing this devastating complication especially in a neurologically debilitated population. We present a case of penile necrosis due to condom catheter. We will also discuss proper catheter care and treatment of possible complications.", "title": "" }, { "docid": "6206b0e393c54cfe2921604c2405bfeb", "text": "and fibrils along a greater length of tendon would follow, converting the new fibrils bridging the repair site into fibers and bundles. The discrete mass of collagen needed to completely heal a transected tendon would be quite small relative to the total collagen mass of the tendon; this is consistent with previous findings (Goldfarb et al., 2001). The tendon could be the sole source of this existing collagen with little effect on its overall strength once the remodelling process was complete, decreasing the need for new collagen synthesis. Postoperative ruptures at or adjacent to the healing site, the hand surgeon’s feared yet poorly understood complication of flexor tendon repair, may be explained by the inherent weakness caused by the recycling process itself. Biochemical modifications at the time of repair may evolve through an improved understanding of the seemingly paradoxical role of collagen fibril segment recycling in temporarily weakening healing tendon so that it may be strengthened. The principal author wishes to thank H.P. Ehrlich, PhD, Hershey, P.A. and M.R. Forough, PhD, Seattle, WA, for their comments and insight, and the late H. Sittertz-Bhatkar, PhD, for the images herein.", "title": "" }, { "docid": "736a7f4cad46138f350fda904d5de624", "text": "In the last decades, the development of new technologies applied to lipidomics has revitalized the analysis of lipid profile alterations and the understanding of the underlying molecular mechanisms of lipid metabolism, together with their involvement in the occurrence of human disease. Of particular interest is the study of omega-3 and omega-6 long chain polyunsaturated fatty acids (LC-PUFAs), notably EPA (eicosapentaenoic acid, 20:5n-3), DHA (docosahexaenoic acid, 22:6n-3), and ARA (arachidonic acid, 20:4n-6), and their transformation into bioactive lipid mediators. In this sense, new families of PUFA-derived lipid mediators, including resolvins derived from EPA and DHA, and protectins and maresins derived from DHA, are being increasingly investigated because of their active role in the \"return to homeostasis\" process and resolution of inflammation. Recent findings reviewed in the present study highlight that the omega-6 fatty acid ARA appears increased, and omega-3 EPA and DHA decreased in most cancer tissues compared to normal ones, and that increments in omega-3 LC-PUFAs consumption and an omega-6/omega-3 ratio of 2-4:1, are associated with a reduced risk of breast, prostate, colon and renal cancers. Along with their lipid-lowering properties, omega-3 LC-PUFAs also exert cardioprotective functions, such as reducing platelet aggregation and inflammation, and controlling the presence of DHA in our body, especially in our liver and brain, which is crucial for optimal brain functionality. Considering that DHA is the principal omega-3 FA in cortical gray matter, the importance of DHA intake and its derived lipid mediators have been recently reported in patients with major depressive and bipolar disorders, Alzheimer disease, Parkinson's disease, and amyotrophic lateral sclerosis. The present study reviews the relationships between major diseases occurring today in the Western world and LC-PUFAs. More specifically this review focuses on the dietary omega-3 LC-PUFAs and the omega-6/omega-3 balance, in a wide range of inflammation disorders, including autoimmune diseases. This review suggests that the current recommendations of consumption and/or supplementation of omega-3 FAs are specific to particular groups of age and physiological status, and still need more fine tuning for overall human health and well being.", "title": "" }, { "docid": "1d9b50bf7fa39c11cca4e864bbec5cf3", "text": "FPGA-based embedded soft vector processors can exceed the performance and energy-efficiency of embedded GPUs and DSPs for lightweight deep learning applications. For low complexity deep neural networks targeting resource constrained platforms, we develop optimized Caffe-compatible deep learning library routines that target a range of embedded accelerator-based systems between 4 -- 8 W power budgets such as the Xilinx Zedboard (with MXP soft vector processor), NVIDIA Jetson TK1 (GPU), InForce 6410 (DSP), TI EVM5432 (DSP) as well as the Adapteva Parallella board (custom multi-core with NoC). For MNIST (28×28 images) and CIFAR10 (32×32 images), the deep layer structure is amenable to MXP-enhanced FPGA mappings to deliver 1.4 -- 5× higher energy efficiency than all other platforms. Not surprisingly, embedded GPU works better for complex networks with large image resolutions.", "title": "" }, { "docid": "c221568e2ed4d6192ab04119046c4884", "text": "An efficient Ultra-Wideband (UWB) Frequency Selective Surface (FSS) is presented to mitigate the potential harmful effects of Electromagnetic Interference (EMI) caused by the radiations emitted by radio devices. The proposed design consists of circular and square elements printed on the opposite surfaces of FR4 substrate of 3.2 mm thickness. It ensures better angular stability by up to 600, bandwidth has been significantly enhanced by up to 16. 21 GHz to provide effective shielding against X-, Ka- and K-bands. While signal attenuation has also been improved remarkably in the desired band compared to the results presented in the latest research. Theoretical results are presented for TE and TM polarization for normal and oblique angles of incidence.", "title": "" } ]
scidocsrr
eacb65f10b0211b0129209075e070a3f
A serious game model for cultural heritage
[ { "docid": "49e3c33aa788d3d075c7569c6843065a", "text": "Cultural heritage around the globe suffers from wars, natural disasters and human negligence. The importance of cultural heritage documentation is well recognized and there is an increasing pressure to document our heritage both nationally and internationally. This has alerted international organizations to the need for issuing guidelines describing the standards for documentation. Charters, resolutions and declarations by international organisations underline the importance of documentation of cultural heritage for the purposes of conservation works, management, appraisal, assessment of the structural condition, archiving, publication and research. Important ones include the International Council on Monuments and Sites, ICOMOS (ICOMOS, 2005) and UNESCO, including the famous Venice Charter, The International Charter for the Conservation and Restoration of Monuments and Sites, 1964, (UNESCO, 2005).", "title": "" }, { "docid": "c1e12a4feec78d480c8f0c02cdb9cb7d", "text": "Although the Parthenon has stood on the Athenian Acropolis for nearly 2,500 years, its sculptural decorations have been scattered to museums around the world. Many of its sculptures have been damaged or lost. Fortunately, most of the decoration survives through drawings, descriptions, and casts. A component of our Parthenon Project has been to assemble digital models of the sculptures and virtually reunite them with the Parthenon. This sketch details our effort to digitally record the Parthenon sculpture collection in the Basel Skulpturhalle museum, which exhibits plaster casts of almost all of the existing pediments, metopes, and frieze. Our techniques have been designed to work as quickly as possible and at low cost.", "title": "" } ]
[ { "docid": "5d8bc135f10c1a9b741cc60ad7aae04f", "text": "In this work, we cast text summarization as a sequence-to-sequence problem and apply the attentional encoder-decoder RNN that has been shown to be successful for Machine Translation (Bahdanau et al. (2014)). Our experiments show that the proposed architecture significantly outperforms the state-of-the art model of Rush et al. (2015) on the Gigaword dataset without any additional tuning. We also propose additional extensions to the standard architecture, which we show contribute to further improvement in performance.", "title": "" }, { "docid": "75e1e8e65bd5dcf426bf9f3ee7c666a5", "text": "This paper offers a new, nonlinear model of informationseeking behavior, which contrasts with earlier stage models of information behavior and represents a potential cornerstone for a shift toward a new perspective for understanding user information behavior. The model is based on the findings of a study on interdisciplinary information-seeking behavior. The study followed a naturalistic inquiry approach using interviews of 45 academics. The interview results were inductively analyzed and an alternative framework for understanding information-seeking behavior was developed. This model illustrates three core processes and three levels of contextual interaction, each composed of several individual activities and attributes. These interact dynamically through time in a nonlinear manner. The behavioral patterns are analogous to an artist’s palette, in which activities remain available throughout the course of information-seeking. In viewing the processes in this way, neither start nor finish points are fixed, and each process may be repeated or lead to any other until either the query or context determine that information-seeking can end. The interactivity and shifts described by the model show information-seeking to be nonlinear, dynamic, holistic, and flowing. The paper offers four main implications of the model as it applies to existing theory and models, requirements for future research, and the development of information literacy curricula. Central to these implications is the creation of a new nonlinear perspective from which user information-seeking can be interpreted.", "title": "" }, { "docid": "d3b24655e01cbb4f5d64006222825361", "text": "A number of leading cognitive architectures that are inspired by the human brain, at various levels of granularity, are reviewed and compared, with special attention paid to the way their internal structures and dynamics map onto neural processes. Four categories of Biologically Inspired Cognitive Architectures (BICAs) are considered, with multiple examples of each category briefly reviewed, and selected examples discussed in more depth: primarily symbolic architectures (e.g. ACT-R), emergentist architectures (e.g. DeSTIN), developmental robotics architectures (e.g. IM-CLEVER), and our central focus, hybrid architectures (e.g. LIDA, CLARION, 4D/RCS, DUAL, MicroPsi, and OpenCog). Given the state of the art in BICA, it is not yet possible to tell whether emulating the brain on the architectural level is going to be enough to allow rough emulation of brain function; and given the state of the art in neuroscience, it is not yet possible to connect BICAs with large-scale brain simulations in a thoroughgoing way. However, it is nonetheless possible to draw reasonably close function connections between various components of various BICAs and various brain regions and dynamics, and as both BICAs and brain simulations mature, these connections should become richer and may extend further into the domain of internal dynamics as well as overall behavior. & 2010 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "808115043786372af3e3fb726cc3e191", "text": "Scapy is a free and open source packet manipulation environment written in Python language. In this paper we present a Modbus extension to Scapy, and show how this environment can be used to build tools for security analysis of industrial network protocols. Our implementation can be extended to other industrial network protocols and can help security analysts to understand how these protocols work under attacks or adverse conditions.", "title": "" }, { "docid": "a3345ad4a18be52b478d3e75cf05a371", "text": "In the course of the routine use of NMR as an aid for organic chemistry, a day-to-day problem is the identification of signals deriving from common contaminants (water, solvents, stabilizers, oils) in less-than-analytically-pure samples. This data may be available in the literature, but the time involved in searching for it may be considerable. Another issue is the concentration dependence of chemical shifts (especially 1H); results obtained two or three decades ago usually refer to much more concentrated samples, and run at lower magnetic fields, than today’s practice. We therefore decided to collect 1H and 13C chemical shifts of what are, in our experience, the most popular “extra peaks” in a variety of commonly used NMR solvents, in the hope that this will be of assistance to the practicing chemist.", "title": "" }, { "docid": "12f6f7e9350d436cc167e00d72b6e1b1", "text": "This paper reviews the state of the art of a polyphase complex filter for RF front-end low-IF transceivers applications. We then propose a multi-stage polyphase filter design to generate a quadrature I/Q signal to achieve a wideband precision quadrature phase shift with a constant 90 ° phase difference for self-interference cancellation circuit for full duplex radio. The number of the stages determines the bandwidth requirement of the channel. An increase of 87% in bandwidth is attained when our design is implemented in multi-stage from 2 to an extended 6 stages. A 4-stage polyphase filter achieves 2.3 GHz bandwidth.", "title": "" }, { "docid": "671eb73ad86525cb183e2b8dbfe09947", "text": "We propose a metalearning approach for learning gradient-based reinforcement learning (RL) algorithms. The idea is to evolve a differentiable loss function, such that an agent, which optimizes its policy to minimize this loss, will achieve high rewards. The loss is parametrized via temporal convolutions over the agent’s experience. Because this loss is highly flexible in its ability to take into account the agent’s history, it enables fast task learning. Empirical results show that our evolved policy gradient algorithm (EPG) achieves faster learning on several randomized environments compared to an off-the-shelf policy gradient method. We also demonstrate that EPG’s learned loss can generalize to out-of-distribution test time tasks, and exhibits qualitatively different behavior from other popular metalearning algorithms.", "title": "" }, { "docid": "6021968dc39e13620e90c30d9c008d19", "text": "In recent years, Deep Reinforcement Learning has made impressive advances in solving several important benchmark problems for sequential decision making. Many control applications use a generic multilayer perceptron (MLP) for non-vision parts of the policy network. In this work, we propose a new neural network architecture for the policy network representation that is simple yet effective. The proposed Structured Control Net (SCN) splits the generic MLP into two separate sub-modules: a nonlinear control module and a linear control module. Intuitively, the nonlinear control is for forward-looking and global control, while the linear control stabilizes the local dynamics around the residual of global control. We hypothesize that this will bring together the benefits of both linear and nonlinear policies: improve training sample efficiency, final episodic reward, and generalization of learned policy, while requiring a smaller network and being generally applicable to different training methods. We validated our hypothesis with competitive results on simulations from OpenAI MuJoCo, Roboschool, Atari, and a custom 2D urban driving environment, with various ablation and generalization tests, trained with multiple black-box and policy gradient training methods. The proposed architecture has the potential to improve upon broader control tasks by incorporating problem specific priors into the architecture. As a case study, we demonstrate much improved performance for locomotion tasks by emulating the biological central pattern generators (CPGs) as the nonlinear part of the architecture.", "title": "" }, { "docid": "cd3bbec4c7f83c9fb553056b1b593bec", "text": "We present results from experiments in using several pitch representations for jazz-oriented musical tasks performed by a recurrent neural network. We have run experiments with several kinds of recurrent networks for this purpose, and have found that Long Short-term Memory networks provide the best results. We show that a new pitch representation called Circles of Thirds works as well as two other published representations for these tasks, yet it is more succinct and enables faster learning. Recurrent Neural Networks and Music Many researchers are familiar with feedforward neural networks consisting of 2 or more layers of processing units, each with weighted connections to the next layer. Each unit passes the sum of its weighted inputs through a nonlinear sigmoid function. Each layer’s outputs are fed forward through the network to the next layer, until the output layer is reached. Weights are initialized to small initial random values. Via the back-propagation algorithm (Rumelhart et al. 1986), outputs are compared to targets, and the errors are propagated back through the connection weights. Weights are updated by gradient descent. Through an iterative training procedure, examples (inputs) and targets are presented repeatedly; the network learns a nonlinear function of the inputs. It can then generalize and produce outputs for new examples. These networks have been explored by the computer music community for classifying chords (Laden and Keefe 1991) and other musical tasks (Todd and Loy 1991, Griffith and Todd 1999). A recurrent network uses feedback from one or more of its units as input in choosing the next output. This means that values generated by units at time step t-1, say y(t-1), are part of the inputs x(t) used in selecting the next set of outputs y(t). A network may be fully recurrent; that is all units are connected back to each other and to themselves. Or part of the network may be fed back in recurrent links. Todd (Todd 1991) uses a Jordan recurrent network (Jordan 1986) to reproduce classical songs and then to produce new songs. The outputs are recurrently fed back as inputs as shown in Figure 1. In addition, self-recurrence on the inputs provides a decaying history of these inputs. The weight update algorithm is back-propagation, using teacher forcing (Williams and Zipser 1988). With teacher forcing, the target outputs are presented to the recurrent inputs from the output units (instead of the actual outputs, which are not correct yet during training). Pitches (on output or input) are represented in a localized binary representation, with one bit for each of the 12 chromatic notes. More bits can be added for more octaves. C is represented as 100000000000. C# is 010000000000, D is 001000000000. Time is divided into 16th note increments. Note durations are determined by how many increments a pitch’s output unit is on (one). E.g. an eighth note lasts for two time increments. Rests occur when all outputs are off (zero). Figure 1. Jordan network, with outputs fed back to inputs. (Mozer 1994)’s CONCERT uses a backpropagationthrough-time (BPTT) recurrent network to learn various musical tasks and to learn melodies with harmonic accompaniment. Then, CONCERT can run in generation mode to compose new music. The BPTT algorithm (Williams and Zipser 1992, Werbos 1988, Campolucci 1998) can be used with a fully recurrent network where the outputs of all units are connected to the inputs of all units, including themselves. The network can include external inputs and optionally, may include a regular feedforward output network (see Figure 2). The BPTT weight updates are proportional to the gradient of the sum of errors over every time step in the interval between start time t0 and end time t1, assuming the error at time step t is affected by the outputs at all previous time steps, starting with t0. BPTT requires saving all inputs, states, and errors for all time steps, and updating the weights in a batch operation at the end, time t1. One sequence (each example) requires one batch weight update. Figure 2. A fully self-recurrent network with external inputs, and optional feedforward output attachment. If there is no output attachment, one or more recurrent units are designated as output units. CONCERT is a combination of BPTT with a layer of output units that are probabilistically interpreted, and a maximum likelihood training criterion (rather than a squared error criterion). There are two sets of outputs (and two sets of inputs), one set for pitch and the other for duration. One pass through the network corresponds to a note, rather than a slice of time. We present only the pitch representation here since that is our focus. Mozer uses a psychologically based representation of musical notes. Figure 3 shows the chromatic circle (CC) and the circle of fifths (CF), used with a linear octave value for CONCERT’s pitch representation. Ignoring octaves, we refer to the rest of the representation as CCCF. Six digits represent the position of a pitch on CC and six more its position on CF. C is represented as 000000 000000, C# as 000001 111110, D as 000011 111111, and so on. Mozer uses -1,1 rather than 0,1 because of implementation details. Figure 3. Chromatic Circle on Left, Circle of Fifths on Right. Pitch position on each circle determines its representation. For chords, CONCERT uses the overlapping subharmonics representation of (Laden and Keefe, 1991). Each chord tone starts in Todd’s binary representation, but 5 harmonics (integer multiples of its frequency) are added. C3 is now C3, C4, G4, C5, E5 requiring a 3 octave representation. Because the 7th of the chord does not overlap with the triad harmonics, Laden and Keefe use triads only. C major triad C3, E3, G3, with harmonics, is C3, C4, G4, C5, E5, E3, E4, B4, E5, G#5, G3, G4, D4, G5, B5. The triad pitches and harmonics give an overlapping representation. Each overlapping pitch adds 1 to its corresponding input. CONCERT excludes octaves, leaving 12 highly overlapping chord inputs, plus an input that is positive when certain key-dependent chords appear, and learns waltzes over a harmonic chord structure. Eck and Schmidhuber (2002) use Long Short-term Memory (LSTM) recurrent networks to learn and compose blues music (Hochreiter and Schmidhuber 1997, and see Gers et al., 2000 for succinct pseudo-code for the algorithm). An LSTM network consists of input units, output units, and a set of memory blocks, each of which includes one or more memory cells. Blocks are connected to each other recurrently. Figure 4 shows an LSTM network on the left, and the contents of one memory block (this one with one cell) on the right. There may also be a direct connection from external inputs to the output units. This is the configuration found in Gers et al., and the one we use in our experiments. Eck and Schmidhuber also add recurrent connections from output units to memory blocks. Each block contains one or more memory cells that are self-recurrent. All other units in the block gate the inputs, outputs, and the memory cell itself. A memory cell can “cache” errors and release them for weight updates much later in time. The gates can learn to delay a block’s outputs, to reset the memory cells, and to inhibit inputs from reaching the cell or to allow inputs in. Figure 4. An LSTM network on the left and a one-cell memory block on the right, with input, forget, and output gates. Black squares on gate connections show that the gates can control whether information is passed to the cell, from the cell, or even within the cell. Weight updates are based on gradient descent, with multiplicative gradient calculations for gates, and approximations from the truncated BPTT (Williams and Peng 1990) and Real-Time Recurrent Learning (RTRL) (Robinson and Fallside 1987) algorithms. LSTM networks are able to perform counting tasks in time-series. Eck and Schmidhuber’s model of blues music is a 12-bar chord sequence over which music is composed/improvised. They successfully trained an LSTM network to learn a sequence of blues chords, with varying durations. Splitting time into 8th note increments, each chord’s duration is either 8 or 4 time steps (whole or half durations). Chords are sets of 3 or 4 tones (triads or triads plus sevenths), represented in a 12-bit localized binary representation with values of 1 for a chord pitch, and 0 for a non-chord pitch. Chords are inverted to fit in 1 octave. For example, C7 is represented as 100010010010 (C,E,G,B-flat), and F7 is 100101000100 (F,A,C,E-flat inverted to C,E-flat,F,A). The network has 4 memory blocks, each containing 2 cells. The outputs are considered probabilities of whether the corresponding note is on or off. The goal is to obtain an output of more that .5 for each note that should be on in a particular chord, with all other outputs below .5. Eck and Schmidhuber’s work includes learning melody and chords with two LSTM networks containing 4 blocks each. Connections are made from the chord network to the melody network, but not vice versa. The authors composed short 1-bar melodies over each of the 12 possible bars. The network is trained on concatenations of the short melodies over the 12-bar blues chord sequence. The melody network is trained until the chords network has learned according to the criterion. In music generation mode, the network can generate new melodies using this training. In a system called CHIME (Franklin 2000, 2001), we first train a Jordan recurrent network (Figure 1) to produce 3 Sonny Rollins jazz/blues melodies. The current chord and index number of the song are non-recurrent inputs to the network. Chords are represented as sets of 4 note values of 1 in a 12-note input layer, with non-chord note inputs set to 0 just as in Eck and Schmidhuber’s chord representation. Chords are also inverted to fit within one octave. 24 (2 octaves) of the outputs are notes, and the 25th is a rest. Of these 25, the unit with the largest value ", "title": "" }, { "docid": "092bf4ee1626553206ee9b434cda957b", "text": ".......................................................................................................... 3 Introduction ...................................................................................................... 4 Methods........................................................................................................... 7 Procedure ..................................................................................................... 7 Inclusion and exclusion criteria ..................................................................... 8 Data extraction and quality assessment ....................................................... 8 Results ............................................................................................................ 9 Included studies ........................................................................................... 9 Quality of included articles .......................................................................... 13 Excluded studies ........................................................................................ 15 Fig. 1 CONSORT 2010 Flow Diagram ....................................................... 16 Table 1: Primary studies ............................................................................. 17 Table2: Secondary studies ......................................................................... 18 Discussion ..................................................................................................... 19 Conclusion ..................................................................................................... 22 Acknowledgements ....................................................................................... 22 References .................................................................................................... 23 Appendix ....................................................................................................... 32", "title": "" }, { "docid": "5c7678fae587ef784b4327d545a73a3e", "text": "The vision of Future Internet based on standard communication protocols considers the merging of computer networks, Internet of Things (IoT), Internet of People (IoP), Internet of Energy (IoE), Internet of Media (IoM), and Internet of Services (IoS), into a common global IT platform of seamless networks and networked “smart things/objects”. However, with the widespread deployment of networked, intelligent sensor technologies, an Internet of Things (IoT) is steadily evolving, much like the Internet decades ago. In the future, hundreds of billions of smart sensors and devices will interact with one another without human intervention, on a Machine-to-Machine (M2M) basis. They will generate an enormous amount of data at an unprecedented scale and resolution, providing humans with information and control of events and objects even in remote physical environments. This paper will provide an overview of performance evaluation, challenges and opportunities of IOT results for machine learning presented by this new paradigm.", "title": "" }, { "docid": "c26919afa32708786ae7f96b88883ed9", "text": "A Privacy Enhancement Technology (PET) is an application or a mechanism which allows users to protect the privacy of their personally identifiable information. Early PETs were about enabling anonymous mailing and anonymous browsing, but lately there have been active research and development efforts in many other problem domains. This paper describes the first pattern language for developing privacy enhancement technologies. Currently, it contains 12 patterns. These privacy patterns are not limited to a specific problem domain; they can be applied to design anonymity systems for various types of online communication, online data sharing, location monitoring, voting and electronic cash management. The pattern language guides a developer when he or she is designing a PET for an existing problem, or innovating a solution for a new problem.", "title": "" }, { "docid": "c6058966ef994d7b447f47d41d7fff33", "text": "The advancement in computer technology has encouraged the researchers to develop software for assisting doctors in making decision without consulting the specialists directly. The software development exploits the potential of human intelligence such as reasoning, making decision, learning (by experiencing) and many others. Artificial intelligence is not a new concept, yet it has been accepted as a new technology in computer science. It has been applied in many areas such as education, business, medical and manufacturing. This paper explores the potential of artificial intelligence techniques particularly for web-based medical applications. In addition, a model for web-based medical diagnosis and prediction is", "title": "" }, { "docid": "753b167933f5dd92c4b8021f6b448350", "text": "The advent of social media and microblogging platforms has radically changed the way we consume information and form opinions. In this paper, we explore the anatomy of the information space on Facebook by characterizing on a global scale the news consumption patterns of 376 million users over a time span of 6 y (January 2010 to December 2015). We find that users tend to focus on a limited set of pages, producing a sharp community structure among news outlets. We also find that the preferences of users and news providers differ. By tracking how Facebook pages \"like\" each other and examining their geolocation, we find that news providers are more geographically confined than users. We devise a simple model of selective exposure that reproduces the observed connectivity patterns.", "title": "" }, { "docid": "b0a0ad5f90d849696e3431373db6b4a5", "text": "A comparative study of the structure of the flower in three species of Robinia L., R. pseudoacacia, R. × ambigua, and R. neomexicana, was carried out. The widely naturalized R. pseudoacacia, as compared to the two other species, has the smallest sizes of flower organs at all stages of development. Qualitative traits that describe each phase of the flower development were identified. A set of microscopic morphological traits of the flower (both quantitative and qualitative) was analyzed. Additional taxonomic traits were identified: shape of anthers, size and shape of pollen grains, and the extent of pollen fertility.", "title": "" }, { "docid": "da72f2990b3e21c45a92f7b54be1d202", "text": "A low-profile, high-gain, and wideband metasurface (MS)-based filtering antenna with high selectivity is investigated in this communication. The planar MS consists of nonuniform metallic patch cells, and it is fed by two separated microstrip-coupled slots from the bottom. The separation between the two slots together with a shorting via is used to provide good filtering performance in the lower stopband, whereas the MS is elaborately designed to provide a sharp roll-off rate at upper band edge for the filtering function. The MS also simultaneously works as a high-efficient radiator, enhancing the impedance bandwidth and antenna gain of the feeding slots. To verify the design, a prototype operating at 5 GHz has been fabricated and measured. The reflection coefficient, radiation pattern, antenna gain, and efficiency are studied, and reasonable agreement between the measured and simulated results is observed. The prototype with dimensions of 1.3 λ0 × 1.3 λ0 × 0.06 λ0 has a 10-dB impedance bandwidth of 28.4%, an average gain of 8.2 dBi within passband, and an out-of-band suppression level of more than 20 dB within a very wide stop-band.", "title": "" }, { "docid": "157c084aa6622c74449f248f98314051", "text": "A magnetically-tuned multi-mode VCO featuring an ultra-wide frequency tuning range is presented. By changing the magnetic coupling coefficient between the primary and secondary coils in the transformer tank, the frequency tuning range of a dual-band VCO is greatly increased to continuously cover the whole E-band. Fabricated in a 65-nm CMOS process, the presented VCO measures a tuning range of 44.2% from 57.5 to 90.1 GHz while consuming 7mA to 9mA at 1.2V supply. The measured phase noises at 10MHz offset from carrier frequencies of 72.2, 80.5 and 90.1 GHz are -111.8, -108.9 and -105 dBc/Hz, respectively, which corresponds to a FOMT between -192.2 and -184.2dBc/Hz.", "title": "" }, { "docid": "5912dda99171351acc25971d3c901624", "text": "New cultivars with very erect leaves, which increase light capture for photosynthesis and nitrogen storage for grain filling, may have increased grain yields. Here we show that the erect leaf phenotype of a rice brassinosteroid–deficient mutant, osdwarf4-1, is associated with enhanced grain yields under conditions of dense planting, even without extra fertilizer. Molecular and biochemical studies reveal that two different cytochrome P450s, CYP90B2/OsDWARF4 and CYP724B1/D11, function redundantly in C-22 hydroxylation, the rate-limiting step of brassinosteroid biosynthesis. Therefore, despite the central role of brassinosteroids in plant growth and development, mutation of OsDWARF4 alone causes only limited defects in brassinosteroid biosynthesis and plant morphology. These results suggest that regulated genetic modulation of brassinosteroid biosynthesis can improve crops without the negative environmental effects of fertilizers.", "title": "" }, { "docid": "7f3bccab6d6043d3dedc464b195df084", "text": "This paper introduces a new probabilistic graphical model called gated Bayesian network (GBN). This model evolved from the need to represent processes that include several distinct phases. In essence, a GBN is a model that combines several Bayesian networks (BNs) in such a manner that they may be active or inactive during queries to the model. We use objects called gates to combine BNs, and to activate and deactivate them when predefined logical statements are satisfied. In this paper we also present an algorithm for semi-automatic learning of GBNs. We use the algorithm to learn GBNs that output buy and sell decisions for use in algorithmic trading systems. We show how the learnt GBNs can substantially lower risk towards invested capital, while they at the same time generate similar or better rewards, compared to the benchmark investment strategy buy-and-hold. We also explore some differences and similarities between GBNs and other related formalisms.", "title": "" } ]
scidocsrr
cb5d74020b03c492872fa66c730053a3
Comparison processes in social judgment: mechanisms and consequences.
[ { "docid": "e9b2f987c4744e509b27cbc2ab1487be", "text": "Analogy and similarity are often assumed to be distinct psychological processes. In contrast to this position, the authors suggest that both similarity and analogy involve a process of structural alignment and mapping, that is, that similarity is like analogy. In this article, the authors first describe the structure-mapping process as it has been worked out for analogy. Then, this view is extended to similarity, where it is used to generate new predictions. Finally, the authors explore broader implications of structural alignment for psychological processing.", "title": "" } ]
[ { "docid": "776de4218230e161570d599440183354", "text": "For the first time, we present a state-of-the-art energy-efficient 16nm technology integrated with FinFET transistors, 0.07um2 high density (HD) SRAM, Cu/low-k interconnect and high density MiM for mobile SoC and computing applications. This technology provides 2X logic density and >35% speed gain or >55% power reduction over our 28nm HK/MG planar technology. To our knowledge, this is the smallest fully functional 128Mb HD FinFET SRAM (with single fin) test-chip demonstrated with low Vccmin for 16nm node. Low leakage (SVt) FinFET transistors achieve excellent short channel control with DIBL of <;30 mV/V and superior Idsat of 520/525 uA/um at 0.75V and Ioff of 30 pA/um for NMOS and PMOS, respectively.", "title": "" }, { "docid": "bda7775f0ec70cf1f80093d484e84332", "text": "Comprehensive situational awareness is paramount to the effectiveness of proprietary navigational and higher-level functions of intelligent vehicles. In this paper, we address a graph-based approach for 2D road representation of 3D point clouds with respect to the road topography. We employ the gradient cues of the road geometry to construct a Markov Random Filed (MRF) and implement an efficient belief propagation (BP) algorithm to classify the road environment into four categories, i.e. the reachable region, the drivable region, the obstacle region and the unknown region. The proposed approach can overcome a wide variety of practical challenges, such as sloped terrains, rough road surfaces, rolling/pitching of the host vehicle, etc., and represent the road environment accurately as well as robustly. Experimental results in typical but challenging environments have substantiated that the proposed approach is more sensitive and reliable than the conventional vertical displacements analysis and show superior performance against other local classifiers.", "title": "" }, { "docid": "cc3b36d8026396a7a931f07ef9d3bcfb", "text": "Planning an itinerary before traveling to a city is one of the most important travel preparation activities. In this paper, we propose a novel framework called TripPlanner, leveraging a combination of location-based social network (i.e., LBSN) and taxi GPS digital footprints to achieve personalized, interactive, and traffic-aware trip planning. First, we construct a dynamic point-of-interest network model by extracting relevant information from crowdsourced LBSN and taxi GPS traces. Then, we propose a two-phase approach for personalized trip planning. In the route search phase, TripPlanner works interactively with users to generate candidate routes with specified venues. In the route augmentation phase, TripPlanner applies heuristic algorithms to add user's preferred venues iteratively to the candidate routes, with the objective of maximizing the route score while satisfying both the venue visiting time and total travel time constraints. To validate the efficiency and effectiveness of the proposed approach, extensive empirical studies were performed on two real-world data sets from the city of San Francisco, which contain more than 391 900 passenger delivery trips generated by 536 taxis in a month and 110 214 check-ins left by 15 680 Foursquare users in six months.", "title": "" }, { "docid": "b775aec0813048fb7101d428f67d0690", "text": "This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryptographic properties of AES, namely, on the MDS property of the linear code providing the diffusion matrix used in the MixColumns transform. It is a chosen-plaintext attack where pairs of AES executions are treated differentially. The method can be easily converted into a chosen-ciphertext attack. We also thoroughly study the physical behavior of cache memory enabling this attack. On the practical side, we demonstrate that our theoretical findings lead to efficient realworld attacks on embedded systems implementing AES at the example of ARM9. As this is one of the most wide-spread embedded platforms today [7], our experimental results might make a revision of the practical security of many embedded applications with security functionality necessary. To our best knowledge, this is the first paper to study cache timing attacks on embedded systems.", "title": "" }, { "docid": "162b678c669a84386e38d5bc8b794bb3", "text": "Women who have been sexually coerced by an intimate partner experience many negative health consequences. Recent research has focused on predicting this sexual coercion. In two studies, we investigated the relationship between men’s use of partner-directed insults and sexually coercive behaviors in the context of intimate relationships. Study 1 secured self-reports from 247 men on the Partner-Directed Insults Scale and the Sexual Coercion in Intimate Relationships Scale. Study 2 obtained partner-reports from 378 women on the same measures. Across both studies, results indicate that men’s use of sexually coercive behaviors can be statistically predicted by the frequency and content of the insults that men direct at their intimate partner. Insults derogating a partner’s value as a person and accusing a partner of sexual infidelity were most useful in predicting sexual coercion. The discussion notes limitations of the current research and highlights directions for future research.", "title": "" }, { "docid": "08dfd4bb173f7d70cff710590b988f08", "text": "Gallium-67 citrate is currently considered as the tracer of first choice in the diagnostic workup of fever of unknown origin (FUO). Fluorine-18 2'-deoxy-2-fluoro-D-glucose (FDG) has been shown to accumulate in malignant tumours but also in inflammatory processes. The aim of this study was to prospectively evaluate FDG imaging with a double-head coincidence camera (DHCC) in patients with FUO in comparison with planar and single-photon emission tomography (SPET) 67Ga citrate scanning. Twenty FUO patients underwent FDG imaging with a DHCC which included transaxial and longitudinal whole-body tomography. In 18 of these subjects, 67Ga citrate whole-body and SPET imaging was performed. The 67Ga citrate and FDG images were interpreted by two investigators, both blinded to the results of other diagnostic modalities. Forty percent (8/20) of the patients had infection, 25% (5/20) had auto-immune diseases, 10% (2/20) had neoplasms and 15% (3/20) had other diseases. Fever remained unexplained in 10% (2/20) of the patients. Of the 20 patients studied, FDG imaging was positive and essentially contributed to the final diagnosis in 11 (55%). The sensitivity of transaxial FDG tomography in detecting the focus of fever was 84% and the specificity, 86%. Positive and negative predictive values were 92% and 75%, respectively. If the analysis was restricted to the 18 patients who were investigated both with 67Ga citrate and FDG, sensitivity was 81% and specificity, 86%. Positive and negative predictive values were 90% and 75%, respectively. The diagnostic accuracy of whole-body FDG tomography (again restricted to the aforementioned 18 patients) was lower (sensitivity, 36%; specificity, 86%; positive and negative predictive values, 80% and 46%, respectively). 67Ga citrate SPET yielded a sensitivity of 67% in detecting the focus of fever and a specificity of 78%. Positive and negative predictive values were 75% and 70%, respectively. A low sensitivity (45%), but combined with a high specificity (100%), was found in planar 67Ga imaging. Positive and negative predictive values were 100% and 54%, respectively. It is concluded that in the context of FUO, transaxial FDG tomography performed with a DHCC is superior to 67Ga citrate SPET. This seems to be the consequence of superior tracer kinetics of FDG compared with those of 67Ga citrate and of a better spatial resolution of a DHCC system compared with SPET imaging. In patients with FUO, FDG imaging with either dedicated PET or DHCC should be considered the procedure of choice.", "title": "" }, { "docid": "3d72ed32a523f4c51b9c57b0d7d0f9ab", "text": "A theoretical study on the design of broadbeam leaky-wave antennas (LWAs) of uniform type and rectilinear geometry is presented. A new broadbeam LWA structure based on the hybrid printed-circuit waveguide is proposed, which allows for the necessary flexible and independent control of the leaky-wave phase and leakage constants. The study shows that both the real and virtual focus LWAs can be synthesized in a simple manner by tapering the printed-slot along the LWA properly, but the real focus LWA is preferred in practice. Practical issues concerning the tapering of these LWA are investigated, including the tuning of the radiation pattern asymmetry level and beamwidth, the control of the ripple level inside the broad radiated main beam, and the frequency response of the broadbeam LWA. The paper provides new insight and guidance for the design of this type of LWAs.", "title": "" }, { "docid": "941dc605dab6cf9bfe89bedb2b4f00a3", "text": "Word boundary detection in continuous speech is very common and important problem in speech synthesis and recognition. Several researches are open on this field. Since there is no sign of start of the word, end of the word and number of words in the spoken utterance of any natural language, one must study the intonation pattern of a particular language. In this paper an algorithm is proposed to detect word boundaries in continuous speech of Hindi language. A careful study of the intonation pattern of Hindi language has been done. Based on this study it is observed that, there are several suprasegmental parameters of speech signal such as pitch, F0 fundamental frequency, duration, intensity, and pause, which can play important role in finding some clues to detect the start and the end of the word from the spoken utterance of Hindi Language. The proposed algorithm is based mainly on two prosodic parameters, pitch and intensity.", "title": "" }, { "docid": "6cabc50fda1107a61c2704c4917b9501", "text": "A vehicle tracking system is very useful for tracking the movement of a vehicle from any location at any time. In this work, real time Google map and Arduino based vehicle tracking system is implemented with Global Positioning System (GPS) and Global system for mobile communication (GSM) technology. GPS module provides geographic coordinates at regular time intervals. Then the GSM module transmits the location of vehicle to cell phone of owner/user in terms of latitude and longitude. At the same time, location is displayed on LCD. Finally, Google map displays the location and name of the place on cell phone. Thus, owner/user will be able to continuously monitor a moving vehicle using the cell phone. In order to show the feasibility and effectiveness of the system, this work presents experimental result of the vehicle tracking system. The proposed system is user friendly and ensures safety and surveillance at low maintenance cost.", "title": "" }, { "docid": "7633393bdc807165f2042f0e9e3c7407", "text": "We present our system for the WNUT 2017 Named Entity Recognition challenge on Twitter data. We describe two modifications of a basic neural network architecture for sequence tagging. First, we show how we exploit additional labeled data, where the Named Entity tags differ from the target task. Then, we propose a way to incorporate sentence level features. Our system uses both methods and ranked second for entity level annotations, achieving an F1-score of 40.78, and second for surface form annotations, achieving an F1score of 39.33.", "title": "" }, { "docid": "774797d2a1bb201bdca750f808d8eb37", "text": "Standard artificial neural networks suffer from the well-known issue of catastrophic forgetting, making continual or lifelong learning problematic. Recently, numerous methods have been proposed for continual learning, but due to differences in evaluation protocols it is difficult to directly compare their performance. To enable more meaningful comparisons, we identified three distinct continual learning scenarios based on whether task identity is known and, if it is not, whether it needs to be inferred. Performing the split and permuted MNIST task protocols according to each of these scenarios, we found that regularization-based approaches (e.g., elastic weight consolidation) failed when task identity needed to be inferred. In contrast, generative replay combined with distillation (i.e., using class probabilities as “soft targets”) achieved superior performance in all three scenarios. In addition, we reduced the computational cost of generative replay by integrating the generative model into the main model by equipping it with generative feedback connections. This Replay-through-Feedback approach substantially shortened training time with no or negligible loss in performance. We believe this to be an important first step towards making the powerful technique of generative replay scalable to real-world continual learning applications.", "title": "" }, { "docid": "1c60ddeb7e940992094cb8f3913e811a", "text": "In this paper, we address the scene segmentation task by capturing rich contextual dependencies based on the selfattention mechanism. Unlike previous works that capture contexts by multi-scale features fusion, we propose a Dual Attention Networks (DANet) to adaptively integrate local features with their global dependencies. Specifically, we append two types of attention modules on top of traditional dilated FCN, which model the semantic interdependencies in spatial and channel dimensions respectively. The position attention module selectively aggregates the features at each position by a weighted sum of the features at all positions. Similar features would be related to each other regardless of their distances. Meanwhile, the channel attention module selectively emphasizes interdependent channel maps by integrating associated features among all channel maps. We sum the outputs of the two attention modules to further improve feature representation which contributes to more precise segmentation results. We achieve new state-of-the-art segmentation performance on three challenging scene segmentation datasets, i.e., Cityscapes, PASCAL Context and COCO Stuff dataset. In particular, a Mean IoU score of 81.5% on Cityscapes test set is achieved without using coarse data. we make the code and trained models publicly available at https://github.com/junfu1115/DANet", "title": "" }, { "docid": "9cf8a2f73a906f7dc22c2d4fbcf8fa6b", "text": "In this paper the effect of spoilers on aerodynamic characteristics of an airfoil were observed by CFD.As the experimental airfoil NACA 2415 was choosen and spoiler was extended from five different positions based on the chord length C. Airfoil section is designed with a spoiler extended at an angle of 7 degree with the horizontal.The spoiler extends to 0.15C.The geometry of 2-D airfoil without spoiler and with spoiler was designed in GAMBIT.The numerical simulation was performed by ANS YS Fluent to observe the effect of spoiler position on the aerodynamic characteristics of this particular airfoil. The results obtained from the computational process were plotted on graph and the conceptual assumptions were verified as the lift is reduced and the drag is increased that obeys the basic function of a spoiler. Coefficient of drag. I. INTRODUCTION An airplane wing has a special shape called an airfoil. As a wing moves through air, the air is split and passes above and below the wing. The wing's upper surface is shaped so the air rushing over the top speeds up and stretches out. This decreases the air pressure above the wing. The air flowing below the wing moves in a straighter line, so its speed and air pressure remains the same. Since high air pressure always moves toward low air pressure, the air below the wing pushes upward toward the air above the wing. The wing is in the middle, and the whole wing is ―lifted‖. The faster an airplane moves, the more lift there is and when the force of lift is greater than the force of gravity, the airplane is able to fly. [1] A spoiler, sometimes called a lift dumper is a device intended to reduce lift in an aircraft. Spoilers are plates on the top surface of a wing which can be extended upward into the airflow and spoil it. By doing so, the spoiler creates a carefully controlled stall over the portion of the wing behind it, greatly reducing the lift of that wing section. Spoilers are designed to reduce lift also making considerable increase in drag. Spoilers increase drag and reduce lift on the wing. If raised on only one wing, they aid roll control, causing that wing to drop. If the spoilers rise symmetrically in flight, the aircraft can either be slowed in level flight or can descend rapidly without an increase in airspeed. When the …", "title": "" }, { "docid": "c24bfd3b7bbc8222f253b004b522f7d5", "text": "The Audio/Visual Emotion Challenge and Workshop (AVEC 2017) \"Real-life depression, and affect\" will be the seventh competition event aimed at comparison of multimedia processing and machine learning methods for automatic audiovisual depression and emotion analysis, with all participants competing under strictly the same conditions. The goal of the Challenge is to provide a common benchmark test set for multimodal information processing and to bring together the depression and emotion recognition communities, as well as the audiovisual processing communities, to compare the relative merits of the various approaches to depression and emotion recognition from real-life data. This paper presents the novelties introduced this year, the challenge guidelines, the data used, and the performance of the baseline system on the two proposed tasks: dimensional emotion recognition (time and value-continuous), and dimensional depression estimation (value-continuous).", "title": "" }, { "docid": "55fabe16bf74ac28c7d7bb9fddd7d12d", "text": "Efficiently and accurately searching for similarities among time series and discovering interesting patterns is an important and non-trivial problem. In this paper, we introduce a new representation of time series, the multiresolution vector quantized (MVQ) approximation, along with a new distance function. The novelty of MVQ is that it keeps both local and global information about the original time series in a hierarchical mechanism, processing the original time series at multiple resolutions. Moreover, the proposed representation is symbolic employing key subsequences and potentially allows the application of text-based retrieval techniques into the similarity analysis of time series. The proposed method is fast and scales linearly with the size of database and the dimensionality. Contrary to the vast majority in the literature that uses the Euclidean distance, MVQ uses a multi-resolution/hierarchical distance function. We performed experiments with real and synthetic data. The proposed distance function consistently outperforms all the major competitors (Euclidean, dynamic time warping, piecewise aggregate approximation) achieving up to 20% better precision/recall and clustering accuracy on the tested datasets.", "title": "" }, { "docid": "87ddd84859d182085c6422e1988b08d8", "text": "The effects of menstrual cycle phase and hormones on women’s visual ability to detect symmetry and visual preference for symmetry were examined. Participants completed tests of symmetry detection and preference for male facial symmetry at two of three menstrual cycle phases (menses, periovulatory, and luteal). Women were better at detecting facial symmetry during the menses than luteal phase of their cycle. A trend indicated the opposite pattern for dot symmetry detection. Similarly, change in salivary progesterone levels across the cycle was negatively related to change in facial symmetry detection scores. However, there was no clear evidence of a greater preference for facial symmetry at any cycle phase, despite an overall preference for facial symmetry across phases. These findings suggest a menses phase advantage and a low progesterone advantage in women’s ability to detect facial symmetry. The results are discussed in the context of hormonal, evolutionary mate selection, and functional neurocognitive theories. # 2007 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "e27d560bd974985dec1df3791fdf2f13", "text": "Modeling natural language inference is a very challenging task. With the availability of large annotated data, it has recently become feasible to train complex models such as neural-network-based inference models, which have shown to achieve the state-of-the-art performance. Although there exist relatively large annotated data, can machines learn all knowledge needed to perform natural language inference (NLI) from these data? If not, how can neural-network-based NLI models benefit from external knowledge and how to build NLI models to leverage it? In this paper, we enrich the state-of-the-art neural natural language inference models with external knowledge. We demonstrate that the proposed models improve neural NLI models to achieve the state-of-the-art performance on the SNLI and MultiNLI datasets.", "title": "" }, { "docid": "757f066b6e693738037994b48d38fcfd", "text": "In this study, results of a variety of ML algorithms are tested against artificially polluted datasets with noise. Two noise models are tested, each of these studied on a range of noise levels from 0 to 50algorithm, a linear regression algorithm, a decision tree, a M5 algorithm, a decision table classifier, a voting interval scheme as well as a hyper pipes classifier. The study is based on an environmental field of application employing data from two air quality prediction problems, a toxicity classification problem and four artificially produced datasets. The results contain evaluation of classification criteria for every algorithm and noise level for the noise sensitivity study. The results suggest that the best algorithms per problem in terms of showing the lower RMS error are the decision table and the linear regression, for classification and regression problems respectively.", "title": "" }, { "docid": "e1dd2a719d3389a11323c5245cd2b938", "text": "Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time user-centric identity management gains acceptance. Anonymous credential schemes are the optimal realization of user-centricity. However, on inexpensive hardware platforms, typically used for eID cards, these schemes could not be made to meet the necessary requirements such as future-proof key lengths and transaction times on the order of 10 seconds. The reasons for this is the need for the hardware platform to be standardized and certified. Therefore an implementation is only possible as a Java Card applet. This results in severe restrictions: little memory (transient and persistent), an 8-bit CPU, and access to hardware acceleration for cryptographic operations only by defined interfaces such as RSA encryption operations.\n Still, we present the first practical implementation of an anonymous credential system on a Java Card 2.2.1. We achieve transaction times that are orders of magnitudes faster than those of any prior attempt, while raising the bar in terms of key length and trust model. Our system is the first one to act completely autonomously on card and to maintain its properties in the face of an untrusted terminal. In addition, we provide a formal system specification and share our solution strategies and experiences gained and with the Java Card.", "title": "" }, { "docid": "d1940745dcc684006037ad099697c4a4", "text": "On a day in November, the body of a 31-year-old man was found near a swimming lake with two open and partly emptied fish tins lying next to him. Further investigations showed that the man had been allergic to fish protein and suffered from severe depression and drug psychosis. Already some days before the suicide, he had repeatedly asked for fish to kill himself. Although the results of the chemical and toxicological examinations were negative, the autopsy findings and histological tests suggest that death was caused by an anaphylactic reaction.", "title": "" } ]
scidocsrr
5f5ddc7558b59ac00b042d30cf4488ee
Design of tilted taper slot antenna for 5G base station antenna circular array
[ { "docid": "09cf4ac9504132c32fe885715e58adf1", "text": "A first-of-the-kind 28 GHz antenna solution for the upcoming 5G cellular communication is presented in detail. Extensive measurements and simulations ascertain the proposed 28 GHz antenna solution to be highly effective for cellular handsets operating in realistic propagating environments.", "title": "" }, { "docid": "364eb800261105453f36b005ba1faf68", "text": "This article presents empirically-based large-scale propagation path loss models for fifth-generation cellular network planning in the millimeter-wave spectrum, based on real-world measurements at 28 GHz and 38 GHz in New York City and Austin, Texas, respectively. We consider industry-standard path loss models used for today's microwave bands, and modify them to fit the propagation data measured in these millimeter-wave bands for cellular planning. Network simulations with the proposed models using a commercial planning tool show that roughly three times more base stations are required to accommodate 5G networks (cell radii up to 200 m) compared to existing 3G and 4G systems (cell radii of 500 m to 1 km) when performing path loss simulations based on arbitrary pointing angles of directional antennas. However, when directional antennas are pointed in the single best directions at the base station and mobile, coverage range is substantially improved with little increase in interference, thereby reducing the required number of 5G base stations. Capacity gains for random pointing angles are shown to be 20 times greater than today's fourth-generation Long Term Evolution networks, and can be further improved when using directional antennas pointed in the strongest transmit and receive directions with the help of beam combining techniques.", "title": "" } ]
[ { "docid": "b6ffc55e4e6b8e44201a5568cd9ca372", "text": "Unlike digitally savvy banking and retail industries, oil and natural gas businesses are latecomers to digitization. With large capital investments in complex industrial operations, firms in latecomer industries are seeking ways to cut costs and become responsive to market demands. Executives in oil and natural gas companies are facing unprecedented pressure to cut costs due to market turbulence and need advice on how to undertake digitization; organizational changes needed; who should lead the digitization effort; and the role of the chief information officer (CIO) in executing a digital strategy.", "title": "" }, { "docid": "38da04256f605a4900c30a90ce2a3e13", "text": "ÐIn wireless sensor networks, energy efficiency is crucial to achieving satisfactory network lifetime. To reduce the energy consumption significantly, a node should turn off its radio most of the time, except when it has to participate in data forwarding. We propose a new technique, called Sparse Topology and Energy Management (STEM), which efficiently wakes up nodes from a deep sleep state without the need for an ultra low-power radio. The designer can trade the energy efficiency of this sleep state for the latency associated with waking up the node. In addition, we integrate STEM with approaches that also leverage excess network density. We show that our hybrid wakeup scheme results in energy savings of over two orders of magnitude compared to sensor networks without topology management. Furthermore, the network designer is offered full flexibility in exploiting the energy-latency-density design space by selecting the appropriate parameter settings of our protocol. Index TermsÐSensor networks, energy efficiency, wakeup, topology.", "title": "" }, { "docid": "790ac9330d698cf5d6f3f8fc7891f090", "text": "It is well known that the convergence rate of the expectation-maximization (EM) algorithm can be faster than those of convention first-order iterative algorithms when the overlap in the given mixture is small. But this argument has not been mathematically proved yet. This article studies this problem asymptotically in the setting of gaussian mixtures under the theoretical framework of Xu and Jordan (1996). It has been proved that the asymptotic convergence rate of the EM algorithm for gaussian mixtures locally around the true solution is o(e0.5()), where > 0 is an arbitrarily small number, o(x) means that it is a higher-order infinitesimal as x 0, and e() is a measure of the average overlap of gaussians in the mixture. In other words, the large sample local convergence rate for the EM algorithm tends to be asymptotically superlinear when e() tends to zero.", "title": "" }, { "docid": "36c26d1be5d9ef1ffaf457246bbc3c90", "text": "In knowledge grounded conversation, domain knowledge plays an important role in a special domain such as Music. The response of knowledge grounded conversation might contain multiple answer entities or no entity at all. Although existing generative question answering (QA) systems can be applied to knowledge grounded conversation, they either have at most one entity in a response or cannot deal with out-ofvocabulary entities. We propose a fully data-driven generative dialogue system GenDS that is capable of generating responses based on input message and related knowledge base (KB). To generate arbitrary number of answer entities even when these entities never appear in the training set, we design a dynamic knowledge enquirer which selects different answer entities at different positions in a single response, according to different local context. It does not rely on the representations of entities, enabling our model deal with out-ofvocabulary entities. We collect a human-human conversation data (ConversMusic) with knowledge annotations. The proposed method is evaluated on CoversMusic and a public question answering dataset. Our proposed GenDS system outperforms baseline methods significantly in terms of the BLEU, entity accuracy, entity recall and human evaluation. Moreover,the experiments also demonstrate that GenDS works better even on small datasets.", "title": "" }, { "docid": "bf17acf28f242a0fd76117c9ef245f4d", "text": "We present an algorithm to compute the silhouette set of a point cloud. Previous methods extract point set silhouettes by thresholding point normals, which can lead to simultaneous overand under-detection of silhouettes. We argue that additional information such as surface curvature is necessary to resolve these issues. To this end, we develop a local reconstruction scheme using Gabriel and intrinsic Delaunay criteria and define point set silhouettes based on the notion of a silhouette generating set. The mesh umbrellas, or local reconstructions of one-ring triangles surrounding each point sample, generated by our method enable accurate silhouette identification near sharp features and close-by surface sheets, and provide the information necessary to detect other characteristic curves such as creases and boundaries. We show that these curves collectively provide a sparse and intuitive visualization of point cloud data.", "title": "" }, { "docid": "ef77d042a04b7fa704f13a0fa5e73688", "text": "The nature of the cellular basis of learning and memory remains an often-discussed, but elusive problem in neurobiology. A popular model for the physiological mechanisms underlying learning and memory postulates that memories are stored by alterations in the strength of neuronal connections within the appropriate neural circuitry. Thus, an understanding of the cellular and molecular basis of synaptic plasticity will expand our knowledge of the molecular basis of learning and memory. The view that learning was the result of altered synaptic weights was first proposed by Ramon y Cajal in 1911 and formalized by Donald O. Hebb. In 1949, Hebb proposed his \" learning rule, \" which suggested that alterations in the strength of synapses would occur between two neurons when those neurons were active simultaneously (1). Hebb's original postulate focused on the need for synaptic activity to lead to the generation of action potentials in the postsynaptic neuron, although more recent work has extended this to include local depolarization at the synapse. One problem with testing this hypothesis is that it has been difficult to record directly the activity of single synapses in a behaving animal. Thus, the challenge in the field has been to relate changes in synaptic efficacy to specific behavioral instances of associative learning. In this chapter, we will review the relationship among synaptic plasticity, learning, and memory. We will examine the extent to which various current models of neuronal plasticity provide potential bases for memory storage and we will explore some of the signal transduction pathways that are critically important for long-term memory storage. We will focus on two systems—the gill and siphon withdrawal reflex of the invertebrate Aplysia californica and the mammalian hippocam-pus—and discuss the abilities of models of synaptic plasticity and learning to account for a range of genetic, pharmacological, and behavioral data.", "title": "" }, { "docid": "03ee8359c7d0115897c89d36531ed971", "text": "No wonder you activities are, reading will be always needed. It is not only to fulfil the duties that you need to finish in deadline time. Reading will encourage your mind and thoughts. Of course, reading will greatly develop your experiences about everything. Reading acs surgery principles and practice is also a way as one of the collective books that gives many advantages. The advantages are not only for you, but for the other peoples with those meaningful benefits.", "title": "" }, { "docid": "2dd20fa690d3e9c363401ad1d080afe5", "text": "There have been some research efforts into identifying activities from smartphone accelerometer data. Kwapisz et al. [1] mined data from smartphone sensors of different users doing different activities, and extracted statistics like the average, standard deviation, and time between peaks from portions of the data. With the features they used, they achieved 91.7% precision overall using Multilayer Perceptron. Ravi et al. [2] attempted to classify similar activities using the mean, standard deviation, energy of the Fourier Transform and correlation between signals on each axis. On a dataset similar to Kwapisz et al., they achieved 72% accuracy using Boosted SVM.", "title": "" }, { "docid": "96055f0e41d62dc0ef318772fa6d6d9f", "text": "Building Information Modeling (BIM) has rapidly grown from merely being a three-dimensional (3D) model of a facility to serving as “a shared knowledge resource for information about a facility, forming a reliable basis for decisions during its life cycle from inception onward” [1]. BIM with three primary spatial dimensions (width, height, and depth) becomes 4D BIM when time (construction scheduling information) is added, and 5D BIM when cost information is added to it. Although the sixth dimension of the 6D BIM is often attributed to asset information useful for Facility Management (FM) processes, there is no agreement in the research literature on what each dimension represents beyond the fifth dimension [2]. BIM ultimately seeks to digitize the different stages of a building lifecycle such as planning, design, construction, and operation such that consistent digital information of a building project can be used by stakeholders throughout the building life-cycle [3]. The United States National Building Information Model Standard (NBIMS) initially characterized BIMs as digital representations of physical and functional aspects of a facility. But, in the most recent version released in July 2015, the NBIMS’ definition of BIM includes three separate but linked functions, namely business process, digital representation, and organization and control [4]. A number of national-level initiatives are underway in various countries to formally encourage the adoption of BIM technologies in the Architecture, Engineering, and Construction (AEC) and FM industries. Building SMART, with 18 chapters across the globe, including USA, UK, Australasia, etc., was established in 1995 with the aim of developing and driving the active use of open internationally-recognized standards to support the wider adoption of BIM across the building and infrastructure sectors [5]. The UK BIM Task Group, with experts from industry, government, public sector, institutes, and academia, is committed to facilitate the implementation of ‘collaborative 3D BIM’, a UK Government Construction Strategy initiative [6]. Similarly, the EUBIM Task Group was started with a vision to foster the common use of BIM in public works and produce a handbook containing the common BIM principles, guidance and practices for public contracting entities and policy makers [7].", "title": "" }, { "docid": "ce32d9fb88faa8730ebec0811c625a35", "text": "With the explosive growth of audio music everywhere over the Internet, it is becoming more important to be able to classify or retrieve audio music based on their key components, such as vocal pitch for common popular music. This paper proposes a novel and effective two-stage approach to singing pitch extraction, which involves singing voice separation and pitch tracking for monaural polyphonic audio music. The first stage extracts singing voice from the songs by using deep neural networks in a supervised setting. Then the second stage estimates the pitch based on the extracted singing voice in a robust manner. Experimental results based on MIR-1K showed that the proposed approach outperforms a previous state-of-the-art approach in raw-pitch accuracy. Moreover, the proposed approach has been submitted to the singing voice separation and audio melody extraction tasks of Music Information Retrieval Evaluation eXchange (MIREX) in 2015. The results of the competition shows that the proposed approach is superior to other submitted algorithms, which demonstrates the feasibility of the method for further applications in music processing.", "title": "" }, { "docid": "0dcd777080c565283802cc8d4674c3f9", "text": "Speech separation or enhancement algorithms seldom exploit information about phoneme identities. In this study, we propose a novel phoneme-specific speech separation method. Rather than training a single global model to enhance all the frames, we train a separate model for each phoneme to process its corresponding frames. A robust ASR system is employed to identify the phoneme identity of each frame. This way, the information from ASR systems and language models can directly influence speech separation by selecting a phoneme-specific model to use at the test stage. In addition, phoneme-specific models have fewer variations to model and do not exhibit the data imbalance problem. The improved enhancement results can in turn help recognition. Experiments on the corpus of the second CHiME speech separation and recognition challenge (task-2) demonstrate the effectiveness of this method in terms of objective measures of speech intelligibility and quality, as well as recognition performance.", "title": "" }, { "docid": "151fd47f87944978edfafb121b655ad8", "text": "We introduce a pair of tools, Rasa NLU and Rasa Core, which are open source python libraries for building conversational software. Their purpose is to make machine-learning based dialogue management and language understanding accessible to non-specialist software developers. In terms of design philosophy, we aim for ease of use, and bootstrapping from minimal (or no) initial training data. Both packages are extensively documented and ship with a comprehensive suite of tests. The code is available at https://github.com/RasaHQ/", "title": "" }, { "docid": "d17e76f7932d59563b791ccde907fb23", "text": "Given a sequential learning algorithm and a target model, sequential machine teaching aims to find the shortest training sequence to drive the learning algorithm to the target model. We present the first principled way to find such shortest training sequences. Our key insight is to formulate sequential machine teaching as a time-optimal control problem. This allows us to solve sequential teaching by leveraging key theoretical and computational tools developed over the past 60 years in the optimal control community. Specifically, we study the Pontryagin Maximum Principle, which yields a necessary condition for optimality of a training sequence. We present analytic, structural, and numerical implications of this approach on a case study with a least-squares loss function and gradient descent learner. We compute optimal training sequences for this problem, and although the sequences seem circuitous, we find that they can vastly outperform the best available heuristics for generating training sequences.", "title": "" }, { "docid": "aa8c85df6cf5291f98b707b995ec1768", "text": "http://www.sciencemag.org/cgi/content/full/313/5786/504 version of this article at: including high-resolution figures, can be found in the online Updated information and services, http://www.sciencemag.org/cgi/content/full/313/5786/504/DC1 can be found at: Supporting Online Material found at: can be related to this article A list of selected additional articles on the Science Web sites http://www.sciencemag.org/cgi/content/full/313/5786/504#related-content http://www.sciencemag.org/cgi/content/full/313/5786/504#otherarticles , 6 of which can be accessed for free: cites 8 articles This article 15 article(s) on the ISI Web of Science. cited by This article has been http://www.sciencemag.org/cgi/content/full/313/5786/504#otherarticles 4 articles hosted by HighWire Press; see: cited by This article has been http://www.sciencemag.org/about/permissions.dtl in whole or in part can be found at: this article permission to reproduce of this article or about obtaining reprints Information about obtaining", "title": "" }, { "docid": "dfc5f6899ceeb886b4197f3b70b7f6e7", "text": "In cognitive radio networks, the secondary users can use the frequency bands when the primary users are not present. Hence secondary users need to constantly sense the presence of the primary users. When the primary users are detected, the secondary users have to vacate that channel. This makes the probability of detection important to the primary users as it indicates their protection level from secondary users. When the secondary users detect the presence of a primary user which is in fact not there, it is referred to as false alarm. The probability of false alarm is important to the secondary users as it determines their usage of an unoccupied channel. Depending on whose interest is of priority, either a targeted probability of detection or false alarm shall be set. After setting one of the probabilities, the other can be optimized through cooperative sensing. In this paper, we show that cooperating all secondary users in the network does not necessary achieve the optimum performance, but instead, it is achieved by cooperating a certain number of users with the highest primary user's signal to noise ratio. Computer simulations have shown that the Pd can increase from 92.03% to 99.88% and Pf can decrease from 6.02% to 0.06% in a network with 200 users.", "title": "" }, { "docid": "41f14f975d8c757404112f918027bd50", "text": "Providing a plausible explanation for the relationship between two related entities is an important task in some applications of knowledge graphs, such as in search engines. However, most existing methods require a large number of manually labeled training data, which cannot be applied in large-scale knowledge graphs due to the expensive data annotation. In addition, these methods typically rely on costly handcrafted features. In this paper, we propose an effective pairwise ranking model by leveraging clickthrough data of a Web search engine to address these two problems. We first construct large-scale training data by leveraging the query-title pairs derived from clickthrough data of a Web search engine. Then, we build a pairwise ranking model which employs a convolutional neural network to automatically learn relevant features. The proposed model can be easily trained with backpropagation to perform the ranking task. The experiments show that our method significantly outperforms several strong baselines.", "title": "" }, { "docid": "b8cda5e974fcf2cb8845f25bd12a13c2", "text": "Abstract System dynamics is an approach for thinking about and simulating situations and organisations of all kinds and sizes by visualising how the elements fit together, interact and change over time. This chapter, written by John Morecroft, describes modern system dynamics which retains the fundamentals developed in the 1950s by Jay W. Forrester of the MIT Sloan School of Management. It looks at feedback loops and time delays that affect system behaviour in a non-linear way, and illustrates how dynamic behaviour depends upon feedback loop structures. It also recognises improvements as part of the ongoing process of managing a situation in order to achieve goals. Significantly it recognises the importance of context, and practitioner skills. Feedback systems thinking views problems and solutions as being intertwined. The main concepts and tools: feedback structure and behaviour, causal loop diagrams, dynamics, are practically illustrated in a wide variety of contexts from a hot water shower through to a symphony orchestra and the practical application of the approach is described through several real examples of its use for strategic planning and evaluation.", "title": "" }, { "docid": "2038dbe6e16892c8d37a4dac47d4f681", "text": "Sentences with different structures may convey the same meaning. Identification of sentences with paraphrases plays an important role in text related research and applications. This work focus on the statistical measures and semantic analysis of Malayalam sentences to detect the paraphrases. The statistical similarity measures between sentences, based on symbolic characteristics and structural information, could measure the similarity between sentences without any prior knowledge but only on the statistical information of sentences. The semantic representation of Universal Networking Language(UNL), represents only the inherent meaning in a sentence without any syntactic details. Thus, comparing the UNL graphs of two sentences can give an insight into how semantically similar the two sentences are. Combination of statistical similarity and semantic similarity score results the overall similarity score. This is the first attempt towards paraphrases of malayalam sentences.", "title": "" }, { "docid": "7462d739a80bf654d6f9df78b4a6e6e3", "text": "Multi-class pattern classification has many applications including text document classification, speech recognition, object recognition, etc. Multi-class pattern classification using neural networks is not a trivial extension from two-class neural networks. This paper presents a comprehensive and competitive study in multi-class neural learning with focuses on issues including neural network architecture, encoding schemes, training methodology and training time complexity. Our study includes multi-class pattern classification using either a system of multiple neural networks or a single neural network, and modeling pattern classes using one-against-all, one-against-one, one-againsthigher-order, and P-against-Q. We also discuss implementations of these approaches and analyze training time complexity associated with each approach. We evaluate six different neural network system architectures for multi-class pattern classification along the dimensions of imbalanced data, large number of pattern classes, large vs. small training data through experiments conducted on well-known benchmark data. 2006 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "394dec5d97fa6ba30a02569ab5412cbe", "text": "The paper presents a new controller approach applied to redundant robot manipulators constrained by mobile obstacles. The proposed controller is constructed in task space by using optimization strategy, in order to achieve a good trajectory tracking of the end effector even if the obstacles are fixed or mobile. The criterion to be optimized is chosen as the sum of the joint displacements energy and the internal needed, only its structure. All unknown functions in the robot dynamical model, written in extended Cartesian space, are carried out using multilayer perceptron (MLP) neural networks. The adaptation laws of the neural parameters are obtained via closed loop stability analysis of the system (Lyapunov approach). In order to evaluate the proposed controller performance a 3 DOF robot manipulator evolving in a vertical space constrained by a mobile obstacle is used. The obtained results show its effectiveness. & 2011 Elsevier B.V. All rights reserved.", "title": "" } ]
scidocsrr
9a03a5940ae99858b4b0b2130b60bd05
Low side-lobe substrate integrated cavity antenna array using unequal microstrip-ridge gap waveguide feeding network at 94 GHz
[ { "docid": "fbf2a211d53603cbcb7441db3006f035", "text": "This letter presents a new metamaterial-based waveguide technology referred to as ridge gap waveguides. The main advantages of the ridge gap waveguides compared to hollow waveguides are that they are planar and much cheaper to manufacture, in particular at high frequencies such as for millimeter and sub- millimeter waves. The latter is due to the fact that there are no mechanical joints across which electric currents must float. The gap waveguides have lower losses than microstrip lines, and they are completely shielded by metal so no additional packaging is needed, in contrast to the severe packaging problems associated with microstrip circuits. The gap waveguides are realized in a narrow gap between two parallel metal plates by using a texture or multilayer structure on one of the surfaces. The waves follow metal ridges in the textured surface. All wave propagation in other directions is prohibited (in cutoff) by realizing a high surface impedance (ideally a perfect magnetic conductor) in the textured surface at both sides of all ridges. Thereby, cavity resonances do not appear either within the band of operation. The present letter introduces the gap waveguide and presents some initial simulated results.", "title": "" } ]
[ { "docid": "ca927f5557a6a5713e9313848fbbc5b1", "text": "A wide band CMOS LC-tank voltage controlled oscillator (VCO) with small VCO gain (KVCO) variation was developed. For small KVCO variation, serial capacitor bank was added to the LC-tank with parallel capacitor array. Implemented in a 0.18 mum CMOS RF technology, the proposed VCO can be tuned from 4.39 GHz to 5.26 GHz with the VCO gain variation less than 9.56%. While consuming 3.5 mA from a 1.8 V supply, the VCO has -113.65 dBc/Hz phase noise at 1 MHz offset from the carrier.", "title": "" }, { "docid": "548c3f3db8c9915e21d8c994fba71fb6", "text": "A subgroup of grossly obese patients may develop a large hanging abdominal apron, panniculus morbidus, which can contain an element of lymphoedema. This hinders normal activities and prevents adequate hygiene. We reviewed published reports and found that the complications that result from resection of a panniculus had been well described, but the presence of lymphoedema and the possible benefit of appropriate physiotherapy was not addressed. Our first aim was to assess our overall morbidity. Secondly we assessed whether perioperative complex decongestive physical therapy had the potential to reduce the incidence of commonly encountered complications. We retrospectively reviewed the casenotes of all massively obese patients who had panniculectomies between 1998 and 2008. We identified two groups of patients, in the first of which were 38 patients who were given perioperative complex decongestive physical therapy (CDP). In the second group were 18 patients who had no additional treatment perioperatively. We then compared the differences between the groups in the incidence of complications, reoperation rate, duration of hospital stay, and wound complications. All the patients not given perioperative treatment developed a postoperative complication. Only 6 patients in the treated group had minor wound problems. The rates and severity of complications associated with this type of operation can be improved if the patient has access to additional care in a specialised rehabilitation centre during the perioperative period.", "title": "" }, { "docid": "bab36592a2f3df97a8580169ad92adef", "text": "Two hundred and nine pupils were randomly allocated to either a cognitive behaviourally based stress management intervention (SMI) group, or a non-intervention control group. Mood and motivation measures were administered pre and post intervention. Standardized examinations were taken 8-10 weeks later. As hypothesized, results indicated that an increase in the functionality of pupils' cognitions served as the mechanism by which mental health improved in the SMI group. In contrast, the control group demonstrated no such improvements. Also, as predicted, an increase in motivation accounted for the SMI group's significantly better performance on the standardized, academic assessments that comprise the United Kingdom's General Certificate of Secondary Education. Indeed, the magnitude of this enhanced performance was, on average, one-letter grade. Discussion focuses on the theoretical and practical implications of these findings.", "title": "" }, { "docid": "682432bc24847bcca3fdeba01c08a5c6", "text": "The effect of high K-concentration, insulin and the L-type Ca 2+ channel blocker PN 200-110 on cytosolic intracellular free calcium ([Ca2+]i) was studied in single ventricular myocytes of 10-day-old embryonic chick heart, 20-week-old human fetus and rabbit aorta (VSM) single cells using the Ca2+-sensitive fluorescent dye, Fura-2 microfluorometry and digital imaging technique. Depolarization of the cell membrane of both heart and VSM cells with continuous superfusion of 30 mM [K+]o induced a rapid transient increase of [Ca2+]j that was followed by a sustained component. The early transient increase of [Ca2+]i by high [K+]o was blocked by the L-type calcium channel antagonist nifedipine. However, the sustained component was found to be insensitive to this drug. PN 200-110 another L-type Ca 2+ blocker was found to decrease both the early transient and the sustained increase of [Ca2+]i induced by depolarization of the cell membrane with high [K+]o. Insulin at a concentration of 40 to 80 tzU/rnl only produced a sustained increase of [Ca2+]i that was blocked by PN 200-110 or by lowering the extracellular Ca 2+ concentration with EGTA. The sustained increase of [Ca2+]i induced by high [K+]o or insulin was insensitive to metabolic inhibitors such as KCN and ouabain as well to the fast Na + channel blocker, tetrodotoxin and to the increase of intracellular concentrations of cyclic nucleotides. Using the patch clamp technique, insulin did not affect the L-type Ca 2+ current and the delayed outward K + current. These results suggest that the early increase of [Ca2+]i during depolarization of the cell membrane of heart and VSM cells with high [K+]o is due to the opening and decay of an L-type Ca z+ channel. However, the sustained increase of [Ca2+]i during a sustained depolarization is due to the activation of a resting (R) Ca 2+ channel that is insensitive to lowering [ATP]i and sensitive to insulin. (Mol Cell Biochem 117: 93--106, 1992)", "title": "" }, { "docid": "b94e096ea1bc990bd7c72aab988dd5ff", "text": "The paper describes the design and implementation of an independent, third party contract monitoring service called Contract Compliance Checker (CCC). The CCC is provided with the specification of the contract in force, and is capable of observing and logging the relevant business-to-business (B2B) interaction events, in order to determine whether the actions of the business partners are consistent with the contract. A contract specification language called EROP (for Events, Rights, Obligations and Prohibitions) for the CCC has been developed based on business rules, that provides constructs to specify what rights, obligation and prohibitions become active and inactive after the occurrence of events related to the execution of business operations. The system has been designed to work with B2B industry standards such as ebXML and RosettaNet.", "title": "" }, { "docid": "26ad95d4ecbea507c22e429efbfeb1d1", "text": "A considerable portion of web images capture events that occur in our personal lives or social activities. In this paper, we aim to develop an effective method for recognizing events from such images. Despite the sheer amount of study on event recognition, most existing methods rely on videos and are not directly applicable to this task. Generally, events are complex phenomena that involve interactions among people and objects, and therefore analysis of event photos requires techniques that can go beyond recognizing individual objects and carry out joint reasoning based on evidences of multiple aspects. Inspired by the recent success of deep learning, we formulate a multi-layer framework to tackle this problem, which takes into account both visual appearance and the interactions among humans and objects, and combines them via semantic fusion. An important issue arising here is that humans and objects discovered by detectors are in the form of bounding boxes, and there is no straightforward way to represent their interactions and incorporate them with a deep network. We address this using a novel strategy that projects the detected instances onto multi-scale spatial maps. On a large dataset with 60, 000 images, the proposed method achieved substantial improvement over the state-of-the-art, raising the accuracy of event recognition by over 10%.", "title": "" }, { "docid": "4816f221d67922009a308058139aa56b", "text": "In this paper we study quantum computation from a complexity theoretic viewpoint. Our first result is the existence of an efficient universal quantum Turing machine in Deutsch’s model of a quantum Turing machine (QTM) [Proc. Roy. Soc. London Ser. A, 400 (1985), pp. 97–117]. This construction is substantially more complicated than the corresponding construction for classical Turing machines (TMs); in fact, even simple primitives such as looping, branching, and composition are not straightforward in the context of quantum Turing machines. We establish how these familiar primitives can be implemented and introduce some new, purely quantum mechanical primitives, such as changing the computational basis and carrying out an arbitrary unitary transformation of polynomially bounded dimension. We also consider the precision to which the transition amplitudes of a quantum Turing machine need to be specified. We prove that O(log T ) bits of precision suffice to support a T step computation. This justifies the claim that the quantum Turing machine model should be regarded as a discrete model of computation and not an analog one. We give the first formal evidence that quantum Turing machines violate the modern (complexity theoretic) formulation of the Church–Turing thesis. We show the existence of a problem, relative to an oracle, that can be solved in polynomial time on a quantum Turing machine, but requires superpolynomial time on a bounded-error probabilistic Turing machine, and thus not in the class BPP. The class BQP of languages that are efficiently decidable (with small error-probability) on a quantum Turing machine satisfies BPP ⊆ BQP ⊆ P. Therefore, there is no possibility of giving a mathematical proof that quantum Turing machines are more powerful than classical probabilistic Turing machines (in the unrelativized setting) unless there is a major breakthrough in complexity theory.", "title": "" }, { "docid": "290a0812a162c52db838e69c8b4f0d09", "text": "Recent advances in next-generation sequencing technologies have facilitated the use of deoxyribonucleic acid (DNA) as a novel covert channels in steganography. There are various methods that exist in other domains to detect hidden messages in conventional covert channels. However, they have not been applied to DNA steganography. The current most common detection approaches, namely frequency analysis-based methods, often overlook important signals when directly applied to DNA steganography because those methods depend on the distribution of the number of sequence characters. To address this limitation, we propose a general sequence learning-based DNA steganalysis framework. The proposed approach learns the intrinsic distribution of coding and non-coding sequences and detects hidden messages by exploiting distribution variations after hiding these messages. Using deep recurrent neural networks (RNNs), our framework identifies the distribution variations by using the classification score to predict whether a sequence is to be a coding or non-coding sequence. We compare our proposed method to various existing methods and biological sequence analysis methods implemented on top of our framework. According to our experimental results, our approach delivers a robust detection performance compared to other tools.", "title": "" }, { "docid": "3738d3c5d5bf4a3de55aa638adac07bb", "text": "The term malware stands for malicious software. It is a program installed on a system without the knowledge of owner of the system. It is basically installed by the third party with the intention to steal some private data from the system or simply just to play pranks. This in turn threatens the computer’s security, wherein computer are used by one’s in day-to-day life as to deal with various necessities like education, communication, hospitals, banking, entertainment etc. Different traditional techniques are used to detect and defend these malwares like Antivirus Scanner (AVS), firewalls, etc. But today malware writers are one step forward towards then Malware detectors. Day-by-day they write new malwares, which become a great challenge for malware detectors. This paper focuses on basis study of malwares and various detection techniques which can be used to detect malwares.", "title": "" }, { "docid": "7bc2c428a43437afbbdb880ea9431288", "text": "Multi-label image classification aims to predict multiple labels for a single image which contains diverse content. By utilizing label correlations, various techniques have been developed to improve classification performance. However, current existing methods either neglect image features when exploiting label correlations or lack the ability to learn image-dependent conditional label structures. In this paper, we develop conditional graphical Lasso (CGL) to handle these challenges. CGL provides a unified Bayesian framework for structure and parameter learning conditioned on image features. We formulate the multi-label prediction as CGL inference problem, which is solved by a mean field variational approach. Meanwhile, CGL learning is efficient due to a tailored proximal gradient procedure by applying the maximum a posterior (MAP) methodology. CGL performs competitively for multi-label image classification on benchmark datasets MULAN scene, PASCAL VOC 2007 and PASCAL VOC 2012, compared with the state-of-the-art multi-label classification algorithms.", "title": "" }, { "docid": "4a9474c0813646708400fc02c344a976", "text": "Over the years, the Web has shrunk the world, allowing individuals to share viewpoints with many more people than they are able to in real life. At the same time, however, it has also enabled anti-social and toxic behavior to occur at an unprecedented scale. Video sharing platforms like YouTube receive uploads from millions of users, covering a wide variety of topics and allowing others to comment and interact in response. Unfortunately, these communities are periodically plagued with aggression and hate attacks. In particular, recent work has showed how these attacks often take place as a result of “raids,” i.e., organized efforts coordinated by ad-hoc mobs from third-party communities. Despite the increasing relevance of this phenomenon, online services often lack effective countermeasures to mitigate it. Unlike well-studied problems like spam and phishing, coordinated aggressive behavior both targets and is perpetrated by humans, making defense mechanisms that look for automated activity unsuitable. Therefore, the de-facto solution is to reactively rely on user reports and human reviews. In this paper, we propose an automated solution to identify videos that are likely to be targeted by coordinated harassers. First, we characterize and model YouTube videos along several axes (metadata, audio transcripts, thumbnails) based on a ground truth dataset of raid victims. Then, we use an ensemble of classifiers to determine the likelihood that a video will be raided with high accuracy (AUC up to 94%). Overall, our work paves the way for providing video platforms like YouTube with proactive systems to detect and mitigate coordinated hate attacks.", "title": "" }, { "docid": "879915e4d09a50bdbff8101fcd01acb4", "text": "A skeletal stroke is a kind of general brush stroke for changing the shape of pictures as if by bending, shearing, twisting, while conservating the aspect ratio of selected features on the picture. It is neither a simple warping nor texture mapping technique, but a new method for controlling the deformation of a picture. A deformation model of a coordinate system has been proposed taking into account cases of discontinuous or extreme bending. Complicated pictures can be built up hierarchically by defining higher order strokes and recursive strokes. It is therefore a powerful general drawing tool and extended image transformation instrument. The use of skeletal strokes as a replacement for affine transformations in IFS coding has been explored. A novel general anchoring mechanism is proposed, which allows arbitrary control of any point in the picture. This control flexibility is particularly desirable in computer animation and digital typography. As a result, virtual ‘2-D models’ of cartoon characters as well as pseudo 3-D objects can be created and manipulated with ease.", "title": "" }, { "docid": "babe85fa78ea1f4ce46eb0cfd77ae2b8", "text": "x + a1x + · · ·+ an = 0. On s’interesse surtout à la résolution “par radicaux”, c’est-à-dire à la résolution qui n’utilise que des racines m √ a. Il est bien connu depuis le 16 siècle que l’on peut résoudre par radicaux des équations de degré n ≤ 4. Par contre, selon un résultat célèbre d’Abel, l’équation générale de degré n ≥ 5 n’est pas résoluble par radicaux. L’idée principale de la théorie de Galois est d’associer à chaque équation son groupe de symétrie. Cette construction permet de traduire des propriétés de l’équation (telles que la résolubilité par radicaux) aux propriétés du groupe associé. Le cours ne suivra pas le chemin historique. L’ouvrage [Ti 1, 2] est une référence agréable pour l’histoire du sujet.", "title": "" }, { "docid": "6751bfa8495065db8f6f5b396bbbc2cd", "text": "This paper proposes a new balanced realization and model reduction method for possibly unstable systems by introducing some new controllability and observability Gramians. These Gramians can be related to minimum control energy and minimum estimation error. In contrast to Gramians defined in the literature for unstable systems, these Gramians can always be computed for systems without imaginary axis poles and they reduce to the standard controllability and observability Gramians when the systems are stable. The proposed balanced model reduction method enjoys the similar error bounds as does for the standard balanced model reduction. Furthermore, the new error bounds and the actual approximation errors seem to be much smaller than the ones using the methods given in the literature for unstable systems. Copyright ( 1999 John Wiley & Sons, Ltd.", "title": "" }, { "docid": "bc4ce8c0dce6515d1432a6baecef4614", "text": "The lsemantica command, presented in this paper, implements Latent Semantic Analysis in Stata. Latent Semantic Analysis is a machine learning algorithm for word and text similarity comparison. Latent Semantic Analysis uses Truncated Singular Value Decomposition to derive the hidden semantic relationships between words and texts. lsemantica provides a simple command for Latent Semantic Analysis in Stata as well as complementary commands for text similarity comparison.", "title": "" }, { "docid": "5c7ab7ff9c0758d2560668fa6e65a8e4", "text": "Convolutional neural network (CNN) architectures utilize downsampling layers, which restrict the subsequent layers to learn spatially invariant features while reducing computational costs. However, such a downsampling operation makes it impossible to use the full spectrum of input features. Motivated by this observation, we propose a novel layer called parallel grid pooling (PGP) which is applicable to various CNN models. PGP performs downsampling without discarding any intermediate feature. It works as data augmentation and is complementary to commonly used data augmentation techniques. Furthermore, we demonstrate that a dilated convolution can naturally be represented using PGP operations, which suggests that the dilated convolution can also be regarded as a type of data augmentation technique. Experimental results based on popular image classification benchmarks demonstrate the effectiveness of the proposed method. Code is available at: https://github.com/akitotakeki/pgp-chainer.", "title": "" }, { "docid": "afc5a67dc415ac4039f8120876a40b7f", "text": "One of the implications of connectionist work on language is that the \"language mechanism\" is not essentially different from mechanisms that perform other cognitive tasks. This leads naturally to the notion that language learning must be understood in the context of learning about the world more generally. It is difficult to think of how to constrain a modeling exercise that adopts this perspective, for such a system requires an encoding not only of some interesting part of language but also of the corresponding part of \"the world.\" If one were to undertake this rather daunting task, a natural place to start would be with a subdomain of language in which the important semantic contrasts can be expressed in a two-dimensional visual world and to use low-resolution computer graphics for the encoding of this world. In The Human Semantic Potential, Regier takes precisely this approach, by focusing on the domain of closed-class spatial markers (e.g., prepositions such as above, below, left, right, in, and on in English). Bit map \"movies\" of a trajector that moves in relation to a landmark for several movie frames, or that simply exists, are used as the input to a connectionist learning model; the outputs are labels corresponding to prepositions. The scientific game plan is to construct a model that learns the semantics of spatial markers on the basis of exposure to examples in a given language; the learnable sets of markers under the model then constitute a typology of possible sets of spatial markers in languages of the world. Thus the model makes cross-linguistic typological predictions. Moreover, since the model generalizes from a subset of examples in each language to an assessment of the aptness of each word in all representable conditions, it makes language-internal predictions about the meanings that particular spatial markers can have. Given this framework, it seems reasonable to assess the project in terms of how much we learn about these two domains of prediction from it. In the former case-cross-linguistic typological prediction--the results are only mildly interesting: only a very small subset of the range of predictions that the model makes is revealed, apparently because of the assumed unanalyzability of the connectionist network at the core of the model. In the case of the second task--generalization from positive examples-the results are more appealing: Regier shows how a linguistically-motivated variation on a standard connectionist learning algorithm provides an effective mechanism for", "title": "" }, { "docid": "40839b46d8e5593d6c59e04cd5ec2316", "text": "The main focus of image mining is concerned with the classification of brain tumor in the CT scan brain images. The major steps involved in the system are: pre-processing, feature extraction, association rule mining and classification. Here, we present some experiments for tumor detection in MRI images. The pre-processing step has been done using the median filtering process and features have been extracted using texture feature extraction technique. The extracted features from the CT scan images are used to mine the association rules. The proposed method is used to classify the medical images for diagnosis. In this system we are going to use Decision Tree classification algorithm. The proposed method improves the efficiency than the traditional image mining methods. Here, results which we get are compared with Naive Bayesian classification algorithm.", "title": "" }, { "docid": "200da22a331c381bf46b901879273970", "text": "The explosive growth in volume, velocity, and diversity of data produced by mobile devices and cloud applications has contributed to the abundance of data or ‘big data.’ Available solutions for efficient data storage and management cannot fulfill the needs of such heterogeneous data where the amount of data is continuously increasing. For efficient retrieval and management, existing indexing solutions become inefficient with the rapidly growing index size and seek time and an optimized index scheme is required for big data. Regarding real-world applications, the indexing issue with big data in cloud computing is widespread in healthcare, enterprises, scientific experiments, and social networks. To date, diverse soft computing, machine learning, and other techniques in terms of artificial intelligence have been utilized to satisfy the indexing requirements, yet in the literature, there is no reported state-of-the-art survey investigating the performance and consequences of techniques for solving indexing in big data issues as they enter cloud computing. The objective of this paper is to investigate and examine the existing indexing techniques for big data. Taxonomy of indexing techniques is developed to provide insight to enable researchers understand and select a technique as a basis to design an indexing mechanism with reduced time and space consumption for BD-MCC. In this study, 48 indexing techniques have been studied and compared based on 60 articles related to the topic. The indexing techniques’ performance is analyzed based on their characteristics and big data indexing requirements. The main contribution of this study is taxonomy of categorized indexing techniques based on their method. The categories are non-artificial intelligence, artificial intelligence, and collaborative artificial intelligence indexing methods. In addition, the significance of different procedures and performance is analyzed, besides limitations of each technique. In conclusion, several key future research topics with potential to accelerate the progress and deployment of artificial intelligence-based cooperative indexing in BD-MCC are elaborated on.", "title": "" } ]
scidocsrr
a4b6ff84625bc57c265b825f712ba42b
Real-Time Face Detection and Motion Analysis With Application in “Liveness” Assessment
[ { "docid": "6f56d10f90b1b3ba0c1700fa06c9199e", "text": "Finding human faces automatically in an image is a dif cult yet important rst step to a fully automatic face recognition system This paper presents an example based learning approach for locating unoccluded frontal views of human faces in complex scenes The technique represents the space of human faces by means of a few view based face and non face pattern prototypes At each image location a value distance measure is com puted between the local image pattern and each prototype A trained classi er determines based on the set of dis tance measurements whether a human face exists at the current image location We show empirically that our distance metric is critical for the success of our system", "title": "" } ]
[ { "docid": "82c8a692e3b39e58bd73997b2e922c2c", "text": "The traditional approaches to building survivable systems assume a framework of absolute trust requiring a provably impenetrable and incorruptible Trusted Computing Base (TCB). Unfortunately, we don’t have TCB’s, and experience suggests that we never will. We must instead concentrate on software systems that can provide useful services even when computational resource are compromised. Such a system will 1) Estimate the degree to which a computational resources may be trusted using models of possible compromises. 2) Recognize that a resource is compromised by relying on a system for long term monitoring and analysis of the computational infrastructure. 3) Engage in self-monitoring, diagnosis and adaptation to best achieve its purposes within the available infrastructure. All this, in turn, depends on the ability of the application, monitoring, and control systems to engage in rational decision making about what resources they should use in order to achieve the best ratio of expected benefit to risk.", "title": "" }, { "docid": "9e1c3d4a8bbe211b85b19b38e39db28e", "text": "This paper presents a novel context-based scene recognition method that enables mobile robots to recognize previously observed topological places in known environments or categorize previously unseen places in new environments. We achieve this by introducing the Histogram of Oriented Uniform Patterns (HOUP), which provides strong discriminative power for place recognition, while offering a significant level of generalization for place categorization. HOUP descriptors are used for image representation within a subdivision framework, where the size and location of sub-regions are determined using an informative feature selection method based on kernel alignment. Further improvement is achieved by developing a similarity measure that accounts for perceptual aliasing to eliminate the effect of indistinctive but visually similar regions that are frequently present in outdoor and indoor scenes. An extensive set of experiments reveals the excellent performance of our method on challenging categorization and recognition tasks. Specifically, our proposed method outperforms the current state of the art on two place categorization datasets with 15 and 5 place categories, and two topological place recognition datasets, with 5 and 27 places.", "title": "" }, { "docid": "58d629b3ac6bd731cd45126ce3ed8494", "text": "The Support Vector Machine (SVM) is a common machine learning tool that is widely used because of its high classification accuracy. Implementing SVM for embedded real-time applications is very challenging because of the intensive computations required. This increases the attractiveness of implementing SVM on hardware platforms for reaching high performance computing with low cost and power consumption. This paper provides the first comprehensive survey of current literature (2010-2015) of different hardware implementations of SVM classifier on Field-Programmable Gate Array (FPGA). A classification of existing techniques is presented, along with a critical analysis and discussion. A challenging trade-off between meeting embedded real-time systems constraints and high classification accuracy has been observed. Finally, some key future research directions are suggested.", "title": "" }, { "docid": "c8c57c89f5bd92c726373f9cf77726e0", "text": "Research of named entity recognition (NER) on electrical medical records (EMRs) focuses on verifying whether methods to NER in traditional texts are effective for that in EMRs, and there is no model proposed for enhancing performance of NER via deep learning from the perspective of multiclass classification. In this paper, we annotate a real EMR corpus to accomplish the model training and evaluation. And, then, we present a Convolutional Neural Network (CNN) based multiclass classification method for mining named entities from EMRs. The method consists of two phases. In the phase 1, EMRs are pre-processed for representing samples with word embedding. In the phase 2, the method is built by segmenting training data into many subsets and training a CNN binary classification model on each of subset. Experimental results showed the effectiveness of our method.", "title": "" }, { "docid": "2d6225b20cf13d2974ce78877642a2f7", "text": "Low rank and sparse representation based methods, which make few specific assumptions about the background, have recently attracted wide attention in background modeling. With these methods, moving objects in the scene are modeled as pixel-wised sparse outliers. However, in many practical scenarios, the distributions of these moving parts are not truly pixel-wised sparse but structurally sparse. Meanwhile a robust analysis mechanism is required to handle background regions or foreground movements with varying scales. Based on these two observations, we first introduce a class of structured sparsity-inducing norms to model moving objects in videos. In our approach, we regard the observed sequence as being constituted of two terms, a low-rank matrix (background) and a structured sparse outlier matrix (foreground). Next, in virtue of adaptive parameters for dynamic videos, we propose a saliency measurement to dynamically estimate the support of the foreground. Experiments on challenging well known data sets demonstrate that the proposed approach outperforms the state-of-the-art methods and works effectively on a wide range of complex videos.", "title": "" }, { "docid": "40e38080e12b2d73836fcb1cf79db033", "text": "The research in statistical parametric speech synthesis is towards improving naturalness and intelligibility. In this work, the deviation in spectral tilt of the natural and synthesized speech is analyzed and observed a large gap between the two. Furthermore, the same is analyzed for different classes of sounds, namely low-vowels, mid-vowels, high-vowels, semi-vowels, nasals, and found to be varying with category of sound units. Based on variation, a novel method for spectral tilt enhancement is proposed, where the amount of enhancement introduced is different for different classes of sound units. The proposed method yields improvement in terms of intelligibility, naturalness, and speaker similarity of the synthesized speech.", "title": "" }, { "docid": "0ea239ac71e65397d0713fe8c340f67c", "text": "Mutations in leucine-rich repeat kinase 2 (LRRK2) are a common cause of familial and sporadic Parkinson's disease (PD). Elevated LRRK2 kinase activity and neurodegeneration are linked, but the phosphosubstrate that connects LRRK2 kinase activity to neurodegeneration is not known. Here, we show that ribosomal protein s15 is a key pathogenic LRRK2 substrate in Drosophila and human neuron PD models. Phosphodeficient s15 carrying a threonine 136 to alanine substitution rescues dopamine neuron degeneration and age-related locomotor deficits in G2019S LRRK2 transgenic Drosophila and substantially reduces G2019S LRRK2-mediated neurite loss and cell death in human dopamine and cortical neurons. Remarkably, pathogenic LRRK2 stimulates both cap-dependent and cap-independent mRNA translation and induces a bulk increase in protein synthesis in Drosophila, which can be prevented by phosphodeficient T136A s15. These results reveal a novel mechanism of PD pathogenesis linked to elevated LRRK2 kinase activity and aberrant protein synthesis in vivo.", "title": "" }, { "docid": "5caa0646c0d5b1a2a0c799e048b5557a", "text": "The goal of this research is to find the efficient and most widely used cryptographic algorithms form the history, investigating one of its merits and demerits which have not been modified so far. Perception of cryptography, its techniques such as transposition & substitution and Steganography were discussed. Our main focus is on the Playfair Cipher, its advantages and disadvantages. Finally, we have proposed a few methods to enhance the playfair cipher for more secure and efficient cryptography.", "title": "" }, { "docid": "cf374e1d1fa165edaf0b29749f32789c", "text": "Photovoltaic (PV) system performance extremely depends on local insolation and temperature conditions. Under partial shading, P-I characteristics of PV systems are complicated and may have multiple local maxima. Conventional Maximum Power Point Tracking (MPPT) techniques can easily fail to track global maxima and may be trapped in local maxima under partial shading; this can be one of main causes for reduced energy yield for many PV systems. In order to solve this problem, this paper proposes a novel Maximum Power Point tracking algorithm based on Differential Evolution (DE) that is capable of tracking global MPP under partial shaded conditions. The ability of proposed algorithm and its excellent performances are evaluated with conventional and popular algorithm by means of simulation. The proposed algorithm works in conjunction with a Boost (step up) DC-DC converter to track the global peak. Moreover, this paper includes a MATLAB-based modeling and simulation scheme suitable for photovoltaic characteristics under partial shading.", "title": "" }, { "docid": "2eba092d19cc8fb35994e045f826e950", "text": "Deep neural networks have proven to be particularly e‚ective in visual and audio recognition tasks. Existing models tend to be computationally expensive and memory intensive, however, and so methods for hardwareoriented approximation have become a hot topic. Research has shown that custom hardware-based neural network accelerators can surpass their general-purpose processor equivalents in terms of both throughput and energy eciency. Application-tailored accelerators, when co-designed with approximation-based network training methods, transform large, dense and computationally expensive networks into small, sparse and hardware-ecient alternatives, increasing the feasibility of network deployment. In this article, we provide a comprehensive evaluation of approximation methods for high-performance network inference along with in-depth discussion of their e‚ectiveness for custom hardware implementation. We also include proposals for future research based on a thorough analysis of current trends. Œis article represents the €rst survey providing detailed comparisons of custom hardware accelerators featuring approximation for both convolutional and recurrent neural networks, through which we hope to inspire exciting new developments in the €eld.", "title": "" }, { "docid": "b42f4d645e2a7e24df676a933f414a6c", "text": "Epilepsy is a common neurological condition which affects the central nervous system that causes people to have a seizure and can be assessed by electroencephalogram (EEG). Electroencephalography (EEG) signals reflect two types of paroxysmal activity: ictal activity and interictal paroxystic events (IPE). The relationship between IPE and ictal activity is an essential and recurrent question in epileptology. The spike detection in EEG is a difficult problem. Many methods have been developed to detect the IPE in the literature. In this paper we propose three methods to detect the spike in real EEG signal: Page Hinkley test, smoothed nonlinear energy operator (SNEO) and fractal dimension. Before using these methods, we filter the signal. The Singular Spectrum Analysis (SSA) filter is used to remove the noise in an EEG signal.", "title": "" }, { "docid": "fa7cbe54e7fdc2ef373cf4b966181eba", "text": "Fingerprint enhancement is a critical step in fingerprint recognition systems. There are many existing contact-based fingerprint image enhancement methods and they have their own strengths and weaknesses. However, image enhancement approaches that can be used for contactless fingerprints are rarely considered and the number of such approaches is limited. Furthermore, the performance of existing contact-based fingerprint enhancement methods on the contactless fingerprint samples are unsatisfactory. Therefore, in this paper we propose an improved 3-step fingerprint image quality enhancement approach, which can be used for enhancing contactless fingerprint samples. The evaluation results show that, the proposed enhancement method significantly increases the number of detected minutiae, and improves the performance of fingerprint recognition system by reducing 7% and 15% EER compared to existing methods, respectively.", "title": "" }, { "docid": "310036a45a95679a612cc9a60e44e2e0", "text": "A broadband single layer, dual circularly polarized (CP) reflectarrays with linearly polarized feed is introduced in this paper. To reduce the electrical interference between the two orthogonal polarizations of the CP element, a novel subwavelength multiresonance element with a Jerusalem cross and an open loop is proposed, which presents a broader bandwidth and phase range excessing 360° simultaneously. By tuning the x- and y-axis dimensions of the proposed element, an optimization technique is used to minimize the phase errors on both orthogonal components. Then, a single-layer offset-fed 20 × 20-element dual-CP reflectarray has been designed and fabricated. The measured results show that the 1-dB gain and 3-dB axial ratio (AR) bandwidths of the dual-CP reflectarray can reach 12.5% and 50%, respectively, which shows a significant improvement in gain and AR bandwidths as compared to reflectarrays with conventional λ/2 cross-dipole elements.", "title": "" }, { "docid": "7b7f1f029e13008b1578c87c7319b645", "text": "This paper presents the design and manufacturing processes of a new piezoactuated XY stage with integrated parallel, decoupled, and stacked kinematics structure for micro-/nanopositioning application. The flexure-based XY stage is composed of two decoupled prismatic-prismatic limbs which are constructed by compound parallelogram flexures and compound bridge-type displacement amplifiers. The two limbs are assembled in a parallel and stacked manner to achieve a compact stage with the merits of parallel kinematics. Analytical models for the mechanical performance assessment of the stage in terms of kinematics, statics, stiffness, load capacity, and dynamics are derived and verified with finite element analysis. A prototype of the XY stage is then fabricated, and its decoupling property is tested. Moreover, the Bouc-Wen hysteresis model of the system is identified by resorting to particle swarm optimization, and a control scheme combining the inverse hysteresis model-based feedforward with feedback control is employed to compensate for the plant nonlinearity and uncertainty. Experimental results reveal that a submicrometer accuracy single-axis motion tracking and biaxial contouring can be achieved by the micropositioning system, which validate the effectiveness of the proposed mechanism and controller designs as well.", "title": "" }, { "docid": "56bd18820903da1917ca5d194b520413", "text": "The problem of identifying subtle time-space clustering of dis ease, as may be occurring in leukemia, is described and reviewed. Published approaches, generally associated with studies of leuke mia, not dependent on knowledge of the underlying population for their validity, are directed towards identifying clustering by establishing a relationship between the temporal and the spatial separations for the n(n —l)/2 possible pairs which can be formed from the n observed cases of disease. Here it is proposed that statistical power can be improved by applying a reciprocal trans form to these separations. While a permutational approach can give valid probability levels for any observed association, for reasons of practicability, it is suggested that the observed associa tion be tested relative to its permutational variance. Formulas and computational procedures for doing so are given. While the distance measures between points represent sym metric relationships subject to mathematical and geometric regu larities, the variance formula developed is appropriate for ar bitrary relationships. Simplified procedures are given for the ease of symmetric and skew-symmetric relationships. The general pro cedure is indicated as being potentially useful in other situations as, for example, the study of interpersonal relationships. Viewing the procedure as a regression approach, the possibility for extend ing it to nonlinear and mult ¡variatesituations is suggested. Other aspects of the problem and of the procedure developed are discussed.", "title": "" }, { "docid": "86d705256c19f63dac90162b33818a9b", "text": "Despite the recent success of deep-learning based semantic segmentation, deploying a pre-trained road scene segmenter to a city whose images are not presented in the training set would not achieve satisfactory performance due to dataset biases. Instead of collecting a large number of annotated images of each city of interest to train or refine the segmenter, we propose an unsupervised learning approach to adapt road scene segmenters across different cities. By utilizing Google Street View and its timemachine feature, we can collect unannotated images for each road scene at different times, so that the associated static-object priors can be extracted accordingly. By advancing a joint global and class-specific domain adversarial learning framework, adaptation of pre-trained segmenters to that city can be achieved without the need of any user annotation or interaction. We show that our method improves the performance of semantic segmentation in multiple cities across continents, while it performs favorably against state-of-the-art approaches requiring annotated training data.", "title": "" }, { "docid": "ce429bbed5895731c9a3a9b77e3f488b", "text": "[Purpose] This study assessed the relationships between the ankle dorsiflexion range of motion and foot and ankle strength. [Subjects and Methods] Twenty-nine healthy (young adults) volunteers participated in this study. Each participant completed tests for ankle dorsiflexion range of motion, hallux flexor strength, and ankle plantar and dorsiflexor strength. [Results] The results showed (1) a moderate correlation between ankle dorsiflexor strength and dorsiflexion range of motion and (2) a moderate correlation between ankle dorsiflexor strength and first toe flexor muscle strength. Ankle dorsiflexor strength is the main contributor ankle dorsiflexion range of motion to and first toe flexor muscle strength. [Conclusion] Ankle dorsiflexion range of motion can play an important role in determining ankle dorsiflexor strength in young adults.", "title": "" }, { "docid": "01a95065526771523795494c9968efb9", "text": "Depression is one of the most common and debilitating psychiatric disorders and is a leading cause of suicide. Most people who become depressed will have multiple episodes, and some depressions are chronic. Persons with bipolar disorder will also have manic or hypomanic episodes. Given the recurrent nature of the disorder, it is important not just to treat the acute episode, but also to protect against its return and the onset of subsequent episodes. Several types of interventions have been shown to be efficacious in treating depression. The antidepressant medications are relatively safe and work for many patients, but there is no evidence that they reduce risk of recurrence once their use is terminated. The different medication classes are roughly comparable in efficacy, although some are easier to tolerate than are others. About half of all patients will respond to a given medication, and many of those who do not will respond to some other agent or to a combination of medications. Electro-convulsive therapy is particularly effective for the most severe and resistant depressions, but raises concerns about possible deleterious effects on memory and cognition. It is rarely used until a number of different medications have been tried. Although it is still unclear whether traditional psychodynamic approaches are effective in treating depression, interpersonal psychotherapy (IPT) has fared well in controlled comparisons with medications and other types of psychotherapies. It also appears to have a delayed effect that improves the quality of social relationships and interpersonal skills. It has been shown to reduce acute distress and to prevent relapse and recurrence so long as it is continued or maintained. Treatment combining IPT with medication retains the quick results of pharmacotherapy and the greater interpersonal breadth of IPT, as well as boosting response in patients who are otherwise more difficult to treat. The main problem is that IPT has only recently entered clinical practice and is not widely available to those in need. Cognitive behavior therapy (CBT) also appears to be efficacious in treating depression, and recent studies suggest that it can work for even severe depressions in the hands of experienced therapists. Not only can CBT relieve acute distress, but it also appears to reduce risk for the return of symptoms as long as it is continued or maintained. Moreover, it appears to have an enduring effect that reduces risk for relapse or recurrence long after treatment is over. Combined treatment with medication and CBT appears to be as efficacious as treatment with medication alone and to retain the enduring effects of CBT. There also are indications that the same strategies used to reduce risk in psychiatric patients following successful treatment can be used to prevent the initial onset of depression in persons at risk. More purely behavioral interventions have been studied less than the cognitive therapies, but have performed well in recent trials and exhibit many of the benefits of cognitive therapy. Mood stabilizers like lithium or the anticonvulsants form the core treatment for bipolar disorder, but there is a growing recognition that the outcomes produced by modern pharmacology are not sufficient. Both IPT and CBT show promise as adjuncts to medication with such patients. The same is true for family-focused therapy, which is designed to reduce interpersonal conflict in the family. Clearly, more needs to be done with respect to treatment of the bipolar disorders. Good medical management of depression can be hard to find, and the empirically supported psychotherapies are still not widely practiced. As a consequence, many patients do not have access to adequate treatment. Moreover, not everyone responds to the existing interventions, and not enough is known about what to do for people who are not helped by treatment. Although great strides have been made over the past few decades, much remains to be done with respect to the treatment of depression and the bipolar disorders.", "title": "" }, { "docid": "e9ea3dd59bb3ab6bd698b44c993a8b0e", "text": "We present an optical flow algorithm for large displacement motions. Most existing optical flow methods use the standard coarse-to-fine framework to deal with large displacement motions which has intrinsic limitations. Instead, we formulate the motion estimation problem as a motion segmentation problem. We use approximate nearest neighbor fields to compute an initial motion field and use a robust algorithm to compute a set of similarity transformations as the motion candidates for segmentation. To account for deviations from similarity transformations, we add local deformations in the segmentation process. We also observe that small objects can be better recovered using translations as the motion candidates. We fuse the motion results obtained under similarity transformations and under translations together before a final refinement. Experimental validation shows that our method can successfully handle large displacement motions. Although we particularly focus on large displacement motions in this work, we make no sacrifice in terms of overall performance. In particular, our method ranks at the top of the Middlebury benchmark.", "title": "" } ]
scidocsrr
2535d1b874c11c3a0ccb1f12bd399abc
A switched inductor multilevel boost converter
[ { "docid": "484bfbb8f0291e06ddbdbb2ae4561d10", "text": "High switching frequency associated with soft commutation techniques is a new trend in switching converters. Following this trend, the authors present a buck pulsewidth modulation converter, where the dc voltage conversion ratio has a quadratic dependence on duty cycle, providing a large step-down. By introducing two resonant networks, soft switching is attained, providing highly efficient operating conditions for a wide load range at high switching frequency. Contrary to most of the converters that apply soft-switching techniques, the switches presented are not subjected to high switch voltage or current stresses and, consequently, present low conduction losses. The authors present, for this converter, the principle of operation, theoretical analysis, relevant equations, and simulation and experimental results.", "title": "" } ]
[ { "docid": "b64c48d4d2820e01490076c1b18cf32b", "text": "The availability of detailed environmental data, together with inexpensive and powerful computers, has fueled a rapid increase in predictive modeling of species environmental requirements and geographic distributions. For some species, detailed presence/absence occurrence data are available, allowing the use of a variety of standard statistical techniques. However, absence data are not available for most species. In this paper, we introduce the use of the maximum entropy method (Maxent) for modeling species geographic distributions with presence-only data. Maxent is a general-purpose machine learning method with a simple and precise mathematical formulation, and it has a number of aspects that make it well-suited for species distribution modeling. In mmals: a diction emaining outline eceiver dicating ts present ues horder to investigate the efficacy of the method, here we perform a continental-scale case study using two Neotropical ma lowland species of sloth, Bradypus variegatus, and a small montane murid rodent, Microryzomys minutus. We compared Maxent predictions with those of a commonly used presence-only modeling method, the Genetic Algorithm for Rule-Set Pre (GARP). We made predictions on 10 random subsets of the occurrence records for both species, and then used the r localities for testing. Both algorithms provided reasonable estimates of the species’ range, far superior to the shaded maps available in field guides. All models were significantly better than random in both binomial tests of omission and r operating characteristic (ROC) analyses. The area under the ROC curve (AUC) was almost always higher for Maxent, in better discrimination of suitable versus unsuitable areas for the species. The Maxent modeling approach can be used in i form for many applications with presence-only datasets, and merits further research and development. © 2005 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "f58801db3709cde9ea45f43856d35b7c", "text": "A method for applying pattern recognition techniques to recognize the identity of a person based on their iris is proposed. Hidden Markov Models are used to parametrically model the local frequencies of the iris. Also discussed is a transform of the iris image from two to one dimensional space and overcoming limited data with the generation of synthetic images.", "title": "" }, { "docid": "e487efba10df1b548d897d95b348bed2", "text": "Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due to rapid development of computer networks and associated infrastructure, and millions of software applications, large and small, addressing all varieties of tasks. Botnets pose a major threat to network security as they are widely used for many Internet crimes such as DDoS attacks, identity theft, email spamming, and click fraud. Botnet based DDoS attacks are catastrophic to the victim network as they can exhaust both network bandwidth and resources of the victim machine. This survey presents a comprehensive overview of DDoS attacks, their causes, types with a taxonomy, and technical details of various attack launching tools. A detailed discussion of several botnet architectures, tools developed using botnet architectures, and pros and cons analysis are also included. Furthermore, a list of important issues and research challenges is also reported.", "title": "" }, { "docid": "455068ecca4db680a8cd65bf127cfc91", "text": "OBJECTIVES\nLoneliness is common among older persons and has been associated with health and mental health risks. This systematic review examines the utility of loneliness interventions among older persons.\n\n\nDATA SOURCE\nThirty-four intervention studies were used. STUDY INCLUSION CRITERIA: The study was conducted between 1996 and 2011, included a sample of older adults, implemented an intervention affecting loneliness or identified a situation that directly affected loneliness, included in its outcome measures the effects of the intervention or situation on loneliness levels or on loneliness-related measures (e.g., social interaction), and included in its analysis pretest-posttest comparisons.\n\n\nDATA EXTRACTION\nStudies were accessed using the databases PsycINFO, MEDLINE, ScienceDirect, AgeLine, PsycBOOKS, and Google Scholar for the years 1996-2011.\n\n\nDATA SYNTHESIS\nInterventions were classified based on population, format, and content and were evaluated for quality of design and efficacy.\n\n\nRESULTS\nTwelve studies were effective in reducing loneliness according to the review criteria, and 15 were evaluated as potentially effective. The findings suggest that it is possible to reduce loneliness by using educational interventions focused on social networks maintenance and enhancement.\n\n\nCONCLUSIONS\nMultiple approaches show promise, although flawed design often prevents proper evaluation of efficacy. The value of specific therapy techniques in reducing loneliness is highlighted and warrants a wider investigation. Studies of special populations, such as the cognitively impaired, are also needed.", "title": "" }, { "docid": "60114bebc1b64a3bfd5dc010a1a4891c", "text": "Attachment anxiety is expected to be positively associated with dependence and self-criticism. However, attachment avoidance is expected to be negatively associated with dependence but positively associated with self-criticism. Both dependence and self-criticism are expected to be related to depressive symptoms. Data were analyzed from 424 undergraduate participants at a large Midwestern university, using structural equation modeling. Results indicated that the relation between attachment anxiety and depressive symptoms was fully mediated by dependence and self-criticism, whereas the relation between attachment avoidance and depressive symptoms was partially mediated by dependence and self-criticism. Moreover, through a multiple-group comparison analysis, the results indicated that men with high levels of attachment avoidance are more likely than women to be self-critical.", "title": "" }, { "docid": "6669f7260e0df11c320ac739433c6b40", "text": "OBJECTIVE\nThis study was conducted to determine the attitudes of university students studying in different fields toward discrimination of the elderly.\n\n\nMETHODS\nThis descriptive study was conducted with students who were still studying in the 2015-2016 period. A sample size of 416 students was determined by the stratified sampling method, and students were selected by simple random sampling. Data were collected using an identifying information form and an Age Discrimination Attitude Scale (ADAS) by face-to-face interview. Statistical analysis was performed using the program SPSS 20.0.\n\n\nRESULTS\nThe mean total ADAS score of students was 67.7±6.0. The total ADAS scores and the scores of male students on limiting the life of the elderly was significantly higher than those of female students (p<0.05).\n\n\nCONCLUSION\nIt was determined that university students studying in different fields have a positive attitude toward the elderly. Action must be taken to remove discrimination of the elderly, and policies must be developed to increase social sensitivity.", "title": "" }, { "docid": "ce863c10e38ca976f0f994b3d1c4f9f1", "text": "Grammatical inference – used successfully in a variety of fields such as pattern recognition, computational biology and natural language processing – is the process of automatically inferring a grammar by examining the sentences of an unknown language. Software engineering can also benefit from grammatical inference. Unlike these other fields, which use grammars as a convenient tool to model naturally occuring patterns, software engineering treats grammars as first-class objects typically created and maintained for a specific purpose by human designers. We introduce the theory of grammatical inference and review the state of the art as it relates to software engineering.", "title": "" }, { "docid": "091279f6b95594f9418591264d0d7e3c", "text": "A great deal of research has focused on algorithms for learning features from unlabeled data. Indeed, much progress has been made on benchmark datasets like NORB and CIFAR by employing increasingly complex unsupervised learning algorithms and deep models. In this paper, however, we show that several simple factors, such as the number of hidden nodes in the model, may be more important to achieving high performance than the learning algorithm or the depth of the model. Specifically, we will apply several offthe-shelf feature learning algorithms (sparse auto-encoders, sparse RBMs, K-means clustering, and Gaussian mixtures) to CIFAR, NORB, and STL datasets using only singlelayer networks. We then present a detailed analysis of the effect of changes in the model setup: the receptive field size, number of hidden nodes (features), the step-size (“stride”) between extracted features, and the effect of whitening. Our results show that large numbers of hidden nodes and dense feature extraction are critical to achieving high performance—so critical, in fact, that when these parameters are pushed to their limits, we achieve state-of-the-art performance on both CIFAR-10 and NORB using only a single layer of features. More surprisingly, our best performance is based on K-means clustering, which is extremely fast, has no hyperparameters to tune beyond the model structure itself, and is very easy to implement. Despite the simplicity of our system, we achieve accuracy beyond all previously published results on the CIFAR-10 and NORB datasets (79.6% and 97.2% respectively). Appearing in Proceedings of the 14 International Conference on Artificial Intelligence and Statistics (AISTATS) 2011, Fort Lauderdale, FL, USA. Volume 15 of JMLR: W&CP 15. Copyright 2011 by the authors.", "title": "" }, { "docid": "bb361bc0ce796ab9435c281720ce2ae1", "text": "Developers typically rely on the information submitted by end-users to resolve bugs. We conducted a survey on information needs and commonly faced problems with bug reporting among several hundred developers and users of the APACHE, ECLIPSE and MOZILLA projects. In this paper, we present the results of a card sort on the 175 comments sent back to us by the responders of the survey. The card sort revealed several hurdles involved in reporting and resolving bugs, which we present in a collection of recommendations for the design of new bug tracking systems. Such systems could provide contextual assistance, reminders to add information, and most important, assistance to collect and report crucial information to developers.", "title": "" }, { "docid": "5c9e4a243ee97eb2b178cdaec44d3add", "text": "A 320-detector-row multislice computed tomography (320-MSCT) scanner can acquire a volume data set covering a maximum range of 16 cm and can generate axial images 0.5-mm thick at 0.5-mm intervals. Three-dimensional (3D) images reconstructed from the thin axial slices include multiplanar reconstruction and 3D-CT. Single-phase 3D images are reconstructed from 0.175-s data, and multiphase 3D images are created in 29 phases at intervals of 0.1 s. Continuous replay of these 3D images produces four-dimensional moving images. In order to determine the feasibility of the morphologic and kinematic analyses of swallowing using 320-MSCT, single-phase volume scanning was performed on three patients and multiphase volume scanning was performed on one healthy volunteer. The single-phase 3D images clearly and accurately showed the structures involved in swallowing, and the multiphase 3D images were able to show the oral stage to the early esophageal stage of swallowing, allowing a kinematic analysis of swallowing. We developed a reclining chair that allows scanning to be performed with the subject in a semisitting position, which makes swallowing evaluation by 320-MSCT applicable not only to research on healthy swallowing but also to the clinical examination of dysphagia patients.", "title": "" }, { "docid": "effbe5c9cd150b01e0659707e72650a9", "text": "Research on grammatical error correction has received considerable attention. For dealing with all types of errors, grammatical error correction methods that employ statistical machine translation (SMT) have been proposed in recent years. An SMT system generates candidates with scores for all candidates and selects the sentence with the highest score as the correction result. However, the 1-best result of an SMT system is not always the best result. Thus, we propose a reranking approach for grammatical error correction. The reranking approach is used to re-score N-best results of the SMT and reorder the results. Our experiments show that our reranking system using parts of speech and syntactic features improves performance and achieves state-of-theart quality, with an F0.5 score of 40.0.", "title": "" }, { "docid": "89d0ffd0b809acafda10a20bd5f35a77", "text": "Microscopic analysis of erythrocytes in urine is a valuable diagnostic tool for identifying glomerular hematuria. Indicative of glomerular hematuria is the presence of erythrocyte casts and polyand dysmorphic erythrocytes. In contrast, in non-glomerular hematuria, urine sediment erythrocytes are monoand isomorphic, and erythrocyte casts are absent (1, 2) . To date, various variant forms of dysmorphic erythrocyte morphology have been defi ned and classifi ed. They are categorized as: D1, D2, and D3 cells (2) . D1 and D2 cells are also referred to as acanthocytes or G1 cells which are mickey mouse-like cells with membrane protrusions and severe (D1) to mild (D2) loss of cytoplasmic color (2) . D3 cells are doughnut-like or other polyand dysmorphic forms that include discocytes, knizocytes, anulocytes, stomatocytes, codocytes, and schizocytes (2, 3) . The cellular morphology of these cells is observed to have mild cytoplasmic loss, and symmetrical shaped membranes free of protrusions. Echinocytes and pseudo-acanthocytes (bite-cells) are not considered to be dysmorphic erythrocytes. Glomerular hematuria is likely if more than 40 % of erythrocytes are dysmorphic or 5 % are D1-D2 cells and nephrologic work-up should be considered (2) . For over 20 years, manual microscopy has been the prevailing technique for examining dysmorphic erythrocytes in urine sediments when glomerular pathology is suspected (4, 5) . This labor-intensive method requires signifi cant expertise and experience to ensure consistent and accurate analysis. A more immediate and defi nitive automated technique that classifi es dysmorphic erythrocytes at least as good as the manual method would be an invaluable asset in the routine clinical laboratory practice. Therefore, the aim of the study was to investigate the use of the Iris Diagnostics automated iQ200 (Instrumentation Laboratory, Brussels, Belgium) as an automated platform for screening of dysmorphic erythrocytes. The iQ200 has proven to be an effi cient and reliable asset for our urinalysis (5) , but has not been used for the quantifi cation of dysmorphic erythrocytes. In total, 207 urine specimens of patients with suspected glomerular pathology were initially examined using manual phase contrast microscopy by two independent experienced laboratory technicians at a university medical center. The same specimens were re-evaluated using the Iris iQ200 instrument at our facility, which is a teaching hospital. The accuracy of the iQ200 was compared to the results of manual microscopy for detecting dysmorphic erythrocytes. Urine samples were processed within 2 h of voiding. Upon receipt, uncentrifuged urine samples were used for strip analysis using the AutionMax Urine Analyzer (Menarini, Valkenswaard, The Netherlands). For analysis of dysmorphic erythrocytes 20 mL urine was fi xed with CellFIX TM (a formaldehyde containing fi xative solution; BD Biosciences, Breda, The Netherlands) at a dilution of 100:1 (6) . One half of fi xed urine was centrifuged at 500 × g for 10 min and the pellet analyzed by two independent experienced technicians using phase-contrast microscopy. The other half was analyzed by automated urine sediment analyzer using the iQ200. The iQ200 uses a fl ow cell that hydrodynamically orients the particles within the focal plane of a microscopic lens coupled to a 1.3 megapixel CCD digital camera. Each particle image is digitized and sent to the instrument processor. For our study, the instrument ’ s cellrecognition function for classifying erythrocytes was used. Although the iQ200 can easily recognize and classify normal erythrocytes it cannot automatically classify dysmorphic erythrocytes. Instead, two independent and experienced technicians review the images in categories ‘ normal erythrocytes ’ and ‘ unclassifi ed ’ and reclassify dysmorphic erythrocytes to a separate ‘ dysmorphic ’ category. To minimize *Corresponding author: Ayşe Y. Demir, MD, PhD, Department of Clinical Chemistry and Haematology, Meander Medical Center Utrechtseweg 160, 3818 ES Amersfoort, The Netherlands Phone: + 31 33 8504344, Fax: + 31 33 8502035 , E-mail: ay.demir@meandermc.nl Received September 20, 2011; accepted November 15, 2011; previously published online December 7, 2011", "title": "" }, { "docid": "e10b5a0363897f6e7cbb128a4d2f7cd7", "text": "We introduce a method to stabilize Generative Adversarial Networks (GANs) by defining the generator objective with respect to an unrolled optimization of the discriminator. This allows training to be adjusted between using the optimal discriminator in the generator’s objective, which is ideal but infeasible in practice, and using the current value of the discriminator, which is often unstable and leads to poor solutions. We show how this technique solves the common problem of mode collapse, stabilizes training of GANs with complex recurrent generators, and increases diversity and coverage of the data distribution by the generator.", "title": "" }, { "docid": "69179341377477af8ebe9013c664828c", "text": "1. Intensive agricultural practices drive biodiversity loss with potentially drastic consequences for ecosystem services. To advance conservation and production goals, agricultural practices should be compatible with biodiversity. Traditional or less intensive systems (i.e. with fewer agrochemicals, less mechanisation, more crop species) such as shaded coffee and cacao agroforests are highlighted for their ability to provide a refuge for biodiversity and may also enhance certain ecosystem functions (i.e. predation). 2. Ants are an important predator group in tropical agroforestry systems. Generally, ant biodiversity declines with coffee and cacao intensification yet the literature lacks a summary of the known mechanisms for ant declines and how this diversity loss may affect the role of ants as predators. 3. Here, how shaded coffee and cacao agroforestry systems protect biodiversity and may preserve related ecosystem functions is discussed in the context of ants as predators. Specifically, the relationships between biodiversity and predation, links between agriculture and conservation, patterns and mechanisms for ant diversity loss with agricultural intensification, importance of ants as control agents of pests and fungal diseases, and whether ant diversity may influence the functional role of ants as predators are addressed. Furthermore, because of the importance of homopteran-tending by ants in the ecological and agricultural literature, as well as to the success of ants as predators, the costs and benefits of promoting ants in agroforests are discussed. 4. Especially where the diversity of ants and other predators is high, as in traditional agroforestry systems, both agroecosystem function and conservation goals will be advanced by biodiversity protection.", "title": "" }, { "docid": "9a1e0edc4d5eb8a2cbf7fa0c6640f0bc", "text": "The classical SVM is an optimization problem minimizing the hinge losses of mis-classified samples with the regularization term. When the sample size is small or data has noise, it is possible that the classifier obtained with training data may not generalize well to population, since the samples may not accurately represent the true population distribution. We propose a distributionally-robust framework for Support Vector Machines (DR-SVMs). We build an ambiguity set for the population distribution based on samples using the Kantorovich metric. DR-SVMs search the classifier that minimizes the sum of regularization term and the hinge loss function for the worst-case population distribution among the ambiguity set. We provide semi-infinite programming formulation of the DR-SVMs and propose a cutting-plane algorithm to solve the problem. Computational results on simulated data and real data from University of California, Irvine Machine Learning Repository show that the DR-SVMs outperform the SVMs in terms of the Area Under Curve (AUC) measures on several test problems.", "title": "" }, { "docid": "4f6979ca99ec7fb0010fd102e7796248", "text": "Cryptographic systems are essential for computer and communication security, for instance, RSA is used in PGP Email clients and AES is employed in full disk encryption. In practice, the cryptographic keys are loaded and stored in RAM as plain-text, and therefore vulnerable to physical memory attacks (e.g., cold-boot attacks). To tackle this problem, we propose Copker, which implements asymmetric cryptosystems entirely within the CPU, without storing plain-text private keys in the RAM. In its active mode, Copker stores kilobytes of sensitive data, including the private key and the intermediate states, only in onchip CPU caches (and registers). Decryption/signing operations are performed without storing sensitive information in system memory. In the suspend mode, Copker stores symmetrically encrypted private keys in memory, while employs existing solutions to keep the key-encryption key securely in CPU registers. Hence, Copker releases the system resources in the suspend mode. In this paper, we implement Copker with the most common asymmetric cryptosystem, RSA, with the support of multiple private keys. We show that Copker provides decryption/signing services that are secure against physical memory attacks. Meanwhile, with intensive experiments, we demonstrate that our implementation of Copker is secure and requires reasonable overhead. Keywords—Cache-as-RAM; cold-boot attack; key management; asymmetric cryptography implementation.", "title": "" }, { "docid": "685e6338727b4ab899cffe2bbc1a20fc", "text": "Existing code similarity comparison methods, whether source or binary code based, are mostly not resilient to obfuscations. In the case of software plagiarism, emerging obfuscation techniques have made automated detection increasingly difficult. In this paper, we propose a binary-oriented, obfuscation-resilient method based on a new concept, longest common subsequence of semantically equivalent basic blocks, which combines rigorous program semantics with longest common subsequence based fuzzy matching. We model the semantics of a basic block by a set of symbolic formulas representing the input-output relations of the block. This way, the semantics equivalence (and similarity) of two blocks can be checked by a theorem prover. We then model the semantics similarity of two paths using the longest common subsequence with basic blocks as elements. This novel combination has resulted in strong resiliency to code obfuscation. We have developed a prototype and our experimental results show that our method is effective and practical when applied to real-world software.", "title": "" }, { "docid": "b8032e13156e0168e2c5850cdf452e5b", "text": "We observe that end-to-end memory networks (MN) trained for task-oriented dialogue, such as for recommending restaurants to a user, suffer from an out-ofvocabulary (OOV) problem – the entities returned by the Knowledge Base (KB) may not be seen by the network at training time, making it impossible for it to use them in dialogue. We propose a Hierarchical Pointer Memory Network (HyP-MN), in which the next word may be generated from the decode vocabulary or copied from a hierarchical memory maintaining KB results and previous utterances. Evaluating over the dialog bAbI tasks, we find that HyP-MN drastically outperforms MN obtaining 12% overall accuracy gains. Further analysis reveals that MN fails completely in recommending any relevant restaurant, whereas HyP-MN recommends the best next restaurant 80% of the time.", "title": "" }, { "docid": "0ed8212399f2e93017fde1c5819acb61", "text": "This study examines the acceptance of technology and behavioral intention to use learning management systems (LMS). In specific, the aim of the research reported in this paper is to examine whether students ultimately accept LMSs such as eClass and the impact of behavioral intention on their decision to use them. An extended version of technology acceptance model has been proposed and used by employing one of the most reliable measures of perceived eased of use, the System Usability Scale. 345 university students participated in the study. The data analysis was based on partial least squares method. The majority of the research hypotheses were confirmed. In particular, social norm, system access and self-efficacy were found to significantly affect behavioral intention to use. As a result, it is suggested that e-learning developers and stakeholders should focus on these factors to increase acceptance and effectiveness of learning management systems.", "title": "" }, { "docid": "b1dd830adf87c283ff58630eade75b3c", "text": "Self-control is a central function of the self and an important key to success in life. The exertion of self-control appears to depend on a limited resource. Just as a muscle gets tired from exertion, acts of self-control cause short-term impairments (ego depletion) in subsequent self-control, even on unrelated tasks. Research has supported the strength model in the domains of eating, drinking, spending, sexuality, intelligent thought, making choices, and interpersonal behavior. Motivational or framing factors can temporarily block the deleterious effects of being in a state of ego depletion. Blood glucose is an important component of the energy. KEYWORDS—self-control; ego depletion; willpower; impulse; strength Every day, people resist impulses to go back to sleep, to eat fattening or forbidden foods, to say or do hurtful things to their relationship partners, to play instead of work, to engage in inappropriate sexual or violent acts, and to do countless other sorts of problematic behaviors—that is, ones that might feel good immediately or be easy but that carry long-term costs or violate the rules and guidelines of proper behavior. What enables the human animal to follow rules and norms prescribed by society and to resist doing what it selfishly wants? Self-control refers to the capacity for altering one’s own responses, especially to bring them into line with standards such as ideals, values, morals, and social expectations, and to support the pursuit of long-term goals. Many writers use the terms selfcontrol and self-regulation interchangeably, but those whomake a distinction typically consider self-control to be the deliberate, conscious, effortful subset of self-regulation. In contrast, homeostatic processes such as maintaining a constant body temperature may be called self-regulation but not self-control. Self-control enables a person to restrain or override one response, thereby making a different response possible. Self-control has attracted increasing attention from psychologists for two main reasons. At the theoretical level, self-control holds important keys to understanding the nature and functions of the self. Meanwhile, the practical applications of self-control have attracted study in many contexts. Inadequate self-control has been linked to behavioral and impulse-control problems, including overeating, alcohol and drug abuse, crime and violence, overspending, sexually impulsive behavior, unwanted pregnancy, and smoking (e.g., Baumeister, Heatherton, & Tice, 1994; Gottfredson & Hirschi, 1990; Tangney, Baumeister, & Boone, 2004; Vohs & Faber, 2007). It may also be linked to emotional problems, school underachievement, lack of persistence, various failures at task performance, relationship problems and dissolution, and more.", "title": "" } ]
scidocsrr
0677c5968c3e97d00c7b64b5465f9a0a
SDN and OpenFlow Evolution: A Standards Perspective
[ { "docid": "e93c5395f350d44b59f549a29e65d75c", "text": "Software Defined Networking (SDN) is an exciting technology that enables innovation in how we design and manage networks. Although this technology seems to have appeared suddenly, SDN is part of a long history of efforts to make computer networks more programmable. In this paper, we trace the intellectual history of programmable networks, including active networks, early efforts to separate the control and data plane, and more recent work on OpenFlow and network operating systems. We highlight key concepts, as well as the technology pushes and application pulls that spurred each innovation. Along the way, we debunk common myths and misconceptions about the technologies and clarify the relationship between SDN and related technologies such as network virtualization.", "title": "" } ]
[ { "docid": "056d7d639d91636b382860a3df08d0dd", "text": "This paper describes a novel monolithic low voltage (1-V) CMOS RF front-end architecture with an integrated quadrature coupler (QC) and two subharmonic mixers for direct-down conversion. The LC-folded-cascode technique is adopted to achieve low-voltage operation while the subharmonic mixers in conjunction with the QC are used to eliminate LO self-mixing. In addition, the inherent bandpass characteristic of the LC tanks helps suppression of LO leakage at RF port. The circuit was fabricated in a standard 0.18-mum CMOS process for 5-6 GHz applications. At 5.4 GHz, the RF front-end exhibits a voltage gain of 26.2 dB and a noise figure of 5.2 dB while dissipating 45.5 mW from a 1.0-V supply. The achieved input-referred DC-offset due to LO self-mixing is below -110.7 dBm.", "title": "" }, { "docid": "57fa4164381d9d9691b9ba5c506addbd", "text": "The aim of this study was to evaluate the acute effects of unilateral ankle plantar flexors static-stretching (SS) on the passive range of movement (ROM) of the stretched limb, surface electromyography (sEMG) and single-leg bounce drop jump (SBDJ) performance measures of the ipsilateral stretched and contralateral non-stretched lower limbs. Seventeen young men (24 ± 5 years) performed SBDJ before and after (stretched limb: immediately post-stretch, 10 and 20 minutes and non-stretched limb: immediately post-stretch) unilateral ankle plantar flexor SS (6 sets of 45s/15s, 70-90% point of discomfort). SBDJ performance measures included jump height, impulse, time to reach peak force, contact time as well as the sEMG integral (IEMG) and pre-activation (IEMGpre-activation) of the gastrocnemius lateralis. Ankle dorsiflexion passive ROM increased in the stretched limb after the SS (pre-test: 21 ± 4° and post-test: 26.5 ± 5°, p < 0.001). Post-stretching decreases were observed with peak force (p = 0.029), IEMG (P<0.001), and IEMGpre-activation (p = 0.015) in the stretched limb; as well as impulse (p = 0.03), and jump height (p = 0.032) in the non-stretched limb. In conclusion, SS effectively increased passive ankle ROM of the stretched limb, and transiently (less than 10 minutes) decreased muscle peak force and pre-activation. The decrease of jump height and impulse for the non-stretched limb suggests a SS-induced central nervous system inhibitory effect. Key pointsWhen considering whether or not to SS prior to athletic activities, one must consider the potential positive effects of increased ankle dorsiflexion motion with the potential deleterious effects of power and muscle activity during a simple jumping task or as part of the rehabilitation process.Since decreased jump performance measures can persist for 10 minutes in the stretched leg, the timing of SS prior to performance must be taken into consideration.Athletes, fitness enthusiasts and therapists should also keep in mind that SS one limb has generalized effects upon contralateral limbs as well.", "title": "" }, { "docid": "7ca863355d1fb9e4954c360c810ece53", "text": "The detection of community structure is a widely accepted means of investigating the principles governing biological systems. Recent efforts are exploring ways in which multiple data sources can be integrated to generate a more comprehensive model of cellular interactions, leading to the detection of more biologically relevant communities. In this work, we propose a mathematical programming model to cluster multiplex biological networks, i.e. multiple network slices, each with a different interaction type, to determine a single representative partition of composite communities. Our method, known as SimMod, is evaluated through its application to yeast networks of physical, genetic and co-expression interactions. A comparative analysis involving partitions of the individual networks, partitions of aggregated networks and partitions generated by similar methods from the literature highlights the ability of SimMod to identify functionally enriched modules. It is further shown that SimMod offers enhanced results when compared to existing approaches without the need to train on known cellular interactions.", "title": "" }, { "docid": "1594afac3fe296478bd2a0c5a6ca0bb4", "text": "Executive Summary The market turmoil of 2008 highlighted the importance of risk management to investors in the UK and worldwide. Realized risk levels and risk forecasts from the Barra Europe Equity Model (EUE2L) are both currently at the highest level for the last two decades. According to portfolio theory, institutional investors can gain significant risk-reduction and return-enhancement benefits from venturing out of their domestic markets. These effects from international diversification are due to imperfect correlations among markets. In this paper, we explore the historical diversification effects of an international allocation for UK investors. We illustrate that investing only in the UK market can be considered an active deviation from a global benchmark. Although a domestic allocation to UK large-cap stocks has significant international exposure when revenue sources are taken into account, as an active deviation from a global benchmark a UK domestic strategy has high concentration, leading to high asset-specific risk, and significant style and industry tilts. We show that an international allocation resulted in higher returns and lower risk for a UK investor in the last one, three, five, and ten years. In GBP terms, the MSCI All Country World Investable Market Index (ACWI IMI) — a global index that could be viewed as a proxy for a global portfolio — achieved higher return and lower risk compared to the MSCI UK Index during these periods. A developed market minimum-variance portfolio, represented by the MSCI World Minimum Volatility Index, 1 The market turmoil of 2008 highlighted the importance of risk management to investors in the UK and worldwide. Figure 1 illustrates that the historical standard deviation of the MSCI UK Index is now near the highest level in recent history. The risk forecast for the index, obtained using the Barra Europe Equity Model, typically showed still better risk and return performance during these periods. The decreases in risk represented by allocations to MSCI ACWI IMI and the MSCI World Minimum Volatility Index were robust based on four different measures of portfolio risk. We also consider a stepwise approach to international diversification, sequentially adding small cap and international assets to a large cap UK portfolio. We show that this approach also reduced risk during the observed period, but we did not find evidence that it was more efficient for risk reduction than a passive allocation to MSCI ACWI IMI.", "title": "" }, { "docid": "8147143579de86a5eeb668037c2b8c5d", "text": "In this paper we propose that the conventional dichotomy between exemplar-based and prototype-based models of concept learning is helpfully viewed as an instance of what is known in the statistical learning literature as the bias/variance tradeoff. The bias/variance tradeoff can be thought of as a sliding scale that modulates how closely any learning procedure adheres to its training data. At one end of the scale (high variance), models can entertain very complex hypotheses, allowing them to fit a wide variety of data very closely--but as a result can generalize poorly, a phenomenon called overfitting. At the other end of the scale (high bias), models make relatively simple and inflexible assumptions, and as a result may fit the data poorly, called underfitting. Exemplar and prototype models of category formation are at opposite ends of this scale: prototype models are highly biased, in that they assume a simple, standard conceptual form (the prototype), while exemplar models have very little bias but high variance, allowing them to fit virtually any combination of training data. We investigated human learners' position on this spectrum by confronting them with category structures at variable levels of intrinsic complexity, ranging from simple prototype-like categories to much more complex multimodal ones. The results show that human learners adopt an intermediate point on the bias/variance continuum, inconsistent with either of the poles occupied by most conventional approaches. We present a simple model that adjusts (regularizes) the complexity of its hypotheses in order to suit the training data, which fits the experimental data better than representative exemplar and prototype models.", "title": "" }, { "docid": "e4d10b57a9ddb304263abd869c1a79d9", "text": "rrrmrrxvivt This research explores the effectiveness of interactive advertising on a new medium platform. Like the presence in industry and the media themselves, the academic research stream is fairly new. Our research seeks to isolate the key feature of interactivity from confounding factors and to begin to tease apart those situations for which interactivity might be highly desirable from those situations for which traditional advertising vehicles may be sufficient or superior. We find that the traditional linear advertising format of conventional ads is actually better than interactive advertising for certain kinds of consumers and for certain kinds of ads. In particular, we find that a cognitive “matching” of the system properties (being predominately visual or verbal) and the consumer segment needs (preferring their information to be presented in a visual or verbal manner) appears to be critical. More research should be conducted before substantial expenditures are devoted to advertising on these interactive media. These new means of communicating with customers are indeed exciting, but they must be demonstrated to be effective on consumer engagement and persuasion. INTERACTIVE MARKETING SYSTEMS are enjoying explosive growth, giving firms a plethora of ways of contacting consumers (e.g., kiosks, Web pages, home computers). In these interactive systems, a customer controls the content of the interaction, requesting or giving information, at the attributelevel (e.g., a PC’s RAM and MHz) or in terms of benefits (e.g., a PC’s capability and speed). A customer can control the presentation order of the information, and unwanted options may be deleted. The consumer may request that the information sought be presented in comparative table format, in video, audio, pictorial format, or in standard text. Increasingly, customers can also order products using the interactive system. These new media are no fad, and while they are only in the infancy of their development, they are already changing the marketplace (cf. Hoffman and Novak, 1996). The hallmark of all of these new media is their irlteuactivity-the consumer and the manufacturer enter into dialogue in a way not previously possible. Interactive marketing, as defined in this paper, is: “the immediately iterative process by which customer needs and desires are uncovered, met, modified, and satisfied by the providing firm.” Interactivity iterates between the firm and the customer, eliciting information from both parties, and attempting to align interests and possibilities. The iterations occur over some duration, allowing the firm to build databases that provide subsequent purchase opportunities tailored to the consumer (Blattberg and Deighton, 1991). The consumer’s input allows subsequent information to be customized to pertinent interests and bars irrelevant communications, thereby enhancing both the consumer experience and the efficiency of the firm’s advertising and marketing dollar. As exciting as these new interactive media appear to be, little is actually known about their effect on consumers’ consideration of the advertised products. As Berthon, Pitt, and Watson (1996) state, “advertising and marketing practitioners, and academics are by now aware that more systematic research is required to reveal the true nature of commerce on the Web” or for interactive systems more generally. Our research is intended to address this need, and more specifically to focus on the effects of interactivity. We investigate interactive marketing in terms of its performance in persuading consumers to buy the advertised products. We wish to begin to understand whether interactive methods are truly superior to standard advertising formats as the excitement about the new media would suggest. Alternatively, perhaps there are some circumstances for which traditional advertising is more effective. Certainly it would not be desirable to channel the majority of one’s advertising resources toward interactive media until they are demonstrated to be superior persuasion vehicles. To this end we present an experimental study comparing consumer reactions to products advertised through an interactive medium with re-", "title": "" }, { "docid": "5a44a37f5ae6e485a4096861f53f6245", "text": "The goal of the paper is to show that some types of L evy processes such as the hyperbolic motion and the CGMY are particularly suitable for asset price modelling and option pricing. We wish to review some fundamental mathematic properties of L evy distributions, such as the one of infinite divisibility, and how they translate observed features of asset price returns. We explain how these processes are related to Brownian motion, the central process in finance, through stochastic time changes which can in turn be interpreted as a measure of the economic activity. Lastly, we focus on two particular classes of pure jump L evy processes, the generalized hyperbolic model and the CGMY models, and report on the goodness of fit obtained both on stock prices and option prices. 2002 Published by Elsevier Science B.V. JEL classification: G12; G13", "title": "" }, { "docid": "6933e944e88307c85f0b398b5abbb48f", "text": "The main problem in many model-building situations is to choose from a large set of covariates those that should be included in the \"best\" model. A decision to keep a variable in the model might be based on the clinical or statistical significance. There are several variable selection algorithms in existence. Those methods are mechanical and as such carry some limitations. Hosmer and Lemeshow describe a purposeful selection of covariates within which an analyst makes a variable selection decision at each step of the modeling process. In this paper we introduce an algorithm which automates that process. We conduct a simulation study to compare the performance of this algorithm with three well documented variable selection procedures in SAS PROC LOGISTIC: FORWARD, BACKWARD, and STEPWISE. We show that the advantage of this approach is when the analyst is interested in risk factor modeling and not just prediction. In addition to significant covariates, this variable selection procedure has the capability of retaining important confounding variables, resulting potentially in a slightly richer model. Application of the macro is further illustrated with the Hosmer and Lemeshow Worchester Heart Attack Study (WHAS) data. If an analyst is in need of an algorithm that will help guide the retention of significant covariates as well as confounding ones they should consider this macro as an alternative tool.", "title": "" }, { "docid": "dfcc6b34f008e4ea9d560b5da4826f4d", "text": "The paper describes a Chinese shadow play animation system based on Kinect. Users, without any professional training, can personally manipulate the shadow characters to finish a shadow play performance by their body actions and get a shadow play video through giving the record command to our system if they want. In our system, Kinect is responsible for capturing human movement and voice commands data. Gesture recognition module is used to control the change of the shadow play scenes. After packaging the data from Kinect and the recognition result from gesture recognition module, VRPN transmits them to the server-side. At last, the server-side uses the information to control the motion of shadow characters and video recording. This system not only achieves human-computer interaction, but also realizes the interaction between people. It brings an entertaining experience to users and easy to operate for all ages. Even more important is that the application background of Chinese shadow play embodies the protection of the art of shadow play animation. Keywords—Gesture recognition, Kinect, shadow play animation, VRPN.", "title": "" }, { "docid": "8582c4a040e4dec8fd141b00eaa45898", "text": "Emerging airborne networks require domainspecific routing protocols to cope with the challenges faced by the highly-dynamic aeronautical environment. We present an ns-3 based performance comparison of the AeroRP protocol with conventional MANET routing protocols. To simulate a highly-dynamic airborne network, accurate mobility models are needed for the physical movement of nodes. The fundamental problem with many synthetic mobility models is their random, memoryless behavior. Airborne ad hoc networks require a flexible memory-based 3-dimensional mobility model. Therefore, we have implemented a 3-dimensional Gauss-Markov mobility model in ns-3 that appears to be more realistic than memoryless models such as random waypoint and random walk. Using this model, we are able to simulate the airborne networking environment with greater realism than was previously possible and show that AeroRP has several advantages over other MANET routing protocols.", "title": "" }, { "docid": "cde6d84d22ca9d8cd851f3067bc9b41e", "text": "The purpose of the present study was to examine the reciprocal relationships between authenticity and measures of life satisfaction and distress using a 2-wave panel study design. Data were collected from 232 college students attending 2 public universities. Structural equation modeling was used to analyze the data. The results of the cross-lagged panel analysis indicated that after controlling for temporal stability, initial authenticity (Time 1) predicted later distress and life satisfaction (Time 2). Specifically, higher levels of authenticity at Time 1 were associated with increased life satisfaction and decreased distress at Time 2. Neither distress nor life satisfaction at Time 1 significantly predicted authenticity at Time 2. However, the relationship between Time 1 distress and Time 2 authenticity was not significantly different from the relationship between Time 1 authenticity and Time 2 distress. Results are discussed in light of humanistic-existential theories and the empirical research on well-being.", "title": "" }, { "docid": "59786d8ea951639b8b9a4e60c9d43a06", "text": "Compressed sensing is a technique to sample compressible signals below the Nyquist rate, whilst still allowing near optimal reconstruction of the signal. In this paper we present a theoretical analysis of the iterative hard thresholding algorithm when applied to the compressed sensing recovery problem. We show that the algorithm has the following properties (made more precise in the main text of the paper) • It gives near-optimal error guarantees. • It is robust to observation noise. • It succeeds with a minimum number of observations. • It can be used with any sampling operator for which the operator and its adjoint can be computed. • The memory requirement is linear in the problem size. Preprint submitted to Elsevier 28 January 2009 • Its computational complexity per iteration is of the same order as the application of the measurement operator or its adjoint. • It requires a fixed number of iterations depending only on the logarithm of a form of signal to noise ratio of the signal. • Its performance guarantees are uniform in that they only depend on properties of the sampling operator and signal sparsity.", "title": "" }, { "docid": "6c1d7a70d0fa21222a0d1046eee128c7", "text": "A BSTRACT Background Goal-directed therapy has been used for severe sepsis and septic shock in the intensive care unit. This approach involves adjustments of cardiac preload, afterload, and contractility to balance oxygen delivery with oxygen demand. The purpose of this study was to evaluate the efficacy of early goal-directed therapy before admission to the intensive care unit. Methods We randomly assigned patients who arrived at an urban emergency department with severe sepsis or septic shock to receive either six hours of early goal-directed therapy or standard therapy (as a control) before admission to the intensive care unit. Clinicians who subsequently assumed the care of the patients were blinded to the treatment assignment. In-hospital mortality (the primary efficacy outcome), end points with respect to resuscitation, and Acute Physiology and Chronic Health Evaluation (APACHE II) scores were obtained serially for 72 hours and compared between the study groups. Results Of the 263 enrolled patients, 130 were randomly assigned to early goal-directed therapy and 133 to standard therapy; there were no significant differences between the groups with respect to base-line characteristics. In-hospital mortality was 30.5 percent in the group assigned to early goal-directed therapy, as compared with 46.5 percent in the group assigned to standard therapy (P=0.009). During the interval from 7 to 72 hours, the patients assigned to early goaldirected therapy had a significantly higher mean (±SD) central venous oxygen saturation (70.4±10.7 percent vs. 65.3±11.4 percent), a lower lactate concentration (3.0±4.4 vs. 3.9±4.4 mmol per liter), a lower base deficit (2.0±6.6 vs. 5.1±6.7 mmol per liter), and a higher pH (7.40±0.12 vs. 7.36±0.12) than the patients assigned to standard therapy (P«0.02 for all comparisons). During the same period, mean APACHE II scores were significantly lower, indicating less severe organ dysfunction, in the patients assigned to early goal-directed therapy than in those assigned to standard therapy (13.0±6.3 vs. 15.9±6.4, P<0.001). Conclusions Early goal-directed therapy provides significant benefits with respect to outcome in patients with severe sepsis and septic shock. (N Engl J Med 2001;345:1368-77.)", "title": "" }, { "docid": "0c70966c4dbe41458f7ec9692c566c1f", "text": "By 2012 the U.S. military had increased its investment in research and production of unmanned aerial vehicles (UAVs) from $2.3 billion in 2008 to $4.2 billion [1]. Currently UAVs are used for a wide range of missions such as border surveillance, reconnaissance, transportation and armed attacks. UAVs are presumed to provide their services at any time, be reliable, automated and autonomous. Based on these presumptions, governmental and military leaders expect UAVs to improve national security through surveillance or combat missions. To fulfill their missions, UAVs need to collect and process data. Therefore, UAVs may store a wide range of information from troop movements to environmental data and strategic operations. The amount and kind of information enclosed make UAVs an extremely interesting target for espionage and endangers UAVs of theft, manipulation and attacks. Events such as the loss of an RQ-170 Sentinel to Iranian military forces on 4th December 2011 [2] or the “keylogging” virus that infected an U.S. UAV fleet at Creech Air Force Base in Nevada in September 2011 [3] show that the efforts of the past to identify risks and harden UAVs are insufficient. Due to the increasing governmental and military reliance on UAVs to protect national security, the necessity of a methodical and reliable analysis of the technical vulnerabilities becomes apparent. We investigated recent attacks and developed a scheme for the risk assessment of UAVs based on the provided services and communication infrastructures. We provide a first approach to an UAV specific risk assessment and take into account the factors exposure, communication systems, storage media, sensor systems and fault handling mechanisms. We used this approach to assess the risk of some currently used UAVs: The “MQ-9 Reaper” and the “AR Drone”. A risk analysis of the “RQ-170 Sentinel” is discussed.", "title": "" }, { "docid": "b1b18ffff0f9efdef25dd15099139b7e", "text": "This paper presents a fast and accurate alignment method for polyphonic symbolic music signals. It is known that to accurately align piano performances, methods using the voice structure are needed. However, such methods typically have high computational cost and they are applicable only when prior voice information is given. It is pointed out that alignment errors are typically accompanied by performance errors in the aligned signal. This suggests the possibility of correcting (or realigning) preliminary results by a fast (but not-so-accurate) alignment method with a refined method applied to limited segments of aligned signals, to save the computational cost. To realise this, we develop a method for detecting performance errors and a realignment method that works fast and accurately in local regions around performance errors. To remove the dependence on prior voice information, voice separation is performed to the reference signal in the local regions. By applying our method to results obtained by previously proposed hidden Markov models, the highest accuracies are achieved with short computation time. Our source code is published in the accompanying web page, together with a user interface to examine and correct alignment results.", "title": "" }, { "docid": "c2fb88df12e97e8475bb923063c8a46e", "text": "This paper addresses the job shop scheduling problem in the presence of machine breakdowns. In this work, we propose to exploit the advantages of data mining techniques to resolve the problem. We proposed an approach to discover a set of classification rules by using historic scheduling data. Intelligent decisions are then made in real time based on this constructed rules to assign the corresponding dispatching rule in a dynamic job shop scheduling environment. A simulation study is conducted at last with the constructed rules and four other dispatching rules from literature. The experimental results verify the performance of classification rule for minimizing mean tardiness.", "title": "" }, { "docid": "7edb8a803734f4eb9418b8c34b1bf07c", "text": "Building automation systems (BAS) provide automatic control of the conditions of indoor environments. The historical root and still core domain of BAS is the automation of heating, ventilation and air-conditioning systems in large functional buildings. Their primary goal is to realize significant savings in energy and reduce cost. Yet the reach of BAS has extended to include information from all kinds of building systems, working toward the goal of \"intelligent buildings\". Since these systems are diverse by tradition, integration issues are of particular importance. When compared with the field of industrial automation, building automation exhibits specific, differing characteristics. The present paper introduces the task of building automation and the systems and communications infrastructure necessary to address it. Basic requirements are covered as well as standard application models and typical services. An overview of relevant standards is given, including BACnet, LonWorks and EIB/KNX as open systems of key significance in the building automation domain.", "title": "" }, { "docid": "21f6a18e34579ae482c93c3476828729", "text": "A low power highly sensitive Thoracic Impedance Variance (TIV) and Electrocardiogram (ECG) monitoring SoC is designed and implemented into a poultice-like plaster sensor for wearable cardiac monitoring. 0.1 Ω TIV detection is possible with a sensitivity of 3.17 V/Ω and SNR > 40 dB. This is achieved with the help of a high quality (Q-factor > 30) balanced sinusoidal current source and low noise reconfigurable readout electronics. A cm-range 13.56 MHz fabric inductor coupling is adopted to start/stop the SoC remotely. Moreover, a 5% duty-cycled Body Channel Communication (BCC) is exploited for 0.2 nJ/b 1 Mbps energy efficient external data communication. The proposed SoC occupies 5 mm × 5 mm including pads in a standard 0.18 μm 1P6M CMOS technology. It dissipates a peak power of 3.9 mW when operating in body channel receiver mode, and consumes 2.4 mW when operating in TIV and ECG detection mode. The SoC is integrated on a 15 cm × 15 cm fabric circuit board together with a flexible battery to form a compact wearable sensor. With 25 adhesive screen-printed fabric electrodes, detection of TIV and ECG at 16 different sites of the heart is possible, allowing optimal detection sites to be configured to accommodate different user dependencies.", "title": "" } ]
scidocsrr
441a8cccfe1b05140b8bed527e8a2359
Building a Recommender Agent for e-Learning Systems
[ { "docid": "323113ab2bed4b8012f3a6df5aae63be", "text": "Clustering data generally involves some input parameters or heuristics that are usually unknown at the time they are needed. We discuss the general problem of parameters in clustering and present a new approach, TURN, based on boundary detection and apply it to the clustering of web log data. We also present the use of di erent lters on the web log data to focus the clustering results and discuss di erent coeÆcients for de ning similarity in a non-Euclidean space.", "title": "" } ]
[ { "docid": "d297360f609e4b03c9d70fda7cc04123", "text": "This paper describes an FPGA implementation of a single-precision floating-point multiply-accumulator (FPMAC) that supports single-cycle accumulation while maintaining high clock frequencies. A non-traditional internal representation reduces the cost of mantissa alignment within the accumulator. The FPMAC is evaluated on an Altera Stratix III FPGA.", "title": "" }, { "docid": "35981768a2a46c2dd9d52ebbd5b63750", "text": "A vehicle detection and classification system has been developed based on a low-cost triaxial anisotropic magnetoresistive sensor. Considering the characteristics of vehicle magnetic detection signals, especially the signals for low-speed congested traffic in large cities, a novel fixed threshold state machine algorithm based on signal variance is proposed to detect vehicles within a single lane and segment the vehicle signals effectively according to the time information of vehicles entering and leaving the sensor monitoring area. In our experiments, five signal features are extracted, including the signal duration, signal energy, average energy of the signal, ratio of positive and negative energy of x-axis signal, and ratio of positive and negative energy of y-axis signal. Furthermore, the detected vehicles are classified into motorcycles, two-box cars, saloon cars, buses, and Sport Utility Vehicle commercial vehicles based on a classification tree model. The experimental results have shown that the detection accuracy of the proposed algorithm can reach up to 99.05% and the average classification accuracy is 93.66%, which verify the effectiveness of our algorithm for low-speed congested traffic.", "title": "" }, { "docid": "176cf87aa657a5066a02bfb650532070", "text": "Structural Design of Reinforced Concrete Tall Buildings Author: Ali Sherif S. Rizk, Director, Dar al-Handasah Shair & Partners Subject: Structural Engineering", "title": "" }, { "docid": "02c687cbe7961f082c60fad1cc3f3f80", "text": "The simplicity of Transpose Jacobian (TJ) control is a significant characteristic of this algorithm for controlling robotic manipulators. Nevertheless, a poor performance may result in tracking of fast trajectories, since it is not dynamics-based. Use of high gains can deteriorate performance seriously in the presence of feedback measurement noise. Another drawback is that there is no prescribed method of selecting its control gains. In this paper, based on feedback linearization approach a Modified TJ (MTJ) algorithm is presented which employs stored data of the control command in the previous time step, as a learning tool to yield improved performance. The gains of this new algorithm can be selected systematically, and do not need to be large, hence the noise rejection characteristics of the algorithm are improved. Based on Lyapunov’s theorems, it is shown that both the standard and the MTJ algorithms are asymptotically stable. Analysis of the required computational effort reveals the efficiency of the proposed MTJ law compared to the Model-based algorithms. Simulation results are presented which compare tracking performance of the MTJ algorithm to that of the TJ and Model-Based algorithms in various tasks. Results of these simulations show that performance of the new MTJ algorithm is comparable to that of Computed Torque algorithms, without requiring a priori knowledge of plant dynamics, and with reduced computational burden. Therefore, the proposed algorithm is well suited to most industrial applications where simple efficient algorithms are more appropriate than complicated theoretical ones with massive computational burden. 2007 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "b22137cbb14396f1dcd24b2a15b02508", "text": "This paper studies the self-alignment properties between two chips that are stacked on top of each other with copper pillars micro-bumps. The chips feature alignment marks used for measuring the resulting offset after assembly. The accuracy of the alignment is found to be better than 0.5 µm in × and y directions, depending on the process. The chips also feature waveguides and vertical grating couplers (VGC) fabricated in the front-end-of-line (FEOL) and organized in order to realize an optical interconnection between the chips. The coupling of light between the chips is measured and compared to numerical simulation. This high accuracy self-alignment was obtained after studying the impact of flux and fluxless treatments on the wetting of the pads and the successful assembly yield. The composition of the bump surface was analyzed with Time-of-Flight Secondary Ions Mass Spectroscopy (ToF-SIMS) in order to understand the impact of each treatment. This study confirms that copper pillars micro-bumps can be used to self-align photonic integrated circuits (PIC) with another die (for example a microlens array) in order to achieve high throughput alignment of optical fiber to the PIC.", "title": "" }, { "docid": "e4007c7e6a80006238e1211a213e391b", "text": "Various techniques for multiprogramming parallel multiprocessor systems have been proposed recently as a way to improve performance. A natural approach is to divide the set of processing elements into independent partitions, and simultaneously execute a diierent parallel program in each partition. Several issues arise, including the determination of the optimal number of programs allowed to execute simultaneously (i.e., the number of partitions) and the corresponding partition sizes. This can be done statically, dynamically, or adaptively, depending on the system and workload characteristics. In this paper several adaptive partitioning policies are evaluated. Their behavior, as well as the behavior of static policies, is investigated using real parallel programs. The policy applicability to actual systems is addressed, and implementation results of the proposed policies on an iPSC/2 hypercube system are reported. The concept of robustness (i.e., the ability to perform well on a wide range of workload types over a wide range of arrival rates) is presented and quantiied. Relative rankings of the policies are obtained, depending on the speciic work-load characteristics. A trade-oo is shown between potential performance and the amount of knowledge of the workload characteristics required to select the best policy. A policy that performs best when such knowledge of workload parallelism and/or arrival rate is not available is proposed as the most robust of those analyzed.", "title": "" }, { "docid": "18b3328725661770be1f408f37c7eb64", "text": "Researchers have proposed various machine learning algorithms for traffic sign recognition, which is a supervised multicategory classification problem with unbalanced class frequencies and various appearances. We present a novel graph embedding algorithm that strikes a balance between local manifold structures and global discriminative information. A novel graph structure is designed to depict explicitly the local manifold structures of traffic signs with various appearances and to intuitively model between-class discriminative information. Through this graph structure, our algorithm effectively learns a compact and discriminative subspace. Moreover, by using L2, 1-norm, the proposed algorithm can preserve the sparse representation property in the original space after graph embedding, thereby generating a more accurate projection matrix. Experiments demonstrate that the proposed algorithm exhibits better performance than the recent state-of-the-art methods.", "title": "" }, { "docid": "a712b6efb5c869619864cd817c2e27e1", "text": "We measure the value of promotional activities and referrals by content creators to an online platform of user-generated content. To do so, we develop a modeling approach that explains individual-level choices of visiting the platform, creating, and purchasing content, as a function of consumer characteristics and marketing activities, allowing for the possibility of interdependence of decisions within and across users. Empirically, we apply our model to Hewlett-Packard’s (HP) print-on-demand service of user-created magazines, named MagCloud. We use two distinct data sets to show the applicability of our approach: an aggregate-level data set from Google Analytics, which is a widely available source of data to managers, and an individual-level data set from HP. Our results compare content creator activities, which include referrals and word-ofmouth efforts, with firm-based actions, such as price promotions and public relations. We show that price promotions have strong effects, but limited to the purchase decisions, while content creator referrals and public relations have broader effects which impact all consumer decisions at the platform. We provide recommendations to the level of the firm’s investments when “free” promotional activities by content creators exist. These “free” marketing campaigns are likely to have a substantial presence in most online services of user-generated content.", "title": "" }, { "docid": "307d9742739cbd2ade98c3d3c5d25887", "text": "In this paper, we present a smart US imaging system (SMUS) based on an android-OS smartphone, which can provide maximally optimized efficacy in terms of weight and size in point-of-care diagnostic applications. The proposed SMUS consists of the smartphone (Galaxy S5 LTE-A, Samsung., Korea) and a 16-channel probe system. The probe system contains analog and digital front-ends, which conducts beamforming and mid-processing procedures. Otherwise, the smartphone performs the back-end processing including envelope detection, log compression, 2D image filtering, digital scan conversion, and image display with custom-made graphical user interface (GUI). Note that the probe system and smartphone are interconnected by the USB 3.0 protocol. As a result, the developed SMUS can provide real-time B-mode image with the sufficient frame rate (i.e., 58 fps), battery run-time for point-of-care diagnosis (i.e., 54 min), and 35.0°C of transducer surface temperature during B-mode imaging, which satisfies the temperature standards for the safety and effectiveness of medical electrical equipment, IEC 60601-1 (i.e., 43°C).", "title": "" }, { "docid": "4d4a09c7cef74e9be52844a61ca57bef", "text": "The key of zero-shot learning (ZSL) is how to find the information transfer model for bridging the gap between images and semantic information (texts or attributes). Existing ZSL methods usually construct the compatibility function between images and class labels with the consideration of the relevance on the semantic classes (the manifold structure of semantic classes). However, the relationship of image classes (the manifold structure of image classes) is also very important for the compatibility model construction. It is difficult to capture the relationship among image classes due to unseen classes, so that the manifold structure of image classes often is ignored in ZSL. To complement each other between the manifold structure of image classes and that of semantic classes information, we propose structure propagation (SP) for improving the performance of ZSL for classification. SP can jointly consider the manifold structure of image classes and that of semantic classes for approximating to the intrinsic structure of object classes. Moreover, the SP can describe the constrain condition between the compatibility function and these manifold structures for balancing the influence of the structure propagation iteration. The SP solution provides not only unseen class labels but also the relationship of two manifold structures that encode the positive transfer in structure propagation. Experimental results demonstrate that SP can attain the promising results on the AwA, CUB, Dogs and SUN databases.", "title": "" }, { "docid": "4100a10b2a03f3a1ba712901cee406d2", "text": "Traditionally, many clinicians tend to forego esthetic considerations when full-coverage restorations are indicated for pediatric patients with primary dentitions. However, the availability of new zirconia pediatric crowns and reliable techniques for cementation makes esthetic outcomes practical and consistent when restoring primary dentition. Two cases are described: a 3-year-old boy who presented with severe early childhood caries affecting both anterior and posterior teeth, and a 6-year-old boy who presented with extensive caries of his primary posterior dentition, including a molar requiring full coverage. The parents of both boys were concerned about esthetics, and the extent of decay indicated the need for full-coverage restorations. This led to the boys receiving treatment using a restorative procedure in which the carious teeth were prepared for and restored with esthetic tooth-colored zirconia crowns. In both cases, comfortable function and pleasing esthetics were achieved.", "title": "" }, { "docid": "b7ca3a123963bb2f0bfbe586b3bc63d0", "text": "Objective In symptom-dependent diseases such as functional dyspepsia (FD), matching the pattern of epigastric symptoms, including severity, kind, and perception site, between patients and physicians is critical. Additionally, a comprehensive examination of the stomach, duodenum, and pancreas is important for evaluating the origin of such symptoms. Methods FD-specific symptoms (epigastric pain, epigastric burning, early satiety, and postprandial fullness) and other symptoms (regurgitation, nausea, belching, and abdominal bloating) as well as the perception site of the above symptoms were investigated in healthy subjects using a new questionnaire with an illustration of the human body. A total of 114 patients with treatment-resistant dyspeptic symptoms were evaluated for their pancreatic exocrine function using N-benzoyl-L-tyrosyl-p-aminobenzoic acid. Results A total of 323 subjects (men:women, 216:107; mean age, 52.1 years old) were initially enrolled. Most of the subjects felt the FD-specific symptoms at the epigastrium, while about 20% felt them at other abdominal sites. About 30% of expressed as epigastric symptoms were FD-nonspecific symptoms. At the epigastrium, epigastric pain and epigastric burning were mainly felt at the upper part, and postprandial fullness and early satiety were felt at the lower part. The prevalence of patients with pancreatic exocrine dysfunction was 71% in the postprandial fullness group, 68% in the epigastric pain group, and 82% in the diarrhea group. Conclusion We observed mismatch in the perception site and expression between the epigastric symptoms of healthy subjects and FD-specific symptoms. Postprandial symptoms were often felt at the lower part of the epigastrium, and pancreatic exocrine dysfunction may be involved in the FD symptoms, especially for treatment-resistant dyspepsia patients.", "title": "" }, { "docid": "a5e960a4b20959a1b4a85e08eebab9d3", "text": "This paper presents a new class of dual-, tri- and quad-band BPF by using proposed open stub-loaded shorted stepped-impedance resonator (OSLSSIR). The OSLSSIR consists of a two-end-shorted three-section stepped-impedance resistor (SIR) with two identical open stubs loaded at its impedance junctions. Two 50- Ω tapped lines are directly connected to two shorted sections of the SIR to serve as I/O ports. As the electrical lengths of two identical open stubs increase, many more transmission poles (TPs) and transmission zeros (TZs) can be shifted or excited within the interested frequency range. The TZs introduced by open stubs divide the TPs into multiple groups, which can be applied to design a multiple-band bandpass filter (BPF). In order to increase many more design freedoms for tuning filter performance, a high-impedance open stub and the narrow/broad side coupling are introduced as perturbations in all filters design, which can tune the even- and odd-mode TPs separately. In addition, two branches of I/O coupling and open stub-loaded shorted microstrip line are employed in tri- and quad-band BPF design. As examples, two dual-wideband BPFs, one tri-band BPF, and one quad-band BPF have been successfully developed. The fabricated four BPFs have merits of compact sizes, low insertion losses, and high band-to-band isolations. The measured results are in good agreement with the full-wave simulated results.", "title": "" }, { "docid": "d6f473f6b6758b2243dde898840656b0", "text": "In this paper, we introduce the new generation 3300V HiPak2 IGBT module (130x190)mm employing the recently developed TSPT+ IGBT with Enhanced Trench MOS technology and Field Charge Extraction (FCE) diode. The new chip-set enables IGBT modules with improved electrical performance in terms of low losses, good controllability, high robustness and soft diode recovery. Due to the lower losses and the excellent SOA, the current rating of the 3300V HiPak2 module can be increased from 1500A for the current SPT+ generation to 1800A for the new TSPT+ version.", "title": "" }, { "docid": "7635d39eda6ac2b3969216b39a1aa1f7", "text": "We introduce tailored displays that enhance visual acuity by decomposing virtual objects and placing the resulting anisotropic pieces into the subject's focal range. The goal is to free the viewer from needing wearable optical corrections when looking at displays. Our tailoring process uses aberration and scattering maps to account for refractive errors and cataracts. It splits an object's light field into multiple instances that are each in-focus for a given eye sub-aperture. Their integration onto the retina leads to a quality improvement of perceived images when observing the display with naked eyes. The use of multiple depths to render each point of focus on the retina creates multi-focus, multi-depth displays. User evaluations and validation with modified camera optics are performed. We propose tailored displays for daily tasks where using eyeglasses are unfeasible or inconvenient (e.g., on head-mounted displays, e-readers, as well as for games); when a multi-focus function is required but undoable (e.g., driving for farsighted individuals, checking a portable device while doing physical activities); or for correcting the visual distortions produced by high-order aberrations that eyeglasses are not able to.", "title": "" }, { "docid": "69f710a71b27cf46039d54e20b5f589b", "text": "This paper presents a new needle deflection model that is an extension of prior work in our group based on the principles of beam theory. The use of a long flexible needle in percutaneous interventions necessitates accurate modeling of the generated curved trajectory when the needle interacts with soft tissue. Finding a feasible model is important in simulators with applications in training novice clinicians or in path planners used for needle guidance. Using intra-operative force measurements at the needle base, our approach relates mechanical and geometric properties of needle-tissue interaction to the net amount of deflection and estimates the needle curvature. To this end, tissue resistance is modeled by introducing virtual springs along the needle shaft, and the impact of needle-tissue friction is considered by adding a moving distributed external force to the bending equations. Cutting force is also incorporated by finding its equivalent sub-boundary conditions. Subsequently, the closed-from solution of the partial differential equations governing the planar deflection is obtained using Green's functions. To evaluate the performance of our model, experiments were carried out on artificial phantoms.", "title": "" }, { "docid": "c0f46732345837cf959ea9ee030874fd", "text": "In this paper we discuss the development and use of low-rank approximate nonnegative matrix factorization (NMF) algorithms for feature extraction and identification in the fields of text mining and spectral data analysis. The evolution and convergence properties of hybrid methods based on both sparsity and smoothness constraints for the resulting nonnegative matrix factors are discussed. The interpretability of NMF outputs in specific contexts are provided along with opportunities for future work in the modification of NMF algorithms for large-scale and time-varying datasets.", "title": "" }, { "docid": "481d62df8c6cc7ed6bc93a4e3c27a515", "text": "Minutiae points are defined as the minute discontinuities of local ridge flows, which are widely used as the fine level features for fingerprint recognition. Accurate minutiae detection is important and traditional methods are often based on the hand-crafted processes such as image enhancement, binarization, thinning and tracing of the ridge flows etc. These methods require strong prior knowledge to define the patterns of minutiae points and are easily sensitive to noises. In this paper, we propose a machine learning based algorithm to detect the minutiae points with the gray fingerprint image based on Convolution Neural Networks (CNN). The proposed approach is divided into the training and testing stages. In the training stage, a number of local image patches are extracted and labeled and CNN models are trained to classify the image patches. The test fingerprint is scanned with the CNN model to locate the minutiae position in the testing stage. To improve the detection accuracy, two CNN models are trained to classify the local patch into minutiae v.s. non-minutiae and into ridge ending v.s. bifurcation, respectively. In addition, multi-scale CNNs are constructed with the image patches of varying sizes and are combined to achieve more accurate detection. Finally, the proposed algorithm is tested the fingerprints of FVC2002 DB1 database. Experimental results and comparisons have been presented to show the effectiveness of the proposed method.", "title": "" }, { "docid": "57a48dee2cc149b70a172ac5785afc6c", "text": "We present the first pipeline for real-time volumetric surface reconstruction and dense 6DoF camera tracking running purely on standard, off-the-shelf mobile phones. Using only the embedded RGB camera, our system allows users to scan objects of varying shape, size, and appearance in seconds, with real-time feedback during the capture process. Unlike existing state of the art methods, which produce only point-based 3D models on the phone, or require cloud-based processing, our hybrid GPU/CPU pipeline is unique in that it creates a connected 3D surface model directly on the device at 25Hz. In each frame, we perform dense 6DoF tracking, which continuously registers the RGB input to the incrementally built 3D model, minimizing a noise aware photoconsistency error metric. This is followed by efficient key-frame selection, and dense per-frame stereo matching. These depth maps are fused volumetrically using a method akin to KinectFusion, producing compelling surface models. For each frame, the implicit surface is extracted for live user feedback and pose estimation. We demonstrate scans of a variety of objects, and compare to a Kinect-based baseline, showing on average ~ 1.5cm error. We qualitatively compare to a state of the art point-based mobile phone method, demonstrating an order of magnitude faster scanning times, and fully connected surface models.", "title": "" }, { "docid": "438e690466823b7ae79cf28f62ba87be", "text": "Decades of research have documented that young word learners have more difficulty learning verbs than nouns. Nonetheless, recent evidence has uncovered conditions under which children as young as 24 months succeed. Here, we focus in on the kind of linguistic information that undergirds 24-month-olds' success. We introduced 24-month-olds to novel words (either nouns or verbs) as they watched dynamic scenes (e.g., a man waving a balloon); the novel words were presented in semantic contexts that were either rich (e.g., The man is pilking a balloon), or more sparse (e.g., He's pilking it). Toddlers successfully learned nouns in both the semantically rich and sparse contexts, but learned verbs only in the rich context. This documents that to learn the meaning of a novel verb, English-acquiring toddlers take advantage of the semantically rich information provided in lexicalized noun phrases. Implications for cross-linguistic theories of acquisition are discussed.", "title": "" } ]
scidocsrr
ba4cf772bab99ee296d0eb8eef7c57bd
An Experimental Evaluation of DoS Attack and Its Impact on Throughput of IEEE 802.11 Wireless Networks
[ { "docid": "09211bc28dea118cc114b261d13f098e", "text": "IEEE 802.11 Wireless LAN (WLAN) has gained popularity. WLANs use different security protocols like WEP, WPA and WPA2. The newly ratified WPA2 provides the highest level of security for data frames. However WPA2 does not really mention about protection of management frames. In other words IEEE 802.11 management frames are always sent in an unsecured manner. In fact the only security mechanism for management frames is CRC-32 bit algorithm. While useful for unintentional error detection, CRC-32 bit is not safe to completely verify data integrity in the face of intentional modifications. Therefore an unsecured management frame allows an attacker to start different kinds of attack. This paper proposes a new model to address these security problems in management frames. First we summarize security threats on management frames and their influences in WLANs. Then based on these security threats, we propose a new per frames security model to provide efficient security for these frames. Finally simulation methodology is presented and results are provided. Mathematical probabilities are discussed to demonstrate that the proposed security model is robust and efficient to secure management frames.", "title": "" }, { "docid": "8dd540b33035904f63c67b57d4c97aa3", "text": "Wireless local area networks (WLANs) based on the IEEE 802.11 standards are one of today’s fastest growing technologies in businesses, schools, and homes, for good reasons. As WLAN deployments increase, so does the challenge to provide these networks with security. Security risks can originate either due to technical lapse in the security mechanisms or due to defects in software implementations. Standard Bodies and researchers have mainly used UML state machines to address the implementation issues. In this paper we propose the use of GSE methodology to analyse the incompleteness and uncertainties in specifications. The IEEE 802.11i security protocol is used as an example to compare the effectiveness of the GSE and UML models. The GSE methodology was found to be more effective in identifying ambiguities in specifications and inconsistencies between the specification and the state machines. Resolving all issues, we represent the robust security network (RSN) proposed in the IEEE 802.11i standard using different GSE models.", "title": "" }, { "docid": "8dcb99721a06752168075e6d45ee64c7", "text": "The convenience of 802.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors. However, this use is predicated on an implicit assumption of confidentiality and availability. While the secu­ rity flaws in 802.11’s basic confidentially mechanisms have been widely publicized, the threats to network availability are far less widely appreciated. In fact, it has been suggested that 802.11 is highly suscepti­ ble to malicious denial-of-service (DoS) attacks tar­ geting its management and media access protocols. This paper provides an experimental analysis of such 802.11-specific attacks – their practicality, their ef­ ficacy and potential low-overhead implementation changes to mitigate the underlying vulnerabilities.", "title": "" } ]
[ { "docid": "6aadba165b0eb979b32e7549b3e8da7c", "text": "In multimedia scenario, number of saliency detection designs has been portrayed for different intelligent applications regarding the accurate saliency detection like human visual system. More challenges exist regarding complexity in natural images and lesser scale prototypes in salient objects. In lots of the prevailing methods, the competency of identifying objects’ instances in the discovered salient regions is still not up to the mark. Hence it is planned to assist a new strategy by considering certain parameters of feature evaluation under optimization algorithms which diverts the new method of capturing the optimal parameters to acquire better outcomes. The given paper proposes a new saliency detection design that encompasses 2 phases like Feature extraction and depth saliency detection. In which Gaussian kernel model is processed for extracting the STFT features (Short-Time Fourier Transform), Texture features, and Depth features; and Gabor filter is used to get the depth saliency map. Here, the color space information is progressed under STFT model for extracting the STFT features. This is the major contribution, where all the STFT feature, Texture feature and Depth features are taken out to gain the depth saliency map. Additionally, this paper proffers a new optimization prototype that optimizes 2 coefficients namely feature difference amongst image patches from feature evaluation, and fine scale, by which more precise saliency detection outcomes can be attained through the proposed model. Subsequently, the proposed GSDU (Glowworm Swarm optimization with Dragonfly Update) contrasts its performance over other conventional methodologies concerning i) ROC (Receiver Operator Curve), ii) PCC (Pearson Correlation Coefficient), iii) KLD (Kullback Leibler Divergence) as well as iv) AUC (Area Under the Curve), and the efficiency of proposed model is proven grounded on higher accuracy rate.", "title": "" }, { "docid": "e48903be16ccab7bf1263e0a407e5d66", "text": "This research applies Lotka’s Law to metadata on open source software development. Lotka’s Law predicts the proportion of authors at different levels of productivity. Open source software development harnesses the creativity of thousands of programmers worldwide, is important to the progress of the Internet and many other computing environments, and yet has not been widely researched. We examine metadata from the Linux Software Map (LSM), which documents many open source projects, and Sourceforge, one of the largest resources for open source developers. Authoring patterns found are comparable to prior studies of Lotka’s Law for scientific and scholarly publishing. Lotka’s Law was found to be effective in understanding software development productivity patterns, and offer promise in predicting aggregate behavior of open source developers.", "title": "" }, { "docid": "2bb356ac7620bacc9190f73f92b04da1", "text": "It is well known that it is possible to construct “adversarial examples” for neural networks: inputs which are misclassified by the network yet indistinguishable from true data. We propose a simple modification to standard neural network architectures, thermometer encoding, which significantly increases the robustness of the network to adversarial examples. We demonstrate this robustness with experiments on the MNIST, CIFAR-10, CIFAR-100, and SVHN datasets, and show that models with thermometer-encoded inputs consistently have higher accuracy on adversarial examples, without decreasing generalization. State-of-the-art accuracy under the strongest known white-box attack was increased from 93.20% to 94.30% on MNIST and 50.00% to 79.16% on CIFAR-10. We explore the properties of these networks, providing evidence that thermometer encodings help neural networks to find more-non-linear decision boundaries.", "title": "" }, { "docid": "8adcbd916e99e63d5dcebf58f19e2e05", "text": "Cloud computing is still a juvenile and most dynamic field characterized by a buzzing IT industry. Virtually every industry and even some parts of the public sector are taking on cloud computing today, either as a provider or as a consumer. It has now become essentially an inseparable part of everyone's life. The cloud thus has become a part of the critical global infrastructure but is unique in that it has no customary borders to safeguard it from attacks. Once weakened these web servers can serve as a launching point for conducting further attacks against users in the cloud. One such attack is the DoS or its version DDOS attack. Distributed Denial of Service (DdoS) Attacks have recently emerged as one of the most newsworthy, if not the greatest weaknesses of the Internet. DDoS attacks cause economic losses due to the unavailability of services and potentially serious security problems due to incapacitation of critical infrastructures. This paper presents a simple distance estimation based technique to detect and prevent the cloud from flooding based DDoS attack and thereby protect other servers and users from its adverse effects.", "title": "" }, { "docid": "1aa7e7fe70bdcbc22b5d59b0605c34e9", "text": "Surgical tasks are complex multi-step sequences of smaller subtasks (often called surgemes) and it is useful to segment task demonstrations into meaningful subsequences for:(a) extracting finite-state machines for automation, (b) surgical training and skill assessment, and (c) task classification. Existing supervised methods for task segmentation use segment labels from a dictionary of motions to build classifiers. However, as the datasets become voluminous, the labeling becomes arduous and further, this method doesnt́ generalize to new tasks that dont́ use the same dictionary. We propose an unsupervised semantic task segmentation framework by learning “milestones”, ellipsoidal regions of the position and feature states at which a task transitions between motion regimes modeled as locally linear. Milestone learning uses a hierarchy of Dirichlet Process Mixture Models, learned through Expectation-Maximization, to cluster the transition points and optimize the number of clusters. It leverages transition information from kinematic state as well as environment state such as visual features. We also introduce a compaction step which removes repetitive segments that correspond to a mid-demonstration failure recovery by retrying an action. We evaluate Milestones Learning on three surgical subtasks: pattern cutting, suturing, and needle passing. Initial results suggest that our milestones qualitatively match manually annotated segmentation. While one-to-one correspondence of milestones with annotated data is not meaningful, the milestones recovered from our method have exactly one annotated surgeme transition in 74% (needle passing) and 66% (suturing) of total milestones, indicating a semantic match.", "title": "" }, { "docid": "2da4c992e8e2e9bfdab188bedd47a4d2", "text": "Hybrid neural networks (hybrid-NNs) have been widely used and brought new challenges to NN processors. Thinker is an energy efficient reconfigurable hybrid-NN processor fabricated in 65-nm technology. To achieve high energy efficiency, three optimization techniques are proposed. First, each processing element (PE) supports bit-width adaptive computing to meet various bit-widths of neural layers, which raises computing throughput by 91% and improves energy efficiency by <inline-formula> <tex-math notation=\"LaTeX\">$1.93 \\times $ </tex-math></inline-formula> on average. Second, PE array supports on-demand array partitioning and reconfiguration for processing different NNs in parallel, which results in 13.7% improvement of PE utilization and improves energy efficiency by <inline-formula> <tex-math notation=\"LaTeX\">$1.11 \\times $ </tex-math></inline-formula>. Third, a fused data pattern-based multi-bank memory system is designed to exploit data reuse and guarantee parallel data access, which improves computing throughput and energy efficiency by <inline-formula> <tex-math notation=\"LaTeX\">$1.11 \\times $ </tex-math></inline-formula> and <inline-formula> <tex-math notation=\"LaTeX\">$1.17 \\times $ </tex-math></inline-formula>, respectively. Measurement results show that this processor achieves 5.09-TOPS/W energy efficiency at most.", "title": "" }, { "docid": "227fb4fe1a8cba3b696708bf191be7e3", "text": "Qualitative research has experienced broad acceptance in the IS discipline. Despite the merits for exploring new phenomena, qualitative methods are criticized for their subjectivity when it comes to interpretation. Therefore, research mostly emphasized the development of criteria and guidelines for good practice. I present an approach to counteract the issue of credibility and traceability in qualitative data analysis and expand the repertoire of approaches used in IS research. I draw on an existing approach from the information science discipline and adapt it to analyze coded qualitative data. The developed approach is designed to answer questions about the specific relevance of codes and aims to support the researcher in detecting hidden information in the coded material. For this reason, the paper contributes to the IS methodology with bringing new insights to current methods by enhancing them with an approach from another", "title": "" }, { "docid": "736ee2bed70510d77b1f9bb13b3bee68", "text": "Yes, they do. This work investigates a perspective for deep learning: whether different normalization layers in a ConvNet require different normalizers. This is the first step towards understanding this phenomenon. We allow each convolutional layer to be stacked before a switchable normalization (SN) that learns to choose a normalizer from a pool of normalization methods. Through systematic experiments in ImageNet, COCO, Cityscapes, and ADE20K, we answer three questions: (a) Is it useful to allow each normalization layer to select its own normalizer? (b) What impacts the choices of normalizers? (c) Do different tasks and datasets prefer different normalizers? Our results suggest that (1) using distinct normalizers improves both learning and generalization of a ConvNet; (2) the choices of normalizers are more related to depth and batch size, but less relevant to parameter initialization, learning rate decay, and solver; (3) different tasks and datasets have different behaviors when learning to select normalizers.", "title": "" }, { "docid": "91771b6c50d7193e5612d9552913dec8", "text": "The expected diffusion of EVehicles (EVs) to limit the impact of fossil fuel on mobility is going to cause severe issues to the management of electric grid. A large number of charging stations is going to be installed on the power grid to support EVs. Each of the charging station could require more than 100 kW from the grid. The grid consumption is unpredictable and it depends from the need of EVs in the neighborhood. The impact of the EV on the power grid can be limited by the proper exploitation of Vehicle to Grid communication (V2G). The advent of Low Power Wide Area Network (LPWAN) promoted by Internet Of Things applications offers new opportunity for wireless communications. In this work, an example of such a technology (the LoRaWAN solution) is tested in a real-world scenario as a candidate for EV to grid communications. The experimental results highlight as LoRaWAN technology can be used to cover an area with a radius under 2 km, in an urban environment. At this distance, the Received Signal Strength Indicator (RSSI) is about −117 dBm. Such a result demonstrates the feasibility of the proposed approach.", "title": "" }, { "docid": "f51583c6eb5a0d6e27823e0714d40ef5", "text": "Studies of emotion regulation typically contrast two or more strategies (e.g., reappraisal vs. suppression) and ignore variation within each strategy. To address such variation, we focused on cognitive reappraisal and considered the effects of goals (i.e., what people are trying to achieve) and tactics (i.e., what people actually do) on outcomes (i.e., how affective responses change). To examine goals, we randomly assigned participants to either increase positive emotion or decrease negative emotion to a negative stimulus. To examine tactics, we categorized participants' reports of how they reappraised. To examine reappraisal outcomes, we measured experience and electrodermal responding. Findings indicated that (a) the goal of increasing positive emotion led to greater increases in positive affect and smaller decreases in skin conductance than the goal of decreasing negative emotion, and (b) use of the reality challenge tactic was associated with smaller increases in positive affect during reappraisal. These findings suggest that reappraisal can be implemented in the service of different emotion goals, using different tactics. Such differences are associated with different outcomes, and they should be considered in future research and applied attempts to maximize reappraisal success.", "title": "" }, { "docid": "718f874dfe34403d70433582065d1737", "text": "We aim to better exploit the limited amounts of parallel text available in low-resource settings by introducing a differentiable reconstruction loss for neural machine translation (NMT). We reconstruct the input from sampled translations and leverage differentiable sampling and bi-directional NMT to build a compact model that can be trained end-to-end. This approach achieves small but consistent BLEU improvements on four language pairs in both translation directions, and outperforms an alternative differentiable reconstruction strategy based on hidden states.", "title": "" }, { "docid": "ba8886a9e251492ec0dca0512d6994be", "text": "In this paper, we consider various moment inequalities for sums of random matrices—which are well–studied in the functional analysis and probability theory literature—and demonstrate how they can be used to obtain the best known performance guarantees for several problems in optimization. First, we show that the validity of a recent conjecture of Nemirovski is actually a direct consequence of the so–called non–commutative Khintchine’s inequality in functional analysis. Using this result, we show that an SDP–based algorithm of Nemirovski, which is developed for solving a class of quadratic optimization problems with orthogonality constraints, has a logarithmic approximation guarantee. This improves upon the polynomial approximation guarantee established earlier by Nemirovski. Furthermore, we obtain improved safe tractable approximations of a certain class of chance constrained linear matrix inequalities. Secondly, we consider a recent result of Delage and Ye on the so–called data–driven distributionally robust stochastic programming problem. One of the assumptions in the Delage–Ye result is that the underlying probability distribution has bounded support. However, using a suitable moment inequality, we show that the result in fact holds for a much larger class of probability distributions. Given the close connection between the behavior of sums of random matrices and the theoretical properties of various optimization problems, we expect that the moment inequalities discussed in this paper will find further applications in optimization.", "title": "" }, { "docid": "ced911b92e427c1d58be739e20f47fcd", "text": "Software defined networking and network function virtualization are widely deemed two critical pillars of the future service provider network. The expectation for significant operations cost savings from network programmability, open APIs, and operations automation is frequently mentioned as one of the primary benefits of the NFV/SDN vision. Intuitively, the flexibility and simplification values attributed to NFV/SDN lead the industry to the conclusion that operating expenses will decrease. This article provides a view into the operational costs of a typical service provider and discusses how the NFV/SDN attributes can be expected to influence the business equation. The drivers of OPEX change, the directionality of the change, and the categories of OPEX most affected based on our analysis from interactions with a number of service providers worldwide are presented in a structured analysis.", "title": "" }, { "docid": "0368fdfe05918134e62e0f7b106130ee", "text": "Scientific charts are an effective tool to visualize numerical data trends. They appear in a wide range of contexts, from experimental results in scientific papers to statistical analyses in business reports. The abundance of scientific charts in the web has made it inevitable for search engines to include them as indexed content. However, the queries based on only the textual data used to tag the images can limit query results. Many studies exist to address the extraction of data from scientific diagrams in order to improve search results. In our approach to achieving this goal, we attempt to enhance the semantic labeling of the charts by using the original data values that these charts were designed to represent. In this paper, we describe a method to extract data values from a specific class of charts, bar charts. The extraction process is fully automated using image processing and text recognition techniques combined with various heuristics derived from the graphical properties of bar charts. The extracted information can be used to enrich the indexing content for bar charts and improve search results. We evaluate the effectiveness of our method on bar charts drawn from the web as well as charts embedded in digital documents.", "title": "" }, { "docid": "fada1434ec6e060eee9a2431688f82f3", "text": "Neural language models (NLMs) have been able to improve machine translation (MT) thanks to their ability to generalize well to long contexts. Despite recent successes of deep neural networks in speech and vision, the general practice in MT is to incorporate NLMs with only one or two hidden layers and there have not been clear results on whether having more layers helps. In this paper, we demonstrate that deep NLMs with three or four layers outperform those with fewer layers in terms of both the perplexity and the translation quality. We combine various techniques to successfully train deep NLMs that jointly condition on both the source and target contexts. When reranking nbest lists of a strong web-forum baseline, our deep models yield an average boost of 0.5 TER / 0.5 BLEU points compared to using a shallow NLM. Additionally, we adapt our models to a new sms-chat domain and obtain a similar gain of 1.0 TER / 0.5 BLEU points.", "title": "" }, { "docid": "4ddd48db66a5951b82d5b7c2d9b8345a", "text": "In this paper we address the memory demands that come with the processing of 3-dimensional, high-resolution, multi-channeled medical images in deep learning. We exploit memory-efficient backpropagation techniques, to reduce the memory complexity of network training from being linear in the network’s depth, to being roughly constant – permitting us to elongate deep architectures with negligible memory increase. We evaluate our methodology in the paradigm of Image Quality Transfer, whilst noting its potential application to various tasks that use deep learning. We study the impact of depth on accuracy and show that deeper models have more predictive power, which may exploit larger training sets. We obtain substantially better results than the previous state-of-the-art model with a slight memory increase, reducing the rootmean-squared-error by 13%. Our code is publicly available.", "title": "" }, { "docid": "d1ffeda7280999f6485f3fa747d14b11", "text": "We show how two existing paradigms for two-party secure function evaluation (SFE) in the semi-honest model can be combined securely and efficiently – those based on additively homomorphic encryption (HE) with those based on garbled circuits (GC) and vice versa. Additionally, we propose new GC constructions for addition, subtraction, multiplication, and comparison functions. Our circuits are approximately two times smaller (in terms of garbled tables) than previous constructions. This implies corresponding computation and communication improvements in SFE of functions using the above building blocks (including the protocols for combining HE and GC). Based on these results, we present efficient constant-round protocols for secure integer comparison, and the related problems of minimum selection and minimum distance, which are crucial building blocks of many cryptographic schemes such as privacy preserving biometric authentication (e.g., face recognition, fingerprint matching, etc).", "title": "" }, { "docid": "a25c24018499ae1da6d5ff50c2412fec", "text": "In the rapid change of drug scenarios, as the powerful development in the drug market, particularly in the number and the kind of the compound available, Internet plays a dominant role to become one of the major \"drug market\". The European Commission funded the Psychonaut Web Mapping Project (carried out in the time-frame January 2008-December 2009), with the aim to start/implement an Early Warning System (through the data/information collected from the Web virtual market), to identify and categorise novel recreational drugs/psychoactive compounds (synthetical/herbal drugs), and new trends in drug use to provide information for immediate and prevention intervention. The Psychonaut is a multi-site research project involving 8 research centres (De Sleutel, Belgium; University of Hertfordshire School of Pharmacy, St George's University of London, England; A-klinikkasäätiö, Finlandia; Klinik für Psychiatrie und Psychotherapie, Germany; Assessorato Salute Regione Marche, Italy; Drug Abuse Unit, Spain; Centre of Competence Bergen Clinics Foundation, Norway) based in 7 European Countries (England, Italy, Belgium, Finland, Germany, Spain, Norway).", "title": "" }, { "docid": "13ffc17fe344471e96ada190493354d8", "text": "The role of inflammation in the pathogenesis of type 2 diabetes and associated complications is now well established. Several conditions that are driven by inflammatory processes are also associated with diabetes, including rheumatoid arthritis, gout, psoriasis and Crohn's disease, and various anti-inflammatory drugs have been approved or are in late stages of development for the treatment of these conditions. This Review discusses the rationale for the use of some of these anti-inflammatory treatments in patients with diabetes and what we could expect from their use. Future immunomodulatory treatments may not target a specific disease, but could instead act on a dysfunctional pathway that causes several conditions associated with the metabolic syndrome.", "title": "" }, { "docid": "e303eddacfdce272b8e71dc30a507020", "text": "As new media are becoming daily fare, Internet addiction appears as a potential problem in adolescents. From the reported negative consequences, it appears that Internet addiction can have a variety of detrimental outcomes for young people that may require professional intervention. Researchers have now identified a number of activities and personality traits associated with Internet addiction. This study aimed to synthesise previous findings by (i) assessing the prevalence of potential Internet addiction in a large sample of adolescents, and (ii) investigating the interactions between personality traits and the usage of particular Internet applications as risk factors for Internet addiction. A total of 3,105 adolescents in the Netherlands filled out a self-report questionnaire including the Compulsive Internet Use Scale and the Quick Big Five Scale. Results indicate that 3.7% of the sample were classified as potentially being addicted to the Internet. The use of online gaming and social applications (online social networking sites and Twitter) increased the risk for Internet addiction, whereas agreeableness and resourcefulness appeared as protective factors in high frequency online gamers. The findings support the inclusion of ‘Internet addiction’ in the DSM-V. Vulnerability and resilience appear as significant aspects that require consideration in", "title": "" } ]
scidocsrr
c340a561d9f52732f7156d9f51afc0fd
Poisson-driven seamless completion of triangular meshes
[ { "docid": "da87c8385ac485fe5d2903e27803c801", "text": "It's not surprisingly when entering this site to get the book. One of the popular books now is the polygon mesh processing. You may be confused because you can't find the book in the book store around your city. Commonly, the popular book will be sold quickly. And when you have found the store to buy the book, it will be so hurt when you run out of it. This is why, searching for this popular book in this website will give you benefit. You will not run out of this book.", "title": "" } ]
[ { "docid": "07a21e6badefd068dd9da0fa86957ea2", "text": "Design details of reduction of asymmetrical hypertrophy of the breasts are discussed. The concepts apply to nearly any breast reduction technique, although here they are presented in the context of the inferior segment method, which we favor. Although most of these points may seem self-evident to the experienced plastic surgeon, there has been little written about the details.", "title": "" }, { "docid": "fdcea57edbe935ec9949247fd47888e6", "text": "Maintenance of skeletal muscle mass is contingent upon the dynamic equilibrium (fasted losses-fed gains) in protein turnover. Of all nutrients, the single amino acid leucine (Leu) possesses the most marked anabolic characteristics in acting as a trigger element for the initiation of protein synthesis. While the mechanisms by which Leu is 'sensed' have been the subject of great scrutiny, as a branched-chain amino acid, Leu can be catabolized within muscle, thus posing the possibility that metabolites of Leu could be involved in mediating the anabolic effect(s) of Leu. Our objective was to measure muscle protein anabolism in response to Leu and its metabolite HMB. Using [1,2-(13)C2]Leu and [(2)H5]phenylalanine tracers, and GC-MS/GC-C-IRMS we studied the effect of HMB or Leu alone on MPS (by tracer incorporation into myofibrils), and for HMB we also measured muscle proteolysis (by arteriovenous (A-V) dilution). Orally consumed 3.42 g free-acid (FA-HMB) HMB (providing 2.42 g of pure HMB) exhibited rapid bioavailability in plasma and muscle and, similarly to 3.42 g Leu, stimulated muscle protein synthesis (MPS; HMB +70% vs. Leu +110%). While HMB and Leu both increased anabolic signalling (mechanistic target of rapamycin; mTOR), this was more pronounced with Leu (i.e. p70S6K1 signalling 90 min vs. 30 min for HMB). HMB consumption also attenuated muscle protein breakdown (MPB; -57%) in an insulin-independent manner. We conclude that exogenous HMB induces acute muscle anabolism (increased MPS and reduced MPB) albeit perhaps via distinct, and/or additional mechanism(s) to Leu.", "title": "" }, { "docid": "dccfb7f6d6ac9014f668b0fa6a994931", "text": "Orthodontics has the potential to cause significant damage to hard and soft tissues. The most important aspect of orthodontic care is to have an extremely high standard of oral hygiene before and during orthodontic treatment. It is also essential that any carious lesions are dealt with before any active treatment starts. Root resorption is a common complication during orthodontic treatment but there is some evidence that once appliances are removed this resorption stops. Some of the risk pointers for root resorption are summarised. Soft tissue damage includes that caused by archwires but also the more harrowing potential for headgears to cause damage to eyes. It is essential that adequate safety measures are included with this type of treatment.", "title": "" }, { "docid": "d0bf44f333658339650ae725dc229980", "text": "We propose a new multi-frame method for efficiently computing scene flow (dense depth and optical flow) and camera ego-motion for a dynamic scene observed from a moving stereo camera rig. Our technique also segments out moving objects from the rigid scene. In our method, we first estimate the disparity map and the 6-DOF camera motion using stereo matching and visual odometry. We then identify regions inconsistent with the estimated camera motion and compute per-pixel optical flow only at these regions. This flow proposal is fused with the camera motion-based flow proposal using fusion moves to obtain the final optical flow and motion segmentation. This unified framework benefits all four tasks &#x2013; stereo, optical flow, visual odometry and motion segmentation leading to overall higher accuracy and efficiency. Our method is currently ranked third on the KITTI 2015 scene flow benchmark. Furthermore, our CPU implementation runs in 2-3 seconds per frame which is 1-3 orders of magnitude faster than the top six methods. We also report a thorough evaluation on challenging Sintel sequences with fast camera and object motion, where our method consistently outperforms OSF [30], which is currently ranked second on the KITTI benchmark.", "title": "" }, { "docid": "237ad676cccd55b969a3a96364b59a96", "text": "Modeling Modeling is not merely a process of behavioral mimicry. Highly functional patterns of behavior, which constitute the proven skills and established customs of a culture, may be adopted in essentially the same form as they are exemplified. There is little leeway for 25 improvisation on how to drive automobiles or to perform arithmetic operations. However, in many activities, subskills must be improvised to suit varying circumstances. Modeling influences can convey rules for generative and innovative behavior as well. This higher-level learning is achieved through abstract modeling. Rule-governed behavior differs in specific content and other details but it contains the same underlying rule. For example, the modeled statements, \"The dog is being petted,\" and \"the window was opened\" refer to different things but the linguistic rule-the passive form--is the same. In abstract modeling, observers extract the rule embodied in the specific behavior exhibited by others. Once they learn the rule, they can use it to generate new instances of behavior that go beyond what they have seen or heard. Much human learning is aimed at developing cognitive skills on how to gain and use knowledge for future use. Observational learning of thinking skills is greatly facilitated by modeling thought processes in conjunction with action strategies (Meichenbaum, 1984). Models verbalize their thought strategies as they engage in problem-solving activities. The ordinarily covert thoughts guiding the actions of the models are thus made observable and learnable by others. Modeling has been shown to be a highly effective means of establishing abstract or rulegoverned behavior. On the basis of modeled information, people acquire, among other things, judgmental standards, linguistic rules, styles of inquiry, information-processing skills, and standards of self-evaluation (Bandura, 1986; Rosenthal & Zimmerman, 1978). Evidence that generative rules of thought and conduct can be created through abstract modeling attests to the broad scope of observational learning. Development of Modeling Capabilities Because observational learning involves several subfunctions that evolve with maturation and experiences, it depends upon prior development. When analyzed in terms of its constituent 26 subfunctions, facility in observational learning is not primarily a matter of learning to imitate. Nor is it a discrete skill. Rather, developing adeptness in observational learning involves acquiring multiple subskills in selective attention, cognitive representation, symbolic transformation, and anticipatory motivation. Neonates possess greater modeling capabilities than is commonly believed. By several months of age, infants can and do model behavior with some consistency (Kaye, 1982; Meltzoff & Moore, 1983; Valentine, 1930). The development of proficiency in observational learning is grounded in social reciprocation. Infants possess sufficient rudimentary representational capacities and sensorimotor coordination to enable them to imitate elementary sounds and acts within their physical capabilities. Parents readily imitate a newborn's gestures and vocalizations from the very beginning, often in expressive ways that have been shown to facilitate modeling (Papousek & Papousek, 1977; Pawlby, 1977). The newborn, whose means of communication and social influence are severely limited, learns that reciprocal imitation is an effective way of eliciting and sustaining parental responsiveness. Uzgiris (1984) has given considerable attention to the social function of imitation in infancy. Mutual imitation serves as a means of conveying interest and sharing experiences. Initially, parents tend to model acts that infants spontaneously perform. After the reciprocal imitation is established, parents are quick to initiate new response patterns for imitative sequences that help to expand their infant's competencies (Pawlby, 1977). Successful modeling of these more complicated patterns of behavior require development of the major subfunctions that govern observational learning. It is to the developmental course of these subfunctions that we turn next. 27 Attentional Processes Young children present certain attentional deficiencies that limit their proficiency in observational learning. They have difficulty attending to different sorts of information at the same time, distinguishing pertinent aspects from irrelevancies, and maintaining attention to ongoing events long enough to acquire sufficient information about them (Cohen & Salapatek, 1975; Hagen & Hale, 1973). They are easily distracted. With increasing experience, children's attentional skills improve in all these respects. In promoting observational learning, adults alter the behavior they model to compensate for the attentional limitations of children. With infants, parents gain their attention and give salience to the behavior they want to encourage by selectively imitating them. Parents tend to perform the reciprocated imitations in an exaggerated animated fashion that is well designed to sustain the child's attentiveness at a high level during the mutual modeling sequences (Papousek & Papousek, 1977). The animated social interplay provides a vehicle for channeling and expanding infants' attention in activities that go beyond those they have already mastered. The attention-arousing value of the modeled acts, themselves, also influences what infants are likely to adopt. Infants are more attentive to, and imitate more often, modeled acts when they involve objects and sound accompaniments than when they are modeled silently and without objects to draw attention (Abravanel et al., 1976; Uzgiris, 1979). The more attention infants pay to the modeled activities, the more likely they are to adopt them. As infants attentional capabilities increase, parents exhibit developmentally progressive activities for them to model. 28 Representational Processes In developing representational memory skills, children have to learn how to transform modeled information into symbolic forms and to organize it into easily remembered structures. They also have to learn how to use timely rehearsal to facilitate the retention of activities that are vulnerable to memory loss. It takes time for children to learn that they can improve their future performances by symbolizing and rehearsing their immediate experiences. In the earliest period of development, experiences are probably retained mainly in imaginal modes of representation. Infants will model single acts, but they have difficulty reproducing coordinated sequences that require them to remember how several actions are strung together (McCall, Parke, & Kavanaugh, 1977). They often start the sequence right and simply forget what comes next. With experience, they become more skilled at delayed modeling. Indeed, infants even as young as 18 months will enact behavior learned from televised models after some time has elapsed. Delayed performances of this type require symbolic memory. As children begin to acquire language they can symbolize the essential aspects of events in words for memory representation. It is not until children acquire some cognitive and linguistic skills that they can extract rules from modeled performances and make effective use of the more complex linguistic transformations (Rosenthal & Zimmerman, 1978). Children can improve their memory by instruction to anticipate, verbally code, and rehearse what they observe (Brown & Barclay, 1976). The vicarious memorial subskills can also be acquired through modeling. By observing the memory feats of others, children learn what information is worth coding, how events should be categorized, and more general strategies for processing information (Lamal, 1971; Rosenthal & Zimmerman, 1978). 29 Production Processes Converting conceptions to appropriate actions requires development of transformational skills in intermodal guidance of behavior. Information in the symbolic mode must be translated into corresponding action modes. This involves learning how to organize action sequences, to monitor and compare behavioral enactments against the symbolic model, and to correct evident mismatches (Carroll & Bandura, 1985; 1987). When children must depend on what others tell them, because they cannot observe fully all of their own actions, detecting and correcting mismatches requires linguistic competencies. Deficiencies in any of these production subskills can create a developmental lag between comprehending and performing. Motivational Processes Motivational factors that influence the use to which modeled knowledge is put undergo significant developmental changes. During infancy, imitation functions mainly to secure interpersonal responsiveness. Through mutual modeling with adults, infants enjoy playful intimacy and gain experience in social reciprocation. Before long parents cease mimicking their infant's actions, but they remain responsive to instances of infants adopting modeled patterns that expand their competencies. What continues to serve a social function for young infants changes into an instructional vehicle for parents. This transition requires infants to cognize, on the basis of observed regularities, the social effects their different imitations are likely to produce. To help infants to learn the functional value of modeling the parents make the outcomes salient, recurrent, consistent, and closely tied to the infant's actions (Papousek & Papousek, 1977). With increasing cognitive development, children become more skilled at judging probable outcomes of their actions. Such outcome expectations serve as incentives for observational learning. 30 What has incentive value for children also changes with experience. At the earliest level, infants and young children are motivated primarily by the immediate sensory and social effects of their actions. In the course of development, symbolic incentives signifying achievements, the exercise of mas", "title": "" }, { "docid": "2168edeee6171ef9df18f74f9b1d2c47", "text": "We present a novel high-level parallel programming model aimed at graphics processing units (GPUs). We embed GPU kernels as data-parallel array computations in the purely functional language Haskell. GPU and CPU computations can be freely interleaved with the type system tracking the two different modes of computation. The embedded language of array computations is sufficiently limited that our system can automatically extract these computations and compile them to efficient GPU code. In this paper, we outline our approach and present the results of a few preliminary benchmarks.", "title": "" }, { "docid": "8f24898cb21a259d9260b67202141d49", "text": "PROBLEM\nHow can human contributions to accidents be reconstructed? Investigators can easily take the position a of retrospective outsider, looking back on a sequence of events that seems to lead to an inevitable outcome, and pointing out where people went wrong. This does not explain much, however, and may not help prevent recurrence.\n\n\nMETHOD AND RESULTS\nThis paper examines how investigators can reconstruct the role that people contribute to accidents in light of what has recently become known as the new view of human error. The commitment of the new view is to move controversial human assessments and actions back into the flow of events of which they were part and which helped bring them forth, to see why assessments and actions made sense to people at the time. The second half of the paper addresses one way in which investigators can begin to reconstruct people's unfolding mindsets.\n\n\nIMPACT ON INDUSTRY\nIn an era where a large portion of accidents are attributed to human error, it is critical to understand why people did what they did, rather than judging them for not doing what we now know they should have done. This paper helps investigators avoid the traps of hindsight by presenting a method with which investigators can begin to see how people's actions and assessments actually made sense at the time.", "title": "" }, { "docid": "0b631a4139efb14c1fe43876b29cf1c6", "text": "In recent years, remote sensing image data have increased significantly due to the improvement of remote sensing technique. On the other hand, data acquisition rate will also be accelerated by increasing satellite sensors. Hence, it is a large challenge to make full use of so considerable data by conventional retrieval approach. The lack of semantic based retrieval capability has impeded application of remote sensing data. To address the issue, we propose a framework based on domain-dependent ontology to perform semantic retrieval in image archives. Firstly, primitive features expressed by color and texture are extracted to gain homogeneous region by means of our unsupervised algorithm. The homogeneous regions are described by high-level concepts depicted and organized by domain specific ontology. Interactive learning technique is employed to associate regions and high-level concepts. These associations are used to perform querying task. Additionally, a reasoning mechanism over ontology integrating an inference engine is discussed. It enables the capability of semantic query in archives by mining the interrelationships among domain concepts and their properties to satisfy users’ requirements. In our framework, ontology is used to provide a sharable and reusable concept set as infrastructure for high level extension such as reasoning. Finally, preliminary results are present and future work is also discussed. KeywordsImage retrieval; Ontology; Semantic reasoning;", "title": "" }, { "docid": "990c1e569bf489d23182d5778a3c1b3f", "text": "The future Internet is an IPv6 network interconnecting traditional computers and a large number of smart objects. This Internet of Things (IoT) will be the foundation of many services and our daily life will depend on its availability and reliable operation. Therefore, among many other issues, the challenge of implementing secure communication in the IoT must be addressed. In the traditional Internet, IPsec is the established and tested way of securing networks. It is therefore reasonable to explore the option of using IPsec as a security mechanism for the IoT. Smart objects are generally added to the Internet using IPv6 over Low-power Wireless Personal Area Networks (6LoWPAN), which defines IP communication for resource-constrained networks. Thus, to provide security for the IoT based on the trusted and tested IPsec mechanism, it is necessary to define an IPsec extension of 6LoWPAN. In this paper, we present such a 6LoWPAN/IPsec extension and show the viability of this approach. We describe our 6LoWPAN/IPsec implementation, which we evaluate and compare with our implementation of IEEE 802.15.4 link-layer security. We also show that it is possible to reuse crypto hardware within existing IEEE 802.15.4 transceivers for 6LoWPAN/IPsec. The evaluation results show that IPsec is a feasible option for securing the IoT in terms of packet size, energy consumption, memory usage, and processing time. Furthermore, we demonstrate that in contrast to common belief, IPsec scales better than link-layer security as the data size and the number of hops grow, resulting in time and energy savings. Copyright © 2012 John Wiley & Sons, Ltd.", "title": "" }, { "docid": "0894fa5925eae1d0f1235115dee8d85e", "text": "Using aperture-fed stacked curl elements, a full corporate-fed millimeter-wave planar broadband circularly polarized antenna array is proposed. First, the stacked curl element is aperture-fed, using the substrate-integrated waveguide (SIW) feeding network. This element is designed under a specific boundary condition, which leads to an excellent agreement of impedance bandwidth and axial ratio (AR) bandwidth between the designed element and the corresponding antenna array. Simulation results show that the antenna element achieves 35.8% impedance bandwidth and 37.8% 3 dB AR bandwidth with a maximum gain of 8.2 dBic. Then, a <inline-formula> <tex-math notation=\"LaTeX\">$2\\times 2$ </tex-math></inline-formula> subarray is designed to achieve 33.1% impedance bandwidth. Next, the full-corporate SIW feeding scheme is utilized to construct the <inline-formula> <tex-math notation=\"LaTeX\">$8\\times 8$ </tex-math></inline-formula> broadband antenna array. Finally, the <inline-formula> <tex-math notation=\"LaTeX\">$8\\times 8$ </tex-math></inline-formula> antenna array is fabricated and its performance is evaluated. Measurement results show that its impedance bandwidth is 35.4%, 3 dB AR bandwidth is 33.8%, and 3 dB gain bandwidth is 32.2% with a peak gain of 23.5 dBic. Considering these three types of bandwidth together, its overall bandwidth is 30.6%. Good efficiency of about 70% is obtained because of the low-loss full-corporate SIW feeding scheme. A <inline-formula> <tex-math notation=\"LaTeX\">$4\\times 4$ </tex-math></inline-formula> multibeam array is also simulated to verify the multibeam potential of the proposed antenna array.", "title": "" }, { "docid": "5f68b3ab2253349941fc1bf7e602c6a2", "text": "Motivated by recent advances in adaptive sparse representations and nonlocal image modeling, we propose a patch-based image interpolation algorithm under a set theoretic framework. Our algorithm alternates the projection onto two convex sets: one is given by the observation data and the other defined by a sparsity-based nonlocal prior similar to BM3D. In order to optimize the design of observation constraint set, we propose to address the issue of sampling pattern and model it by a spatial point process. A Monte-Carlo based algorithm is proposed to optimize the randomness of sampling patterns to better approximate homogeneous Poisson process. Extensive experimental results in image interpolation and coding applications are reported to demonstrate the potential of the proposed algorithms.", "title": "" }, { "docid": "733f5029329072adf5635f0b4d0ad1cb", "text": "We present a new approach to scalable training of deep learning machines by incremental block training with intra-block parallel optimization to leverage data parallelism and blockwise model-update filtering to stabilize learning process. By using an implementation on a distributed GPU cluster with an MPI-based HPC machine learning framework to coordinate parallel job scheduling and collective communication, we have trained successfully deep bidirectional long short-term memory (LSTM) recurrent neural networks (RNNs) and fully-connected feed-forward deep neural networks (DNNs) for large vocabulary continuous speech recognition on two benchmark tasks, namely 309-hour Switchboard-I task and 1,860-hour \"Switch-board+Fisher\" task. We achieve almost linear speedup up to 16 GPU cards on LSTM task and 64 GPU cards on DNN task, with either no degradation or improved recognition accuracy in comparison with that of running a traditional mini-batch based stochastic gradient descent training on a single GPU.", "title": "" }, { "docid": "7209139cc4d9ca5d41eba5e0f5256eb9", "text": "Over the last few years, research on learning and memory has become increasingly interdisciplinary. In the past, theories of learning, as a prerogative of psychologists, were generally formulated in purely verbal terms and evaluated exclusively at the behavioral level. At present, scientists are trying to build theories with a quantitative and biological flavor, seeking to embrace more complex behavioral phenomena. Pavlovian conditioning, one of the simplest and ubiquitous forms of learning, is especially suited for this multiple level analysis (i.e., quantitative, neurobiological, and behavioral), in part because of recent discoveries showing a correspondence between behavioral phenomena and associative properties at the cellular and systems levels, and in part because of its well established quantitative theoretical tradition. The present review, examines the mayor quantitative theories of Pavlovian conditioning and the phenomena to which they have been designed to account. In order to provide researchers from different disciplines with a simple guideline about the rationale of the different theoretical choices, all the models are described through a single formalism based on the neural network connectionist perspective.", "title": "" }, { "docid": "507a60e62e9d2086481e7a306d012e52", "text": "Health monitoring systems have rapidly evolved recently, and smart systems have been proposed to monitor patient current health conditions, in our proposed and implemented system, we focus on monitoring the patient's blood pressure, and his body temperature. Based on last decade statistics of medical records, death rates due to hypertensive heart disease, shows that the blood pressure is a crucial risk factor for atherosclerosis and ischemic heart diseases; thus, preventive measures should be taken against high blood pressure which provide the ability to track, trace and save patient's life at appropriate time is an essential need for mankind. Nowadays, Globalization demands Smart cities, which involves many attributes and services, such as government services, Intelligent Transportation Systems (ITS), energy, health care, water and waste. This paper proposes a system architecture for smart healthcare based on GSM and GPS technologies. The objective of this work is providing an effective application for Real Time Health Monitoring and Tracking. The system will track, trace, monitor patients and facilitate taking care of their health; so efficient medical services could be provided at appropriate time. By Using specific sensors, the data will be captured and compared with a configurable threshold via microcontroller which is defined by a specialized doctor who follows the patient; in any case of emergency a short message service (SMS) will be sent to the Doctor's mobile number along with the measured values through GSM module. furthermore, the GPS provides the position information of the monitored person who is under surveillance all the time. Moreover, the paper demonstrates the feasibility of realizing a complete end-to-end smart health system responding to the real health system design requirements by taking in consideration wider vital human health parameters such as respiration rate, nerves signs ... etc. The system will be able to bridge the gap between patients - in dramatic health change occasions- and health entities who response and take actions in real time fashion.", "title": "" }, { "docid": "1be9813cd6765a4d3df0f84ff8580256", "text": "Deep learning models learn to fit training data while they are highly expected to generalize well to testing data. Most works aim at finding such models by creatively designing architectures and fine-tuning parameters. To adapt to particular tasks, hand-crafted information such as image prior has also been incorporated into end-to-end learning. However, very little progress has been made on investigating how an individual training sample will influence the generalization ability of a model. In other words, to achieve high generalization accuracy, do we really need all the samples in a training dataset? In this paper, we demonstrate that deep learning models such as convolutional neural networks may not favor all training samples, and generalization accuracy can be further improved by dropping those unfavorable samples. Specifically, the influence of removing a training sample is quantifiable, and we propose a Two-Round Training approach, aiming to achieve higher generalization accuracy. We locate unfavorable samples after the first round of training, and then retrain the model from scratch with the reduced training dataset in the second round. Since our approach is essentially different from fine-tuning or further training, the computational cost should not be a concern. Our extensive experimental results indicate that, with identical settings, the proposed approach can boost performance of the well-known networks on both high-level computer vision problems such as image classification, and low-level vision problems such as image denoising.", "title": "" }, { "docid": "bb31ee54930ed5e3f807bdb93dcb8b80", "text": "Darwin charted the field of emotional expressions with five major contributions. Possible explanations of why he was able to make such important and lasting contributions are proposed. A few of the important questions that he did not consider are described. Two of those questions have been answered at least in part; one remains a major gap in our understanding of emotion.", "title": "" }, { "docid": "b585947e882fca6f07b65dc940cc819f", "text": "One way to help all users of commercial Web search engines be more successful in their searches is to better understand what those users with greater search expertise are doing, and use this knowledge to benefit everyone. In this paper we study the interaction logs of advanced search engine users (and those not so advanced) to better understand how these user groups search. The results show that there are marked differences in the queries, result clicks, post-query browsing, and search success of users we classify as advanced (based on their use of query operators), relative to those classified as non-advanced. Our findings have implications for how advanced users should be supported during their searches, and how their interactions could be used to help searchers of all experience levels find more relevant information and learn improved searching strategies.", "title": "" }, { "docid": "1ceee71530d920adb32f4cab56b0c4a2", "text": "Requirement analysis is the preliminary step in software development process. The requirements stated by the clients are analyzed and an abstraction of it, is created which is termed as requirement model. The automatic generation of UML diagram from natural language requirements is highly challenging and demanding very efficient methodology. Unified Modeling Language (UML) models are helpful for understanding the problems, communicating with application experts and preparing documentation. The static design view of the system can be modeled using a UML class diagram. System requirements stated by the user are usually in natural language form. This is an imprecise and inconsistent form which is difficult to be used by the developer for design UML model. We present a new methodology for generating UML diagrams or models from natural language problem statement or requirement specification. We have named our methodology as Requirement analysis and UML diagram extraction (RAUE).", "title": "" }, { "docid": "e6b9c0064a8dcf2790a891e20a5bb01d", "text": "The difficulty in inverse reinforcement learning (IRL) aris es in choosing the best reward function since there are typically an infinite number of eward functions that yield the given behaviour data as optimal. Using a Bayes i n framework, we address this challenge by using the maximum a posteriori (MA P) estimation for the reward function, and show that most of the previous IRL al gorithms can be modeled into our framework. We also present a gradient metho d for the MAP estimation based on the (sub)differentiability of the poster ior distribution. We show the effectiveness of our approach by comparing the performa nce of the proposed method to those of the previous algorithms.", "title": "" }, { "docid": "e65d522f6b08eeebb8a488b133439568", "text": "We propose a bootstrap learning algorithm for salient object detection in which both weak and strong models are exploited. First, a weak saliency map is constructed based on image priors to generate training samples for a strong model. Second, a strong classifier based on samples directly from an input image is learned to detect salient pixels. Results from multiscale saliency maps are integrated to further improve the detection performance. Extensive experiments on six benchmark datasets demonstrate that the proposed bootstrap learning algorithm performs favorably against the state-of-the-art saliency detection methods. Furthermore, we show that the proposed bootstrap learning approach can be easily applied to other bottom-up saliency models for significant improvement.", "title": "" } ]
scidocsrr
f2360d10268383bcfbe6fea7f9cdb2bc
I would DiYSE for it!: a manifesto for do-it-yourself internet-of-things creation
[ { "docid": "b06dcdb662a8d55219c9ae1c7e507987", "text": "Most programs today are written not by professional software developers, but by people with expertise in other domains working towards goals for which they need computational support. For example, a teacher might write a grading spreadsheet to save time grading, or an interaction designer might use an interface builder to test some user interface design ideas. Although these end-user programmers may not have the same goals as professional developers, they do face many of the same software engineering challenges, including understanding their requirements, as well as making decisions about design, reuse, integration, testing, and debugging. This article summarizes and classifies research on these activities, defining the area of End-User Software Engineering (EUSE) and related terminology. The article then discusses empirical research about end-user software engineering activities and the technologies designed to support them. The article also addresses several crosscutting issues in the design of EUSE tools, including the roles of risk, reward, and domain complexity, and self-efficacy in the design of EUSE tools and the potential of educating users about software engineering principles.", "title": "" }, { "docid": "da2a8e74a56fbcc8c98a74eabaaec59b", "text": "NodeBox is a free application for producing generative art. This paper gives an overview of the nature-inspired functionality in NodeBox and the artworks we created using it. We demonstrate how it can be used for evolutionary computation in the context of computer games and art, and discuss some of our recent research with the aim to simulate (artistic) brainstorming using language processing techniques and semantic networks.", "title": "" } ]
[ { "docid": "dd911eff60469b32330c5627c288f19f", "text": "Routing Algorithms are driving the growth of the data transmission in wireless sensor networks. Contextually, many algorithms considered the data gathering and data aggregation. This paper uses the scenario of clustering and its impact over the SPIN protocol and also finds out the effect over the energy consumption in SPIN after uses of clustering. The proposed scheme is implemented using TCL/C++ programming language and evaluated using Ns2.34 simulator and compare with LEACH. Simulation shows proposed protocol exhibits significant performance gains over the LEACH for lifetime of network and guaranteed data transmission.", "title": "" }, { "docid": "1d4b1612f9e3d3205ced6ba07af21467", "text": "A precision control system that enables a center pivot irrigation system (CP) to precisely supply water in optimal rates relative to the needs of individual areas within fields was developed through a collaboration between the Farmscan group (Perth, Western Australia) and the University of Georgia Precision Farming team at the National Environmentally Sound Production Agriculture Laboratory (NESPAL) in Tifton, GA. The control system, referred to as Variable-Rate Irrigation (VRI), varies application rate by cycling sprinklers on and off and by varying the CP travel speed. Desktop PC software is used to define application maps which are loaded into the VRI controller. The VRI system uses GPS to determine pivot position/angle of the CP mainline. Results from VRI system performance testing indicate good correlation between target and actual application rates and also shows that sprinkler cycling on/off does not alter the CP uniformity. By applying irrigation water in this precise manner, water application to the field is optimized. In many cases, substantial water savings can be realized.", "title": "" }, { "docid": "97d1f0c14edeedd8348058b50fae653b", "text": "A high-efficiency self-shielded microstrip-fed Yagi-Uda antenna has been developed for 60 GHz communications. The antenna is built on a Teflon substrate (εr = 2.2) with a thickness of 10 mils (0.254 mm). A 7-element design results in a measured S11 of <; -10 dB at 56.0 - 66.4 GHz with a gain >; 9.5 dBi at 58 - 63 GHz. The antenna shows excellent performance in free space and in the presence of metal-planes used for shielding purposes. A parametric study is done with metal plane heights from 2 mm to 11 mm, and the Yagi-Uda antenna results in a gain >; 12 dBi at 58 - 63 GHz for h = 5 - 8 mm. A 60 GHz four-element switched-beam Yagi-Uda array is also presented with top and bottom shielding planes, and allows for 180° angular coverage with <; 3 dB amplitude variations. This antenna is ideal for inclusion in complex platforms, such as laptops, for point-to-point communication systems, either as a single element or a switched-beam system.", "title": "" }, { "docid": "77e6593b3078a5d8b23fcb282f90596b", "text": "A graph database is a database where the data structures for the schema and/or instances are modeled as a (labeled)(directed) graph or generalizations of it, and where querying is expressed by graphoriented operations and type constructors. In this article we present the basic notions of graph databases, give an historical overview of its main development, and study the main current systems that implement them.", "title": "" }, { "docid": "f9f92d3b2ea0a4bf769c63b7f1fc884a", "text": "The current taxonomy of probiotic lactic acid bacteria is reviewed with special focus on the genera Lactobacillus, Bifidobacterium and Enterococcus. The physiology and taxonomic position of species and strains of these genera were investigated by phenotypic and genomic methods. In total, 176 strains, including the type strains, have been included. Phenotypic methods applied were based on biochemical, enzymatical and physiological characteristics, including growth temperatures, cell wall analysis and analysis of the total soluble cytoplasmatic proteins. Genomic methods used were pulsed field gel electrophoresis (PFGE), randomly amplified polymorphic DNA-PCR (RAPD-PCR) and DNA-DNA hybridization for bifidobacteria. In the genus Lactobacillus the following species of importance as probiotics were investigated: L. acidophilus group, L. casei group and L. reuteri/L. fermentum group. Most strains referred to as L. acidophilus in probiotic products could be identified either as L. gasseri or as L. johnsonii, both members of the L. acidophilus group. A similar situation could be shown in the L. casei group, where most of the strains named L. casei belonged to L. paracasei subspp. A recent proposal to reject the species L. paracasei and to include this species in the restored species L. casei with a neotype strain was supported by protein analysis. Bifidobacterium spp. strains have been reported to be used for production of fermented dairy and recently of probiotic products. According to phenotypic features and confirmed by DNA-DNA hybridization most of the bifidobacteria strains from dairy origin belonged to B. animalis, although they were often declared as B. longum by the manufacturer. From the genus Enterococcus, probiotic Ec. faecium strains were investigated with regard to the vanA-mediated resistance against glycopeptides. These unwanted resistances could be ruled out by analysis of the 39 kDa resistance protein. In conclusion, the taxonomy and physiology of probiotic lactic acid bacteria can only be understood by using polyphasic taxonomy combining morphological, biochemical and physiological characteristics with molecular-based phenotypic and genomic techniques.", "title": "" }, { "docid": "ff619ce19b787d32aa78a6ac295d1f1d", "text": "Mullerian duct anomalies (MDAs) are rare, affecting approximately 1% of all women and about 3% of women with poor reproductive outcomes. These congenital anomalies usually result from one of the following categories of abnormalities of the mullerian ducts: failure of formation (no development or underdevelopment) or failure of fusion of the mullerian ducts. The American Fertility Society (AFS) classification of uterine anomalies is widely accepted and includes seven distinct categories. MR imaging has consolidated its role as the imaging modality of choice in the evaluation of MDA. MRI is capable of demonstrating the anatomy of the female genital tract remarkably well and is able to provide detailed images of the intra-uterine zonal anatomy, delineate the external fundal contour of the uterus, and comprehensively image the entire female pelvis in multiple imaging planes in a single examination. The purpose of this pictorial essay is to show the value of MRI in the diagnosis of MDA and to review the key imaging features of anomalies of formation and fusion, emphasizing the relevance of accurate diagnosis before therapeutic intervention.", "title": "" }, { "docid": "ffb03136c1f8d690be696f65f832ab11", "text": "This paper aims to improve the feature learning in Convolutional Networks (Convnet) by capturing the structure of objects. A new sparsity function is imposed on the extracted featuremap to capture the structure and shape of the learned object, extracting interpretable features to improve the prediction performance. The proposed algorithm is based on organizing the activation within and across featuremap by constraining the node activities through `2 and `1 normalization in a structured form.", "title": "" }, { "docid": "8234cb805d080a13fb9aeab9373f75c8", "text": "Essentially a software system’s utility is determined by both its functionality and its non-functional characteristics, such as usability, flexibility, performance, interoperability and security. Nonetheless, there has been a lop-sided emphasis in the functionality of the software, even though the functionality is not useful or usable without the necessary non-functional characteristics. In this chapter, we review the state of the art on the treatment of non-functional requirements (hereafter, NFRs), while providing some prospects for future", "title": "" }, { "docid": "c819096800cc1d758cd3bcf4949f2690", "text": "Recent years have witnessed the trend of leveraging cloud-based services for large scale content storage, processing, and distribution. Security and privacy are among top concerns for the public cloud environments. Towards these security challenges, we propose and implement, on OpenStack Swift, a new client-side deduplication scheme for securely storing and sharing outsourced data via the public cloud. The originality of our proposal is twofold. First, it ensures better confidentiality towards unauthorized users. That is, every client computes a per data key to encrypt the data that he intends to store in the cloud. As such, the data access is managed by the data owner. Second, by integrating access rights in metadata file, an authorized user can decipher an encrypted file only with his private key.", "title": "" }, { "docid": "a2cf369a67507d38ac1a645e84525497", "text": "Development of a cystic mass on the nasal dorsum is a very rare complication of aesthetic rhinoplasty. Most reported cases are of mucous cyst and entrapment of the nasal mucosa in the subcutaneous space due to traumatic surgical technique has been suggested as a presumptive pathogenesis. Here, we report a case of dorsal nasal cyst that had a different pathogenesis for cyst formation. A 58-yr-old woman developed a large cystic mass on the nasal radix 30 yr after augmentation rhinoplasty with silicone material. The mass was removed via a direct open approach and the pathology findings revealed a foreign body inclusion cyst associated with silicone. Successful nasal reconstruction was performed with autologous cartilages. Discussion and a brief review of the literature will be focused on the pathophysiology of and treatment options for a postrhinoplasty dorsal cyst.", "title": "" }, { "docid": "ee55a72568868837e11da7fabca169fe", "text": "Tying suture knots is a time-consuming task performed frequently during minimally invasive surgery (MIS). Automating this task could greatly reduce total surgery time for patients. Current solutions to this problem replay manually programmed trajectories, but a more general and robust approach is to use supervised machine learning to smooth surgeon-given training trajectories and generalize from them. Since knottying generally requires a controller with internal memory to distinguish between identical inputs that require different actions at different points along a trajectory, it would be impossible to teach the system using traditional feedforward neural nets or support vector machines. Instead we exploit more powerful, recurrent neural networks (RNNs) with adaptive internal states. Results obtained using LSTM RNNs trained by the recent Evolino algorithm show that this approach can significantly increase the efficiency of suture knot tying in MIS over preprogrammed control", "title": "" }, { "docid": "23f0e46a17cd5833b4f8d344041314a3", "text": "Fingerprint recognition and verification are often based on local fingerprint features, usually ridge endings or terminations, also called minutiae. By exploiting the structural uniqueness of the image region around a minutia, the fingerprint recognition performance can be significantly enhanced. However, for most fingerprint images the number of minutia image regions (MIR’s) becomes dramatically large, which imposes especially for embedded systems an enormous memory requirement. Therefore, we are investigating different algorithms for compression of minutia regions. The requirement for these algorithms is to achieve a high compression rate (about 20) with minimum loss in the matching performance of minutia image region matching. In this paper we investigate the matching performance for compression algorithms based on the Principal Component and the wavelet transformation. The matching results are presented in form of normalized ROC curves and interpreted in terms of compression rates and the MIR dimension.", "title": "" }, { "docid": "c4b08fc102c5b28f865f3452286470c6", "text": "Data compression is a method of improving the efficiency of transmission and storage of images. Dithering, as a method of data compression, can be used to convert an 8-bit gray level image into a 1-bit / binary image. Undithering is the process of reconstruction of gray image from binary image obtained from dithering of gray image. In the present paper, I propose a method of undithering using linear filtering followed by anisotropic diffusion which brings the advantage of smoothing and edge enhancement. First-order statistical parameters, second-order statistical parameters, mean-squared error (MSE) between reconstructed image and the original image before dithering, and peak signal to noise ratio (PSNR) are evaluated at each step of diffusion. Results of the experiments show that the reconstructed image is not as sharp as the image before dithering but a large number of gray values are reproduced with reference to those of the original image prior to dithering.", "title": "" }, { "docid": "d903f684b2dacaec1d4b524aa8fe44c1", "text": "The emerging die-stacked DRAM technology allows computer architects to design a last-level cache (LLC) with high memory bandwidth and large capacity. There are four key requirements for DRAM cache design: minimizing on-chip tag storage overhead, optimizing access latency, improving hit rate, and reducing off-chip traffic. These requirements seem mutually incompatible. For example, to reduce the tag storage overhead, the recent proposed LH-cache co-locates tags and data in the same DRAM cache row, and the Alloy Cache proposed to alloy data and tags in the same cache line in a direct-mapped design. However, these ideas either require significant tag lookup latency or sacrifice hit rate for hit latency. To optimize all four key requirements, we propose the Buffered Way Predictor (BWP). The BWP predicts the way ID of a DRAM cache request with high accuracy and coverage, allowing data and tag to be fetched back to back. Thus, the read latency for the data can be completely hidden so that DRAM cache hitting requests have low access latency. The BWP technique is designed for highly associative block-based DRAM caches and achieves a low miss rate and low off-chip traffic. Our evaluation with multi-programmed workloads and a 128MB DRAM cache shows that a 128KB BWP achieves a 76.2% hit rate. The BWP improves performance by 8.8% and 12.3% compared to LH-cache and Alloy Cache, respectively.", "title": "" }, { "docid": "d7c44247c9ac5f686200b9eca9d8d4f0", "text": "The computer game industry requires a skilled workforce and this combined with the complexity of modern games, means that production costs are extremely high. One of the most time consuming aspects is the creation of game geometry, the virtual world which the players inhabit. Procedural techniques have been used within computer graphics to create natural textures, simulate special effects and generate complex natural models including trees and waterfalls. It is these procedural techniques that we intend to harness to generate geometry and textures suitable for a game situated in an urban environment. Procedural techniques can provide many benefits for computer graphics applications when the correct algorithm is used. An overview of several commonly used procedural techniques including fractals, L-systems, Perlin noise, tiling systems and cellular basis is provided. The function of each technique and the resulting output they create are discussed to better understand their characteristics, benefits and relevance to the city generation problem. City generation is the creation of an urban area which necessitates the creation of buildings, situated along streets and arranged in appropriate patterns. Some research has already taken place into recreating road network patterns and generating buildings that can vary in function and architectural style. We will study the main body of existing research into procedural city generation and provide an overview of their implementations and a critique of their functionality and results. Finally we present areas in which further research into the generation of cities is required and outline our research goals for city generation.", "title": "" }, { "docid": "2ff3eff32bc1a53527185d6d1a87b2d3", "text": "This document presents a summary of the latest developments in satellite antennas at MDA. It covers high-performance multibeam antennas used in geostationary missions, low-cost dual-band gimballed Ka-band antennas used in non-geostationary constellations and reconfigurable antennas.", "title": "" }, { "docid": "543a0cdc8101c6f253431c8a4d697be6", "text": "While significant progress has been made in the image captioning task, video description is still comparatively in its infancy, due to the complex nature of video data. Generating multi-sentence descriptions for long videos is even more challenging. Among the main issues are the fluency and coherence of the generated descriptions, and their relevance to the video. Recently, reinforcement and adversarial learning based methods have been explored to improve the image captioning models; however, both types of methods suffer from a number of issues, e.g. poor readability and high redundancy for RL and stability issues for GANs. In this work, we instead propose to apply adversarial techniques during inference, designing a discriminator which encourages better multi-sentence video description. In addition, we find that a multi-discriminator “hybrid” design, where each discriminator targets one aspect of a description, leads to the best results. Specifically, we decouple the discriminator to evaluate on three criteria: 1) visual relevance to the video, 2) language diversity and fluency, and 3) coherence across sentences. Our approach results in more accurate, diverse and coherent multi-sentence video descriptions, as shown by automatic as well as human evaluation on the popular ActivityNet Captions dataset.", "title": "" }, { "docid": "02e3f296f7c0c30cc8320abb7456bc9c", "text": "Purpose – This research aims to examine the relationship between information security strategy and organization performance, with organizational capabilities as important factors influencing successful implementation of information security strategy and organization performance. Design/methodology/approach – Based on existing literature in strategic management and information security, a theoretical model was proposed and validated. A self-administered survey instrument was developed to collect empirical data. Structural equation modeling was used to test hypotheses and to fit the theoretical model. Findings – Evidence suggests that organizational capabilities, encompassing the ability to develop high-quality situational awareness of the current and future threat environment, the ability to possess appropriate means, and the ability to orchestrate the means to respond to information security threats, are positively associated with effective implementation of information security strategy, which in turn positively affects organization performance. However, there is no significant relationship between decision making and information security strategy implementation success. Research limitations/implications – The study provides a starting point for further research on the role of decision-making in information security. Practical implications – Findings are expected to yield practical value for business leaders in understanding the viable predisposition of organizational capabilities in the context of information security, thus enabling firms to focus on acquiring the ones indispensable for improving organization performance. Originality/value – This study provides the body of knowledge with an empirical analysis of organization’s information security capabilities as an aggregation of sense making, decision-making, asset availability, and operations management constructs.", "title": "" }, { "docid": "1177ddef815db481082feb75afd79ec5", "text": "This paper explores three main areas, firstly, website accessibility guidelines; secondly, website accessibility tools and finally the implication of human factors in the process of implementing successful e-Government websites. It investigates the issues that make a website accessible and explores the importance placed on web usability and accessibility with respect to e-Government websites. It briefly examines accessibility guidelines, evaluation methods and analysis tools. It then evaluates the web accessibility of e-Government websites of Saudi Arabia and Oman by adapting the ‘W3C Web Content Accessibility Guidelines’. Finally, it presents recommendations for improvement of e-Government website accessibility.", "title": "" }, { "docid": "7aae72c04e4b1a230c47d1d481f9e34d", "text": "We present an algorithm for automatic detection of a large number of anthropometric landmarks on 3D faces. Our approach does not use texture and is completely shape based in order to detect landmarks that are morphologically significant. The proposed algorithm evolves level set curves with adaptive geometric speed functions to automatically extract effective seed points for dense correspondence. Correspondences are established by minimizing the bending energy between patches around seed points of given faces to those of a reference face. Given its hierarchical structure, our algorithm is capable of establishing thousands of correspondences between a large number of faces. Finally, a morphable model based on the dense corresponding points is fitted to an unseen query face for transfer of correspondences and hence automatic detection of landmarks. The proposed algorithm can detect any number of pre-defined landmarks including subtle landmarks that are even difficult to detect manually. Extensive experimental comparison on two benchmark databases containing 6, 507 scans shows that our algorithm outperforms six state of the art algorithms.", "title": "" } ]
scidocsrr
8273a14719375c386589fbfadf432e2a
An Analytical Study of Routing Attacks in Vehicular Ad-hoc Networks ( VANETs )
[ { "docid": "fd61461d5033bca2fd5a2be9bfc917b7", "text": "Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness and efficiency.", "title": "" } ]
[ { "docid": "c504800ce08654fb5bf49356d2f7fce3", "text": "Memristive synapses, the most promising passive devices for synaptic interconnections in artificial neural networks, are the driving force behind recent research on hardware neural networks. Despite significant efforts to utilize memristive synapses, progress to date has only shown the possibility of building a neural network system that can classify simple image patterns. In this article, we report a high-density cross-point memristive synapse array with improved synaptic characteristics. The proposed PCMO-based memristive synapse exhibits the necessary gradual and symmetrical conductance changes, and has been successfully adapted to a neural network system. The system learns, and later recognizes, the human thought pattern corresponding to three vowels, i.e. /a /, /i /, and /u/, using electroencephalography signals generated while a subject imagines speaking vowels. Our successful demonstration of a neural network system for EEG pattern recognition is likely to intrigue many researchers and stimulate a new research direction.", "title": "" }, { "docid": "d5509e4d4165872122609deddb440d40", "text": "Model selection with cross validation (CV) is very popular in machine learning. However, CV with grid and other common search strategies cannot guarantee to find the model with minimum CV error, which is often the ultimate goal of model selection. Recently, various solution path algorithms have been proposed for several important learning algorithms including support vector classification, Lasso, and so on. However, they still do not guarantee to find the model with minimum CV error. In this paper, we first show that the solution paths produced by various algorithms have the property of piecewise linearity. Then, we prove that a large class of error (or loss) functions are piecewise constant, linear, or quadratic w.r.t. the regularization parameter, based on the solution path. Finally, we propose a new generalized error path algorithm (GEP), and prove that it will find the model with minimum CV error for the entire range of the regularization parameter. The experimental results on a variety of datasets not only confirm our theoretical findings, but also show that the best model with our GEP has better generalization error on the test data, compared to the grid search, manual search, and random search.", "title": "" }, { "docid": "914daf0fd51e135d6d964ecbe89a5b29", "text": "Large-scale parallel programming environments and algorithms require efficient group-communication on computing systems with failing nodes. Existing reliable broadcast algorithms either cannot guarantee that all nodes are reached or are very expensive in terms of the number of messages and latency. This paper proposes Corrected-Gossip, a method that combines Monte Carlo style gossiping with a deterministic correction phase, to construct a Las Vegas style reliable broadcast that guarantees reaching all the nodes at low cost. We analyze the performance of this method both analytically and by simulations and show how it reduces the latency and network load compared to existing algorithms. Our method improves the latency by 20% and the network load by 53% compared to the fastest known algorithm on 4,096 nodes. We believe that the principle of corrected-gossip opens an avenue for many other reliable group communication operations.", "title": "" }, { "docid": "b5f8f310f2f4ed083b20f42446d27feb", "text": "This paper provides algorithms that use an information-theoretic analysis to learn Bayesian network structures from data. Based on our three-phase learning framework, we develop efficient algorithms that can effectively learn Bayesian networks, requiring only polynomial numbers of conditional independence (CI) tests in typical cases. We provide precise conditions that specify when these algorithms are guaranteed to be correct as well as empirical evidence (from real world applications and simulation tests) that demonstrates that these systems work efficiently and reliably in practice.", "title": "" }, { "docid": "c7daf28d656a9e51e5a738e70beeadcf", "text": "We present a taxonomy for Information Visualization (IV) that characterizes it in terms of data, task, skill and context, as well as a number of dimensions that relate to the input and output hardware, the software tools, as well as user interactions and human perceptual abil ities. We il lustrate the utilit y of the taxonomy by focusing particularly on the information retrieval task and the importance of taking into account human perceptual capabiliti es and limitations. Although the relevance of Psychology to IV is often recognised, we have seen relatively littl e translation of psychological results and theory to practical IV applications. This paper targets the better development of information visualizations through the introduction of a framework delineating the major factors in interface development. We believe that higher quality visualizations will result from structured developments that take into account these considerations and that the framework will also serve to assist the development of effective evaluation and assessment processes.", "title": "" }, { "docid": "e4cea8ba1de77c94b658c83b08d4c584", "text": "Algorithms, IEEE.it can be combined with many IP address lookup algorithms for fast update. Surveys on address lookup algorithms were given in 5 11 9. Ruiz-Sanchez, E.W. Dabbous, Survey and Taxonomy of. IP.AbstractIP address lookup is a key bottleneck for. Lookup algorithm based on a new memory organization. Survey and taxonomy of IP address lookup.IP routing requires that a router perform a longest-prefix-match address lookup for each incoming datagram in order to determine the datagrams next. A very quick survey at the time of writing indicates that.", "title": "" }, { "docid": "65a4709f62c084cdd07fe54d834b8eaf", "text": "Although in the era of third generation (3G) mobile networks technical hurdles are minor, the continuing failure of mobile payments (m-payments) withstands the endorsement by customers and service providers. A major reason is the uncommonly high interdependency of technical, human and market factors which have to be regarded and orchestrated cohesively to solve the problem. In this paper, we apply Business Model Ontology in order to develop an m-payment business model framework based on the results of a precedent multi case study analysis of 27 m-payment procedures. The framework is depicted with a system of morphological boxes and the interrelations between the associated characteristics. Representing any m-payment business model along with its market setting and influencing decisions as instantiations, the resulting framework enables researchers and practitioners for comprehensive analysis of existing and future models and provides a helpful tool for m-payment business model engineering.", "title": "" }, { "docid": "d9f0f36e75c08d2c3097e85d8c2dec36", "text": "Social software solutions in enterprises such as IBM Connections are said to have the potential to support communication and collaboration among employees. However, companies are faced to manage the adoption of such collaborative tools and therefore need to raise the employees’ acceptance and motivation. To solve these problems, developers started to implement Gamification elements in social software tools, which aim to increase users’ motivation. In this research-in-progress paper, we give first insights and critically examine the current market of leading social software solutions to find out which Gamification approaches are implementated in such collaborative tools. Our findings show, that most of the major social collaboration solutions do not offer Gamification features by default, but leave the integration to a various number of third party plug-in vendors. Furthermore we identify a trend in which Gamification solutions majorly focus on rewarding quantitative improvement of work activities, neglecting qualitative performance. Subsequently, current solutions do not match recent findings in research and ignore risks that can lower the employees’ motivation and work performance in the long run.", "title": "" }, { "docid": "9d089af812c0fdd245a218362d88b62a", "text": "Interaction is increasingly a public affair, taking place in our theatres, galleries, museums, exhibitions and on the city streets. This raises a new design challenge for HCI - how should spectators experience a performer's interaction with a computer? We classify public interfaces (including examples from art, performance and exhibition design) according to the extent to which a performer's manipulations of an interface and their resulting effects are hidden, partially revealed, fully revealed or even amplified for spectators. Our taxonomy uncovers four broad design strategies: 'secretive,' where manipulations and effects are largely hidden; 'expressive,' where they tend to be revealed enabling the spectator to fully appreciate the performer's interaction; 'magical,' where effects are revealed but the manipulations that caused them are hidden; and finally 'suspenseful,' where manipulations are apparent but effects are only revealed as the spectator takes their turn.", "title": "" }, { "docid": "100c152685655ad6865f740639dd7d57", "text": "Semantic image inpainting is a challenging task where large missing regions have to be filled based on the available visual data. Existing methods which extract information from only a single image generally produce unsatisfactory results due to the lack of high level context. In this paper, we propose a novel method for semantic image inpainting, which generates the missing content by conditioning on the available data. Given a trained generative model, we search for the closest encoding of the corrupted image in the latent image manifold using our context and prior losses. This encoding is then passed through the generative model to infer the missing content. In our method, inference is possible irrespective of how the missing content is structured, while the state-of-the-art learning based method requires specific information about the holes in the training phase. Experiments on three datasets show that our method successfully predicts information in large missing regions and achieves pixel-level photorealism, significantly outperforming the state-of-the-art methods.", "title": "" }, { "docid": "e577c2827822bfe2f1fc177efeeef732", "text": "This paper presents a control problem involving an experimental propeller setup that is called the twin rotor multi-input multi-output system (TRMS). The control objective is to make the beam of the TRMS move quickly and accurately to the desired attitudes, both the pitch angle and the azimuth angle in the condition of decoupling between two axes. It is difficult to design a suitable controller because of the influence between the two axes and nonlinear movement. For easy demonstration in the vertical and horizontal separately, the TRMS is decoupled by the main rotor and tail rotor. An intelligent control scheme which utilizes a hybrid PID controller is implemented to this problem. Simulation results show that the new approach to the TRMS control problem can improve the tracking performance and reduce control energy.", "title": "" }, { "docid": "f50c735147be5112bc3c81107002d99a", "text": "Over the years, several spatio-temporal interest point detectors have been proposed. While some detectors can only extract a sparse set of scaleinvariant features, others allow for the detection of a larger amount of features at user-defined scales. This paper presents for the first time spatio-temporal interest points that are at the same time scale-invariant (both spatially and temporally) and densely cover the video content. Moreover, as opposed to earlier work, the features can be computed efficiently. Applying scale-space theory, we show that this can be achieved by using the determinant of the Hessian as the saliency measure. Computations are speeded-up further through the use of approximative box-filter operations on an integral video structure. A quantitative evaluation and experimental results on action recognition show the strengths of the proposed detector in terms of repeatability, accuracy and speed, in comparison with previously proposed detectors.", "title": "" }, { "docid": "40aa8b356983686472b3d2871add4491", "text": "Illegal logging is in these days widespread problem. In this paper we propose the system based on principles of WSN for monitoring the forest. Acoustic signal processing and evaluation system described in this paper is dealing with the detection of chainsaw sound with autocorrelation method. This work is describing first steps in building the integrated system.", "title": "" }, { "docid": "c07c69bf5e2fce6f9944838ce80b5b8c", "text": "Many image editing applications rely on the analysis of image patches. In this paper, we present a method to analyze patches by embedding them to a vector space, in which the Euclidean distance reflects patch similarity. Inspired by Word2Vec, we term our approach Patch2Vec. However, there is a significant difference between words and patches. Words have a fairly small and well defined dictionary. Image patches, on the other hand, have no such dictionary and the number of different patch types is not well defined. The problem is aggravated by the fact that each patch might contain several objects and textures. Moreover, Patch2Vec should be universal because it must be able to map never-seen-before texture to the vector space. The mapping is learned by analyzing the distribution of all natural patches. We use Convolutional Neural Networks (CNN) to learn Patch2Vec. In particular, we train a CNN on labeled images with a triplet-loss objective function. The trained network encodes a given patch to a 128D vector. Patch2Vec is evaluated visually, qualitatively, and quantitatively. We then use several variants of an interactive single-click image segmentation algorithm to demonstrate the power of our method.", "title": "" }, { "docid": "43f9cd44dee709339fe5b11eb73b15b6", "text": "Mutual interference of radar systems has been identified as one of the major challenges for future automotive radar systems. In this work the interference of frequency (FMCW) and phase modulated continuous wave (PMCW) systems is investigated by means of simulations. All twofold combinations of the aforementioned systems are considered. The interference scenario follows a typical use-case from the well-known MOre Safety for All by Radar Interference Mitigation (MOSARIM) study. The investigated radar systems operate with similar system parameters to guarantee a certain comparability, but with different waveform durations, and chirps with different slopes and different phase code sequences, respectively. Since the effects in perfect synchrony are well understood, we focus on the cases where both systems exhibit a certain asynchrony. It is shown that the energy received from interferers can cluster in certain Doppler bins in the range-Doppler plane when systems exhibit a slight asynchrony.", "title": "" }, { "docid": "3176f0a4824b2dd11d612d55b4421881", "text": "This article reviews some of the criticisms directed towards the eclectic paradigm of international production over the past decade, and restates its main tenets. The second part of the article considers a number of possible extensions of the paradigm and concludes by asserting that it remains \"a robust general framework for explaining and analysing not only the economic rationale of economic production but many organisational nd impact issues in relation to MNE activity as well.\"", "title": "" }, { "docid": "811c430ff9efd0f8a61ff40753f083d4", "text": "The Waikato Environment for Knowledge Analysis (Weka) is a comprehensive suite of Java class libraries that implement many state-of-the-art machine learning and data mining algorithms. Weka is freely available on the World-Wide Web and accompanies a new text on data mining [1] which documents and fully explains all the algorithms it contains. Applications written using the Weka class libraries can be run on any computer with a Web browsing capability; this allows users to apply machine learning techniques to their own data regardless of computer platform.", "title": "" }, { "docid": "5859379f3c4c5a7186c9dc8c85e1e384", "text": "Purpose – Investigate the use of two imaging-based methods – coded pattern projection and laser-based triangulation – to generate 3D models as input to a rapid prototyping pipeline. Design/methodology/approach – Discusses structured lighting technologies as suitable imaging-based methods. Two approaches, coded-pattern projection and laser-based triangulation, are specifically identified and discussed in detail. Two commercial systems are used to generate experimental results. These systems include the Genex Technologies 3D FaceCam and the Integrated Vision Products Ranger System. Findings – Presents 3D reconstructions of objects from each of the commercial systems. Research limitations/implications – Provides background in imaging-based methods for 3D data collection and model generation. A practical limitation is that imaging-based systems do not currently meet accuracy requirements, but continued improvements in imaging systems will minimize this limitation. Practical implications – Imaging-based approaches to 3D model generation offer potential to increase scanning time and reduce scanning complexity. Originality/value – Introduces imaging-based concepts to the rapid prototyping pipeline.", "title": "" }, { "docid": "ab97caed9c596430c3d76ebda55d5e6e", "text": "A 1.5 GHz low noise amplifier for a Global Positioning System (GPS) receiver has been implemented in a 0.6 /spl mu/m CMOS process. This amplifier provides a forward gain of 22 dB with a noise figure of only 3.5 dB while drawing 30 mW from a 1.5 V supply. To the authors' knowledge, this represents the lowest noise figure reported to date for a CMOS amplifier operating above 1 GHz.", "title": "" }, { "docid": "60d8839833d10b905729e3d672cafdd6", "text": "In order to account for the phenomenon of virtual pitch, various theories assume implicitly or explicitly that each spectral component introduces a series of subharmonics. The spectral-compression method for pitch determination can be viewed as a direct implementation of this principle. The widespread application of this principle in pitch determination is, however, impeded by numerical problems with respect to accuracy and computational efficiency. A modified algorithm is described that solves these problems. Its performance is tested for normal speech and \"telephone\" speech, i.e., speech high-pass filtered at 300 Hz. The algorithm out-performs the harmonic-sieve method for pitch determination, while its computational requirements are about the same. The algorithm is described in terms of nonlinear system theory, i.c., subharmonic summation. It is argued that the favorable performance of the subharmonic-summation algorithm stems from its corresponding more closely with current pitch-perception theories than does the harmonic sieve.", "title": "" } ]
scidocsrr
3a89727104542a4a01df5ffb1bb1fc17
Graph-Preserving Sparse Nonnegative Matrix Factorization With Application to Facial Expression Recognition
[ { "docid": "1c846a6fc89142f96707e8fd71e86818", "text": "In this paper, we report our experiments on feature-based facial expression recognition within an architecture based on a two-layer perceptron. We investigate the use of two types of features extracted from face images: the geometric positions of a set of fiducial points on a face, and a set of multi-scale and multi-orientation Gabor wavelet coefficients at these points. They can be used either independently or jointly. The recognition performance with different types of features has been compared, which shows that Gabor wavelet coefficients are much more powerful than geometric positions. Furthermore, since the first layer of the perceptron actually performs a nonlinear reduction of the dimensionality of the feature space, we have also studied the desired number of hidden units, i.e., the appropriate dimension to represent a facial expression in order to achieve a good recognition rate. It turns out that five to seven hidden units are probably enough to represent the space of feature expressions. Then, we have investigated the importance of each individual fiducial point to facial expression recognition. Sensitivity analysis reveals that points on cheeks and on forehead carry little useful information. After discarding them, not only the computational efficiency increases, but also the generalization performance slightly improves. Finally, we have studied the significance of image scales. Experiments show that facial expression recognition is mainly a low frequency process, and a spatial resolution of 64 pixels 64 pixels is probably enough.", "title": "" }, { "docid": "c30fe4a7563090638a3bcc943c1cb328", "text": "In order to investigate the role of facial movement in the recognition of emotions, faces were covered with black makeup and white spots. Video recordings of such faces were played back so that only the white spots were visible. The results demonstrated that moving displays of happiness, sadness, fear, surprise, anger and disgust were recognized more accurately than static displays of the white spots at the apex of the expressions. This indicated that facial motion, in the absence of information about the shape and position of facial features, is informative about these basic emotions. Normally illuminated dynamic displays of these expressions, however, were recognized more accurately than displays of moving spots. The relative effectiveness of upper and lower facial areas for the recognition of these six emotions was also investigated using normally illuminated and spots-only displays. In both instances the results indicated that different facial regions are more informative for different emitions. The movement patterns characterizing the various emotional expressions as well as common confusions between emotions are also discussed.", "title": "" }, { "docid": "da168a94f6642ee92454f2ea5380c7f3", "text": "One of the central problems in machine learning and pattern recognition is to develop appropriate representations for complex data. We consider the problem of constructing a representation for data lying on a low-dimensional manifold embedded in a high-dimensional space. Drawing on the correspondence between the graph Laplacian, the Laplace Beltrami operator on the manifold, and the connections to the heat equation, we propose a geometrically motivated algorithm for representing the high-dimensional data. The algorithm provides a computationally efficient approach to nonlinear dimensionality reduction that has locality-preserving properties and a natural connection to clustering. Some potential applications and illustrative examples are discussed.", "title": "" }, { "docid": "1e2768be2148ff1fd102c6621e8da14d", "text": "Example-based learning for computer vision can be difficult when a large number of examples to represent each pattern or object class is not available. In such situations, learning from a small number of samples is of practical value. To study this issue, the task of face expression recognition with a small number of training images of each expression is considered. A new technique based on linear programming for both feature selection and classifier training is introduced. A pairwise framework for feature selection, instead of using all classes simultaneously, is presented. Experimental results compare the method with three others: a simplified Bayes classifier, support vector machine, and AdaBoost. Finally, each algorithm is analyzed and a new categorization of these algorithms is given, especially for learning from examples in the small sample case.", "title": "" }, { "docid": "570bc6b72db11c32292f705378042089", "text": "In this paper, we propose a novel method, called local nonnegative matrix factorization (LNMF), for learning spatially localized, parts-based subspace representation of visual patterns. An objective function is defined to impose localization constraint, in addition to the non-negativity constraint in the standard NMF [1]. This gives a set of bases which not only allows a non-subtractive (part-based) representation of images but also manifests localized features. An algorithm is presented for the learning of such basis components. Experimental results are presented to compare LNMF with the NMF and PCA methods for face representation and recognition, which demonstrates advantages of LNMF.", "title": "" } ]
[ { "docid": "3e4bc9dd99d094292b493687ccccab09", "text": "With an increasing number of technologies supporting transactions over distance and replacing traditional forms of interaction, designing for trust in mediated interactions has become a key concern for researchers in HCI. While much of this research focuses on increasing users’ trust, we present a framework that shifts the perspective towards factors that support trustworthy behavior. In a second step, we analyze how the presence of these factors can be signaled. We argue that it is essential to take a systemic perspective for enabling well-placed trust and trustworthy behavior in the long term. For our analysis we draw on relevant research from sociology, economics, and psychology, as well as HCI. We identify contextual properties (motivation based on temporal, social, and institutional embeddedness) and the actor’s intrinsic properties (ability, and motivation based on internalized norms and benevolence) that form the basis of trustworthy behavior. Our analysis provides a frame of reference for the design of studies on trust in technologymediated interactions, as well as a guide for identifying trust requirements in design processes. We demonstrate the application of the framework in three scenarios: call centre interactions, B2C e-commerce, and voice-enabled online gaming.", "title": "" }, { "docid": "d704917077795fbe16e52ea2385e19ef", "text": "The objectives of this review were to summarize the evidence from randomized controlled trials (RCTs) on the effects of animal-assisted therapy (AAT). Studies were eligible if they were RCTs. Studies included one treatment group in which AAT was applied. We searched the following databases from 1990 up to October 31, 2012: MEDLINE via PubMed, CINAHL, Web of Science, Ichushi Web, GHL, WPRIM, and PsycINFO. We also searched all Cochrane Database up to October 31, 2012. Eleven RCTs were identified, and seven studies were about \"Mental and behavioral disorders\". Types of animal intervention were dog, cat, dolphin, bird, cow, rabbit, ferret, and guinea pig. The RCTs conducted have been of relatively low quality. We could not perform meta-analysis because of heterogeneity. In a study environment limited to the people who like animals, AAT may be an effective treatment for mental and behavioral disorders such as depression, schizophrenia, and alcohol/drug addictions, and is based on a holistic approach through interaction with animals in nature. To most effectively assess the potential benefits for AAT, it will be important for further research to utilize and describe (1) RCT methodology when appropriate, (2) reasons for non-participation, (3) intervention dose, (4) adverse effects and withdrawals, and (5) cost.", "title": "" }, { "docid": "d9a87325efbd29520c37ec46531c6062", "text": "Predicting the risk of potential diseases from Electronic Health Records (EHR) has attracted considerable attention in recent years, especially with the development of deep learning techniques. Compared with traditional machine learning models, deep learning based approaches achieve superior performance on risk prediction task. However, none of existing work explicitly takes prior medical knowledge (such as the relationships between diseases and corresponding risk factors) into account. In medical domain, knowledge is usually represented by discrete and arbitrary rules. Thus, how to integrate such medical rules into existing risk prediction models to improve the performance is a challenge. To tackle this challenge, we propose a novel and general framework called PRIME for risk prediction task, which can successfully incorporate discrete prior medical knowledge into all of the state-of-the-art predictive models using posterior regularization technique. Different from traditional posterior regularization, we do not need to manually set a bound for each piece of prior medical knowledge when modeling desired distribution of the target disease on patients. Moreover, the proposed PRIME can automatically learn the importance of different prior knowledge with a log-linear model.Experimental results on three real medical datasets demonstrate the effectiveness of the proposed framework for the task of risk prediction", "title": "" }, { "docid": "2f6c2a4e83bf86b29fcff77d7937eded", "text": "0957-4174/$ see front matter 2008 Elsevier Ltd. A doi:10.1016/j.eswa.2008.10.027 * Corresponding author. E-mail addresses: cagatay.catal@bte.mam.gov.tr (C (B. Diri). This paper provides a systematic review of previous software fault prediction studies with a specific focus on metrics, methods, and datasets. The review uses 74 software fault prediction papers in 11 journals and several conference proceedings. According to the review results, the usage percentage of public datasets increased significantly and the usage percentage of machine learning algorithms increased slightly since 2005. In addition, method-level metrics are still the most dominant metrics in fault prediction research area and machine learning algorithms are still the most popular methods for fault prediction. Researchers working on software fault prediction area should continue to use public datasets and machine learning algorithms to build better fault predictors. The usage percentage of class-level is beyond acceptable levels and they should be used much more than they are now in order to predict the faults earlier in design phase of software life cycle. 2008 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "f873e55f76905f465e17778f25ba2a79", "text": "PURPOSE\nThe purpose of this study is to develop an automatic human movement classification system for the elderly using single waist-mounted tri-axial accelerometer.\n\n\nMETHODS\nReal-time movement classification algorithm was developed using a hierarchical binary tree, which can classify activities of daily living into four general states: (1) resting state such as sitting, lying, and standing; (2) locomotion state such as walking and running; (3) emergency state such as fall and (4) transition state such as sit to stand, stand to sit, stand to lie, lie to stand, sit to lie, and lie to sit. To evaluate the proposed algorithm, experiments were performed on five healthy young subjects with several activities, such as falls, walking, running, etc.\n\n\nRESULTS\nThe results of experiment showed that successful detection rate of the system for all activities were about 96%. To evaluate long-term monitoring, 3 h experiment in home environment was performed on one healthy subject and 98% of the movement was successfully classified.\n\n\nCONCLUSIONS\nThe results of experiment showed a possible use of this system which can monitor and classify the activities of daily living. For further improvement of the system, it is necessary to include more detailed classification algorithm to distinguish several daily activities.", "title": "" }, { "docid": "f45d6d572325e20bad1eaffe5330f077", "text": "Ongoing brain activity can be recorded as electroen-cephalograph (EEG) to discover the links between emotional states and brain activity. This study applied machine-learning algorithms to categorize EEG dynamics according to subject self-reported emotional states during music listening. A framework was proposed to optimize EEG-based emotion recognition by systematically 1) seeking emotion-specific EEG features and 2) exploring the efficacy of the classifiers. Support vector machine was employed to classify four emotional states (joy, anger, sadness, and pleasure) and obtained an averaged classification accuracy of 82.29% ± 3.06% across 26 subjects. Further, this study identified 30 subject-independent features that were most relevant to emotional processing across subjects and explored the feasibility of using fewer electrodes to characterize the EEG dynamics during music listening. The identified features were primarily derived from electrodes placed near the frontal and the parietal lobes, consistent with many of the findings in the literature. This study might lead to a practical system for noninvasive assessment of the emotional states in practical or clinical applications.", "title": "" }, { "docid": "8813c7c18f0629680f537bdd0afcb1ba", "text": "A fault-tolerant (FT) control approach for four-wheel independently-driven (4WID) electric vehicles is presented. An adaptive control based passive fault-tolerant controller is designed to ensure the system stability when an in-wheel motor/motor driver fault happens. As an over-actuated system, it is challenging to isolate the faulty wheel and accurately estimate the control gain of the faulty in-wheel motor for 4WID electric vehicles. An active fault diagnosis approach is thus proposed to isolate and evaluate the fault. Based on the estimated control gain of the faulty in-wheel motor, the control efforts of all the four wheels are redistributed to relieve the torque demand on the faulty wheel. Simulations using a high-fidelity, CarSim, full-vehicle model show the effectiveness of the proposed in-wheel motor/motor driver fault diagnosis and fault-tolerant control approach.", "title": "" }, { "docid": "5a9c448b9ea2ee797250bbd156805f50", "text": "Clothing segmentation is a challenging field of research which is rapidly gaining attention. This paper presents a system for semantic segmentation of primarily monochromatic clothing and printed/stitched textures in single images or live video. This is especially appealing to emerging augmented reality applications such as retexturing sports players’ shirts with localized adverts or statistics in TV/internet broadcasting. We initialise points on the upper body clothing by body fiducials rather than by applying distance metrics to a detected face. This helps prevent segmentation of the skin rather than clothing. We take advantage of hue and intensity histograms incorporating spatial priors to develop an efficient segmentation method. Evaluated against ground truth on a dataset of 100 people, mostly in groups, the accuracy has an average F-score of 0.97 with an approach which can be over 88% more efficient than the state of the art.", "title": "" }, { "docid": "8ef6a44e42dbc3ba2418a5b72243cdd4", "text": "This study aims to contribute empirical computational results to the understanding of tonality and harmonic structure. It analyses aspects of tonal harmony and harmonic patterns based on a statistical, computational corpus analysis of Bach’s chorales. This is carried out using a novel heuristic method of segmentation developed specifically for that purpose. Analyses of distributions of single pc sets, chord classes and pc set transitions reveal very different structural patterns in both modes, many, but not all of which accord with standard music theory. In addition, most frequent chord transitions are found to exhibit a large degree of asymmetry, or, directedness, in way that for two pc sets A,B the transition frequencies f(A→B) and f(B→A) may differ to a large extent. Distributions of unigrams and bigrams are found to follow a Zipf distribution, i.e. decay in frequency roughly according to 1/x which implies that the majority of the musical structure is governed by a few frequent elements. The findings provide evidence for an underlying harmonic syntax which results in distinct statistical patterns. A subsequent hierarchical cluster analysis of pc sets based on respective antecedent and consequent patterns finds that this information suffices to group chords into meaningful functional groups solely on intrinsic statistical grounds without regard to pitch", "title": "" }, { "docid": "efc63a7feba2dad141177fcd0160f7e2", "text": "Recently, very high resolution (VHR) panchromatic and multispectral (MS) remote-sensing images can be acquired easily. However, it is still a challenging task to fuse and classify these VHR images. Generally, there are two ways for the fusion and classification of panchromatic and MS images. One way is to use a panchromatic image to sharpen an MS image, and then classify a pan-sharpened MS image. Another way is to extract features from panchromatic and MS images, respectively, and then combine these features for classification. In this paper, we propose a superpixel-based multiple local convolution neural network (SML-CNN) model for panchromatic and MS images classification. In order to reduce the amount of input data for the CNN, we extend simple linear iterative clustering algorithm for segmenting MS images and generating superpixels. Superpixels are taken as the basic analysis unit instead of pixels. To make full advantage of the spatial-spectral and environment information of superpixels, a superpixel-based multiple local regions joint representation method is proposed. Then, an SML-CNN model is established to extract an efficient joint feature representation. A softmax layer is used to classify these features learned by multiple local CNN into different categories. Finally, in order to eliminate the adverse effects on the classification results within and between superpixels, we propose a multi-information modification strategy that combines the detailed information and semantic information to improve the classification performance. Experiments on the classification of Vancouver and Xi’an panchromatic and MS image data sets have demonstrated the effectiveness of the proposed approach.", "title": "" }, { "docid": "22ddd01d6658567ef5417829ecfe1104", "text": "Recently electrocorticography (ECoG) has emerged as a potential tool for Brain Computer Interfacing applications. In this paper, a continuous wavelet transform (CWT) based method is proposed for classifying ECoG motor imagery signals corresponding to left pinky and tongue movement. The total experiment is carried out with the publicly available benchmark BCI competition III, data set I. The L2 norms of the CWT coefficients obtained from ECoG signals are shown to be separable for the two classes of motor imagery signals. Then the L2 norm based features are subjected to principal component analysis, yielding a feature set with lower dimension. Among various types of classifiers used, support vector machine based classifiers have been shown to provide a good accuracy of 92% which is shown to be better than several existing techniques. In addition, unlike most of the existing methods, our proposed method involves no pre-processing and thus can have better potential for practical implementation while requiring much lower computational time in extracting the features.", "title": "" }, { "docid": "c582e3c1f3896e5f86b0d322184582fd", "text": "The interest for data mining techniques has increased tremendously during the past decades, and numerous classification techniques have been applied in a wide range of business applications. Hence, the need for adequate performance measures has become more important than ever. In this paper, a cost-benefit analysis framework is formalized in order to define performance measures which are aligned with the main objectives of the end users, i.e., profit maximization. A new performance measure is defined, the expected maximum profit criterion. This general framework is then applied to the customer churn problem with its particular cost-benefit structure. The advantage of this approach is that it assists companies with selecting the classifier which maximizes the profit. Moreover, it aids with the practical implementation in the sense that it provides guidance about the fraction of the customer base to be included in the retention campaign.", "title": "" }, { "docid": "4088b1148b5631f91f012ddc700cc136", "text": "BACKGROUND\nAny standard skin flap of the body including a detectable or identified perforator at its axis can be safely designed and harvested in a free-style fashion.\n\n\nMETHODS\nFifty-six local free-style perforator flaps in the head and neck region, 33 primary and 23 recycle flaps, were performed in 53 patients. The authors introduced the term \"recycle\" to describe a perforator flap harvested within the borders of a previously transferred flap. A Doppler device was routinely used preoperatively for locating perforators in the area adjacent to a given defect. The final flap design and degree of mobilization were decided intraoperatively, depending on the location of the most suitable perforator and the ability to achieve primary closure of the donor site. Based on clinical experience, the authors suggest a useful classification of local free-style perforator flaps.\n\n\nRESULTS\nAll primary and 20 of 23 recycle free-style perforator flaps survived completely, providing tension-free coverage and a pleasing final contour for patients. In the remaining three recycle cases, the skeletonization of the pedicle resulted in pedicle damage, because of surrounding postradiotherapy scarring and flap failure. All donor sites except one were closed primarily, and all of them healed without any complications.\n\n\nCONCLUSIONS\nThe free-style concept has significantly increased the potential and versatility of the standard local and recycled head and neck flap alternatives for moderate to large defects, providing a more robust, custom-made, tissue-sparing, and cosmetically superior outcome in a one-stage procedure, with minimal donor-site morbidity.\n\n\nCLINICAL QUESTION/LEVEL OF EVIDENCE\nTherapeutic, V.", "title": "" }, { "docid": "f584b2d89bacacf31158496460d6f546", "text": "Significant advances in clinical practice as well as basic and translational science were presented at the American Transplant Congress this year. Topics included innovative clinical trials to recent advances in our basic understanding of the scientific underpinnings of transplant immunology. Key areas of interest included the following: clinical trials utilizing hepatitis C virus-positive (HCV+ ) donors for HCV- recipients, the impact of the new allocation policies, normothermic perfusion, novel treatments for desensitization, attempts at precision medicine, advances in xenotransplantation, the role of mitochondria and exosomes in rejection, nanomedicine, and the impact of the microbiota on transplant outcomes. This review highlights some of the most interesting and noteworthy presentations from the meeting.", "title": "" }, { "docid": "2dd3ca2e8e9bc9b6d9ab6d4e8c9c3974", "text": "With the advancement of data acquisition techniques, tensor (multidimensional data) objects are increasingly accumulated and generated, for example, multichannel electroencephalographies, multiview images, and videos. In these applications, the tensor objects are usually nonnegative, since the physical signals are recorded. As the dimensionality of tensor objects is often very high, a dimension reduction technique becomes an important research topic of tensor data. From the perspective of geometry, high-dimensional objects often reside in a low-dimensional submanifold of the ambient space. In this paper, we propose a new approach to perform the dimension reduction for nonnegative tensor objects. Our idea is to use nonnegative Tucker decomposition (NTD) to obtain a set of core tensors of smaller sizes by finding a common set of projection matrices for tensor objects. To preserve geometric information in tensor data, we employ a manifold regularization term for the core tensors constructed in the Tucker decomposition. An algorithm called manifold regularization NTD (MR-NTD) is developed to solve the common projection matrices and core tensors in an alternating least squares manner. The convergence of the proposed algorithm is shown, and the computational complexity of the proposed method scales linearly with respect to the number of tensor objects and the size of the tensor objects, respectively. These theoretical results show that the proposed algorithm can be efficient. Extensive experimental results have been provided to further demonstrate the effectiveness and efficiency of the proposed MR-NTD algorithm.", "title": "" }, { "docid": "8f79360872a095e634e04d34f0c3baea", "text": "T paper formalizes and adapts the well-known concept of Pareto efficiency in the context of the popular robust optimization (RO) methodology for linear optimization problems. We argue that the classical RO paradigm need not produce solutions that possess the associated property of Pareto optimality, and we illustrate via examples how this could lead to inefficiencies and suboptimal performance in practice. We provide a basic theoretical characterization of Pareto robustly optimal (PRO) solutions and extend the RO framework by proposing practical methods that verify Pareto optimality and generate solutions that are PRO. Critically important, our methodology involves solving optimization problems that are of the same complexity as the underlying robust problems; hence, the potential improvements from our framework come at essentially limited extra computational cost. We perform numerical experiments drawn from three different application areas (portfolio optimization, inventory management, and project management), which demonstrate that PRO solutions have a significant potential upside compared with solutions obtained using classical RO methods.", "title": "" }, { "docid": "fbcd8871bc3d8509687698073b97d5de", "text": "A longstanding debate concerns the use of concrete versus abstract instructional materials, particularly in domains such as mathematics and science. Although decades of research have focused on the advantages and disadvantages of concrete and abstract materials considered independently, we argue for an approach that moves beyond this dichotomy and combines their advantages. Specifically, we recommend beginning with concrete materials and then explicitly and gradually fading to the more abstract. Theoretical benefits of this “concreteness fading” technique for mathematics and science instruction include (1) helping learners interpret ambiguous or opaque abstract symbols in terms of well-understood concrete objects, (2) providing embodied perceptual and physical experiences that can ground abstract thinking, (3) enabling learners to build up a store of memorable images that can be used when abstract symbols lose meaning, and (4) guiding learners to strip away extraneous concrete properties and distill the generic, generalizable properties. In these ways, concreteness fading provides advantages that go beyond the sum of the benefits of concrete and abstract materials.", "title": "" }, { "docid": "9b8819832849177b5d7db29386936368", "text": "Artemisinin resistance in Plasmodium falciparum threatens the remarkable efficacy of artemisinin-based combination therapies worldwide. Thus, greater insight into the resistance mechanism using monitoring tools is essential. The ring-stage survival assay is used for phenotyping artemisinin-resistance or decreased artemisinin sensitivity. Here, we review the progress of this measurement assay and explore its limitations and potential applications.", "title": "" }, { "docid": "ee4c6084527c6099ea5394aec66ce171", "text": "Gualzru’s path to the Advertisement World . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Fernando Fernández, Moisés Mart́ınez, Ismael Garćıa-Varea, Jesús Mart́ınez-Gómez, Jose Pérez-Lorenzo, Raquel Viciana, Pablo Bustos, Luis J. Manso, Luis Calderita, Marco Antonio Gutiérrez Giraldo, Pedro Núñez, Antonio Bandera, Adrián Romero-Garcés, Juan Bandera and Rebeca Marfil", "title": "" }, { "docid": "2f9e93892a013452df2cce84374ab7d7", "text": "Minimum cut/maximum flow algorithms on graphs have emerged as an increasingly useful tool for exactor approximate energy minimization in low-level vision. The combinatorial optimization literature provides many min-cut/max-flow algorithms with different polynomial time complexity. Their practical efficiency, however, has to date been studied mainly outside the scope of computer vision. The goal of this paper is to provide an experimental comparison of the efficiency of min-cut/max flow algorithms for applications in vision. We compare the running times of several standard algorithms, as well as a new algorithm that we have recently developed. The algorithms we study include both Goldberg-Tarjan style \"push -relabel\" methods and algorithms based on Ford-Fulkerson style \"augmenting paths.\" We benchmark these algorithms on a number of typical graphs in the contexts of image restoration, stereo, and segmentation. In many cases, our new algorithm works several times faster than any of the other methods, making near real-time performance possible. An implementation of our max-flow/min-cut algorithm is available upon request for research purposes.", "title": "" } ]
scidocsrr
c89c3b365965fb17e44173b4861bd31f
Flexible Spatio-Temporal Networks for Video Prediction
[ { "docid": "3c3ae987e018322ca45b280c3d01eba8", "text": "Boundary prediction in images as well as video has been a very active topic of research and organizing visual information into boundaries and segments is believed to be a corner stone of visual perception. While prior work has focused on predicting boundaries for observed frames, our work aims at predicting boundaries of future unobserved frames. This requires our model to learn about the fate of boundaries and extrapolate motion patterns. We experiment on established realworld video segmentation dataset, which provides a testbed for this new task. We show for the first time spatio-temporal boundary extrapolation in this challenging scenario. Furthermore, we show long-term prediction of boundaries in situations where the motion is governed by the laws of physics. We successfully predict boundaries in a billiard scenario without any assumptions of a strong parametric model or any object notion. We argue that our model has with minimalistic model assumptions derived a notion of “intuitive physics” that can be applied to novel scenes.", "title": "" }, { "docid": "53f7958f77563b9dfaeedf38099cedf2", "text": "The availability of new techniques and tools for Video Surveillance and the capability of storing huge amounts of visual data acquired by hundreds of cameras every day call for a convergence between pattern recognition, computer vision and multimedia paradigms. A clear need for this convergence is shown by new research projects which attempt to exploit both ontology-based retrieval and video analysis techniques also in the field of surveillance. This paper presents the ViSOR (Video Surveillance Online Repository) framework, designed with the aim of establishing an open platform for collecting, annotating, retrieving, and sharing surveillance videos, as well as evaluating the performance of automatic surveillance systems. Annotations are based on a reference ontology which has been defined integrating hundreds of concepts, some of them coming from the LSCOM and MediaMill ontologies. A new annotation classification schema is also provided, which is aimed at identifying the spatial, temporal and domain detail level used. The ViSOR web interface allows video browsing, querying by annotated concepts or by keywords, compressed video previewing, media downloading and uploading. Finally, ViSOR includes a performance evaluation desk which can be used to compare different annotations.", "title": "" } ]
[ { "docid": "36c4b2ab451c24d2d0d6abcbec491116", "text": "A key advantage of scientific workflow systems over traditional scripting approaches is their ability to automatically record data and process dependencies introduced during workflow runs. This information is often represented through provenance graphs, which can be used by scientists to better understand, reproduce, and verify scientific results. However, while most systems record and store data and process dependencies, few provide easy-to-use and efficient approaches for accessing and querying provenance information. Instead, users formulate provenance graph queries directly against physical data representations (e.g., relational, XML, or RDF), leading to queries that are difficult to express and expensive to evaluate. We address these problems through a high-level query language tailored for expressing provenance graph queries. The language is based on a general model of provenance supporting scientific workflows that process XML data and employ update semantics. Query constructs are provided for querying both structure and lineage information. Unlike other languages that return sets of nodes as answers, our query language is closed, i.e., answers to lineage queries are sets of lineage dependencies (edges) allowing answers to be further queried. We provide a formal semantics for the language and present novel techniques for efficiently evaluating lineage queries. Experimental results on real and synthetic provenance traces demonstrate that our lineage based optimizations outperform an in-memory and standard database implementation by orders of magnitude. We also show that our strategies are feasible and can significantly reduce both provenance storage size and query execution time when compared with standard approaches.", "title": "" }, { "docid": "ee0e4dda5654896a27fa6525c23199cc", "text": "This paper addresses the task of designing a modular neural network architecture that jointly solves different tasks. As an example we use the tasks of depth estimation and semantic segmentation given a single RGB image. The main focus of this work is to analyze the cross-modality influence between depth and semantic prediction maps on their joint refinement. While most of the previous works solely focus on measuring improvements in accuracy, we propose a way to quantify the cross-modality influence. We show that there is a relationship between final accuracy and cross-modality influence, although not a simple linear one. Hence a larger cross-modality influence does not necessarily translate into an improved accuracy. We find that a beneficial balance between the cross-modality influences can be achieved by network architecture and conjecture that this relationship can be utilized to understand different network design choices. Towards this end we propose a Convolutional Neural Network (CNN) architecture that fuses the state-of-the-art results for depth estimation and semantic labeling. By balancing the cross-modality influences between depth and semantic prediction, we achieve improved results for both tasks using the NYU-Depth v2 benchmark.", "title": "" }, { "docid": "28bbcecc552dfb78fa434005ae06bf40", "text": "Prominent semantic annotations take an inclusive approach to argument span annotation, marking arguments as full constituency subtrees. Some works, however, showed that identifying a reduced argument span can be beneficial for various semantic tasks. While certain practical methods do extract reduced argument spans, such as in Open-IE , these solutions are often ad-hoc and system-dependent, with no commonly accepted standards. In this paper we propose a generic argument reduction criterion, along with an annotation procedure, and show that it can be consistently and intuitively annotated using the recent QA-SRL paradigm.", "title": "" }, { "docid": "a56a95db6d9d0f0ccf26192b7e2322ff", "text": "CRISPR-Cas9 is a versatile genome editing technology for studying the functions of genetic elements. To broadly enable the application of Cas9 in vivo, we established a Cre-dependent Cas9 knockin mouse. We demonstrated in vivo as well as ex vivo genome editing using adeno-associated virus (AAV)-, lentivirus-, or particle-mediated delivery of guide RNA in neurons, immune cells, and endothelial cells. Using these mice, we simultaneously modeled the dynamics of KRAS, p53, and LKB1, the top three significantly mutated genes in lung adenocarcinoma. Delivery of a single AAV vector in the lung generated loss-of-function mutations in p53 and Lkb1, as well as homology-directed repair-mediated Kras(G12D) mutations, leading to macroscopic tumors of adenocarcinoma pathology. Together, these results suggest that Cas9 mice empower a wide range of biological and disease modeling applications.", "title": "" }, { "docid": "fa691b72e61685d0fa89bf7a821373da", "text": "BACKGROUND\nStabilization of a pelvic discontinuity with a posterior column plate with or without an associated acetabular cage sometimes results in persistent micromotion across the discontinuity with late fatigue failure and component loosening. Acetabular distraction offers an alternative technique for reconstruction in cases of severe bone loss with an associated pelvic discontinuity.\n\n\nQUESTIONS/PURPOSES\nWe describe the acetabular distraction technique with porous tantalum components and evaluate its survival, function, and complication rate in patients undergoing revision for chronic pelvic discontinuity.\n\n\nMETHODS\nBetween 2002 and 2006, we treated 28 patients with a chronic pelvic discontinuity with acetabular reconstruction using acetabular distraction. A porous tantalum elliptical acetabular component was used alone or with an associated modular porous tantalum augment in all patients. Three patients died and five were lost to followup before 2 years. The remaining 20 patients were followed semiannually for a minimum of 2 years (average, 4.5 years; range, 2-7 years) with clinical (Merle d'Aubigné-Postel score) and radiographic (loosening, migration, failure) evaluation.\n\n\nRESULTS\nOne of the 20 patients required rerevision for aseptic loosening. Fifteen patients remained radiographically stable at last followup. Four patients had early migration of their acetabular component but thereafter remained clinically asymptomatic and radiographically stable. At latest followup, the average improvement in the patients not requiring rerevision using the modified Merle d'Aubigné-Postel score was 6.6 (range, 3.3-9.6). There were no postoperative dislocations; however, one patient had an infection, one a vascular injury, and one a bowel injury.\n\n\nCONCLUSIONS\nAcetabular distraction with porous tantalum components provides predictable pain relief and durability at 2- to 7-year followup when reconstructing severe acetabular defects with an associated pelvic discontinuity.\n\n\nLEVEL OF EVIDENCE\nLevel IV, therapeutic study. See Instructions for Authors for a complete description of levels of evidence.", "title": "" }, { "docid": "51c4dd282e85db5741b65ae4386f6c48", "text": "In this paper, we present an end-to-end approach to simultaneously learn spatio-temporal features and corresponding similarity metric for video-based person re-identification. Given the video sequence of a person, features from each frame that are extracted from all levels of a deep convolutional network can preserve a higher spatial resolution from which we can model finer motion patterns. These lowlevel visual percepts are leveraged into a variant of recurrent model to characterize the temporal variation between time-steps. Features from all time-steps are then summarized using temporal pooling to produce an overall feature representation for the complete sequence. The deep convolutional network, recurrent layer, and the temporal pooling are jointly trained to extract comparable hidden-unit representations from input pair of time series to compute their corresponding similarity value. The proposed framework combines time series modeling and metric learning to jointly learn relevant features and a good similarity measure between time sequences of person. Experiments demonstrate that our approach achieves the state-of-the-art performance for video-based person re-identification on iLIDS-VID and PRID 2011, the two primary public datasets for this purpose.", "title": "" }, { "docid": "776688e1b33a5f5b11e0609d8b1b46d2", "text": "Entity resolution (ER) is a process to identify records in information systems, which refer to the same real-world entity. Because in the two recent decades the data volume has grown so large, parallel techniques are called upon to satisfy the ER requirements of high performance and scalability. The development of parallel ER has reached a relatively prosperous stage, and has found its way into several applications. In this work, we first comprehensively survey the state of the art of parallel ER approaches. From the comprehensive overview, we then extract the classification criteria of parallel ER, classify and compare these approaches based on these criteria. Finally, we identify open research questions and challenges and discuss potential solutions and further research potentials in this field. TYPE OF PAPER AND", "title": "" }, { "docid": "d5771929cdaf41ce059e00b35825adf2", "text": "We develop a new collaborative filtering (CF) method that combines both previously known users’ preferences, i.e. standard CF, as well as product/user attributes, i.e. classical function approximation, to predict a given user’s interest in a particular product. Our method is a generalized low rank matrix completion problem, where we learn a function whose inputs are pairs of vectors – the standard low rank matrix completion problem being a special case where the inputs to the function are the row and column indices of the matrix. We solve this generalized matrix completion problem using tensor product kernels for which we also formally generalize standard kernel properties. Benchmark experiments on movie ratings show the advantages of our generalized matrix completion method over the standard matrix completion one with no information about movies or people, as well as over standard multi-task or single task learning methods.", "title": "" }, { "docid": "d52a933abc629237853b41deb63a2022", "text": "BACKGROUND\nTrastuzumab--a humanised monoclonal antibody against HER2--has been shown to improve disease-free survival after chemotherapy in women with HER2-positive early breast cancer. We investigated the drug's effect on overall survival after a median follow-up of 2 years in the Herceptin Adjuvant (HERA) study.\n\n\nMETHODS\nHERA is an international multicentre randomised trial that compared 1 or 2 years of trastuzumab treatment with observation alone after standard neoadjuvant or adjuvant chemotherapy in women with HER2-positive node positive or high-risk node negative breast cancer. 5102 women participated in the trial; we analysed data from 1703 women who had been randomised for treatment with trastuzumab for 1 year and 1698 women from the control group, with median follow-up of 23.5 months (range 0-48 months). The primary endpoint of the trial was disease-free survival. Here, we assess overall survival, a secondary endpoint. Analyses were done on an intent-to-treat basis. This trial is registered with the European Clinical Trials Database, number 2005-002385-11.\n\n\nFINDINGS\n97 (5.7%) patients randomised to observation alone and 58 (3.4%) patients randomised to 1 year of treatment with trastuzumab were lost to follow-up. 172 women stopped trastuzumab prematurely. 59 deaths were reported for trastuzumab and 90 in the control group. The unadjusted hazard ratio (HR) for the risk of death with trastuzumab compared with observation alone was 0.66 (95% CI 0.47-0.91; p=0.0115). 218 disease-free survival events were reported with trastuzumab compared with 321 in the control group. The unadjusted HR for the risk of an event with trastuzumab compared with observation alone was 0.64 (0.54-0.76; p<0.0001).\n\n\nINTERPRETATION\nOur results show that 1 year of treatment with trastuzumab after adjuvant chemotherapy has a significant overall survival benefit after a median follow-up of 2 years. The emergence of this benefit after only 2 years reinforces the importance of trastuzumab in the treatment of women with HER2-positive early breast cancer.", "title": "" }, { "docid": "896edd4e7b3db05d67035a7159b927d6", "text": "Chronic rhinosinusitis (CRS) is a heterogeneous disease characterized by local inflammation of the upper airways and sinuses which persists for at least 12 weeks. CRS can be divided into two phenotypes dependent on the presence of nasal polyps (NPs); CRS with NPs (CRSwNP) and CRS without NPs (CRSsNP). Immunological patterns in the two diseases are known to be different. Inflammation in CRSsNP is rarely investigated and limited studies show that CRSsNP is characterized by type 1 inflammation. Inflammation in CRSwNP is well investigated and CRSwNP in Western countries shows type 2 inflammation and eosinophilia in NPs. In contrast, mixed inflammatory patterns are found in CRSwNP in Asia and the ratio of eosinophilic NPs and non-eosinophilic NPs is almost 50:50 in these countries. Inflammation in eosinophilic NPs is mainly controlled by type 2 cytokines, IL-5 and IL-13, which can be produced from several immune cells including Th2 cells, mast cells and group 2 innate lymphoid cells (ILC2s) that are all elevated in eosinophilic NPs. IL-5 strongly induces eosinophilia. IL-13 activates macrophages, B cells and epithelial cells to induce recruitment of eosinophils and Th2 cells, IgE mediated reactions and remodeling. Epithelial derived cytokines, TSLP, IL-33 and IL-1 can directly and indirectly control type 2 cytokine production from these cells in eosinophilic NPs. Recent clinical trials showed the beneficial effect on eosinophilic NPs and/or asthma by monoclonal antibodies against IL-5, IL-4Rα, IgE and TSLP suggesting that they can be therapeutic targets for eosinophilic CRSwNP.", "title": "" }, { "docid": "4d0522eed482d894b59cc7c3fed23d81", "text": "Extracting knowledge by performing computations on graphs is becoming increasingly challenging as graphs grow in size. A standard approach distributes the graph over a cluster of nodes, but performing computations on a distributed graph is expensive if large amount of data have to be moved. Without partitioning the graph, communication quickly becomes a limiting factor in scaling the system up. Existing graph partitioning heuristics incur high computation and communication cost on large graphs, sometimes as high as the future computation itself. Observing that the graph has to be loaded into the cluster, we ask if the partitioning can be done at the same time with a lightweight streaming algorithm.\n We propose natural, simple heuristics and compare their performance to hashing and METIS, a fast, offline heuristic. We show on a large collection of graph datasets that our heuristics are a significant improvement, with the best obtaining an average gain of 76%. The heuristics are scalable in the size of the graphs and the number of partitions. Using our streaming partitioning methods, we are able to speed up PageRank computations on Spark, a distributed computation system, by 18% to 39% for large social networks.", "title": "" }, { "docid": "73b4cceb1546a94260c75ae8bed8edd8", "text": "We address the problem of distance metric learning (DML), defined as learning a distance consistent with a notion of semantic similarity. Traditionally, for this problem supervision is expressed in the form of sets of points that follow an ordinal relationship – an anchor point x is similar to a set of positive points Y , and dissimilar to a set of negative points Z, and a loss defined over these distances is minimized. While the specifics of the optimization differ, in this work we collectively call this type of supervision Triplets and all methods that follow this pattern Triplet-Based methods. These methods are challenging to optimize. A main issue is the need for finding informative triplets, which is usually achieved by a variety of tricks such as increasing the batch size, hard or semi-hard triplet mining, etc. Even with these tricks, the convergence rate of such methods is slow. In this paper we propose to optimize the triplet loss on a different space of triplets, consisting of an anchor data point and similar and dissimilar proxy points which are learned as well. These proxies approximate the original data points, so that a triplet loss over the proxies is a tight upper bound of the original loss. This proxy-based loss is empirically better behaved. As a result, the proxy-loss improves on state-of-art results for three standard zero-shot learning datasets, by up to 15% points, while converging three times as fast as other triplet-based losses.", "title": "" }, { "docid": "73fdbdbff06b57195cde51ab5135ccbe", "text": "1 Abstract This paper describes five widely-applicable business strategy patterns. The initiate patterns where inspired Michael Porter's work on competitive strategy (1980). By applying the pattern form we are able to explore the strategies and consequences in a fresh light. The patterns form part of a larger endeavour to apply pattern thinking to the business domain. This endeavour seeks to map the business domain in patterns, this involves develop patterns, possibly based on existing literature, and mapping existing patterns into a coherent model of the business domain. If you find the paper interesting you might be interested in some more patterns that are currently (May 2005) in development. These describe in more detail how these strategies can be implemented: This paper is one of the most downloaded pieces on my website. I'd be interested to know more about who is downloading the paper, what use your making of it and any comments you have on it-allan@allankelly.net. Cost Leadership Build an organization that can produce your chosen product more cheaply than anyone else. You can then choose to undercut the opposition (and sell more) or sell at the same price (and make more profit per unit.) Differentiated Product Build a product that fulfils the same functions as your competitors but is clearly different, e.g. it is better quality, novel design, or carries a brand name. Customer will be prepared to pay more for your product than the competition. Market Focus You can't compete directly on cost or differentiation with the market leader; so, focus on a niche in the market. The niche will be smaller than the overall market (so sales will be lower) but the customer requirements will be different, serve these customers requirements better then the mass market and they will buy from you again and again. Sweet Spot Customers don't always want the best or the cheapest, so, produce a product that combines elements of differentiation with reasonable cost so you offer superior value. However, be careful, customer tastes", "title": "" }, { "docid": "d6379e449f1b7c6d845a004c59c1023c", "text": "Phase-shifted ZVS PWM full-bridge converter realizes ZVS and eliminates the voltage oscillation caused by the reverse recovery of the rectifier diodes by introducing a resonant inductance and two clamping diodes. This paper improves the converter just by exchanging the position of the resonant inductance and the transformer such that the transformer is connected with the lagging leg. The improved converter has several advantages over the original counterpart, e.g., the clamping diodes conduct only once in a switching cycle, and the resonant inductance current is smaller in zero state, leading to a higher efficiency and reduced duty cycle loss. A blocking capacitor is usually introduced to the primary side to prevent the transformer from saturating, this paper analyzes the effects of the blocking capacitor in different positions, and a best scheme is determined. A 2850 W prototype converter is built to verify the effectiveness of the improved converter and the best scheme for the blocking capacitor.", "title": "" }, { "docid": "cdb295a5a98da527a244d9b9f490407e", "text": "The Toggle-based <italic>X</italic>-masking method requires a single toggle at a given cycle, there is a chance that non-<italic>X</italic> values are also masked. Hence, the non-<italic>X</italic> value over-masking problem may cause a fault coverage degradation. In this paper, a scan chain partitioning scheme is described to alleviate non-<italic>X </italic> bit over-masking problem arising from Toggle-based <italic>X</italic>-Masking method. The scan chain partitioning method finds a scan chain combination that gives the least toggling conflicts. The experimental results show that the amount of over-masked bits is significantly reduced, and it is further reduced when the proposed method is incorporated with <italic>X</italic>-canceling method. However, as the number of scan chain partitions increases, the control data for decoder increases. To reduce a control data overhead, this paper exploits a Huffman coding based data compression. Assuming two partitions, the size of control bits is even smaller than the conventional <italic>X </italic>-toggling method that uses only one decoder. In addition, selection rules of <italic>X</italic>-bits delivered to <italic>X</italic>-Canceling MISR are also proposed. With the selection rules, a significant test time increase can be prevented.", "title": "" }, { "docid": "b33e896a23f27a81f04aaeaff2f2350c", "text": "Nowadays it has become increasingly common for family members to be distributed in different time zones. These time differences pose specific challenges for communication within the family and result in different communication practices to cope with them. To gain an understanding of current challenges and practices, we interviewed people who regularly communicate with immediate family members living in other time zones. We report primary findings from the interviews, and identify design opportunities for improving the experience of cross time zone family communication.", "title": "" }, { "docid": "cfcae9b30fda24358e79e4e664ed747d", "text": "Automated driving is predicted to enhance traffic safety, transport efficiency, and driver comfort. To extend the capability of current advanced driver assistance systems, and eventually realize fully automated driving, the intelligent vehicle system must have the ability to plan different maneuvers while adapting to the surrounding traffic environment. This paper presents an algorithm for longitudinal and lateral trajectory planning for automated driving maneuvers where the vehicle does not have right of way, i.e., yielding maneuvers. Such maneuvers include, e.g., lane change, roundabout entry, and intersection crossing. In the proposed approach, the traffic environment which the vehicle must traverse is incorporated as constraints on its longitudinal and lateral positions. The trajectory planning problem can thereby be formulated as two loosely coupled low-complexity model predictive control problems for longitudinal and lateral motion. Simulation results demonstrate the ability of the proposed trajectory planning algorithm to generate smooth collision-free maneuvers which are appropriate for various traffic situations.", "title": "" }, { "docid": "5ea59255b0ffd15285477fe5b997d48d", "text": "Gastric cancer in humans arises in the setting of oxyntic atrophy (parietal cell loss) and attendant hyperplastic and metaplastic lineage changes within the gastric mucosa. Helicobacter infection in mice and humans leads to spasmolytic polypeptide-expressing metaplasia (SPEM). In a number of mouse models, SPEM arises after oxyntic atrophy. In mice treated with the parietal cell toxic protonophore DMP-777, SPEM appears to arise from the transdifferentiation of chief cells. These results support the concept that intrinsic mucosal influences regulate and modulate the appearance of gastric metaplasia even in the absence of significant inflammation, whereas chronic inflammation is required for the further neoplastic transition.", "title": "" }, { "docid": "cc15583675d6b19fbd9a10f06876a61e", "text": "Matrix factorization approaches to relation extraction provide several attractive features: they support distant supervision, handle open schemas, and leverage unlabeled data. Unfortunately, these methods share a shortcoming with all other distantly supervised approaches: they cannot learn to extract target relations without existing data in the knowledge base, and likewise, these models are inaccurate for relations with sparse data. Rule-based extractors, on the other hand, can be easily extended to novel relations and improved for existing but inaccurate relations, through first-order formulae that capture auxiliary domain knowledge. However, usually a large set of such formulae is necessary to achieve generalization. In this paper, we introduce a paradigm for learning low-dimensional embeddings of entity-pairs and relations that combine the advantages of matrix factorization with first-order logic domain knowledge. We introduce simple approaches for estimating such embeddings, as well as a novel training algorithm to jointly optimize over factual and first-order logic information. Our results show that this method is able to learn accurate extractors with little or no distant supervision alignments, while at the same time generalizing to textual patterns that do not appear in the formulae.", "title": "" }, { "docid": "cf95d41dc5a2bcc31b691c04e3fb8b96", "text": "Resection of pancreas, in particular pancreaticoduodenectomy, is a complex procedure, commonly performed in appropriately selected patients with benign and malignant disease of the pancreas and periampullary region. Despite significant improvements in the safety and efficacy of pancreatic surgery, pancreaticoenteric anastomosis continues to be the \"Achilles heel\" of pancreaticoduodenectomy, due to its association with a measurable risk of leakage or failure of healing, leading to pancreatic fistula. The morbidity rate after pancreaticoduodenectomy remains high in the range of 30% to 65%, although the mortality has significantly dropped to below 5%. Most of these complications are related to pancreatic fistula, with serious complications of intra-abdominal abscess, postoperative bleeding, and multiorgan failure. Several pharmacological and technical interventions have been suggested to decrease the pancreatic fistula rate, but the results have been controversial. This paper considers definition and classification of pancreatic fistula, risk factors, and preventive approach and offers management strategy when they do occur.", "title": "" } ]
scidocsrr
f8a56babbb0a788a5a5846259882844d
Improving Security Level through Obfuscation Technique for Source Code Protection using AES Algorithm
[ { "docid": "fe944f1845eca3b0c252ada2c0306d61", "text": "Now a days sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. The present work focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encrypted algorithm in cryptography .Secondly the encrypted data must be hidden in an image or video or an audio file with help of steganographic algorithm. Thirdly by using decryption technique the receiver can view the original data from the hidden image or video or audio file. Transmitting data or document can be done through these ways will be secured. In this paper we implemented three encrypt techniques like DES, AES and RSA algorithm along with steganographic algorithm like LSB substitution technique and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption process and also its buffer size experimentally. The entire process has done in C#.", "title": "" }, { "docid": "24fc1997724932c6ddc3311a529d7505", "text": "In these days securing a network is an important issue. Many techniques are provided to secure network. Cryptographic is a technique of transforming a message into such form which is unreadable, and then retransforming that message back to its original form. Cryptography works in two techniques: symmetric key also known as secret-key cryptography algorithms and asymmetric key also known as public-key cryptography algorithms. In this paper we are reviewing different symmetric and asymmetric algorithms.", "title": "" }, { "docid": "395dcc7c09562f358c07af9c999fbdc7", "text": "Protecting source code against reverse engineering and theft is an important problem. The goal is to carry out computations using confidential algorithms on an untrusted party while ensuring confidentiality of algorithms. This problem has been addressed for Boolean circuits known as ‘circuit privacy’. Circuits corresponding to real-world programs are impractical. Well-known obfuscation techniques are highly practicable, but provide only limited security, e.g., no piracy protection. In this work, we modify source code yielding programs with adjustable performance and security guarantees ranging from indistinguishability obfuscators to (non-secure) ordinary obfuscation. The idea is to artificially generate ‘misleading’ statements. Their results are combined with the outcome of a confidential statement using encrypted selector variables. Thus, an attacker must ‘guess’ the encrypted selector variables to disguise the confidential source code. We evaluated our method using more than ten programmers as well as pattern mining across open source code repositories to gain insights of (micro-)coding patterns that are relevant for generating misleading statements. The evaluation reveals that our approach is effective in that it successfully preserves source code confidentiality.", "title": "" } ]
[ { "docid": "806088642828d5064e0b52f3c08f6ce9", "text": "We introduce a simple new regularizer for auto-encoders whose hidden-unit activation functions contain at least one zero-gradient (saturated) region. This regularizer explicitly encourages activations in the saturated region(s) of the corresponding activation function. We call these Saturating Auto-Encoders (SATAE). We show that the saturation regularizer explicitly limits the SATAE’s ability to reconstruct inputs which are not near the data manifold. Furthermore, we show that a wide variety of features can be learned when different activation functions are used. Finally, connections are established with the Contractive and Sparse Auto-Encoders.", "title": "" }, { "docid": "d6e76bfeeb127addcbe2eb77b1b0ad7e", "text": "The choice of modeling units is critical to automatic speech recognition (ASR) tasks. Conventional ASR systems typically choose context-dependent states (CD-states) or contextdependent phonemes (CD-phonemes) as their modeling units. However, it has been challenged by sequence-to-sequence attention-based models, which integrate an acoustic, pronunciation and language model into a single neural network. On English ASR tasks, previous attempts have already shown that the modeling unit of graphemes can outperform that of phonemes by sequence-to-sequence attention-based model. In this paper, we are concerned with modeling units on Mandarin Chinese ASR tasks using sequence-to-sequence attention-based models with the Transformer. Five modeling units are explored including context-independent phonemes (CI-phonemes), syllables, words, sub-words and characters. Experiments on HKUST datasets demonstrate that the lexicon free modeling units can outperform lexicon related modeling units in terms of character error rate (CER). Among five modeling units, character based model performs best and establishes a new state-of-the-art CER of 26.64% on HKUST datasets without a hand-designed lexicon and an extra language model integration, which corresponds to a 4.8% relative improvement over the existing best CER of 28.0% by the joint CTC-attention based encoder-decoder network.", "title": "" }, { "docid": "032db9c2dba42ca376e87b28ecb812fa", "text": "This paper tries to put various ways in which Natural Language Processing (NLP) and Software Engineering (SE) can be seen as inter-disciplinary research areas. We survey the current literature, with the aim of assessing use of Software Engineering and Natural Language Processing tools in the researches undertaken. An assessment of how various phases of SDLC can employ NLP techniques is presented. The paper also provides the justification of the use of text for automating or combining both these areas. A short research direction while undertaking multidisciplinary research is also provided.", "title": "" }, { "docid": "25176cef55afd54f06b7127d10729f5e", "text": "Senescent cells (SCs) accumulate with age and after genotoxic stress, such as total-body irradiation (TBI). Clearance of SCs in a progeroid mouse model using a transgenic approach delays several age-associated disorders, suggesting that SCs play a causative role in certain age-related pathologies. Thus, a 'senolytic' pharmacological agent that can selectively kill SCs holds promise for rejuvenating tissue stem cells and extending health span. To test this idea, we screened a collection of compounds and identified ABT263 (a specific inhibitor of the anti-apoptotic proteins BCL-2 and BCL-xL) as a potent senolytic drug. We show that ABT263 selectively kills SCs in culture in a cell type– and species-independent manner by inducing apoptosis. Oral administration of ABT263 to either sublethally irradiated or normally aged mice effectively depleted SCs, including senescent bone marrow hematopoietic stem cells (HSCs) and senescent muscle stem cells (MuSCs). Notably, this depletion mitigated TBI-induced premature aging of the hematopoietic system and rejuvenated the aged HSCs and MuSCs in normally aged mice. Our results demonstrate that selective clearance of SCs by a pharmacological agent is beneficial in part through its rejuvenation of aged tissue stem cells. Thus, senolytic drugs may represent a new class of radiation mitigators and anti-aging agents.", "title": "" }, { "docid": "a17241732ee8e9a8bc34caea2f08545d", "text": "Text line segmentation is an essential pre-processing stage for off-line handwriting recognition in many Optical Character Recognition (OCR) systems. It is an important step because inaccurately segmented text lines will cause errors in the recognition stage. Text line segmentation of the handwritten documents is still one of the most complicated problems in developing a reliable OCR. The nature of handwriting makes the process of text line segmentation very challenging. Several techniques to segment handwriting text line have been proposed in the past. This paper seeks to provide a comprehensive review of the methods of off-line handwriting text line segmentation proposed by researchers.", "title": "" }, { "docid": "e872173252bf7b516183d3e733c36f6c", "text": "Nonlinear autoregressive moving average with exogenous inputs (NARMAX) models have been successfully demonstrated for modeling the input-output behavior of many complex systems. This paper deals with the proposition of a scheme to provide time series prediction. The approach is based on a recurrent NARX model obtained by linear combination of a recurrent neural network (RNN) output and the real data output. Some prediction metrics are also proposed to assess the quality of predictions. This metrics enable to compare different prediction schemes and provide an objective way to measure how changes in training or prediction model (Neural network architecture) affect the quality of predictions. Results show that the proposed NARX approach consistently outperforms the prediction obtained by the RNN neural network.", "title": "" }, { "docid": "33a9140fb57200a489b9150d39f0ab65", "text": "In this paper, a double-quadrant state-of-charge (SoC)-based droop control method for distributed energy storage system is proposed to reach the proper power distribution in autonomous dc microgrids. In order to prolong the lifetime of the energy storage units (ESUs) and avoid the overuse of a certain unit, the SoC of each unit should be balanced and the injected/output power should be gradually equalized. Droop control as a decentralized approach is used as the basis of the power sharing method for distributed energy storage units. In the charging process, the droop coefficient is set to be proportional to the nth order of SoC, while in the discharging process, the droop coefficient is set to be inversely proportional to the nth order of SoC. Since the injected/output power is inversely proportional to the droop coefficient, it is obtained that in the charging process the ESU with higher SoC absorbs less power, while the one with lower SoC absorbs more power. Meanwhile, in the discharging process, the ESU with higher SoC delivers more power and the one with lower SoC delivers less power. Hence, SoC balancing and injected/output power equalization can be gradually realized. The exponent n of SoC is employed in the control diagram to regulate the speed of SoC balancing. It is found that with larger exponent n, the balancing speed is higher. MATLAB/simulink model comprised of three ESUs is implemented and the simulation results are shown to verify the proposed approach.", "title": "" }, { "docid": "4d52865efa6c359d68125c7013647c86", "text": "In recent years, we have witnessed an unprecedented proliferation of large document collections. This development has spawned the need for appropriate analytical means. In particular, to seize the thematic composition of large document collections, researchers increasingly draw on quantitative topic models. Among their most prominent representatives is the Latent Dirichlet Allocation (LDA). Yet, these models have significant drawbacks, e.g. the generated topics lack context and thus meaningfulness. Prior research has rarely addressed this limitation through the lens of mixed-methods research. We position our paper towards this gap by proposing a structured mixedmethods approach to the meaningful analysis of large document collections. Particularly, we draw on qualitative coding and quantitative hierarchical clustering to validate and enhance topic models through re-contextualization. To illustrate the proposed approach, we conduct a case study of the thematic composition of the AIS Senior Scholars' Basket of Journals.", "title": "" }, { "docid": "d6bd475e9929748bbb71ac0d82e4f067", "text": "We present an approach for answering questions that span multiple sentences and exhibit sophisticated cross-sentence anaphoric phenomena, evaluating on a rich source of such questions – the math portion of the Scholastic Aptitude Test (SAT). By using a tree transducer cascade as its basic architecture, our system (called EUCLID) propagates uncertainty from multiple sources (e.g. coreference resolution or verb interpretation) until it can be confidently resolved. Experiments show the first-ever results (43% recall and 91% precision) on SAT algebra word problems. We also apply EUCLID to the public Dolphin algebra question set, and improve the state-of-the-art F1-score from 73.9% to 77.0%.", "title": "" }, { "docid": "a0ebe19188abab323122a5effc3c4173", "text": "In this paper, we present LOADED, an algorithm for outlier detection in evolving data sets containing both continuous and categorical attributes. LOADED is a tunable algorithm, wherein one can trade off computation for accuracy so that domain-specific response times are achieved. Experimental results show that LOADED provides very good detection and false positive rates, which are several times better than those of existing distance-based schemes.", "title": "" }, { "docid": "119a4b04bc042b68f4b32480a069f6d4", "text": "Preserving the availability and integrity of the power grid critical infrastructures in the face of fast-spreading intrusions requires advances in detection techniques specialized for such large-scale cyber-physical systems. In this paper, we present a security-oriented cyber-physical state estimation (SCPSE) system, which, at each time instant, identifies the compromised set of hosts in the cyber network and the maliciously modified set of measurements obtained from power system sensors. SCPSE fuses uncertain information from different types of distributed sensors, such as power system meters and cyber-side intrusion detectors, to detect the malicious activities within the cyber-physical system. We implemented a working prototype of SCPSE and evaluated it using the IEEE 24-bus benchmark system. The experimental results show that SCPSE significantly improves on the scalability of traditional intrusion detection techniques by using information from both cyber and power sensors. Furthermore, SCPSE was able to detect all the attacks against the control network in our experiments.", "title": "" }, { "docid": "759bf80a33903899cb7f684aa277eddd", "text": "Effective patient similarity assessment is important for clinical decision support. It enables the capture of past experience as manifested in the collective longitudinal medical records of patients to help clinicians assess the likely outcomes resulting from their decisions and actions. However, it is challenging to devise a patient similarity metric that is clinically relevant and semantically sound. Patient similarity is highly context sensitive: it depends on factors such as the disease, the particular stage of the disease, and co-morbidities. One way to discern the semantics in a particular context is to take advantage of physicians’ expert knowledge as reflected in labels assigned to some patients. In this paper we present a method that leverages localized supervised metric learning to effectively incorporate such expert knowledge to arrive at semantically sound patient similarity measures. Experiments using data obtained from the MIMIC II database demonstrate the effectiveness of this approach.", "title": "" }, { "docid": "902e6d047605a426ae9bebc3f9ddf139", "text": "Learning based approaches have not yet achieved their full potential in optical flow estimation, where their performance still trails heuristic approaches. In this paper, we present a CNN based patch matching approach for optical flow estimation. An important contribution of our approach is a novel thresholded loss for Siamese networks. We demonstrate that our loss performs clearly better than existing losses. It also allows to speed up training by a factor of 2 in our tests. Furthermore, we present a novel way for calculating CNN based features for different image scales, which performs better than existing methods. We also discuss new ways of evaluating the robustness of trained features for the application of patch matching for optical flow. An interesting discovery in our paper is that low-pass filtering of feature maps can increase the robustness of features created by CNNs. We proved the competitive performance of our approach by submitting it to the KITTI 2012, KITTI 2015 and MPI-Sintel evaluation portals where we obtained state-of-the-art results on all three datasets.", "title": "" }, { "docid": "ffe6edef11daef1db0c4aac77bed7a23", "text": "MPI is a well-established technology that is used widely in high-performance computing environment. However, setting up an MPI cluster can be challenging and time-consuming. This paper tackles this challenge by using modern containerization technology, which is Docker, and container orchestration technology, which is Docker Swarm mode, to automate the MPI cluster setup and deployment. We created a ready-to-use solution for developing and deploying MPI programs in a cluster of Docker containers running on multiple machines, orchestrated with Docker Swarm mode, to perform high computation tasks. We explain the considerations when creating Docker image that will be instantiated as MPI nodes, and we describe the steps needed to set up a fully connected MPI cluster as Docker containers running in a Docker Swarm mode. Our goal is to give the rationale behind our solution so that others can adapt to different system requirements. All pre-built Docker images, source code, documentation, and screencasts are publicly available.", "title": "" }, { "docid": "11962ec2381422cfac77ad543b519545", "text": "In high dimensions, most machine learning methods are brittle to even a small fraction of structured outliers. To address this, we introduce a new meta-algorithm that can take in a base learner such as least squares or stochastic gradient descent, and harden the learner to be resistant to outliers. Our method, Sever, possesses strong theoretical guarantees yet is also highly scalable—beyond running the base learner itself, it only requires computing the top singular vector of a certain n×d matrix. We apply Sever on a drug design dataset and a spam classification dataset, and find that in both cases it has substantially greater robustness than several baselines. On the spam dataset, with 1% corruptions, we achieved 7.4% test error, compared to 13.4%− 20.5% for the baselines, and 3% error on the uncorrupted dataset. Similarly, on the drug design dataset, with 10% corruptions, we achieved 1.42 mean-squared error test error, compared to 1.51-2.33 for the baselines, and 1.23 error on the uncorrupted dataset.", "title": "" }, { "docid": "448b1a9645216cedc89feac0afd70d0c", "text": "Voluminous amounts of data have been produced, since the past decade as the miniaturization of Internet of things (IoT) devices increases. However, such data are not useful without analytic power. Numerous big data, IoT, and analytics solutions have enabled people to obtain valuable insight into large data generated by IoT devices. However, these solutions are still in their infancy, and the domain lacks a comprehensive survey. This paper investigates the state-of-the-art research efforts directed toward big IoT data analytics. The relationship between big data analytics and IoT is explained. Moreover, this paper adds value by proposing a new architecture for big IoT data analytics. Furthermore, big IoT data analytic types, methods, and technologies for big data mining are discussed. Numerous notable use cases are also presented. Several opportunities brought by data analytics in IoT paradigm are then discussed. Finally, open research challenges, such as privacy, big data mining, visualization, and integration, are presented as future research directions.", "title": "" }, { "docid": "4e5c9901da9ee977d995dd4fd6b9b6bd", "text": "kmlonolgpbqJrtsHu qNvwlyxzl{vw|~}€ololyp | xoly‚ƒxoqNv…„J† lg‡‰ˆŠ‚‹xg‚Ony‚c}g‡ ‚ƒpAqNvwl ŒlgrcŽ„† pŠ|HqJ‘bxz|’r rc|“pb”“‘4|H”Yl ˆ•xz„Hnzl–}o}g‚ƒpb”“— ˜™|“p'‘w|’rmlypŠno„HŽ“‚ƒpb”™„†0rš‚ƒpb”“‘ ‚›}zqJ‚On ‚ƒpy†„“xg‡ |HqJ‚O„’p ‚c}&oly‚ƒpb”%nov4|“rƒrclgpb”YloŽ%ys{|’‘Xq„’‡œ|~qloŽ no„“xˆŠ‘X}ozz|~}lzŽ ržlo|’xgp4‚ƒpb”0|~} |3‡ loqNvw„HŽ „J† ˆ•xz„’Ÿ‚OŽ’‚ƒpb”0| pŠ|HqJ‘bxz|“r•rž|’pb”“‘w|~”’lmˆŠxz„Hnolo}o}g‚ƒpb”;}gsH}oqly‡ ¡‚cqOv rš‚ƒpb”“‘ ‚›}zqJ‚Onm¢~pŠ„’ TržloŽH”Yly—¤£;r¥qOv4„“‘X”Hv&no„“xˆŠ‘X}ozz|~}lzŽ |–ˆYˆ•xz„H|Yn–vwl–}]vw|’Ÿ~l zlolyp¦}–‘4nonolo}o}ƒ†g‘br•‚ƒp2‡ |“p4s Ž“‚ †o †lyxzlypbq |“xzlo|~}^„†]pŠ|~q§‘bxz|’r4rž|’pb”“‘w|~”’lmˆŠxz„Hnolo}o}g‚ƒpb”Hu ̈‚cq©‚c} „J†oqhlyp qNvwl]no|~}yl^qNvw|~qaqNvwl–}l‰‡œl–qOv4„Ž~} no|oˆ4qJ‘bxzl qNvwl&rt‚ƒpb”“‘b‚c}oq§‚Nn ‚ƒpg†H„“xg‡ |HqJ‚O„“p#qNvwlys%|“xol ‡ „ŽXlgrƒrš‚ƒpb”«‚ƒpŠŽ“‚‹xzlonoqJrts¦‚ƒp rž|’xJ”Yl2„–ˆw|X¬g‘4l&q|Xgrclo}2„J† }oqh|HqJ‚c}o qJ‚On–}–—;­®v ‚›}&no|“p ‡œ|~¢’l¦‚cq3Ž“‚ ̄=ny‘br°q]qh„%|’pŠ|“ršsH±yl–u ‘bpŠŽXlgx–}zqh|“p•Ž™|’pŠŽ%‚‹‡]ˆ•xz„“Ÿ“l qNvwl«|Xg‚ƒrš‚cqJsL„J†&qOv4lo}l |–ˆYˆŠxo„|Xnov4lo}‰q„ ‡ „HŽYlyr ‘ p•ŽYlyxgrts“‚ƒpw”0rt‚ƒpw”~‘b‚c}oqJ‚On;zl–vw|’Ÿ‚N„“xg— 2gp¦qNv ‚c} ˆ4|oˆ4lyxou 3l‰ ‚ƒrƒr ŽYl–}ngxg‚Nzl;| }g‚ƒ‡  ˆ•ržl‰xg‘bržl–zo|H}loŽ |oˆYˆ•xz„H|Yn–v q„ |’‘Xq„’‡œ|~qloŽ ržlo|’xgp4‚ƒpb”0„† rš‚ƒpb”“‘b‚c}oq§‚On^¢“pŠ„“ TrcloŽH”Ylg—T­®v ‚›} |oˆYˆ•xz„H|Yn–v vw|~} ololgp€}ovw„“ ¡p2†„’xL| ́p4‘b‡œolyxL„J†&q|~}o¢} qh„™no|–ˆ4qJ‘ xol¦‚ƒpg†„’xg‡œ|~q§‚N„“p ‚ƒp |™nyržlo|“xolgx2|’pŠŽ#‡ „“xzl«Ž’‚ƒxzlon–q †|~}ov ‚O„’p ‚cqNvw„“‘Xq]|%no„“‡‰ˆŠxo„“‡ ‚c}l ‚ƒp«ˆwlyxƒ†„’xg‡ |“pŠnoly—3μLl¶ˆŠxzl–}lgpwq¶|«ŽYl–q|’‚ƒržloŽ«no|H}l }oqJ‘4Ž“s%„J† qOvb‚c} rclz|’xgp4‚ƒpw”0‡œl–qNvw„HŽL|–ˆYˆ•rt‚OloŽ qh„‰ˆ4|“xoq]„J†;}Jˆ4lolzn–v2qh|H”H”“‚ƒpb”“—", "title": "" }, { "docid": "3d2e47ed90e8ff4dec54e85e4996c961", "text": "Open source software encourages innovation by allowing users to extend the functionality of existing applications. Treeview is a popular application for the visualization of microarray data, but is closed-source and platform-specific, which limits both its current utility and suitability as a platform for further development. Java Treeview is an open-source, cross-platform rewrite that handles very large datasets well, and supports extensions to the file format that allow the results of additional analysis to be visualized and compared. The combination of a general file format and open source makes Java Treeview an attractive choice for solving a class of visualization problems. An applet version is also available that can be used on any website with no special server-side setup.", "title": "" }, { "docid": "6a51aba04d0af9351e86b8a61b4529cb", "text": "Cloud computing is a newly emerged technology, and the rapidly growing field of IT. It is used extensively to deliver Computing, data Storage services and other resources remotely over internet on a pay per usage model. Nowadays, it is the preferred choice of every IT organization because it extends its ability to meet the computing demands of its everyday operations, while providing scalability, mobility and flexibility with a low cost. However, the security and privacy is a major hurdle in its success and its wide adoption by organizations, and the reason that Chief Information Officers (CIOs) hesitate to move the data and applications from premises of organizations to the cloud. In fact, due to the distributed and open nature of the cloud, resources, applications, and data are vulnerable to intruders. Intrusion Detection System (IDS) has become the most commonly used component of computer system security and compliance practices that defends network accessible Cloud resources and services from various kinds of threats and attacks. This paper presents an overview of different intrusions in cloud, various detection techniques used by IDS and the types of Cloud Computing based IDS. Then, we analyze some pertinent existing cloud based intrusion detection systems with respect to their various types, positioning, detection time and data source. The analysis also gives strengths of each system, and limitations, in order to evaluate whether they carry out the security requirements of cloud computing environment or not. We highlight the deployment of IDS that uses multiple detection approaches to deal with security challenges in cloud.", "title": "" }, { "docid": "2e2cffc777e534ad1ab7a5c638e0574e", "text": "BACKGROUND\nPoly(ADP-ribose)polymerase-1 (PARP-1) is a highly promising novel target in breast cancer. However, the expression of PARP-1 protein in breast cancer and its associations with outcome are yet poorly characterized.\n\n\nPATIENTS AND METHODS\nQuantitative expression of PARP-1 protein was assayed by a specific immunohistochemical signal intensity scanning assay in a range of normal to malignant breast lesions, including a series of patients (N = 330) with operable breast cancer to correlate with clinicopathological factors and long-term outcome.\n\n\nRESULTS\nPARP-1 was overexpressed in about a third of ductal carcinoma in situ and infiltrating breast carcinomas. PARP-1 protein overexpression was associated to higher tumor grade (P = 0.01), estrogen-negative tumors (P < 0.001) and triple-negative phenotype (P < 0.001). The hazard ratio (HR) for death in patients with PARP-1 overexpressing tumors was 7.24 (95% CI; 3.56-14.75). In a multivariate analysis, PARP-1 overexpression was an independent prognostic factor for both disease-free (HR 10.05; 95% CI 5.42-10.66) and overall survival (HR 1.82; 95% CI 1.32-2.52).\n\n\nCONCLUSIONS\nNuclear PARP-1 is overexpressed during the malignant transformation of the breast, particularly in triple-negative tumors, and independently predicts poor prognosis in operable invasive breast cancer.", "title": "" } ]
scidocsrr
a9e508921e3cb485fa71c43038e04244
A Cross Benchmark Assessment of a Deep Convolutional Neural Network for Face Recognition
[ { "docid": "e53678707c57dce8d2e91afa04e99aaa", "text": "Forensic facial identification examiners are required to match the identity of faces in images that vary substantially, owing to changes in viewing conditions and in a person's appearance. These identifications affect the course and outcome of criminal investigations and convictions. Despite calls for research on sources of human error in forensic examination, existing scientific knowledge of face matching accuracy is based, almost exclusively, on people without formal training. Here, we administered three challenging face matching tests to a group of forensic examiners with many years' experience of comparing face images for law enforcement and government agencies. Examiners outperformed untrained participants and computer algorithms, thereby providing the first evidence that these examiners are experts at this task. Notably, computationally fusing responses of multiple experts produced near-perfect performance. Results also revealed qualitative differences between expert and non-expert performance. First, examiners' superiority was greatest at longer exposure durations, suggestive of more entailed comparison in forensic examiners. Second, experts were less impaired by image inversion than non-expert students, contrasting with face memory studies that show larger face inversion effects in high performers. We conclude that expertise in matching identity across unfamiliar face images is supported by processes that differ qualitatively from those supporting memory for individual faces.", "title": "" } ]
[ { "docid": "a9550f5f2158f0519a66264b6a948c29", "text": "In this paper, we present a family of adaptive protocols, called SPIN (Sensor Protocols for Information via Negotiation), that efficiently disseminate information among sensors in an energy-constrained wireless sensor network. Nodes running a SPIN communication protocol name their data using high-level data descriptors, called meta-data. They use meta-data negotiations to eliminate the transmission of redundant data throughout the network. In addition, SPIN nodes can base their communication decisions both upon application-specific knowledge of the data and upon knowledge of the resources that are available to them. This allows the sensors to efficiently distribute data given a limited energy supply. We simulate and analyze the performance of four specific SPIN protocols: SPIN-PP and SPIN-EC, which are optimized for a point-to-point network, and SPIN-BC and SPIN-RL, which are optimized for a broadcast network. Comparing the SPIN protocols to other possible approaches, we find that the SPIN protocols can deliver 60% more data for a given amount of energy than conventional approaches in a point-to-point network and 80% more data for a given amount of energy in a broadcast network. We also find that, in terms of dissemination rate and energy usage, the SPIN protocols perform close to the theoretical optimum in both point-to-point and broadcast networks.", "title": "" }, { "docid": "c25a3f84fab51b6cd659bd3d168a33d8", "text": "Achieving automatic interoperability among systems with diverse data structures and languages expressing different viewpoints is a goal that has been difficult to accomplish. This paper describes S-Match, an open source semantic matching framework that tackles the semantic interoperability problem by transforming several data structures such as business catalogs, web directories, conceptual models and web services descriptions into lightweight ontologies and establishing semantic correspondences between them. The framework is the first open source semantic matching project that includes three different algorithms tailored for specific domains and provides an extensible API for developing new algorithms, including possibility to plug-in specific background knowledge according to the characteristics of each application domain.", "title": "" }, { "docid": "269409fcebb523deb10cb3d827de389b", "text": "Variable stiffness and variable damping can play an important role in robot movement, particularly for legged robots such as bipedal walkers. Variable impedance also introduces new control problems, since there are more degrees of freedom to control, and the resulting robot has more complex dynamics. In this paper, we introduce novel design and fabrication methodologies that are capable of producing cost effective hardware prototypes suitable for investigating the efficacy of impedance modulation. We present two variable impedance bipedal platforms produced using a combination of waterjet cutting and 3D printing, and a novel fused deposition modeling (FDM) 3D printing based method for producing hybrid plastic/metal parts. We evaluate walking trajectories at different speeds and stiffness levels. [DOI: 10.1115/1.4030388]", "title": "" }, { "docid": "6ddbdf3b7f8b2bc13d2c1babcabbadc6", "text": "Improved sensors in the automotive field are leading to multi-object tracking of extended objects becoming more and more important for advanced driver assistance systems and highly automated driving. This paper proposes an approach that combines a PHD filter for extended objects, viz. objects that originate multiple measurements while also estimating the shape of the objects via constructing an object-local occupancy grid map and then extracting a polygonal chain. This allows tracking even in traffic scenarios where unambiguous segmentation of measurements is difficult or impossible. In this work, this is achieved using multiple segmentation assumptions by applying different parameter sets for the DBSCAN clustering algorithm. The proposed algorithm is evaluated using simulated data and real sensor data from a test track including highly accurate D-GPS and IMU data as a ground truth.", "title": "" }, { "docid": "f4c08954ae004ce0731561d857709b50", "text": "The new video-coding standard MPEG-4 enables content-based functionality, as well as high coding efficiency, by taking into account shape information of moving objects. A novel algorithm for segmentation of moving objects in video sequences and extraction of video object planes (VOPs) is proposed in this paper. For the case of multiple video objects in a scene, the extraction of a specific single video object (VO) based on connected components analysis and smoothness of VO displacement in successive frames is also discussed. Our algorithm begins with a robust double-edge map derived from the difference between two successive frames. After removing edge points which belong to the previous frame, the remaining edge map, moving edge (ME), is used to extract the VOP. The proposed algorithm is evaluated on an indoor sequence captured by a low-end camera as well as MPEG-4 test sequences and produces promising results.", "title": "" }, { "docid": "fbddd20271cf134e15b33e7d6201c374", "text": "Authors and publishers who wish their publications to be considered for review in Computational Linguistics should send a copy to the book review editor, Graeme Hirst, Department of Computer Science, University of Toronto, Toronto, Canada M5S 3G4. All relevant books received will be listed, but not all can be reviewed. Technical reports (other than dissertations) will not be listed or reviewed. Authors should be aware that some publishers will not send books for review (even when instructed to do so); authors wishing to enquire as to whether their book has been received for review may contact the book review editor.", "title": "" }, { "docid": "471eca6664d0ae8f6cdfb848bc910592", "text": "Taxonomic relation identification aims to recognize the ‘is-a’ relation between two terms. Previous works on identifying taxonomic relations are mostly based on statistical and linguistic approaches, but the accuracy of these approaches is far from satisfactory. In this paper, we propose a novel supervised learning approach for identifying taxonomic relations using term embeddings. For this purpose, we first design a dynamic weighting neural network to learn term embeddings based on not only the hypernym and hyponym terms, but also the contextual information between them. We then apply such embeddings as features to identify taxonomic relations using a supervised method. The experimental results show that our proposed approach significantly outperforms other state-of-the-art methods by 9% to 13% in terms of accuracy for both general and specific domain datasets.", "title": "" }, { "docid": "af0328c3a271859d31c0e3993db7105e", "text": "The increasing bandwidth demand in data centers and telecommunication infrastructures had prompted new electrical interface standards capable of operating up to 56Gb/s per-lane. The CEI-56G-VSR-PAM4 standard [1] defines PAM-4 signaling at 56Gb/s targeting chip-to-module interconnect. Figure 6.3.1 shows the measured S21 of a channel resembling such interconnects and the corresponding single-pulse response after TX-FIR and RX CTLE. Although the S21 is merely ∼10dB at 14GHz, the single-pulse response exhibits significant reflections from impedance discontinuities, mainly between package and PCB traces. These reflections are detrimental to PAM-4 signaling and cannot be equalized effectively by RX CTLE and/or a few taps of TX feed-forward equalization. This paper presents the design of a PAM-4 receiver using 10-tap direct decision-feedback equalization (DFE) targeting such VSR channels.", "title": "" }, { "docid": "fd918f9d6e70f04e5927a1f6b6291535", "text": "Holy Land Crusades were among the most significant forms of military mobilization to occur during the medieval period. Crusader mobilization had important implications for European state formation. We find that areas with large numbers of Holy Land crusaders witnessed increased political stability and institutional development as well as greater urbanization associated with rising trade and capital accumulation, even after taking into account underlying levels of religiosity and economic development. Our findings contribute to a scholarly debate regarding when the essential elements of the modern state first began to appear. Although our causal mechanisms— which focus on the importance of war preparation and urban capital accumulation— resemble those emphasized by previous research, we date the point of critical transition to statehood centuries earlier, in line with scholars who emphasize the medieval origins of the modern state. We also point to one avenue by which the rise of Muslim military and political power may have affected European institutional development. The rise and spread of Islam took place so rapidly that in the century following the death of Mohammed, large parts of the Mediterranean basin—much of which previously had been under Roman rule—came under the leadership of Muslim caliphs. Islam’s success as a political-religious movement brought the Muslim religion to the Iberian peninsula in Western Europe and, eventually, to the Byzantine capital of Constantinople in southeastern Europe. In response to a plea from the Byzantine emperor under threat of being overrun by invading Muslim Turks, in 1095 CE Pope Urban II appealed to Christians in the West to assist their eastern brethren, with a further goal of recapturing Jerusalem and the Holy Land from Muslim control. The military mobilization that followed came to be known as the Crusades, which took place for the next two centuries. The Holy Land Crusades were, perhaps, the largest-scale military mobilizations of the medieval period and a defining feature of a critical period for the establishment of Many thanks to Carles Boix, Gary Cox, Mark Dincecco, James Fearon, Murat Iyigun, Kivanc Karaman, Steve Krasner, David Laitin, Ron Rogowski, David Stasavage, and Ken Schultz for helpful comments. Harry Doshay, Fatima Maan, Tristan Poasa, and Patrick Sheldon Wee provided outstanding research assistance. Any errors are our own. International Organization 70, Summer 2016, pp. 551–586 © The IO Foundation, 2016 doi:10.1017/S0020818316000096 https://doi.org/10.1017/S0020818316000096 subject to the Cambridge Core terms of use, available at https:/www.cambridge.org/core/terms. Downloaded from https:/www.cambridge.org/core. Lane Medical Library / Stanford University Medical Center, on 28 Apr 2017 at 22:52:43, European states. Blaydes and Chaney argue that feudalism—first introduced in the ninth century—played a decisive role in the emergence of European institutional exceptionalism, particularly as feudal associations encouraged early forms of executive constraint.1 But feudalism also entrenched personal elite relationships that hindered productive economic and political competition.2 Ruggie describes the shift from medieval feudalism—with its multiple and overlapping layers of sovereign authority—to a system of territorial states as “the most important contextual change in international politics in this millennium.”3 Explanations for this transition abound, yet we are aware of none that consider how the rise of Muslim military and political power may have affected European institutional development.4 The Holy Land Crusades—which arose in response to the expansion of Muslim polities in the East—impelled Western Europe to break from feudalism and move toward the creation of increasingly impersonal and consolidated states. Although the state structures that emerged were not always highly capable or centralized, they nonetheless represented a significant discontinuity from those that existed in the recent past. European monarchs began to enjoy greater political power over what had previously been a loose network of decentralized local elites. Indeed, Spruyt argues the early twelfth century was a turning point in the development of state formation in Western Europe during which time “taxation, administration, and the subsequent policing of society increased the ability of the state to intervene in all aspects of social life.”5 By 1500 CE—and the emergence of long-distance, Atlantic trade opportunities—European monarchs were already well on their way to developing the types of growth-enhancing institutions that seemed critical for industrialization and, eventually, democratic consolidation.6 Yet scholars specializing in political economy have paid relatively little attention to institutional developments in the late medieval period when Europe first began to enjoy the institutional advantages that facilitated colonial ventures, trade expansion, and technological innovation. We explore four causal channels by which crusader mobilization strengthened nascent states. First, the departure of relatively large numbers of European elites for the Holy Land reduced the absolute number of elites who might serve as challengers to the king, increasing the stability of ruling monarchies. Second, crusade tithes were also among the first “per-head” taxes to be levied on European populations, creating precedent for later forms of centralized taxation and encouraging the 1. Blaydes and Chaney 2013. 2. North, Wallis, and Weingast 2009. 3. Ruggie 1983, 273. Fischer 1992, 433, describes the debate between structural realists and critical theorists over whether “anarchic power politics constitutes the universal condition.” Ruggie argues that structural realists who see systemic continuity in international politics are hard-pressed to describe, let alone explain, the emergence of the state system. 4. See North and Thomas 1973, for one prominent political economy explanation for the decline of feudalism. 5. Spruyt 2002, 132. 6. See North and Weingast 1989; DeLong and Shleifer 1993; Acemoglu, Johnson, and Robinson 2005; Stasavage 2010; and Van Zanden, Buringh, and Bosker 2012. 552 International Organization https://doi.org/10.1017/S0020818316000096 subject to the Cambridge Core terms of use, available at https:/www.cambridge.org/core/terms. Downloaded from https:/www.cambridge.org/core. Lane Medical Library / Stanford University Medical Center, on 28 Apr 2017 at 22:52:43, development of representative institutions. Third, the large-scale sale of land by rural elites seeking to finance crusade expeditions undermined existing feudal institutional forms. Finally, the Crusades were a catalyst for the reintegration of Western Europe into global trade networks with implications for the rise of towns and urban governance structures. Using an original data set of the geographic origins of elite crusaders, we find that areas with large numbers of Holy Land crusaders saw increased political stability, a higher probability of establishing parliamentary institutions, higher downstream levels of tax revenue, and greater urbanization, even after controlling for a number of possible confounders. Our findings contribute to a scholarly debate regarding when the critical institutions associated with the modern state first appeared. The existing literature on state formation has been focused on three key questions: When did nascent, territorial states first emerge? How did territorial states come to predominate over other forms of governance, such as city states? And how did norms of state sovereignty evolve? Prominent existing work has focused on how territorial states came to displace other institutional forms of governance7 and when and how sovereignty emerged and evolved as an international norm.8 The origins of states and the state system, however, remain opaque. Although our causal mechanisms linking the Crusades to state formation, particularly our focus on the importance of war preparation and urban capital accumulation, resemble those emphasized by Tilly,9 we date the point of critical transition to modern statehood centuries earlier than Tilly.10 As a result, our focus on institutional developments in the twelfth and thirteenth centuries is more in line with scholars who emphasize the medieval origins of the modern state.11 Our findings also relate to a small, but growing, literature that considers how developments in the Islamic world affected the evolution of European political institutions. For example, existing scholarly work has considered how historical developments in the Ottoman Empire influenced religious reform and interstate 7. Spruyt 1994a. 8. See Krasner 1995 and 1999; Philpott 2001; and Lake 2003. 9. Tilly 1992. 10. Indeed, Tilly 1992 neglects the Crusades both as a form of war mobilization and as a catalyst for the rise of capitalist interests, focusing instead on changes in military technology that took place in the late fifteenth century, including the rise of mercenaries and development in firearm technology. 11. See, for example, Strayer 1970; Levi 1988; Spruyt 1994a; and Burke 1997. Building on Tilly 1994 and Levi 2002, we take a relatively broad view of the state as a multidimensional constellation of related factors. Levi 2002, 34, argues that the state is an abstract, composite concept that cannot be encompassed in a single variable. In particular, she defines the state as “a complex apparatus of centralized and institutionalized power that concentrates violence, establishes property rights, and regulates society within a given territory while being formally recognized as a state by international forums” (Levi 2002, 40). Similarly, Tilly 1994, 14, applies the term state generously to organizations that command substantial means of coercion and successfully claim durability over other uses of coercion in at least one bounded territory. Branch 2011 argues that the development", "title": "" }, { "docid": "d4b70e82f0f1341ee95c8043fc75ad6a", "text": "Modern question answering systems have been touted as approaching human performance. However, existing question answering datasets are imperfect tests. Questions are written with humans in mind, not computers, and often do not properly expose model limitations. To address this, we develop an adversarial writing setting, where humans interact with trained models and try to break them. This annotation process yields a challenge set, which despite being easy for trivia players to answer, systematically stumps automated question answering systems. Diagnosing model errors on the evaluation data provides actionable insights to explore in developing robust and generalizable question answering systems.", "title": "" }, { "docid": "947e9df94968783869711b76ce64359a", "text": "Terrain surveying using unmanned aerial vehicles (UAV) is being applied to many areas such as precision agriculture or battlefield surveillance. A core problem of the surveying task is the coverage path planning problem (CPP); it is defined as the task of determining a path for an unmanned aerial vehicle so that it observes all points of a target area. State-of-the-art planners solve the problem for a unique region. However, in some operations, for example search and rescue, it is important to plan a path that covers more than a single area. We propose a method for solving the CPP for disjoint areas. The general problem is modeled as a rural postman problem which has been demonstrated to be NP-Hard. Our solution relies on dividing the problem into two steps: optimization of the visiting order and optimization of the flight lines orientation. The method is validated through several simulations using real parameters. In addition, it is fast enough for being implemented onboard.", "title": "" }, { "docid": "411fcc7753b94fde6fa6e5258778b768", "text": "With the growth of available computational resource, CFD–DEM (computational fluid dynamics–discrete element method) becomes an increasingly promising and feasible approach for the study of sediment transport. Several existing CFD–DEM solvers are applied in chemical engineering and mining industry. However, a robust CFD–DEM solver for the simulation of sediment transport is still desirable. In this work, the development of a threedimensional, massively parallel, and open-source CFD–DEM solver SediFoam is detailed. This solver is built based on open-source solvers OpenFOAM and LAMMPS. OpenFOAM is a CFD toolbox that can perform three-dimensional fluid flow simulations on unstructured meshes; LAMMPS is a massively parallel DEM solver for molecular dynamics. Several validation tests of SediFoam are performed using cases of a wide range of complexities. The results obtained in the present simulations are consistent with those in the literature, which demonstrates the capability of SediFoam for sediment transport applications. In addition to the validation test, the parallel efficiency of SediFoam is studied to test the performance of the code for large-scale and complex simulations. The parallel efficiency tests show that the scalability of SediFoam is satisfactory in the simulations using up to O(10) particles.", "title": "" }, { "docid": "b6c571951e7fd0c5736e911cc887401c", "text": "Wireless sensor networks (WSNs) are a rapidly emerging technology with a great potential in many ubiquitous applications. Although these sensors can be inexpensive, they are often relatively unreliable when deployed in harsh environments characterized by a vast amount of noisy and uncertain data, such as urban traffic control, earthquake zones, and battlefields. The data gathered by distributed sensors—which serve as the eyes and ears of the system—are delivered to a decision center or a gateway sensor node that interprets situational information from the data streams. Although many other machine learning techniques have been extensively studied, real-time data mining of high-speed and nonstationary data streams represents one of the most promising WSN solutions. This paper proposes a novel stream mining algorithm with a programmable mechanism for handling missing data. Experimental results from both synthetic and real-life data show that the new model is superior to standard algorithms.", "title": "" }, { "docid": "6d4aa3d000a565b562186d3b3dba1a22", "text": "Recommender systems are software applications that provide or suggest items to intended users. These systems use filtering techniques to provide recommendations. The major ones of these techniques are collaborative-based filtering technique, content-based technique, and hybrid algorithm. The motivation came as a result of the need to integrate recommendation feature in digital libraries in order to reduce information overload. Content-based technique is adopted because of its suitability in domains or situations where items are more than the users. TF-IDF (Term Frequency Inverse Document Frequency) and cosine similarity were used to determine how relevant or similar a research paper is to a user's query or profile of interest. Research papers and user's query were represented as vectors of weights using Keyword-based Vector Space model. The weights indicate the degree of association between a research paper and a user's query. This paper also presents an algorithm to provide or suggest recommendations based on users' query. The algorithm employs both TF-IDF weighing scheme and cosine similarity measure. Based on the result or output of the system, integrating recommendation feature in digital libraries will help library users to find most relevant research papers to their needs. Keywords—Recommender Systems; Content-Based Filtering; Digital Library; TF-IDF; Cosine Similarity; Vector Space Model", "title": "" }, { "docid": "e28438e023fbcbb1c1a7bd2cda3213e1", "text": "Recent studies provide evidence that Quality of Service (QoS) routing can provide increased network utilization compared to routing that is not sensitive to QoS requirements of traffic. However, there are still strong concerns about the increased cost of QoS routing, both in terms of more complex and frequent computations and increased routing protocol overhead. The main goals of this paper are to study these two cost components, and propose solutions that achieve good routing performance with reduced processing cost. First, we identify the parameters that determine the protocol traffic overhead, namely (a) policy for triggering updates, (b) sensitivity of this policy, and (c) clamp down timers that limit the rate of updates. Using simulation, we study the relative significance of these factors and investigate the relationship between routing performance and the amount of update traffic. In addition, we explore a range of design options to reduce the processing cost of QoS routing algorithms, and study their effect on routing performance. Based on the conclusions of these studies, we develop extensions to the basic QoS routing, that can achieve good routing performance with limited update generation rates. The paper also addresses the impact on the results of a number of secondary factors such as topology, high level admission control, and characteristics of network traffic.", "title": "" }, { "docid": "a5f559cf9d8f537306227c7f6b8d3a87", "text": "The proliferation of textual data in business is overwhelming. Unstructured textual data is being constantly generated via call center logs, emails, documents on the web, blogs, tweets, customer comments, customer reviews, and so on. While the amount of textual data is increasing rapidly, businesses’ ability to summarize, understand, and make sense of such data for making better business decisions remain challenging. This paper takes a quick look at how to organize and analyze textual data for extracting insightful customer intelligence from a large collection of documents and for using such information to improve business operations and performance. Multiple business applications of case studies using real data that demonstrate applications of text analytics and sentiment mining using SAS® Text Miner and SAS® Sentiment Analysis Studio are presented. While SAS® products are used as tools for demonstration only, the topics and theories covered are generic (not tool specific).", "title": "" }, { "docid": "d57cac6e8c0013a6d4ba9c149c247d4b", "text": "When humans look at an image, they see not just a pattern of color and texture, but the world behind the image. In the same way, computer vision algorithms must go beyond the pixels and reason about the underlying scene. In this dissertation, we propose methods to recover the basic spatial layout from a single image and begin to investigate its use as a foundation for scene understanding. Our spatial layout is a description of the 3D scene in terms of surfaces, occlusions, camera viewpoint, and objects. We propose a geometric class representation, a coarse categorization of surfaces according to their 3D orientations, and learn appearance-based models of geometry to identify surfaces in an image. These surface estimates serve as a basis for recovering the boundaries and occlusion relationships of prominent objects. We further show that simple reasoning about camera viewpoint and object size in the image allows accurate inference of the viewpoint and greatly improves object detection. Finally, we demonstrate the potential usefulness of our methods in applications to 3D reconstruction, scene synthesis, and robot navigation. Scene understanding from a single image requires strong assumptions about the world. We show that the necessary assumptions can be modeled statistically and learned from training data. Our work demonstrates the importance of robustness through a wide variety of image cues, multiple segmentations, and a general strategy of soft decisions and gradual inference of image structure. Above all, our work manifests the tremendous amount of 3D information that can be gleaned from a single image. Our hope is that this dissertation will inspire others to further explore how computer vision can go beyond pattern recognition and produce an understanding of the environment.", "title": "" }, { "docid": "fbf6e584128b09b6ae00f4a51bca3571", "text": "Accurate event analysis in real time is of paramount importance for high-fidelity situational awareness such that proper actions can take place before any isolated faults escalate to cascading blackouts. For large-scale power systems, due to the large intra-class variance and inter-class similarity, the nonlinear nature of the system, and the large dynamic range of the event scale, multi-event analysis presents an intriguing problem. Existing approaches are limited to detecting only single or double events or a specified event type. Although some previous works can well distinguish multiple events in small-scale power systems, the performance tends to degrade dramatically in large-scale systems. In this paper, we focus on multiple event detection, recognition, and temporal localization in large-scale power systems. We discover that there always exist groups of buses whose reaction to each event shows high degree similarity, and the group membership generally remains the same regardless of the type of event(s). We further verify that this reaction to multiple events can be approximated as a linear combination of reactions to each constituent event. Based on these findings, we propose a novel method, referred to as cluster-based sparse coding (CSC), to extract all the underlying single events involved in a multi-event scenario. Experimental results based on simulated large-scale system model (i.e., NPCC) show that the proposed CSC algorithm presents high detection and recognition rate with low false alarms.", "title": "" }, { "docid": "a02fb872137fe7bc125af746ba814849", "text": "23% of the total global burden of disease is attributable to disorders in people aged 60 years and older. Although the proportion of the burden arising from older people (≥60 years) is highest in high-income regions, disability-adjusted life years (DALYs) per head are 40% higher in low-income and middle-income regions, accounted for by the increased burden per head of population arising from cardiovascular diseases, and sensory, respiratory, and infectious disorders. The leading contributors to disease burden in older people are cardiovascular diseases (30·3% of the total burden in people aged 60 years and older), malignant neoplasms (15·1%), chronic respiratory diseases (9·5%), musculoskeletal diseases (7·5%), and neurological and mental disorders (6·6%). A substantial and increased proportion of morbidity and mortality due to chronic disease occurs in older people. Primary prevention in adults aged younger than 60 years will improve health in successive cohorts of older people, but much of the potential to reduce disease burden will come from more effective primary, secondary, and tertiary prevention targeting older people. Obstacles include misplaced global health priorities, ageism, the poor preparedness of health systems to deliver age-appropriate care for chronic diseases, and the complexity of integrating care for complex multimorbidities. Although population ageing is driving the worldwide epidemic of chronic diseases, substantial untapped potential exists to modify the relation between chronological age and health. This objective is especially important for the most age-dependent disorders (ie, dementia, stroke, chronic obstructive pulmonary disease, and vision impairment), for which the burden of disease arises more from disability than from mortality, and for which long-term care costs outweigh health expenditure. The societal cost of these disorders is enormous.", "title": "" } ]
scidocsrr
95f38c4d5fdf85d1c0f4bf2e9b159e2a
Perspectives on Ontology Learning
[ { "docid": "6209e9f45cf9bb17c13b23e9e45ff45d", "text": "This paper provides a self-contained first introduction to d escription logics (DLs). The main concepts and features are explained with examples before syntax and semantics of the DL SROIQ are defined in detail. Additional sections review lightweight DL languages, discuss the relationship to the OWL Web Ontology Language and give pointers to further reading.", "title": "" } ]
[ { "docid": "01809d609802d949aa8c1604db29419d", "text": "Do convolutional networks really need a fixed feed-forward structure? What if, after identifying the high-level concept of an image, a network could move directly to a layer that can distinguish finegrained differences? Currently, a network would first need to execute sometimes hundreds of intermediate layers that specialize in unrelated aspects. Ideally, the more a network already knows about an image, the better it should be at deciding which layer to compute next. In this work, we propose convolutional networks with adaptive inference graphs (ConvNet-AIG) that adaptively define their network topology conditioned on the input image. Following a high-level structure similar to residual networks (ResNets), ConvNet-AIG decides for each input image on the fly which layers are needed. In experiments on ImageNet we show that ConvNet-AIG learns distinct inference graphs for different categories. Both ConvNet-AIG with 50 and 101 layers outperform their ResNet counterpart, while using 20% and 33% less computations respectively. By grouping parameters into layers for related classes and only executing relevant layers, ConvNet-AIG improves both efficiency and overall classification quality. Lastly, we also study the effect of adaptive inference graphs on the susceptibility towards adversarial examples. We observe that ConvNet-AIG shows a higher robustness than ResNets, complementing other known defense mechanisms.", "title": "" }, { "docid": "ff572d9c74252a70a48d4ba377f941ae", "text": "This paper considers how design fictions in the form of 'imaginary abstracts' can be extended into complete 'fictional papers'. Imaginary abstracts are a type of design fiction that are usually included within the content of 'real' research papers, they comprise brief accounts of fictional problem frames, prototypes, user studies and findings. Design fiction abstracts have been proposed as a means to move beyond solutionism to explore the potential societal value and consequences of new HCI concepts. In this paper we contrast the properties of imaginary abstracts, with the properties of a published paper that presents fictional research, Game of Drones. Extending the notion of imaginary abstracts so that rather than including fictional abstracts within a 'non-fiction' research paper, Game of Drones is fiction from start to finish (except for the concluding paragraph where the fictional nature of the paper is revealed). In this paper we review the scope of design fiction in HCI research before contrasting the properties of imaginary abstracts with the properties of our example fictional research paper. We argue that there are clear merits and weaknesses to both approaches, but when used tactfully and carefully fictional research papers may further empower HCI's burgeoning design discourse with compelling new methods.", "title": "" }, { "docid": "d648cdf8423f3ae447f027feb97b02e1", "text": "This paper proposes a new idea that uses Wikipedia categories as answer types and defines candidate sets inside Wikipedia. The focus of a given question is searched in the hierarchy of Wikipedia main pages. Our searching strategy combines head-noun matching and synonym matching provided in semantic resources. The set of answer candidates is determined by the entry hierarchy in Wikipedia and the hyponymy hierarchy in WordNet. The experimental results show that the approach can find candidate sets in a smaller size but achieve better performance especially for ARTIFACT and ORGANIZATION types, where the performance is better than state-of-the-art Chinese factoid QA systems.", "title": "" }, { "docid": "5399a605e7a1e0337b65ac9ab768aaf6", "text": "This paper presents a new method to parsllelize the minimax tree search algorithm. This method is then compared to the “Young Brother Wait Concept” algorithm in an Othello program implementation and in a Chess program. Results of tests done on a 32-node CM5 and a 12%node CRAY T3D computers are given.", "title": "" }, { "docid": "55f0aa6a21e4976dc4705b037fd82a11", "text": "Dynamic topic models (DTMs) are very effective in discovering topics and capturing their evolution trends in time series data. To do posterior inference of DTMs, existing methods are all batch algorithms that scan the full dataset before each update of the model and make inexact variational approximations with mean-field assumptions. Due to a lack of a more scalable inference algorithm, despite the usefulness, DTMs have not captured large topic dynamics. This paper fills this research void, and presents a fast and parallelizable inference algorithm using Gibbs Sampling with Stochastic Gradient Langevin Dynamics that does not make any unwarranted assumptions. We also present a Metropolis-Hastings based O(1) sampler for topic assignments for each word token. In a distributed environment, our algorithm requires very little communication between workers during sampling (almost embarrassingly parallel) and scales up to large-scale applications. We are able to learn the largest Dynamic Topic Model to our knowledge, and learned the dynamics of 1,000 topics from 2.6 million documents in less than half an hour, and our empirical results show that our algorithm is not only orders of magnitude faster than the baselines but also achieves lower perplexity.", "title": "" }, { "docid": "71b0dbd905c2a9f4111dfc097bfa6c67", "text": "In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, actual incidents and the dilemma of anonymity. Starting with the United Kingdom perspective on cyber warfare, the authors then consider United States' views including the perspective of its military on the law of war and its general inapplicability to cyber conflict. Consideration is then given to the work of the United Nations' group of cyber security specialists and diplomats who as of July 2010 have agreed upon a set of recommendations to the United Nations Secretary General for negotiations on an international computer security treaty. An examination of the use of a nation's cybercrime law to prosecute violations that occur over the Internet indicates the inherent limits caused by the jurisdictional limits of domestic law to address cross-border cybercrime scenarios. Actual incidents from Estonia (2007), Georgia (2008), Republic of Korea (2009), Japan (2010), ongoing attacks on the United States as well as other incidents and reports on ongoing attacks are considered as well. Despite the increasing sophistication of such cyber attacks, it is evident that these attacks were met with a limited use of law and policy to combat them that can be only be characterised as a response posture defined by restraint. Recommendations are then examined for overcoming the attribution problem. The paper then considers when do cyber attacks rise to the level of an act of war by reference to the work of scholars such as Schmitt and Wingfield. Further evaluation of the special impact that non-state actors may have and some theories on how to deal with the problem of asymmetric players are considered. Discussion and possible solutions are offered. A conclusion is offered drawing some guidance from the writings of the Chinese philosopher Sun Tzu. Finally, an appendix providing a technical overview of the problem of attribution and the dilemma of anonymity in cyberspace is provided. 1. The United Kingdom Perspective \"If I went and bombed a power station in France, that would be an act of war. If I went on to the net and took out a power station, is that an act of war? One", "title": "" }, { "docid": "34557bc145ccd6d83edfc80da088f690", "text": "This thesis is dedicated to my mother, who taught me that success is not the key to happiness. Happiness is the key to success. If we love what we are doing, we will be successful. This thesis is dedicated to my father, who taught me that luck is not something that is given to us at random and should be waited for. Luck is the sense to recognize an opportunity and the ability to take advantage of it. iii ACKNOWLEDGEMENTS I would like to thank my thesis committee –", "title": "" }, { "docid": "d2d7595f04af96d7499d7b7c06ba2608", "text": "Deep Neural Network (DNN) is a widely used deep learning technique. How to ensure the safety of DNN-based system is a critical problem for the research and application of DNN. Robustness is an important safety property of DNN. However, existing work of verifying DNN’s robustness is timeconsuming and hard to scale to large-scale DNNs. In this paper, we propose a boosting method for DNN robustness verification, aiming to find counter-examples earlier. Our observation is DNN’s different inputs have different possibilities of existing counter-examples around them, and the input with a small difference between the largest output value and the second largest output value tends to be the achilles’s heel of the DNN. We have implemented our method and applied it on Reluplex, a state-ofthe-art DNN verification tool, and four DNN attacking methods. The results of the extensive experiments on two benchmarks indicate the effectiveness of our boosting method.", "title": "" }, { "docid": "f3c60d98d521ac7853bde863808e8930", "text": "In recent years cybersecurity has gained prominence as a field of expertise and the relevant practical skills are in high demand. To reduce the cost and amount of dedicated hardware required to set up a cybersecurity lab to teach those skills, several virtualization and outsourcing approaches were developed but the resulting setup has often increased in total complexity, hampering adoption. In this paper we present a very simple (and therefore highly scalable) setup that incorporates state-of-the-art industry tools. We also describe a structured set of lab assignments developed for this setup that build one on top of the other to cover the material of a semester-long Cybersecurity course taught at Boston University. We explore alternative lab architectures, discuss other existing sets of lab assignments and present some ideas for further improvement.", "title": "" }, { "docid": "33ce6e07bc4031f1b915e32769d5c984", "text": "MOTIVATION\nDIYABC is a software package for a comprehensive analysis of population history using approximate Bayesian computation on DNA polymorphism data. Version 2.0 implements a number of new features and analytical methods. It allows (i) the analysis of single nucleotide polymorphism data at large number of loci, apart from microsatellite and DNA sequence data, (ii) efficient Bayesian model choice using linear discriminant analysis on summary statistics and (iii) the serial launching of multiple post-processing analyses. DIYABC v2.0 also includes a user-friendly graphical interface with various new options. It can be run on three operating systems: GNU/Linux, Microsoft Windows and Apple Os X.\n\n\nAVAILABILITY\nFreely available with a detailed notice document and example projects to academic users at http://www1.montpellier.inra.fr/CBGP/diyabc CONTACT: estoup@supagro.inra.fr Supplementary information: Supplementary data are available at Bioinformatics online.", "title": "" }, { "docid": "fa94ee5e70d030270f317093b852a4e1", "text": "This paper studies how home wireless performance characteristics affect the performance of user traffic in real homes. Previous studies have focused either on wireless metrics exclusively, without connection to the performance of user traffic; or on the performance of the home network at higher layers. In contrast, we deploy a passive measurement tool on commodity access points to correlate wireless performance metrics with TCP performance of user traffic. We implement our measurement tool, deploy it on commodity routers in 66 homes for one month, and study the relationship between wireless metrics and TCP performance of user traffic. We find that, most of the time, TCP flows from devices in the home achieve only a small fraction of available access link throughput; as the throughput of user traffic approaches the access link throughput, the characteristics of the home wireless network more directly affect performance. We also find that the 5 GHz band offers users better performance better than the 2.4 GHz band, and although the performance of devices varies within the same home, many homes do not have multiple devices sending high traffic volumes, implying that certain types of wireless contention may be uncommon in practice.", "title": "" }, { "docid": "868f0b672676736dbf5688822fcb9ba3", "text": "Inspired by the attractive Flops/dollar ratio and the incredible growth in the speed of modern graphics processing units (GPUs), we propose to use a cluster of GPUs for high performance scientific computing. As an example application, we have developed a parallel flow simulation using the lattice Boltzmann model (LBM) on a GPU cluster and have simulated the dispersion of airborne contaminants in the Times Square area of New York City. Using 30 GPU nodes, our simulation can compute a 480x400x80 LBM in 0.31second/step, a speed which is 4.6 times faster than that of our CPU cluster implementation. Besides the LBM, we also discuss other potential applications of the GPU cluster, such as cellular automata, PDE solvers, and FEM.", "title": "" }, { "docid": "55a1bedc3aa007a4e8bbc77d6f710d7f", "text": "The purpose of the present study was to develop and validate a self-report instrument that measures the nature of the coach-athlete relationship. Jowett et al.'s (Jowett & Meek, 2000; Jowett, in press) qualitative case studies and relevant literature were used to generate items for an instrument that measures affective, cognitive, and behavioral aspects of the coach-athlete relationship. Two studies were carried out in an attempt to assess content, predictive, and construct validity, as well as internal consistency, of the Coach-Athlete Relationship Questionnaire (CART-Q), using two independent British samples. Principal component analysis and confirmatory factor analysis were used to reduce the number of items, identify principal components, and confirm the latent structure of the CART-Q. Results supported the multidimensional nature of the coach-athlete relationship. The latent structure of the CART-Q was underlined by the latent variables of coaches' and athletes' Closeness (emotions), Commitment (cognitions), and Complementarity (behaviors).", "title": "" }, { "docid": "255de21131ccf74c3269cc5e7c21820b", "text": "This paper discusses the effect of driving current on frequency response of the two types of light emitting diodes (LEDs), namely, phosphor-based LED and single color LED. The experiments show that the influence of the change of driving current on frequency response of phosphor-based LED is not obvious compared with the single color LED(blue, red and green). The experiments also find that the bandwidth of the white LED was expanded from 1MHz to 32MHz by the pre-equalization strategy and 26Mbit/s transmission speed was taken under Bit Error Ratio of 7.55×10-6 within 3m by non-return-to-zero on-off-keying modulation. Especially, the frequency response intensity of the phosphor-based LED is little influenced by the fluctuation of the driving current, which meets the requirements that the indoor light source needs to be adjusted in real-time by driving current. As the bandwidth of the single color LED is changed by the driving current obviously, the LED modulation bandwidth should be calculated according to the minimum driving current while we consider the requirement of the VLC transmission speed.", "title": "" }, { "docid": "740b783d840a706992dc6977a918f1f1", "text": "Inadequate curriculum for software engineering is considered to be one of the most common software risks. A number of solutions, on improving Software Engineering Education (SEE) have been reported in literature but there is a need to collectively present these solutions at one place. We have performed a mapping study to present a broad view of literature; published on improving the current state of SEE. Our aim is to give academicians, practitioners and researchers an international view of the current state of SEE. Our study has identified 70 primary studies that met our selection criteria, which we further classified and categorized in a well-defined Software Engineering educational framework. We found that the most researched category within the SE educational framework is Innovative Teaching Methods whereas the least amount of research was found in Student Learning and Assessment category. Our future work is to conduct a Systematic Literature Review on SEE. Keywords—Mapping Study, Software Engineering, Software Engineering Education, Literature Survey.", "title": "" }, { "docid": "b1422b2646f02a5a84a6a4b13f5ae7d8", "text": "Two experiments examined the influence of timbre on auditory stream segregation. In experiment 1, listeners heard sequences of orchestral tones equated for pitch and loudness, and they rated how strongly the instruments segregated. Multidimensional scaling analyses of these ratings revealed that segregation was based on the static and dynamic acoustic attributes that influenced similarity judgements in a previous experiment (P Iverson & CL Krumhansl, 1993). In Experiment 2, listeners heard interleaved melodies and tried to recognize the melodies played by a target timbre. The results extended the findings of Experiment 1 to tones varying pitch. Auditory stream segregation appears to be influenced by gross differences in static spectra and by dynamic attributes, including attack duration and spectral flux. These findings support a gestalt explanation of stream segregation and provide evidence against peripheral channel model.", "title": "" }, { "docid": "648a5479933eb4703f1d2639e0c3b5c7", "text": "The Surgery Treatment Modality Committee of the Korean Gynecologic Oncologic Group (KGOG) has determined to develop a surgical manual to facilitate clinical trials and to improve communication between investigators by standardizing and precisely describing operating procedures. The literature on anatomic terminology, identification of surgical components, and surgical techniques were reviewed and discussed in depth to develop a surgical manual for gynecologic oncology. The surgical procedures provided here represent the minimum requirements for participating in a clinical trial. These procedures should be described in the operation record form, and the pathologic findings obtained from the procedures should be recorded in the pathologic report form. Here, we focused on radical hysterectomy and lymphadenectomy, and we developed a KGOG classification for those conditions.", "title": "" }, { "docid": "699ef9eecd9d7fbef01930915c3480f0", "text": "Disassembly of the cone-shaped HIV-1 capsid in target cells is a prerequisite for establishing a life-long infection. This step in HIV-1 entry, referred to as uncoating, is critical yet poorly understood. Here we report a novel strategy to visualize HIV-1 uncoating using a fluorescently tagged oligomeric form of a capsid-binding host protein cyclophilin A (CypA-DsRed), which is specifically packaged into virions through the high-avidity binding to capsid (CA). Single virus imaging reveals that CypA-DsRed remains associated with cores after permeabilization/removal of the viral membrane and that CypA-DsRed and CA are lost concomitantly from the cores in vitro and in living cells. The rate of loss is modulated by the core stability and is accelerated upon the initiation of reverse transcription. We show that the majority of single cores lose CypA-DsRed shortly after viral fusion, while a small fraction remains intact for several hours. Single particle tracking at late times post-infection reveals a gradual loss of CypA-DsRed which is dependent on reverse transcription. Uncoating occurs both in the cytoplasm and at the nuclear membrane. Our novel imaging assay thus enables time-resolved visualization of single HIV-1 uncoating in living cells, and reveals the previously unappreciated spatio-temporal features of this incompletely understood process.", "title": "" }, { "docid": "14835b93b580081b0398e5e370b72c2c", "text": "In order for autonomous vehicles to achieve life-long operation in outdoor environments, navigation systems must be able to cope with visual change—whether it’s short term, such as variable lighting or weather conditions, or long term, such as different seasons. As a Global Positioning System (GPS) is not always reliable, autonomous vehicles must be self sufficient with onboard sensors. This thesis examines the problem of localisation against a known map across extreme lighting and weather conditions using only a stereo camera as the primary sensor. The method presented departs from traditional techniques that blindly apply out-of-the-box interest-point detectors to all images of all places. This naive approach fails to take into account any prior knowledge that exists about the environment in which the robot is operating. Furthermore, the point-feature approach often fails when there are dramatic appearance changes, as associating low-level features such as corners or edges is extremely difficult and sometimes not possible. By leveraging knowledge of prior appearance, this thesis presents an unsupervised method for learning a set of distinctive and stable (i.e., stable under appearance changes) feature detectors that are unique to a specific place in the environment. In other words, we learn place-dependent feature detectors that enable vastly superior performance in terms of robustness in exchange for a reduced, but tolerable metric precision. By folding in a method for masking distracting objects in dynamic environments and examining a simple model for external illuminates, such as the sun, this thesis presents a robust localisation system that is able to achieve metric estimates from night-today or summer-to-winter conditions. Results are presented from various locations in the UK, including the Begbroke Science Park, Woodstock, Oxford, and central London. Statement of Authorship This thesis is submitted to the Department of Engineering Science, University of Oxford, in fulfilment of the requirements for the degree of Doctor of Philosophy. This thesis is entirely my own work, and except where otherwise stated, describes my own research. Colin McManus, Lady Margaret Hall Funding The work described in this thesis was funded by Nissan Motors.", "title": "" }, { "docid": "d4fa5b9d4530b12a394c1e98ea2793b1", "text": "Most successful object recognition systems rely on binary classification, deciding only if an object is present or not, but not providing information on the actual object location. To perform localization, one can take a sliding window approach, but this strongly increases the computational cost, because the classifier function has to be evaluated over a large set of candidate subwindows. In this paper, we propose a simple yet powerful branch-and-bound scheme that allows efficient maximization of a large class of classifier functions over all possible subimages. It converges to a globally optimal solution typically in sublinear time. We show how our method is applicable to different object detection and retrieval scenarios. The achieved speedup allows the use of classifiers for localization that formerly were considered too slow for this task, such as SVMs with a spatial pyramid kernel or nearest neighbor classifiers based on the chi2-distance. We demonstrate state-of-the-art performance of the resulting systems on the UIUC Cars dataset, the PASCAL VOC 2006 dataset and in the PASCAL VOC 2007 competition.", "title": "" } ]
scidocsrr
9c0c9d4cdea4a8127ae8bbb7782ccf48
A Fast Face Detection Method via Convolutional Neural Network
[ { "docid": "27ad413fa5833094fb2e557308fa761d", "text": "A common practice to gain invariant features in object recognition models is to aggregate multiple low-level features over a small neighborhood. However, the differences between those models makes a comparison of the properties of different aggregation functions hard. Our aim is to gain insight into different functions by directly comparing them on a fixed architecture for several common object recognition tasks. Empirical results show that a maximum pooling operation significantly outperforms subsampling operations. Despite their shift-invariant properties, overlapping pooling windows are no significant improvement over non-overlapping pooling windows. By applying this knowledge, we achieve state-of-the-art error rates of 4.57% on the NORB normalized-uniform dataset and 5.6% on the NORB jittered-cluttered dataset.", "title": "" } ]
[ { "docid": "033253834167cecbcc2658c8ba22aa18", "text": "Semi-supervised image classification aims to classify a large quantity of unlabeled images by typically harnessing scarce labeled images. Existing semi-supervised methods often suffer from inadequate classification accuracy when encountering difficult yet critical images, such as outliers, because they treat all unlabeled images equally and conduct classifications in an imperfectly ordered sequence. In this paper, we employ the curriculum learning methodology by investigating the difficulty of classifying every unlabeled image. The reliability and the discriminability of these unlabeled images are particularly investigated for evaluating their difficulty. As a result, an optimized image sequence is generated during the iterative propagations, and the unlabeled images are logically classified from simple to difficult. Furthermore, since images are usually characterized by multiple visual feature descriptors, we associate each kind of features with a teacher, and design a multi-modal curriculum learning (MMCL) strategy to integrate the information from different feature modalities. In each propagation, each teacher analyzes the difficulties of the currently unlabeled images from its own modality viewpoint. A consensus is subsequently reached among all the teachers, determining the currently simplest images (i.e., a curriculum), which are to be reliably classified by the multi-modal learner. This well-organized propagation process leveraging multiple teachers and one learner enables our MMCL to outperform five state-of-the-art methods on eight popular image data sets.", "title": "" }, { "docid": "1dee4c916308295626bce658529a8e0e", "text": "Despite their impressive performance, deep neural networks exhibit striking failures on out-of-distribution inputs. One core idea of adversarial example research is to reveal neural network errors under such distribution shifts. We decompose these errors into two complementary sources: sensitivity and invariance. We show deep networks are not only too sensitive to task-irrelevant changes of their input, as is well-known from -adversarial examples, but are also too invariant to a wide range of task-relevant changes, thus making vast regions in input space vulnerable to adversarial attacks. We show such excessive invariance occurs across various tasks and architecture types. On MNIST and ImageNet one can manipulate the class-specific content of almost any image without changing the hidden activations. We identify an insufficiency of the standard cross-entropy loss as a reason for these failures. Further, we extend this objective based on an informationtheoretic analysis so it encourages the model to consider all task-dependent features in its decision. This provides the first approach tailored explicitly to overcome excessive invariance and resulting vulnerabilities.", "title": "" }, { "docid": "76cc47710ab6fa91446844368821c991", "text": "Recommender systems (RSs) have been successfully applied to alleviate the problem of information overload and assist users' decision makings. Multi-criteria recommender systems is one of the RSs which utilizes users' multiple ratings on different aspects of the items (i.e., multi-criteria ratings) to predict user preferences. Traditional approaches simply treat these multi-criteria ratings as addons, and aggregate them together to serve for item recommendations. In this paper, we propose the novel approaches which treat criteria preferences as contextual situations. More specifically, we believe that part of multiple criteria preferences can be viewed as contexts, while others can be treated in the traditional way in multi-criteria recommender systems. We compare the recommendation performance among three settings: using all the criteria ratings in the traditional way, treating all the criteria preferences as contexts, and utilizing selected criteria ratings as contexts. Our experiments based on two real-world rating data sets reveal that treating criteria preferences as contexts can improve the performance of item recommendations, but they should be carefully selected. The hybrid model of using selected criteria preferences as contexts and the remaining ones in the traditional way is finally demonstrated as the overall winner in our experiments.", "title": "" }, { "docid": "46a9d3869c3069cb93046b1dbb9cbe67", "text": "Solar energy concentration technology using Fresnel lens is an effective way to make full use of sunlight. This paper makes a review about the recent development of the concentrated solar energy applications using Fresnel lenses. The ongoing research and development involves imaging systems and non-imaging systems. Compared with imaging systems, non-imaging systems have the merits of larger accept angles, higher concentration ratios with less volume and shorter focal length, higher optical efficiency, etc. Concentrated photovoltaics is a major application and the highest solar-to-electric conversion efficiency based on imaging Fresnel lens and non-imaging Fresnel lens are reported as over 30% and 31.5 ± 1.7%, respectively. Moreover, both kinds of systems are widely used in other fields such as hydrogen generation, photo-bio reactors as well as photochemical reactions, surface modification of metallic materials, solar lighting and solar-pumped laser. During the recent two decades, such applications have been built and tested successfully to validate the practicality of Fresnel lens solar concentration systems. Although the present application scale is small, the ongoing research and development works suggest that Fresnel lens solar concentrators, especially non-imaging Fresnel lenses, will bring a breakthrough of commercial solar energy concentration application technology in the near future. Finally, the advantages and disadvantages of two systems are also summarized. Crown Copyright © 2011 Published by Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "2c6c8703d7be507e15066d2a3fbd813c", "text": "This paper presents a novel and effective audio based method on depression classification. It focuses on two important issues, \\emph{i.e.} data representation and sample imbalance, which are not well addressed in literature. For the former one, in contrast to traditional shallow hand-crafted features, we propose a deep model, namely DepAudioNet, to encode the depression related characteristics in the vocal channel, combining Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) to deliver a more comprehensive audio representation. For the latter one, we introduce a random sampling strategy in the model training phase to balance the positive and negative samples, which largely alleviates the bias caused by uneven sample distribution. Evaluations are carried out on the DAIC-WOZ dataset for the Depression Classification Sub-challenge (DCC) at the 2016 Audio-Visual Emotion Challenge (AVEC), and the experimental results achieved clearly demonstrate the effectiveness of the proposed approach.", "title": "" }, { "docid": "5f7adc28fab008d93a968b6a1e5ad061", "text": "This paper describes recent approaches using text-mining to automatically profile and extract arguments from legal cases. We outline some of the background context and motivations. We then turn to consider issues related to the construction and composition of a corpora of legal cases. We show how a Context-Free Grammar can be used to extract arguments, and how ontologies and Natural Language Processing can identify complex information such as case factors and participant roles. Together the results bring us closer to automatic identification of legal arguments.", "title": "" }, { "docid": "33beb7f84ee6e34d7d9c583171f98252", "text": "In this paper, a novel zero-voltage switching full-bridge converter with trailing edge pulse width modulation and capacitive output filter is presented. The target application for this study is the second stage dc-dc converter in a two stage 1.65 kW on-board charger for a plug-in hybrid electric vehicle. For this application the design objective is to achieve high efficiency and low cost in order to minimize the charger size, charging time, and the amount and the cost of electricity drawn from the utility. A detailed converter operation analysis is presented along with simulation and experimental results. In comparison to a benchmark full-bridge with an LC output filter, the proposed converter reduces the reverse recovery losses in the secondary rectifier diodes, therefore, enabling a converter switching frequency of 100 kHz. Experimental results are presented for a prototype unit converting 400 V from the input dc link to an output voltage range of 200-450 V dc at 1650 W. The prototype achieves a peak efficiency of 95.7%.", "title": "" }, { "docid": "e06b2385b1b9a81b9678fa5be485151a", "text": "We propose a new weight compensation mechanism with a non-circular pulley and a spring. We show the basic principle and numerical design method to derive the shape of the non-circular pulley. After demonstration of the weight compensation for an inverted/ordinary pendulum system, we extend the same mechanism to a parallel five-bar linkage system, analyzing the required torques using transposed Jacobian matrices. Finally, we develop a three degree of freedom manipulator with relatively small output actuators and verified that the weight compensation mechanism significantly contributes to decrease static torques to keep the same posture within manipulator's work space.", "title": "" }, { "docid": "1969bf5a07349cc5a9b498e0437e41fe", "text": "In this work, we tackle the problem of instance segmentation, the task of simultaneously solving object detection and semantic segmentation. Towards this goal, we present a model, called MaskLab, which produces three outputs: box detection, semantic segmentation, and direction prediction. Building on top of the Faster-RCNN object detector, the predicted boxes provide accurate localization of object instances. Within each region of interest, MaskLab performs foreground/background segmentation by combining semantic and direction prediction. Semantic segmentation assists the model in distinguishing between objects of different semantic classes including background, while the direction prediction, estimating each pixel's direction towards its corresponding center, allows separating instances of the same semantic class. Moreover, we explore the effect of incorporating recent successful methods from both segmentation and detection (e.g., atrous convolution and hypercolumn). Our proposed model is evaluated on the COCO instance segmentation benchmark and shows comparable performance with other state-of-art models.", "title": "" }, { "docid": "d41d5ed278337cf3138880e628272f2d", "text": "Technological changes and improved electronic communications seem, paradoxically, to be making cities more, rather than less, important. There is a strong correlation between urbanization and economic development across countries, and within-country evidence suggests that productivity rises in dense agglomerations. But urban economic advantages are often offset by the perennial urban curses of crime, congestion and contagious disease. The past history of the developed world suggests that these problems require more capable governments that use a combination of economic and engineering solutions. Though the scope of urban challenges can make remaining rural seem attractive, agrarian poverty has typically also been quite costly.", "title": "" }, { "docid": "e7bb89000329245bccdecbc80549109c", "text": "This paper presents a tutorial overview of the use of coupling between nonadjacent resonators to produce transmission zeros at real frequencies in microwave filters. Multipath coupling diagrams are constructed and the relative phase shifts of multiple paths are observed to produce the known responses of the cascaded triplet and quadruplet sections. The same technique is also used to explore less common nested cross-coupling structures and to predict their behavior. A discussion of the effects of nonzero electrical length coupling elements is presented. Finally, a brief categorization of the various synthesis and implementation techniques available for these types of filters is given.", "title": "" }, { "docid": "5d44a55eedbebe5c0cbacc0892d8b479", "text": "We consider the problem of learning a causal graph over a set of variables with interventions. We study the cost-optimal causal graph learning problem: For a given skeleton (undirected version of the causal graph), design the set of interventions with minimum total cost, that can uniquely identify any causal graph with the given skeleton. We show that this problem is solvable in polynomial time. Later, we consider the case when the number of interventions is limited. For this case, we provide polynomial time algorithms when the skeleton is a tree or a clique tree. For a general chordal skeleton, we develop an efficient greedy algorithm, which can be improved when the causal graph skeleton is an interval graph.", "title": "" }, { "docid": "dcf7214c15c13f13d33c9a7b2c216588", "text": "Many machine learning tasks such as multiple instance learning, 3D shape recognition and few-shot image classification are defined on sets of instances. Since solutions to such problems do not depend on the permutation of elements of the set, models used to address them should be permutation invariant. We present an attention-based neural network module, the Set Transformer, specifically designed to model interactions among elements in the input set. The model consists of an encoder and a decoder, both of which rely on attention mechanisms. In an effort to reduce computational complexity, we introduce an attention scheme inspired by inducing point methods from sparse Gaussian process literature. It reduces computation time of self-attention from quadratic to linear in the number of elements in the set. We show that our model is theoretically attractive and we evaluate it on a range of tasks, demonstrating increased performance compared to recent methods for set-structured data.", "title": "" }, { "docid": "052eb9b25a2efa0c79b65c32c48c7d03", "text": "The advent of high-resolution digital cameras and sophisticated multi-view stereo algorithms offers the promise of unprecedented geometric fidelity in image-based modeling tasks, but it also puts unprecedented demands on camera calibration to fulfill these promises. This paper presents a novel approach to camera calibration where top-down information from rough camera parameter estimates and the output of a multi-view-stereo system on scaled-down input images is used to effectively guide the search for additional image correspondences and significantly improve camera calibration parameters using a standard bundle adjustment algorithm (Lourakis and Argyros 2008). The proposed method has been tested on six real datasets including objects without salient features for which image correspondences cannot be found in a purely bottom-up fashion, and objects with high curvature and thin structures that are lost in visual hull construction even with small errors in camera parameters. Three different methods have been used to qualitatively assess the improvements of the camera parameters. The implementation of the proposed algorithm is publicly available at Furukawa and Ponce (2008b).", "title": "" }, { "docid": "07e54849ceae5e425b106619e760e522", "text": "In this paper, we propose a novel approach to interpret a well-trained classification model through systematically investigating effects of its hidden units on prediction making. We search for the core hidden units responsible for predicting inputs as the class of interest under the generative Bayesian inference framework. We model such a process of unit selection as an Indian Buffet Process, and derive a simplified objective function via the MAP asymptotic technique. The induced binary optimization problem is efficiently solved with a continuous relaxation method by attaching a Switch Gate layer to the hidden layers of interest. The resulted interpreter model is thus end-to-end optimized via standard gradient back-propagation. Experiments are conducted with two popular deep convolutional classifiers, respectively well-trained on the MNIST dataset and the CIFAR10 dataset. The results demonstrate that the proposed interpreter successfully finds the core hidden units most responsible for prediction making. The modified model, only with the selected units activated, can hold correct predictions at a high rate. Besides, this interpreter model is also able to extract the most informative pixels in the images by connecting a Switch Gate layer to the input layer.", "title": "" }, { "docid": "80c9baa20229ab4954c80171b71fc7b6", "text": "Graphs that model social networks, numerical simulations, and the structure of the Internet are enormous and cannot be manually inspected. A popular metric used to analyze these networks is betweenness centrality, which has applications in community detection, power grid contingency analysis, and the study of the human brain. However, these analyses come with a high computational cost that prevents the examination of large graphs of interest.\n Prior GPU implementations suffer from large local data structures and inefficient graph traversals that limit scalability and performance. Here we present several hybrid GPU implementations, providing good performance on graphs of arbitrary structure rather than just scale-free graphs as was done previously. We achieve up to 13x speedup on high-diameter graphs and an average of 2.71x speedup overall over the best existing GPU algorithm. We observe near linear speedup and performance exceeding tens of GTEPS when running betweenness centrality on 192 GPUs.", "title": "" }, { "docid": "55d68333609cc4a7ae5168b841db5189", "text": "The neural revolution is changing our understanding of the brain and the mind in radical ways, and that is no less true in the theory of metaphor. It is 30 years since Mark Johnson and I wrote Metaphors We Live By in 1979. Though the fundamental outlines of what we discovered remain as valid today as they were then, developments in brain science and neural computation have vastly enriched our understanding of how conceptual metaphor works. This is an intermediate report, as of January 2009.", "title": "" }, { "docid": "c3d49f73bf12f67e1f4f095321846ffd", "text": "This paper presents a low-profile user-terminal antenna for mobile bi-directional Ka-band satellite communication networks for emergency scenarios. We have devised an antenna with a circularly polarised radiation pattern and dual-band capability, which addresses a hybrid tracking. The principle of operation of a rectangular antenna panel applying a dual-band partially reflective surface (PRS) of 60 mm by 200 mm was manufactured and successfully verified. This publication describes the design of the panel and analyses measurement results. Furthermore, our first low-profile antenna demonstrator is presented, intended to be evaluated at a testbed for satellite communications in Ilmenau.", "title": "" }, { "docid": "dc5e69ca604d7fde242876d5464fb045", "text": "We propose a general Convolutional Neural Network (CNN) encoder model for machine translation that fits within in the framework of Encoder-Decoder models proposed by Cho, et. al. [1]. A CNN takes as input a sentence in the source language, performs multiple convolution and pooling operations, and uses a fully connected layer to produce a fixed-length encoding of the sentence as input to a Recurrent Neural Network decoder (using GRUs or LSTMs). The decoder, encoder, and word embeddings are jointly trained to maximize the conditional probability of the target sentence given the source sentence. Many variations on the basic model are possible and can improve the performance of the model.", "title": "" }, { "docid": "0f9a4d22cc7f63ea185f3f17759e185a", "text": "Image super-resolution (SR) reconstruction is essentially an ill-posed problem, so it is important to design an effective prior. For this purpose, we propose a novel image SR method by learning both non-local and local regularization priors from a given low-resolution image. The non-local prior takes advantage of the redundancy of similar patches in natural images, while the local prior assumes that a target pixel can be estimated by a weighted average of its neighbors. Based on the above considerations, we utilize the non-local means filter to learn a non-local prior and the steering kernel regression to learn a local prior. By assembling the two complementary regularization terms, we propose a maximum a posteriori probability framework for SR recovery. Thorough experimental results suggest that the proposed SR method can reconstruct higher quality results both quantitatively and perceptually.", "title": "" } ]
scidocsrr
6fd040dc325fe201973f655a2c237c99
Performance Analysis of GWO , GA and PSO Optimized FOPID and PSS for SMIB System
[ { "docid": "9888a7723089d2f1218e6e1a186a5e91", "text": "This classic text offers you the key to understanding short circuits, open conductors and other problems relating to electric power systems that are subject to unbalanced conditions. Using the method of symmetrical components, acknowledged expert Paul M. Anderson provides comprehensive guidance for both finding solutions for faulted power systems and maintaining protective system applications. You'll learn to solve advanced problems, while gaining a thorough background in elementary configurations. Features you'll put to immediate use: Numerous examples and problems Clear, concise notation Analytical simplifications Matrix methods applicable to digital computer technology Extensive appendices", "title": "" } ]
[ { "docid": "543348825e8157926761b2f6a7981de2", "text": "With the aim of developing a fast yet accurate algorithm for compressive sensing (CS) reconstruction of natural images, we combine in this paper the merits of two existing categories of CS methods: the structure insights of traditional optimization-based methods and the speed of recent network-based ones. Specifically, we propose a novel structured deep network, dubbed ISTA-Net, which is inspired by the Iterative Shrinkage-Thresholding Algorithm (ISTA) for optimizing a general $$ norm CS reconstruction model. To cast ISTA into deep network form, we develop an effective strategy to solve the proximal mapping associated with the sparsity-inducing regularizer using nonlinear transforms. All the parameters in ISTA-Net (e.g. nonlinear transforms, shrinkage thresholds, step sizes, etc.) are learned end-to-end, rather than being hand-crafted. Moreover, considering that the residuals of natural images are more compressible, an enhanced version of ISTA-Net in the residual domain, dubbed ISTA-Net+, is derived to further improve CS reconstruction. Extensive CS experiments demonstrate that the proposed ISTA-Nets outperform existing state-of-the-art optimization-based and network-based CS methods by large margins, while maintaining fast computational speed. Our source codes are available: http://jianzhang.tech/projects/ISTA-Net.", "title": "" }, { "docid": "b27d5552763f6e5656610e01160acc08", "text": "PURPOSE\nSome researchers (F. R. Vellutino, F. M. Scanlon, & M. S. Tanzman, 1994) have argued that the different domains comprising language (e.g., phonology, semantics, and grammar) may influence reading development in a differential manner and at different developmental periods. The purpose of this study was to examine proposed causal relationships among different linguistic subsystems and different measures of reading achievement in a group of children with reading disabilities.\n\n\nMETHODS\nParticipants were 279 students in 2nd to 3rd grade who met research criteria for reading disability. Of those students, 108 were girls and 171 were boys. In terms of heritage, 135 were African and 144 were Caucasian. Measures assessing pre-reading skills, word identification, reading comprehension, and general oral language skills were administered.\n\n\nRESULTS\nStructural equation modeling analyses indicated receptive and expressive vocabulary knowledge was independently related to pre-reading skills. Additionally, expressive vocabulary knowledge and listening comprehension skills were found to be independently related to word identification abilities.\n\n\nCONCLUSION\nResults are consistent with previous research indicating that oral language skills are related to reading achievement (e.g., A. Olofsson & J. Niedersoe, 1999; H. S. Scarborough, 1990). Results from this study suggest that receptive and expressive vocabulary knowledge influence pre-reading skills in differential ways. Further, results suggest that expressive vocabulary knowledge and listening comprehension skills facilitate word identification skills.", "title": "" }, { "docid": "da4f95cc061e7f2433ffa37a8e34437e", "text": "Active learning has been proven to be quite effective in reducing the human labeling efforts by actively selecting the most informative examples to label. In this paper, we present a batch-mode active learning method based on logistic regression. Our key motivation is an out-of-sample bound on the estimation error of class distribution in logistic regression conditioned on any fixed training sample. It is different from a typical PACstyle passive learning error bound, that relies on the i.i.d. assumption of example-label pairs. In addition, it does not contain the class labels of the training sample. Therefore, it can be immediately used to design an active learning algorithm by minimizing this bound iteratively. We also discuss the connections between the proposed method and some existing active learning approaches. Experiments on benchmark UCI datasets and text datasets demonstrate that the proposed method outperforms the state-of-the-art active learning methods significantly.", "title": "" }, { "docid": "66044816ca1af0198acd27d22e0e347e", "text": "BACKGROUND\nThe Close Kinetic Chain Upper Extremity Stability Test (CKCUES test) is a low cost shoulder functional test that could be considered as a complementary and objective clinical outcome for shoulder performance evaluation. However, its reliability was tested only in recreational athletes' males and there are no studies comparing scores between sedentary and active samples. The purpose was to examine inter and intrasession reliability of CKCUES Test for samples of sedentary male and female with (SIS), for samples of sedentary healthy male and female, and for male and female samples of healthy upper extremity sport specific recreational athletes. Other purpose was to compare scores within sedentary and within recreational athletes samples of same gender.\n\n\nMETHODS\nA sample of 108 subjects with and without SIS was recruited. Subjects were tested twice, seven days apart. Each subject performed four test repetitions, with 45 seconds of rest between them. The last three repetitions were averaged and used to statistical analysis. Intraclass Correlation Coefficient ICC2,1 was used to assess intrasession reliability of number of touches score and ICC2,3 was used to assess intersession reliability of number of touches, normalized score, and power score. Test scores within groups of same gender also were compared. Measurement error was determined by calculating the Standard Error of the Measurement (SEM) and Minimum detectable change (MDC) for all scores.\n\n\nRESULTS\nThe CKCUES Test showed excellent intersession reliability for scores in all samples. Results also showed excellent intrasession reliability of number of touches for all samples. Scores were greater in active compared to sedentary, with exception of power score. All scores were greater in active compared to sedentary and SIS males and females. SEM ranged from 1.45 to 2.76 touches (based on a 95% CI) and MDC ranged from 2.05 to 3.91(based on a 95% CI) in subjects with and without SIS. At least three touches are needed to be considered a real improvement on CKCUES Test scores.\n\n\nCONCLUSION\nResults suggest CKCUES Test is a reliable tool to evaluate upper extremity functional performance for sedentary, for upper extremity sport specific recreational, and for sedentary males and females with SIS.", "title": "" }, { "docid": "9b19f343a879430283881a69e3f9cb78", "text": "Effective analysis of applications (shortly apps) is essential to understanding apps' behavior. Two analysis approaches, i.e., static and dynamic, are widely used; although, both have well known limitations. Static analysis suffers from obfuscation and dynamic code updates. Whereas, it is extremely hard for dynamic analysis to guarantee the execution of all the code paths in an app and thereby, suffers from the code coverage problem. However, from a security point of view, executing all paths in an app might be less interesting than executing certain potentially malicious paths in the app. In this work, we use a hybrid approach that combines static and dynamic analysis in an iterative manner to cover their shortcomings. We use targeted execution of interesting code paths to solve the issues of obfuscation and dynamic code updates. Our targeted execution leverages a slicing-based analysis for the generation of data-dependent slices for arbitrary methods of interest (MOI) and on execution of the extracted slices for capturing their dynamic behavior. Motivated by the fact that malicious apps use Inter Component Communications (ICC) to exchange data [19], our main contribution is the automatic targeted triggering of MOI that use ICC for passing data between components. We implement a proof of concept, TelCC, and report the results of our evaluation.", "title": "" }, { "docid": "f82a9c15e88ba24dbf8f5d4678b8dffd", "text": "Numerous existing object segmentation frameworks commonly utilize the object bounding box as a prior. In this paper, we address semantic segmentation assuming that object bounding boxes are provided by object detectors, but no training data with annotated segments are available. Based on a set of segment hypotheses, we introduce a simple voting scheme to estimate shape guidance for each bounding box. The derived shape guidance is used in the subsequent graph-cut-based figure-ground segmentation. The final segmentation result is obtained by merging the segmentation results in the bounding boxes. We conduct an extensive analysis of the effect of object bounding box accuracy. Comprehensive experiments on both the challenging PASCAL VOC object segmentation dataset and GrabCut-50 image segmentation dataset show that the proposed approach achieves competitive results compared to previous detection or bounding box prior based methods, as well as other state-of-the-art semantic segmentation methods.", "title": "" }, { "docid": "9153e5e34130ce42df99d86131289744", "text": "We present an adiabatic taper design in three dimensions for coupling light into photonic crystal defect waveguides in a square lattice of circular dielectric rods. The taper is a two-stage structure in which the first stage makes the transition from a dielectric waveguide to a coupled-cavity waveguide. The second stage subsequently transforms the waveguide mode from an index-guided mode to a band-gap-guided mode. We discuss differences between the two-dimensional device and its three-dimensional slab version. © 2003 Optical Society of America OCIS codes: 060.1810, 130.3120, 230.7370.", "title": "" }, { "docid": "82e78a0e89a5fe7ca4465af9d7a4dc3e", "text": "While Six Sigma is increasingly implemented in industry, little academic research has been done on Six Sigma and its influence on quality management theory and application. There is a criticism that Six Sigma simply puts traditional quality management practices in a new package. To investigate this issue and the role of Six Sigma in quality management, this study reviewed both the traditional quality management and Six Sigma literatures and identified three new practices that are critical for implementing Six Sigma’s concept and method in an organization. These practices are referred to as: Six Sigma role structure, Six Sigma structured improvement procedure, and Six Sigma focus on metrics. A research model and survey instrument were developed to investigate how these Six Sigma practices integrate with seven traditional quality management practices to affect quality performance and business performance. Test results based on a sample of 226 US manufacturing plants revealed that the three Six Sigma practices are distinct practices from traditional quality management practices, and that they complement the traditional quality management practices in improving performance. The implications of the findings for researchers and practitioners are discussed and further research directions are offered. # 2008 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "10b8223c9005bd5bdd2836d17541bbb1", "text": "This study explores the stability of attachment security and representations from infancy to early adulthood in a sample chosen originally for poverty and high risk for poor developmental outcomes. Participants for this study were 57 young adults who are part of an ongoing prospective study of development and adaptation in a high-risk sample. Attachment was assessed during infancy by using the Ainsworth Strange Situation (Ainsworth & Wittig) and at age 19 by using the Berkeley Adult Attachment Interview (George, Kaplan, & Main). Possible correlates of continuity and discontinuity in attachment were drawn from assessments of the participants and their mothers over the course of the study. Results provided no evidence for significant continuity between infant and adult attachment in this sample, with many participants transitioning to insecurity. The evidence, however, indicated that there might be lawful discontinuity. Analyses of correlates of continuity and discontinuity in attachment classification from infancy to adulthood indicated that the continuous and discontinuous groups were differentiated on the basis of child maltreatment, maternal depression, and family functioning in early adolescence. These results provide evidence that although attachment has been found to be stable over time in other samples, attachment representations are vulnerable to difficult and chaotic life experiences.", "title": "" }, { "docid": "19f604732dd88b01e1eefea1f995cd54", "text": "Power electronic transformer (PET) technology is one of the promising technology for medium/high power conversion systems. With the cutting-edge improvements in the power electronics and magnetics, makes it possible to substitute conventional line frequency transformer traction (LFTT) technology with the PET technology. Over the past years, research and field trial studies are conducted to explore the technical challenges associated with the operation, functionalities, and control of PET-based traction systems. This paper aims to review the essential requirements, technical challenges, and the existing state of the art of PET traction system architectures. Finally, this paper discusses technical considerations and introduces the new research possibilities especially in the power conversion stages, PET design, and the power switching devices.", "title": "" }, { "docid": "a7765d68c277dbc712376a46a377d5d4", "text": "The trend of currency rates can be predicted with supporting from supervised machine learning in the transaction systems such as support vector machine. Not only representing models in use of machine learning techniques in learning, the support vector machine (SVM) model also is implemented with actual FoRex transactions. This might help automatically to make the transaction decisions of Bid/Ask in Foreign Exchange Market by using Expert Advisor (Robotics). The experimental results show the advantages of use SVM compared to the transactions without use SVM ones.", "title": "" }, { "docid": "22286933cdcdb34870ff08980b8c278a", "text": "Identifying sentiment of opinion target is an essential component of many tasks for sentiment analysis. We firstly identify the sentiment of the clause in which the specific opinion target lie and then infer the sentiment of opinion target from the sentiment of clause. In order to utilize context more adequately, We propose a novel model using Long Short-Term Memory(LSTM) and Convolutional Neural Network(CNN) together to identify the sentiment of clause. LSTM is used for generating context embedding and CNN is treated as a trainable feature detector. In the experiment using product reviews data, our model outperforms traditional methods in the aspect of accuracy. What's more, the time of model training is acceptable and our model is more scalable because we don't need to discovery rules manually and prepare lots of external language resources which is laborious and time-consuming.", "title": "" }, { "docid": "154f5455f593e8ebf7058cc0a32426a2", "text": "Many life-log analysis applications, which transfer data from cameras and sensors to a Cloud and analyze them in the Cloud, have been developed with the spread of various sensors and Cloud computing technologies. However, difficulties arise because of the limitation of the network bandwidth between the sensors and the Cloud. In addition, sending raw sensor data to a Cloud may introduce privacy issues. Therefore, we propose distributed deep learning processing between sensors and the Cloud in a pipeline manner to reduce the amount of data sent to the Cloud and protect the privacy of the users. In this paper, we have developed a pipeline-based distributed processing method for the Caffe deep learning framework and investigated the processing times of the classification by varying a division point and the parameters of the network models using data sets, CIFAR-10 and ImageNet. The experiments show that the accuracy of deep learning with coarse-grain data is comparable to that with the default parameter settings, and the proposed distributed processing method has performance advantages in cases of insufficient network bandwidth with actual sensors and a Cloud environment.", "title": "" }, { "docid": "9f44d82b0f11037e593e719ae0c60a13", "text": "The past 25 years have been a significant period with advances in the development of interior permanent magnet (IPM) machines. Line-start small IPM synchronous motors have expanded their presence in the domestic marketplace from few specialized niche markets in high efficiency machine tools, household appliances, small utility motors, and servo drives to mass-produced applications. A closer examination reveals that several different knowledge-based technological advancements and market forces as well as consumer demand for high efficiency requirements have combined, sometimes in fortuitous ways, to accelerate the development of the improved new small energy efficient motors. This paper provides a broad explanation of the various factors that lead to the current state of the art of the single-phase interior permanent motor drive technology. A unified analysis of single-phase IPM motor that permits the determination of the steady-state, dynamic, and transient performances is presented. The mathematical model is based on both d-q axis theory and finite-element analysis. It leads to more accurate numerical results and meets the engineering requirements more satisfactorily than any other methods. Finally, some concluding comments and remarks are provided for efficiency improvement, manufacturing, and future research trends of line-start energy efficient permanent magnet synchronous motors.", "title": "" }, { "docid": "72def907d2404ea82942d6b09d0f438b", "text": "This paper proposes the measurement of an ozone generator using a phase-shifted pulse width modulation (PWM) full bridge inverter as a power supply. The method of electrode parameter measurement for an ozone generator is presented. An electrode set is represented by an equivalent circuit by parallel capacitor and resistor. The test was performed with high-frequency high-voltage ac power supply. Then voltage and charge characteristics were obtained leading to calculating values of the parallel capacitor and resistor. The validity of the obtained parameters is verified with a comparison between simulation and experimental results. It has proved that the proposed equivalent circuit with parameters obtained from the proposed method is valid which is in agreement with experimental results. It can be used for power supply and electrode design for generating ozone gas. The correctness of the proposed technique is verified by both simulation and experimental results.", "title": "" }, { "docid": "c2733a7dd7006b05852475c21a61bbee", "text": "Data mining is the practice of examining and deriving purposeful information from the data. Data mining finds its application in various fields like finance, retail, medicine, agriculture etc. Data mining in agriculture is used for analyzing the various biotic and abiotic factors. Agriculture in India plays a predominant role in economy and employment. The common problem existing among the Indian farmers are they don't choose the right crop based on their soil requirements. Due to this they face a serious setback in productivity. This problem of the farmers has been addressed through precision agriculture. Precision agriculture is a modern farming technique that uses research data of soil characteristics, soil types, crop yield data collection and suggests the farmers the right crop based on their site-specific parameters. This reduces the wrong choice on a crop and increase in productivity. In this paper, this problem is solved by proposing a recommendation system through an ensemble model with majority voting technique using Random tree, CHAID, K-Nearest Neighbor and Naive Bayes as learners to recommend a crop for the site specific parameters with high accuracy and efficiency.", "title": "" }, { "docid": "8d350db000f7a2b1481b9cad6ce318f1", "text": "Purpose – The purpose of this research paper is to offer a solution to differentiate supply chain planning for products with different demand features and in different life-cycle phases. Design/methodology/approach – A normative framework for selecting a planning approach was developed based on a literature review of supply chain differentiation and supply chain planning. Explorative mini-cases from three companies – Vaisala, Mattel, Inc. and Zara – were investigated to identify the features of their innovative planning solutions. The selection framework was applied to the case company’s new business unit dealing with a product portfolio of highly innovative products as well as commodity items. Findings – The need for planning differentiation is essential for companies with large product portfolios operating in volatile markets. The complexity of market, channel and supply networks makes supply chain planning more intricate. The case company provides an example of using the framework for rough segmentation to differentiate planning. Research limitations/implications – The paper widens Fisher’s supply chain selection framework to consider the aspects of planning. Practical implications – Despite substantial resources being used, planning results are often not reliable or consistent enough to ensure cost efficiency and adequate customer service. Therefore there is a need for management to critically consider current planning solutions. Originality/value – The procedure outlined in this paper is a first illustrative example of the type of processes needed to monitor and select the right planning approach.", "title": "" }, { "docid": "4a163c071d54c641ef4c24a9c1b2299c", "text": "Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magnitude more efficient than previous software taint tracking systems and is fully general to dynamic data flow tracking problems. Our system uses a compiler to transform untrusted programs into policy-enforcing programs, and our system can be easily reconfigured to support new analyses and policies without modifying the compiler or runtime system. Our system uses a sound and sophisticated static analysis that can dramatically reduce the amount of data that must be dynamically tracked. For server programs, our system's average overhead is 0.65% for taint tracking, which is comparable to the best hardware-based solutions. For a set of compute-bound benchmarks, our system produces no runtime overhead because our compiler can prove the absence of vulnerabilities, eliminating the need to dynamically track taint. After modifying these benchmarks to contain format string vulnerabilities, our system's overhead is less than 13%, which is over 6X lower than the previous best solutions. We demonstrate the flexibility and power of our system by applying it to file disclosure vulnerabilities, a problem that taint tracking cannot handle. To prevent such vulnerabilities, our system introduces an average runtime overhead of 0.25% for three open source server programs.", "title": "" }, { "docid": "0056d305c7689d45e7cd9f4b87cac79e", "text": "A method is presented that uses a vectorial multiscale feature image for wave front propagation between two or more user defined points to retrieve the central axis of tubular objects in digital images. Its implicit scale selection mechanism makes the method more robust to overlap and to the presence of adjacent structures than conventional techniques that propagate a wave front over a scalar image representing the maximum of a range of filters. The method is shown to retain its potential to cope with severe stenoses or imaging artifacts and objects with varying widths in simulated and actual two-dimensional angiographic images.", "title": "" }, { "docid": "b1272039194d07ff9b7568b7f295fbfb", "text": "Protein catalysis requires the atomic-level orchestration of side chains, substrates and cofactors, and yet the ability to design a small-molecule-binding protein entirely from first principles with a precisely predetermined structure has not been demonstrated. Here we report the design of a novel protein, PS1, that binds a highly electron-deficient non-natural porphyrin at temperatures up to 100 °C. The high-resolution structure of holo-PS1 is in sub-Å agreement with the design. The structure of apo-PS1 retains the remote core packing of the holoprotein, with a flexible binding region that is predisposed to ligand binding with the desired geometry. Our results illustrate the unification of core packing and binding-site definition as a central principle of ligand-binding protein design.", "title": "" } ]
scidocsrr
17572600a0866f7586a9a223db95f7d3
Real-time Monocular Dense Mapping for Augmented Reality
[ { "docid": "01e5f7c2eb9b55699c38a523776fc4a4", "text": "We propose a formulation of monocular SLAM which combines live dense reconstruction with shape priors-based 3D tracking and reconstruction. Current live dense SLAM approaches are limited to the reconstruction of visible surfaces. Moreover, most of them are based on the minimisation of a photo-consistency error, which usually makes them sensitive to specularities. In the 3D pose recovery literature, problems caused by imperfect and ambiguous image information have been dealt with by using prior shape knowledge. At the same time, the success of depth sensors has shown that combining joint image and depth information drastically increases the robustness of the classical monocular 3D tracking and 3D reconstruction approaches. In this work we link dense SLAM to 3D object pose and shape recovery. More specifically, we automatically augment our SLAM system with object specific identity, together with 6D pose and additional shape degrees of freedom for the object(s) of known class in the scene, combining image data and depth information for the pose and shape recovery. This leads to a system that allows for full scaled 3D reconstruction with the known object(s) segmented from the scene. The segmentation enhances the clarity, accuracy and completeness of the maps built by the dense SLAM system, while the dense 3D data aids the segmentation process, yielding faster and more reliable convergence than when using 2D image data alone.", "title": "" }, { "docid": "7f3fe1eadb59d58db8e5911c1de3465f", "text": "We propose a semi-direct monocular visual odometry algorithm that is precise, robust, and faster than current state-of-the-art methods. The semi-direct approach eliminates the need of costly feature extraction and robust matching techniques for motion estimation. Our algorithm operates directly on pixel intensities, which results in subpixel precision at high frame-rates. A probabilistic mapping method that explicitly models outlier measurements is used to estimate 3D points, which results in fewer outliers and more reliable points. Precise and high frame-rate motion estimation brings increased robustness in scenes of little, repetitive, and high-frequency texture. The algorithm is applied to micro-aerial-vehicle state-estimation in GPS-denied environments and runs at 55 frames per second on the onboard embedded computer and at more than 300 frames per second on a consumer laptop. We call our approach SVO (Semi-direct Visual Odometry) and release our implementation as open-source software.", "title": "" }, { "docid": "f0c08cb3e23e71bab0ff9ca73a4d7869", "text": "A significant weakness of most current deep Convolutional Neural Networks is the need to train them using vast amounts of manually labelled data. In this work we propose a unsupervised framework to learn a deep convolutional neural network for single view depth prediction, without requiring a pre-training stage or annotated ground truth depths. We achieve this by training the network in a manner analogous to an autoencoder. At training time we consider a pair of images, source and target, with small, known camera motion between the two such as a stereo pair. We train the convolutional encoder for the task of predicting the depth map for the source image. To do so, we explicitly generate an inverse warp of the target image using the predicted depth and known inter-view displacement, to reconstruct the source image; the photometric error in the reconstruction is the reconstruction loss for the encoder. The acquisition of this training data is considerably simpler than for equivalent systems, requiring no manual annotation, nor calibration of depth sensor to camera. We show that our network trained on less than half of the KITTI dataset (without any further augmentation) gives comparable performance to that of the state of art supervised methods for single view depth estimation.", "title": "" } ]
[ { "docid": "366cd2f9b48715c0a987a0f77093a780", "text": "Work processes involving dozens or hundreds of collaborators are complex and difficult to manage. Problems within the process may have severe organizational and financial consequences. Visualization helps monitor and analyze those processes. In this paper, we study the development of large software systems as an example of a complex work process. We introduce Developer Rivers, a timeline-based visualization technique that shows how developers work on software modules. The flow of developers' activity is visualized by a river metaphor: activities are transferred between modules represented as rivers. Interactively switching between hierarchically organized modules and workload metrics allows for exploring multiple facets of the work process. We study typical development patterns by applying our visualization to Python and the Linux kernel.", "title": "" }, { "docid": "9bbf3500233a900188987349ecbd6218", "text": "Terpene synthases catalyze the conversion of linear prenyl-diphosphates to a multitude of hydrocarbon skeletons with often high regioand stereoselectivity. These remarkable enzymes all rely on a shared fold for activity, namely, the class I terpene cyclase fold. Recent work has illuminated the catalytic strategy used by these enzymes to catalyze the arguably most complex chemical reactions found in Nature. Terpene synthases catalyze the formation of a reactive carbocation and provide a template for the cyclization reactions while at the same time providing the necessary stability of the carbocationic reaction intermediates as well as strictly controlling water access.", "title": "" }, { "docid": "d895b939ea60b41f7de7e64eb60e3b07", "text": "Deep learning (DL) based semantic segmentation methods have been providing state-of-the-art performance in the last few years. More specifically, these techniques have been successfully applied to medical image classification, segmentation, and detection tasks. One deep learning technique, U-Net, has become one of the most popular for these applications. In this paper, we propose a Recurrent Convolutional Neural Network (RCNN) based on U-Net as well as a Recurrent Residual Convolutional Neural Network (RRCNN) based on U-Net models, which are named RU-Net and R2U-Net respectively. The proposed models utilize the power of U-Net, Residual Network, as well as RCNN. There are several advantages of these proposed architectures for segmentation tasks. First, a residual unit helps when training deep architecture. Second, feature accumulation with recurrent residual convolutional layers ensures better feature representation for segmentation tasks. Third, it allows us to design better U-Net architecture with same number of network parameters with better performance for medical image segmentation. The proposed models are tested on three benchmark datasets such as blood vessel segmentation in retina images, skin cancer segmentation, and lung lesion segmentation. The experimental results show superior performance on segmentation tasks compared to equivalent models including UNet and residual U-Net (ResU-Net).", "title": "" }, { "docid": "3ec603c63166167c88dc6d578a7c652f", "text": "Peer-to-peer (P2P) lending or crowdlending, is a recent innovation allows a group of individual or institutional lenders to lend funds to individuals or businesses in return for interest payment on top of capital repayments. The rapid growth of P2P lending marketplaces has heightened the need to develop a support system to help lenders make sound lending decisions. But realizing such system is challenging in the absence of formal credit data used by the banking sector. In this paper, we attempt to explore the possible connections between user credit risk and how users behave in the lending sites. We present the first analysis of user detailed clickstream data from a large P2P lending provider. Our analysis reveals that the users’ sequences of repayment histories and financial activities in the lending site, have significant predictive value for their future loan repayments. In the light of this, we propose a deep architecture named DeepCredit, to automatically acquire the knowledge of credit risk from the sequences of activities that users conduct on the site. Experiments on our large-scale real-world dataset show that our model generates a high accuracy in predicting both loan delinquency and default, and significantly outperforms a number of baselines and competitive alternatives.", "title": "" }, { "docid": "e451b5044b7d8f642d6718a3e46dfd2a", "text": "Driving simulation from the very beginning of the advent of VR technology uses the very same technology for visualization and similar technology for head movement tracking and high end 3D vision. They also share the same or similar difficulties in rendering movements of the observer in the virtual environments. The visual-vestibular conflict, due to the discrepancies perceived by the human visual and vestibular systems, induce the so-called simulation sickness, when driving or displacing using a control device (ex. Joystick). Another cause for simulation sickness is the transport delay, the delay between the action and the corresponding rendering cues.\n Another similarity between driving simulation and VR is need for correct scale 1:1 perception. Correct perception of speed and acceleration in driving simulation is crucial for automotive experiments for Advances Driver Aid System (ADAS) as vehicle behavior has to be simulated correctly and anywhere where the correct mental workload is an issue as real immersion and driver attention is depending on it. Correct perception of distances and object size is crucial using HMDs or CAVEs, especially as their use is frequently involving digital mockup validation for design, architecture or interior and exterior lighting.\n Today, the advents of high resolution 4K digital display technology allows near eye resolution stereoscopic 3D walls and integrate them in high performance CAVEs. High performance CAVEs now can be used for vehicle ergonomics, styling, interior lighting and perceived quality. The first CAVE in France, built in 2001 at Arts et Metiers ParisTech, is a 4 sided CAVE with a modifiable geometry with now traditional display technology. The latest one is Renault's 70M 3D pixel 5 sides CAVE with 4K x 4K walls and floor and with a cluster of 20 PCs. Another equipment recently designed at Renault is the motion based CARDS driving simulator with CAVE like 4 sides display system providing full 3D immersion for the driver.\n The separation between driving simulation and digital mockup design review is now fading though different uses will require different simulation configurations.\n New application domains, such as automotive AR design, will bring combined features of VR and driving simulation technics, including CAVE like display system equipped driving simulators.", "title": "" }, { "docid": "dc6ee3d45fa76aafe45507b0778018d5", "text": "Traditional endpoint protection will not address the looming cybersecurity crisis because it ignores the source of the problem--the vast online black market buried deep within the Internet.", "title": "" }, { "docid": "db6904a5aa2196dedf37b279e04b3ea8", "text": "The use of animation and multimedia for learning is now further extended by the provision of entire Virtual Reality Learning Environments (VRLE). This highlights a shift in Web-based learning from a conventional multimedia to a more immersive, interactive, intuitive and exciting VR learning environment. VRLEs simulate the real world through the application of 3D models that initiates interaction, immersion and trigger the imagination of the learner. The question of good pedagogy and use of technology innovations comes into focus once again. Educators attempt to find theoretical guidelines or instructional principles that could assist them in developing and applying a novel VR learning environment intelligently. This paper introduces the educational use of Web-based 3D technologies and highlights in particular VR features. It then identifies constructivist learning as the pedagogical engine driving the construction of VRLE and discusses five constructivist learning approaches. Furthermore, the authors provide two case studies to investigate VRLEs for learning purposes. The authors conclude with formulating some guidelines for the effective use of VRLEs, including discussion of the limitations and implications for the future study of VRLEs. 2010 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "64f45424c2bfa571dd47523633cb5d03", "text": "We demonstrate how adjustable robust optimization (ARO) problems with fixed recourse can be casted as static robust optimization problems via Fourier-Motzkin elimination (FME). Through the lens of FME, we characterize the structures of the optimal decision rules for a broad class of ARO problems. A scheme based on a blending of classical FME and a simple Linear Programming technique that can efficiently remove redundant constraints, is developed to reformulate ARO problems. This generic reformulation technique enhances the classical approximation scheme via decision rules, and enables us to solve adjustable optimization problems to optimality. We show via numerical experiments that, for small-size ARO problems our novel approach finds the optimal solution. For moderate or large-size instances, we eliminate a subset of the adjustable variables, which improves the solutions from decision rule approximations.", "title": "" }, { "docid": "3072c5458a075e6643a7679ccceb1417", "text": "A novel interleaved flyback converter with leakage energy recycled is proposed. The proposed converter is combined with dual-switch dual-transformer flyback topology. Two clamping diodes are used to reduce the voltage stress on power switches to the input voltage level and also to recycle leakage inductance energy to the input voltage and capacitor. Besides, the interleaved control is implemented to reduce the output current ripple. In addition, the voltage on the primary windings is reduced to the half of the input voltage and thus reducing the turns ratio of transformers to improve efficiency. The operating principle and the steady state analysis of the proposed converter are discussed in detail. Finally, an experimental prototype is implemented with 400V input voltage, 24V/300W output to verify the feasibility of the proposed converter. The experimental results reveals that the highest efficiency of the proposed converter is 94.42%, the full load efficiency is 92.7%, and the 10% load efficiency is 92.61%.", "title": "" }, { "docid": "96f4f77f114fec7eca22d0721c5efcbe", "text": "Aggregation structures with explicit information, such as image attributes and scene semantics, are effective and popular for intelligent systems for assessing aesthetics of visual data. However, useful information may not be available due to the high cost of manual annotation and expert design. In this paper, we present a novel multi-patch (MP) aggregation method for image aesthetic assessment. Different from state-of-the-art methods, which augment an MP aggregation network with various visual attributes, we train the model in an end-to-end manner with aesthetic labels only (i.e., aesthetically positive or negative). We achieve the goal by resorting to an attention-based mechanism that adaptively adjusts the weight of each patch during the training process to improve learning efficiency. In addition, we propose a set of objectives with three typical attention mechanisms (i.e., average, minimum, and adaptive) and evaluate their effectiveness on the Aesthetic Visual Analysis (AVA) benchmark. Numerical results show that our approach outperforms existing methods by a large margin. We further verify the effectiveness of the proposed attention-based objectives via ablation studies and shed light on the design of aesthetic assessment systems.", "title": "" }, { "docid": "c03bf622dde1bd81c0eb83a87e1f9924", "text": "Image-schemas (e.g. CONTAINER, PATH, FORCE) are pervasive skeletal patterns of a preconceptual nature which arise from everyday bodily and social experiences and which enable us to mentally structure perceptions and events (Johnson 1987; Lakoff 1987, 1989). Within Cognitive Linguistics, these recurrent non-propositional models are taken to unify the different sensory and motor experiences in which they manifest themselves in a direct way and, most significantly, they may be metaphorically projected from the realm of the physical to other more abstract domains. In this paper, we intend to provide a cognitively plausible account of the OBJECT image-schema, which has received rather contradictory treatments in the literature. The OBJECT schema is experientially grounded in our everyday interaction with our own bodies and with other discrete entities. In the light of existence-related language (more specifically, linguistic expressions concerning the creation and destruction of both physical and abstract entities), it is argued that the OBJECT image-schema may be characterized as a basic image-schema, i.e. one that functions as a guideline for the activation of additional models, including other dependent image-schematic patterns (LINK, PART-WHOLE, CENTREPERIPHERY, etc.) which highlight various facets of the higher-level schema.", "title": "" }, { "docid": "b448ea63495d08866ba7759a4ede6895", "text": "Heterogeneous sensor data fusion is a challenging field that has gathered significant interest in recent years. Two of these challenges are learning from data with missing values, and finding shared representations for multimodal data to improve inference and prediction. In this paper, we propose a multimodal data fusion framework, the deep multimodal encoder (DME), based on deep learning techniques for sensor data compression, missing data imputation, and new modality prediction under multimodal scenarios. While traditional methods capture only the intramodal correlations, DME is able to mine both the intramodal correlations in the initial layers and the enhanced intermodal correlations in the deeper layers. In this way, the statistical structure of sensor data may be better exploited for data compression. By incorporating our new objective function, DME shows remarkable ability for missing data imputation tasks in sensor data. The shared multimodal representation learned by DME may be used directly for predicting new modalities. In experiments with a real-world dataset collected from a 40-node agriculture sensor network which contains three modalities, DME can achieve a root mean square error (RMSE) of missing data imputation which is only 20% of the traditional methods like K-nearest neighbors and sparse principal component analysis and the performance is robust to different missing rates. It can also reconstruct temperature modality from humidity and illuminance with an RMSE of $7\\; {}^{\\circ }$C, directly from a highly compressed (2.1%) shared representation that was learned from incomplete (80% missing) data.", "title": "" }, { "docid": "b16eb9ba71fa4ebcd690e9746773321e", "text": "Macroeconometricians face a peculiar data structure. On the one hand, the number of years for which there is reliable and relevant data is limited and cannot readily be increased other than by the passage of time. On the other hand, for much of the postwar period statistical agencies have collected monthly or quarterly data on a great many related macroeconomic, financial, and sectoral variables. Thus macroeconometricians face data sets that have hundreds or even thousands of series, but the number of observations on each series is relatively short, for example 20 to 40 years of quarterly data. This chapter surveys work on a class of models, dynamic factor models (DFMs), which has received considerable attention in the past decade because of their ability to model simultaneously and consistently data sets in which the number of series exceeds the number of time series observations. Dynamic factor models were originally proposed by Geweke (1977) as a time-series extension of factor models previously developed for cross-sectional data. In early influential work, Sargent and Sims (1977) showed that two dynamic factors could explain a large fraction of the variance of important U.S. quarterly macroeconomic variables, including output, employment, and prices. This central empirical finding that a few factors can explain a large fraction of the variance of many macroeconomic series has been confirmed by many studies; see for example Giannone, The aim of this survey is to describe, at a level that is specific enough to be useful to researchers new to the area, the key theoretical results, applications, and empirical findings in the recent literature on DFMs. Bai and Ng (2008) and Stock and Watson 2 (2006) provide complementary surveys of this literature. Bai and Ng's (2008) survey is more technical than this one and focuses on the econometric theory and conditions; Stock and Watson (2006) focus on DFM-based forecasts in the context of other methods for forecasting with many predictors. The premise of a dynamic factor model is that a few latent dynamic factors, f t , drive the comovements of a high-dimensional vector of time-series variables, X t , which is also affected by a vector of mean-zero idiosyncratic disturbances, e t. These idiosyncratic disturbances arise from measurement error and from special features that are specific to an individual series (the effect of a Salmonella scare on restaurant employment, for example). The latent factors follow a time series process, which is …", "title": "" }, { "docid": "ef241b52d4f4fdc892071f684b387242", "text": "A description is given of Sprite, an experimental network operating system under development at the University of California at Berkeley. It is part of a larger research project, SPUR, for the design and construction of a high-performance multiprocessor workstation with special hardware support of Lisp applications. Sprite implements a set of kernel calls that provide sharing, flexibility, and high performance to networked workstations. The discussion covers: the application interface: the basic kernel structure; management of the file name space and file data, virtual memory; and process migration.<<ETX>>", "title": "" }, { "docid": "3266af647a3a85d256d42abc6f3eca55", "text": "This paper introduces a learning scheme to construct a Hilbert space (i.e., a vector space along its inner product) to address both unsupervised and semi-supervised domain adaptation problems. This is achieved by learning projections from each domain to a latent space along the Mahalanobis metric of the latent space to simultaneously minimizing a notion of domain variance while maximizing a measure of discriminatory power. In particular, we make use of the Riemannian optimization techniques to match statistical properties (e.g., first and second order statistics) between samples projected into the latent space from different domains. Upon availability of class labels, we further deem samples sharing the same label to form more compact clusters while pulling away samples coming from different classes. We extensively evaluate and contrast our proposal against state-of-the-art methods for the task of visual domain adaptation using both handcrafted and deep-net features. Our experiments show that even with a simple nearest neighbor classifier, the proposed method can outperform several state-of-the-art methods benefitting from more involved classification schemes.", "title": "" }, { "docid": "4d9adaac8dc69f902056d531f7570da7", "text": "A new CMOS buffer without short-circuit power consumption is proposed. The gatedriving signal of the output pull-up (pull-down) transistor is fed back to the output pull-down (pull-up) transistor to get tri-state output momentarily, eliminating the short-circuit power consumption. The HSPICE simulation results verified the operation of the proposed buffer and showed the power-delay product is about 15% smaller than conventional tapered CMOS buffer.", "title": "" }, { "docid": "3cdc2052eb37bdbb1f7d38ec90a095c4", "text": "We present a simple and effective blind image deblurring method based on the dark channel prior. Our work is inspired by the interesting observation that the dark channel of blurred images is less sparse. While most image patches in the clean image contain some dark pixels, these pixels are not dark when averaged with neighboring highintensity pixels during the blur process. This change in the sparsity of the dark channel is an inherent property of the blur process, which we both prove mathematically and validate using training data. Therefore, enforcing the sparsity of the dark channel helps blind deblurring on various scenarios, including natural, face, text, and low-illumination images. However, sparsity of the dark channel introduces a non-convex non-linear optimization problem. We introduce a linear approximation of the min operator to compute the dark channel. Our look-up-table-based method converges fast in practice and can be directly extended to non-uniform deblurring. Extensive experiments show that our method achieves state-of-the-art results on deblurring natural images and compares favorably methods that are well-engineered for specific scenarios.", "title": "" }, { "docid": "ee63ca73151e24ee6f0543b0914a3bb6", "text": "The aim of this study was to investigate whether different aspects of morality predict traditional bullying and cyberbullying behaviour in a similar way. Students between 12 and 19 years participated in an online study. They reported on the frequency of different traditional and cyberbullying behaviours and completed self-report measures on moral emotions and moral values. A scenario approach with open questions was used to assess morally disengaged justifications. Tobit regressions indicated that a lack of moral values and a lack of remorse predicted both traditional and cyberbullying behaviour. Traditional bullying was strongly predictive for cyberbullying. A lack of moral emotions and moral values predicted cyberbullying behaviour even when controlling for traditional bUllying. Morally disengaged justifications were only predictive for traditional, but not for cyberbullying behaviour. The findings show that moral standards and moral affect are important to understand individual differences in engagement in both traditional and cyberforms of bUllying.", "title": "" }, { "docid": "7013e752987cf3dbdeab029d8eb184e6", "text": "Federated searching was once touted as the library world’s answer to Google, but ten years since federated searching technology’s inception, how does it actually compare? This study focuses on undergraduate student preferences and perceptions when doing research using both Google and a federated search tool. Students were asked about their preferences using each search tool and the perceived relevance of the sources they found using each search tool. Students were also asked to self-assess their online searching skills. The findings show that students believe they possess strong searching skills, are able to find relevant sources using both search tools, but actually prefer the federated search tool to Google for doing research. Thus, despite federated searching’s limitations, students see the need for it, libraries should continue to offer federated search (especially if a discovery search tool is not available), and librarians should focus on teaching students how to use federated search and Google more effectively.", "title": "" }, { "docid": "ea5f0ac771cd3dd860320aba5620cdee", "text": "Despite the burgeoning number of studies of public sector information systems, very few scholars have focussed on the relationship between e-Government policies and information systems choice and design. Drawing on Fountain’s (2001) technology enactment framework, this paper endeavours to conduct an in-depth investigation of the intricacies characterising the choice and design of new technologies in the context of e-Government reforms. By claiming that technologies are carriers of e-Government reform aims, this study investigates the logics embedded in the design of new technology and extant political interests and values inscribed in e-Government policies. The e-Government enactment framework is proposed as a theoretical and analytical approach to understand and study the complexity of these relationships which shape e-Government policies. 2010 Elsevier B.V. All rights reserved.", "title": "" } ]
scidocsrr
ca176316ae524535630a5e460a869a30
Warpage Measurements and Characterizations of Fan-Out Wafer-Level Packaging with Large Chips and Multiple Redistributed Layers
[ { "docid": "1cf43e11b59d7c482c9ab565208238a2", "text": "A powerful integrated fan-out (InFO) wafer level system integration (WLSI) technology has been developed to integrate application processor chip with memory package for smart mobile devices. This novel InFO technology is the first high performance Fan-Out Wafer Level Package (FO_WLP) with multi-layer high density interconnects proposed to the industry. In this paper we present the detailed comparison of InFO packages on package (InFO_PoP) with several other previously proposed 3D package solutions. Result shows that InFO_PoP has more optimized overall results on system performance, leakage power and area (form factor) than others, to meet the ever-increasing system requirements of mobile computing. InFO technology has been successfully qualified on package level with robust component and board level reliability. It is also qualified at interconnect level with high electromigration resistance. With its high flexibility and strong capability of multi-chips integration for both homogeneous and heterogeneous sub-systems, InFO technology not only provides a system scaling solution but also complements the chip scaling and helps to sustain the Moore's Law for the smart mobile as well as internet of things (IoT) applications.", "title": "" }, { "docid": "42b972e8a56834fcbef0bdde7da1b8cd", "text": "With shrinking of chip sizes, Wafer Level Chip Scale Packaging (WLCSP) becomes an attractive and holistic packaging solutions with various advantages in comparison to conventional packages, such as Ball Grid Array (BGA) with flipchip or wirebonding. With the advancement of various fan-out (FO) WLPs, it has been proven to be a more optimal, low cost, integrated and reliable solution compared to fan-in WLP because of the greater design flexibility in having more input/output (I/O), improved mechanical and thermal performance. In addition, FO-WLP shows superior high-frequency electrical performance due to its shorter, finer and simpler interconnection scheme compared to flipchip packaging. eWLB (embedded wafer level BGA) is a type of FO-WLP that enables applications requiring smaller form factor, excellent thermal performance and thin package profiles and it has the potential to evolve into various configurations with proven yields and manufacturing experience based on more than 8 years of high volume manufacturing of over 1.5B unit shipment. This paper discusses the recent advancements in robust board level reliability performance of eWLB for automotive application, where a review of a Design of Experiment (DOE) study will demonstrate improved Temperature Cycle on Board (TCoB) reliability. Several DOE studies were planned and test vehicles were prepared with various variables, such as materials, redistribution layer (RDL) design, copper (Cu) and under bump metallurgy (UBM) thickness, and a printed circuit board (PCB) pad design. The final test vehicle passed over 1000 times temperature cycles (TC) with optimized design factors of these parametric studies and reliability tests. To investigate potential structural defects after the reliability test, both destructive analyses were performed under industry standard test conditions, Daisy chain test vehicles were used for TCoB reliability performance.", "title": "" } ]
[ { "docid": "20c76c212eed35aaae4e238ab4055684", "text": "Philosophers, psychologists, and economists have long asserted that deception harms trust. We challenge this claim. Across four studies, we demonstrate that deception can increase trust. Specifically, prosocial lies increase the willingness to pass money in the trust game, a behavioral measure of benevolence-based trust. In Studies 1a and 1b, we find that altruistic lies increase trust when deception is directly experienced and when it is merely observed. In Study 2, we demonstrate that mutually beneficial lies also increase trust. In Study 3, we disentangle the effects of intentions and deception; intentions are far more important than deception for building benevolence-based trust. In Study 4, we examine how prosocial lies influence integrity-based trust. We introduce a new economic game, the Rely-or-Verify game, to measure integrity-based trust. Prosocial lies increase benevolence-based trust, but harm integrity-based trust. Our findings expand our understanding of deception and deepen our insight into the mechanics", "title": "" }, { "docid": "6ce8648c194a73fccf9352a74faa405c", "text": "Recently, social media such as Facebook has been more popular. Receiving information from Facebook and generating or spreading information on Facebook every day has become a general lifestyle. This new information-exchanging platform contains a lot of meaningful messages including users' emotions and preferences. Using messages on Facebook or in general social media to predict the election result and political affiliation has been a trend. In Taiwan, for example, almost every politician tries to have public opinion polls by using social media; almost every politician has his or her own fan page on Facebook, and so do the parties. We make an effort to predict to what party, DPP or KMT, two major parties in Taiwan, a post would be related or affiliated. We design features and models for the prediction, and we evaluate as well as compare them with the data collected from several political fan pages on Facebook. The results show that we can obtain accuracy higher than 90% when the text and interaction features are used with a nearest neighbor classifier.", "title": "" }, { "docid": "ec77a1fcb50612b086a2c7376870ab8a", "text": "Handwriting recognition (HWR) in Indic scripts, like Devanagari is very challenging due to the subtleties in the scripts, variations in rendering and the cursive nature of the handwriting. Lack of public handwriting datasets in Indic scripts has long stymied the development of offline handwritten word recognizers and made comparison across different methods a tedious task in the field. In this paper, we release a new handwritten word dataset for Devanagari, IIIT-HW-Dev to alleviate some of these issues. We benchmark the IIIT-HW-Dev dataset using a CNN-RNN hybrid architecture. Furthermore, using this architecture, we empirically show that usage of synthetic data and cross lingual transfer learning helps alleviate the issue of lack of training data. We use this proposed pipeline on a public dataset, RoyDB and achieve state of the art results.", "title": "" }, { "docid": "2e8a6a21feef0ae7d02eca7da5359797", "text": "This thesis reports the construction of a novel apparatus for experiments with ultracold atoms in optical lattices: the Fermi gas microscope. Improving upon similar designs for bosonic atoms, our Fermi gas microscope has the novel feature of being able to achieve single-site resolved imaging of fermionic atoms in an optical lattice; specifically, we use fermionic potassium-40, sympathetically cooled by bosonic sodium-23. In this thesis, several milestones on the way to achieving single-site resolution are described and documented. First, we have tested and mounted in place the imaging optics necessary for achieving single-site resolution. We set up separate 3D magnetooptical traps for capturing and cooling both Na and K. These species are then trapped simultaneously in a plugged quadrupole magnetic trap and evaporated to degeneracy; we obtain a sodium Bose-Einstein condensate with about a million atoms and a degenerate potassium cloud cooled to colder than 1 μK. Using magnetic transport over a distance of 1 cm, we move the cold cloud of atoms into place under the high-resolution imaging system and capture it in a hybrid magnetic and optical-dipole trap. Further evaporation in this hybrid trap performed by lowering the optical trap depth, and the cooled atoms are immersed in an optical lattice, the setup and calibration of which is also described here. Finally, we cool the atoms with optical molasses beams while in the lattice, with the imaging optics collecting the fluoresence light for high-resolution imaging. With molasses cooling set up, single-site fluoresence imaging of bosons and fermions in the same experimental apparatus is within reach. Thesis Supervisor: Martin W. Zwierlein Title: Professor of Physics", "title": "" }, { "docid": "051711535ae78e4c24278553843cbc91", "text": "In the current \"Syntactic Web\", uninterpreted syntactic constructs are given meaning only by private off-line agreements that are inaccessible to computers. In the Semantic Web vision, this is replaced by a web where both data and its semantic definition are accessible and manipulable by computer software. DAML+OIL is an ontology language specifically designed for this use in the Web; it exploits existing Web standards (XML and RDF), adding the familiar ontological primitives of object oriented and frame based systems, and the formal rigor of a very expressive description logic. The definition of DAML+OIL is now over a year old, and the language has been in fairly widespread use. In this paper, we review DAML+OIL's relation with its key ingredients (XML, RDF, OIL, DAML-ONT, Description Logics), we discuss the design decisions and trade-offs that were the basis for the language definition, and identify a number of implementation challenges posed by the current language. These issues are important for designers of other representation languages for the Semantic Web, be they competitors or successors of DAML+OIL, such as the language currently under definition by W3C.", "title": "" }, { "docid": "1fde3c7d8109d5d4bfcf1f55facf7a95", "text": "Concerted research effort since the nineteen fifties has lead to effective methods for retrieval of relevant documents from homogeneous collections of text, such as newspaper archives, scientific abstracts and CD-ROM encyclopaedias. However, the triumph of the Web in the nineteen nineties forced a significant paradigm shift in the Information Retrieval field because of the need to address the issues of enormous scale, fluid collection definition, great heterogeneity, unfettered interlinking, democratic publishing, the presence of adversaries and most of all the diversity of purposes for which Web search may be used. Now, the IR field is confronted with a challenge of similarly daunting dimensions – how to bring highly effective search to the complex information spaces within enterprises. Overcoming the challenge would bring massive economic benefit, but victory is far from assured. The present work characterises enterprise search, hints at its economic magnitude, states some of the unsolved research questions in the domain of enterprise search need, proposes an enterprise search test collection and presents results for a small but interesting subproblem.", "title": "" }, { "docid": "1760840e99e3a813e22ea1c656b4ca88", "text": "As data exploration has increased rapidly in recent years, the datastore and data processing are getting more and more attention in extracting important information. To find a scalable solution to process the large-scale data is a critical issue in either the relational database system or the emerging NoSQL database. With the inherent scalability and fault tolerance of Hadoop, MapReduce is attractive to process the massive data in parallel. Most of previous researches focus on developing the SQL or SQL-like queries translator with the Hadoop distributed file system. However, it could be difficult to update data frequently in such file system. Therefore, we need a flexible datastore as HBase not only to place the data over a scale-out storage system, but also to manipulate the changeable data in a transparent way. However, the HBase interface is not friendly enough for most users. A GUI composed of SQL client application and database connection to HBase will ease the learning curve. In this paper, we propose the JackHare framework with SQL query compiler, JDBC driver and a systematical method using MapReduce framework for processing the unstructured data in HBase. After importing the JDBC driver to a SQL client GUI, we can exploit the HBase as the underlying datastore to execute the ANSI-SQL queries. Experimental results show that our approaches can perform well with efficiency and scalability.", "title": "" }, { "docid": "b58a04bbb5d69e6d2e48392d389383a7", "text": "Automatic generation of natural language from images has attracted extensive attention. In this paper, we take one step further to investigate generation of poetic language (with multiple lines) to an image for automatic poetry creation. This task involves multiple challenges, including discovering poetic clues from the image (e.g., hope from green), and generating poems to satisfy both relevance to the image and poeticness in language level. To solve the above challenges, we formulate the task of poem generation into two correlated sub-tasks by multi-adversarial training via policy gradient, through which the cross-modal relevance and poetic language style can be ensured. To extract poetic clues from images, we propose to learn a deep coupled visual-poetic embedding, in which the poetic representation from objects, sentiments \\footnoteWe consider both adjectives and verbs that can express emotions and feelings as sentiment words in this research. and scenes in an image can be jointly learned. Two discriminative networks are further introduced to guide the poem generation, including a multi-modal discriminator and a poem-style discriminator. To facilitate the research, we have released two poem datasets by human annotators with two distinct properties: 1) the first human annotated image-to-poem pair dataset (with $8,292$ pairs in total), and 2) to-date the largest public English poem corpus dataset (with $92,265$ different poems in total). Extensive experiments are conducted with 8K images, among which 1.5K image are randomly picked for evaluation. Both objective and subjective evaluations show the superior performances against the state-of-the-art methods for poem generation from images. Turing test carried out with over $500$ human subjects, among which 30 evaluators are poetry experts, demonstrates the effectiveness of our approach.", "title": "" }, { "docid": "48b16153a467cc40174cdae27165f400", "text": "Video streaming has traditionally been considered an extremely power-hungry operation. Existing approaches optimize the camera and communication modules individually to minimize their power consumption. However, designing a video streaming device requires power-consuming hardware components and computationally intensive video codec algorithms that interface the camera and the communication modules. For example, monochrome HD video streaming at 60 fps requires an ADC operating at a sampling rate of 55.3 MHz and a video codec that can handle uncompressed data being generated at 442 Mbps. We present a novel architecture that enables HD video streaming from a low-power, wearable camera to a nearby mobile device. To achieve this, we present an “analog” video backscatter technique that feeds analog pixels from the photo-diodes directly to the backscatter hardware, thereby eliminating power-consuming hardware components, such as ADCs and codecs. To evaluate our design, we simulate an ASIC, which achieves 60 fps 720p and 1080p HD video streaming for 321 μW and 806 μW, respectively. This translates to 1000x to 10,000x lower power than it used for existing digital video streaming approaches. Our empirical results also show that we can harvest sufficient energy to enable battery-free 30 fps 1080p video streaming at up to 8 feet. Finally, we design and implement a proof-of-concept prototype with off-theshelf hardware components that successfully backscatters 720p HD video at 10 fps up to 16 feet.", "title": "" }, { "docid": "2bec82a2fb984865c04f7c86c844cd59", "text": "This paper proposes a high-speed adder cell using a new design style called \"bridge\". The bridge design style offers more regularity and higher density than conventional CMOS design style, by using some transistors, named bridge transistors. Results show 4.4% (@ Vdd=3 volt) to 34.1% (@ Vdd=1 volt) improvement in speed over conventional CMOS adder. HSPICE is the circuit simulator used, and the technology being used for simulations is BSIM3v3 0.18mum technology", "title": "" }, { "docid": "d3281adf2e84a5bab8b03ab9ee8a2977", "text": "The concept of Learning Health Systems (LHS) is gaining momentum as more and more electronic healthcare data becomes increasingly accessible. The core idea is to enable learning from the collective experience of a care delivery network as recorded in the observational data, to iteratively improve care quality as care is being provided in a real world setting. In line with this vision, much recent research effort has been devoted to exploring machine learning, data mining and data visualization methodologies that can be used to derive real world evidence from diverse sources of healthcare data to provide personalized decision support for care delivery and care management. In this chapter, we will give an overview of a wide range of analytics and visualization components we have developed, examples of clinical insights reached from these components, and some new directions we are taking.", "title": "" }, { "docid": "4504134d0965b077b2462540a9b6950a", "text": "This paper presents a novel dataset for training end-to-end task oriented conversational agents. The dataset contains conversations between an operator – a task expert, and a client who seeks information about the task. Along with the conversation transcriptions, we record database API calls performed by the operator, which capture a distilled meaning of the user query. We expect that the easy-to-get supervision of database calls will allow us to train end-to-end dialogue agents with significantly less training data. The dataset is collected using crowdsourcing and the conversations cover the well-known restaurant domain. Quality of the data is enforced by mutual control among contributors. The dataset is available for download under the Creative Commons 4.0 BY-SA license.", "title": "" }, { "docid": "9fdb52d61c5f6d278c656f75d22aa10d", "text": "BACKGROUND\nIncreasing demand for memory assessment in clinical settings in Iran, as well as the absence of a comprehensive and standardized task based upon the Persian culture and language, requires an appropriate culture- and language-specific version of the commonly used neuropsychological measure of verbal learning and memory, the Rey Auditory Verbal Learning Test (RAVLT).\n\n\nMETHODS\nThe Persian adapted version of the original RAVLT and two other alternate word lists were generated based upon criteria previously set for developing new word lists. A total of 90 subjects (three groups of 30 persons), aged 29.75±7.10 years, volunteered to participate in our study and were tested using the original word list. The practice effect was assessed by retesting the first and second groups using the same word list after 30 and 60 days, respectively. The test-retest reliability was evaluated by retesting the third group of participants twice using two new alternate word lists with an interval of 30 days.\n\n\nRESULTS\nThe re-administration of the same list after one or even two months led to significant practice effects. However, the use of alternate forms after a one-month delay yielded no significant difference across the forms. The first and second trials, as well as the total, immediate, and delayed recall scores showed the best reliability in retesting by the alternate list.\n\n\nCONCLUSION\nThe difference between the generated forms was minor, and it seems that the Persian version of the RAVLT is a reliable instrument for repeated neuropsychological testing as long as alternate forms are used and scores are carefully chosen.  ", "title": "" }, { "docid": "87741fe2019c494e399254f08aa6f3ce", "text": "Copyright © 2008 Massachusetts Medical Society. A previously well 42-year-old woman presents with severe pain in the right upper quadrant, which started 15 hours earlier. She has previously noted episodic pain in that location that lasted for up to 2 hours but has not sought medical advice. She has had one episode of vomiting with the current attack. On physical examination, her temperature is 38.5°C, and the heart rate is 95 beats per minute. She has tenderness and guarding in the right upper quadrant. How should her condition be evaluated and treated?", "title": "" }, { "docid": "c63559ed7971471d7d4b44b85c2917ac", "text": "Vehicle-bicycle accidents with subsequent dragging of the rider over long distances are extremely rare. The case reported here is that of a 16-year-old mentally retarded bike rider who was run over by a truck whose driver failed to notice the accident. The legs of the victim became trapped by the rear axle of the trailer and the body was dragged over 45 km before being discovered under the parked truck. The autopsy revealed that the boy had died from the initial impact and not from the dragging injuries which had caused extensive mutilation. The reports of the technical expert and the forensic pathologist led the prosecutor to drop the case against the truck driver for manslaughter.", "title": "" }, { "docid": "a7d957e619fa7b3fbca8073be818fc94", "text": "The dielectric properties of epoxy nanocomposites with insulating nano-fillers, viz., TiO2, ZnO and AI2O3 were investigated at low filler concentrations by weight. Epoxy nanocomposite samples with a good dispersion of nanoparticles in the epoxy matrix were prepared and experiments were performed to measure the dielectric permittivity and tan delta (400 Hz-1 MHz), dc volume resistivity and ac dielectric strength. At very low nanoparticle loadings, results demonstrate some interesting dielectric behaviors for nanocomposites and some of the electrical properties are found to be unique and advantageous for use in several existing and potential electrical systems. The nanocomposite dielectric properties are analyzed in detail with respect to different experimental parameters like frequency (for permittivity/tan delta), filler size, filler concentration and filler permittivity. In addition, epoxy microcomposites for the same systems were synthesized and their dielectric properties were compared to the results already obtained for nanocomposites. The interesting dielectric characteristics for epoxy based nanodielectric systems are attributed to the large volume fraction of interfaces in the bulk of the material and the ensuing interactions between the charged nanoparticle surface and the epoxy chains.", "title": "" }, { "docid": "5a0fe40414f7881cc262800a43dfe4d0", "text": "In this work, a passive rectifier circuit is presented, which is operating at 868 MHz. It allows energy harvesting from low power RF waves with a high efficiency. It consists of a novel multiplier circuit design and high quality components to reduce parasitic effects, losses and reaches a low startup voltage. Using lower capacitor rises up the switching speed of the whole circuit. An inductor L serves to store energy in a magnetic field during the negative cycle wave and returns it during the positive one. A low pass filter is arranged in cascade with the rectifier circuit to reduce ripple at high frequencies and to get a stable DC signal. A 50 kΩ load is added at the output to measure the output power and to visualize the behavior of the whole circuit. Simulation results show an outstanding potential of this RF-DC converter witch has a relative high sensitivity beginning with -40 dBm.", "title": "" }, { "docid": "87d309b82b008191080d18f47a3fb6e1", "text": "In today's networked environment, massive volume of data being generated, gathered and stored in databases across the world. This trend is growing very fast, year after year. Today it is normal to find databases with terabytes of data, in which vital information and knowledge is hidden. The unseen information in such databases is not feasible to mine without efficient mining techniques for extracting information. In past years many algorithms are created to extract knowledge from large sets of data. There are many different methodologies to approach data mining: classification, clustering, association rule, etc. Classification is the most conventional technique to analyse the large data sets. Classification can help identify intrusions, as well as for discovering new and unknown types of intrusions. For classification, feature selection provides an efficient mechanism to analyse the dataset. We are trying to analyse the NSL-KDD cup 99, dataset using various classification algorithms. Primary experiments are performed in WEKA environment. The accuracy of the various algorithms is also calculated. A feature selection method has been implemented to provide improved accuracy. The main objective of this analysis is to deliver the broad analysis feature selection methods for NSL-KDD intrusion detection dataset.", "title": "" }, { "docid": "639afc633f05f54c790077f80c3628b8", "text": "It has been demonstrated that the sparse representation based framework is one of the most popular and promising ways to handle the single image super-resolution (SISR) issue. However, due to the complexity of image degradation and inevitable existence of noise, the coding coefficients produced by imposing sparse prior only are not precise enough for faithful reconstructions. In order to overcome it, we present an improved SISR reconstruction method based on the proposed bidirectionally aligned sparse representation (BASR) model. In our model, the bidirectional similarities are first modeled and constructed to form a complementary pair of regularization terms. The raw sparse coefficients are additionally aligned to this pair of standards to restrain sparse coding noise and therefore result in better recoveries. On the basis of fast iterative shrinkage-thresholding algorithm, a well-designed mathematic implementation is introduced for solving the proposed BASR model efficiently. Thorough experimental results indicate that the proposed method performs effectively and efficiently, and outperforms many recently published baselines in terms of both objective evaluation and visual fidelity.", "title": "" } ]
scidocsrr
9cf359b6932bcf61505b74ba3c1c5d7b
Lessons from the Amazon Picking Challenge: Four Aspects of Building Robotic Systems
[ { "docid": "f670b91f8874c2c2db442bc869889dbd", "text": "This paper summarizes lessons learned from the first Amazon Picking Challenge in which 26 international teams designed robotic systems that competed to retrieve items from warehouse shelves. This task is currently performed by human workers, and there is hope that robots can someday help increase efficiency and throughput while lowering cost. We report on a 28-question survey posed to the teams to learn about each team’s background, mechanism design, perception apparatus, planning and control approach. We identify trends in this data, correlate it with each team’s success in the competition, and discuss observations and lessons learned. Note to Practitioners: Abstract—Perception, motion planning, grasping, and robotic system engineering has reached a level of maturity that makes it possible to explore automating simple warehouse tasks in semi-structured environments that involve high-mix, low-volume picking applications. This survey summarizes lessons learned from the first Amazon Picking Challenge, highlighting mechanism design, perception, and motion planning algorithms, as well as software engineering practices that were most successful in solving a simplified order fulfillment task. While the choice of mechanism mostly affects execution speed, the competition demonstrated the systems challenges of robotics and illustrated the importance of combining reactive control with deliberative planning.", "title": "" }, { "docid": "50d22974ef09d0f02ee05d345e434055", "text": "We present the exploring/exploiting tree (EET) algorithm for motion planning. The EET planner deliberately trades probabilistic completeness for computational efficiency. This tradeoff enables the EET planner to outperform state-of-the-art sampling-based planners by up to three orders of magnitude. We show that these considerable speedups apply for a variety of challenging real-world motion planning problems. The performance improvements are achieved by leveraging work space information to continuously adjust the sampling behavior of the planner. When the available information captures the planning problem's inherent structure, the planner's sampler becomes increasingly exploitative. When the available information is less accurate, the planner automatically compensates by increasing local configuration space exploration. We show that active balancing of exploration and exploitation based on workspace information can be a key ingredient to enabling highly efficient motion planning in practical scenarios.", "title": "" } ]
[ { "docid": "35cbd0797156630e7b3edf7cf76868c1", "text": "Given a bipartite graph of users and the products that they review, or followers and followees, how can we detect fake reviews or follows? Existing fraud detection methods (spectral, etc.) try to identify dense subgraphs of nodes that are sparsely connected to the remaining graph. Fraudsters can evade these methods using camouflage, by adding reviews or follows with honest targets so that they look “normal.” Even worse, some fraudsters use hijacked accounts from honest users, and then the camouflage is indeed organic.\n Our focus is to spot fraudsters in the presence of camouflage or hijacked accounts. We propose FRAUDAR, an algorithm that (a) is camouflage resistant, (b) provides upper bounds on the effectiveness of fraudsters, and (c) is effective in real-world data. Experimental results under various attacks show that FRAUDAR outperforms the top competitor in accuracy of detecting both camouflaged and non-camouflaged fraud. Additionally, in real-world experiments with a Twitter follower--followee graph of 1.47 billion edges, FRAUDAR successfully detected a subgraph of more than 4, 000 detected accounts, of which a majority had tweets showing that they used follower-buying services.", "title": "" }, { "docid": "4071b0a0f3887a5ad210509e6ad5498a", "text": "Nowadays, the IoT is largely dependent on sensors. The IoT devices are embedded with sensors and have the ability to communicate. A variety of sensors play a key role in networked devices in IoT. In order to facilitate the management of such sensors, this paper investigates how to use SNMP protocol, which is widely used in network device management, to implement sensors information management of IoT system. The principles and implement details to setup the MIB file, agent and manager application are discussed. A prototype system is setup to validate our methods. The test results show that because of its easy use and strong expansibility, SNMP is suitable and a bright way for sensors information management of IoT system.", "title": "" }, { "docid": "2f901bcc774a104db449e38fd8ebb3c4", "text": "Web service composition concerns the building of new value added services by integrating the sets of existing web services. Due to the seamless proliferation of web services, it becomes difficult to find a suitable web service that satisfies the requirements of users during web service composition. This paper systematically reviews existing research on QoS-aware web service composition using computational intelligence techniques (published between 2005 and 2015). This paper develops a classification of research approaches on computational intelligence based QoS-aware web service composition and describes future research directions in this area. In particular, the results of this study confirms that new meta-heuristic algorithms have not yet been applied for solving QoS-aware web services composition.", "title": "" }, { "docid": "dfb3a6fea5c2b12e7865f8b6664246fb", "text": "We develop a new version of prospect theory that employs cumulative rather than separable decision weights and extends the theory in several respects. This version, called cumulative prospect theory, applies to uncertain as well as to risky prospects with any number of outcomes, and it allows different weighting functions for gains and for losses. Two principles, diminishing sensitivity and loss aversion, are invoked to explain the characteristic curvature of the value function and the weighting functions. A review of the experimental evidence and the results of a new experiment confirm a distinctive fourfold pattern of risk attitudes: risk aversion for gains and risk seeking for losses of high probability; risk seeking for gains and risk aversion for losses of low probability. Expected utility theory reigned for several decades as the dominant normative and descriptive model of decision making under uncertainty, but it has come under serious question in recent years. There is now general agreement that the theory does not provide an adequate description of individual choice: a substantial body of evidence shows that decision makers systematically violate its basic tenets. Many alternative models have been proposed in response to this empirical challenge (for reviews, see Camerer, 1989; Fishburn, 1988; Machina, 1987). Some time ago we presented a model of choice, called prospect theory, which explained the major violations of expected utility theory in choices between risky prospects with a small number of outcomes (Kahneman and Tversky, 1979; Tversky and Kahneman, 1986). The key elements of this theory are 1) a value function that is concave for gains, convex for losses, and steeper for losses than for gains, *An earlier version of this article was entitled \"Cumulative Prospect Theory: An Analysis of Decision under Uncertainty.\" This article has benefited from discussions with Colin Camerer, Chew Soo-Hong, David Freedman, and David H. Krantz. We are especially grateful to Peter P. Wakker for his invaluable input and contribution to the axiomatic analysis. We are indebted to Richard Gonzalez and Amy Hayes for running the experiment and analyzing the data. This work was supported by Grants 89-0064 and 88-0206 from the Air Force Office of Scientific Research, by Grant SES-9109535 from the National Science Foundation, and by the Sloan Foundation. 298 AMOS TVERSKY/DANIEL KAHNEMAN and 2) a nonlinear transformation of the probability scale, which overweights small probabilities and underweights moderate and high probabilities. In an important later development, several authors (Quiggin, 1982; Schmeidler, 1989; Yaari, 1987; Weymark, 1981) have advanced a new representation, called the rank-dependent or the cumulative functional, that transforms cumulative rather than individual probabilities. This article presents a new version of prospect theory that incorporates the cumulative functional and extends the theory to uncertain as well to risky prospects with any number of outcomes. The resulting model, called cumulative prospect theory, combines some of the attractive features of both developments (see also Luce and Fishburn, 1991). It gives rise to different evaluations of gains and losses, which are not distinguished in the standard cumulative model, and it provides a unified treatment of both risk and uncertainty. To set the stage for the present development, we first list five major phenomena of choice, which violate the standard model and set a minimal challenge that must be met by any adequate descriptive theory of choice. All these findings have been confirmed in a number of experiments, with both real and hypothetical payoffs. Framing effects. The rational theory of choice assumes description invariance: equivalent formulations of a choice problem should give rise to the same preference order (Arrow, 1982). Contrary to this assumption, there is much evidence that variations in the framing of options (e.g., in terms of gains or losses) yield systematically different preferences (Tversky and Kahneman, 1986). Nonlinear preferences. According to the expectation principle, the utility of a risky prospect is linear in outcome probabilities. Allais's (1953) famous example challenged this principle by showing that the difference between probabilities of .99 and 1.00 has more impact on preferences than the difference between 0.10 and 0.11. More recent studies observed nonlinear preferences in choices that do not involve sure things (Camerer and Ho, 1991). Source dependence. People's willingness to bet on an uncertain event depends not only on the degree of uncertainty but also on its source. Ellsberg (1961) observed that people prefer to bet on an urn containing equal numbers of red and green balls, rather than on an urn that contains red and green balls in unknown proportions. More recent evidence indicates that people often prefer a bet on an event in their area of competence over a bet on a matched chance event, although the former probability is vague and the latter is clear (Heath and Tversky, 1991). Risk seeking. Risk aversion is generally assumed in economic analyses of decision under uncertainty. However, risk-seeking choices are consistently observed in two classes of decision problems. First, people often prefer a small probability of winning a large prize over the expected value of that prospect. Second, risk seeking is prevalent when people must choose between a sure loss and a substantial probability of a larger loss. Loss' aversion. One of the basic phenomena of choice under both risk and uncertainty is that losses loom larger than gains (Kahneman and Tversky, 1984; Tversky and Kahneman, 1991). The observed asymmetry between gains and losses is far too extreme to be explained by income effects or by decreasing risk aversion. ADVANCES IN PROSPECT THEORY 299 The present development explains loss aversion, risk seeking, and nonlinear preferences in terms of the value and the weighting functions. It incorporates a framing process, and it can accommodate source preferences. Additional phenomena that lie beyond the scope of the theory--and of its alternatives--are discussed later. The present article is organized as follows. Section 1.1 introduces the (two-part) cumulative functional; section 1.2 discusses relations to previous work; and section 1.3 describes the qualitative properties of the value and the weighting functions. These properties are tested in an extensive study of individual choice, described in section 2, which also addresses the question of monetary incentives. Implications and limitations of the theory are discussed in section 3. An axiomatic analysis of cumulative prospect theory is presented in the appendix.", "title": "" }, { "docid": "ed5185ea36f61a9216c6f0183b81d276", "text": "Blockchain technology enables the creation of a decentralized environment where transactions and data are not under the control of any third party organization. Any transaction ever completed is recorded in a public ledger in a verifiable and permanent way. Based on blockchain technology, we propose a global higher education credit platform, named EduCTX. This platform is based on the concept of the European Credit Transfer and Accumulation System (ECTS). It constitutes a globally trusted, decentralized higher education credit and grading system that can offer a globally unified viewpoint for students and higher education institutions (HEIs), as well as for other potential stakeholders such as companies, institutions and organizations. As a proof of concept, we present a prototype implementation of the environment, based on the open-source Ark Blockchain Platform. Based on a globally distributed peer-to-peer network, EduCTX will process, manage and control ECTX tokens, which represent credits that students gain for completed courses such as ECTS. HEIs are the peers of the blockchain network. The platform is a first step towards a more transparent and technologically advanced form of higher education systems. The EduCTX platform represents the basis of the EduCTX initiative which anticipates that various HEIs would join forces in order to create a globally efficient, simplified and ubiquitous environment in order to avoid language and administrative barriers. Therefore we invite and encourage HEIs to join the EduCTX initiative and the EduCTX blockchain network.", "title": "" }, { "docid": "9a58dc3eada29c2b929c4442ce0ac025", "text": "Gamification is the application of game elements and game design techniques in non-game contexts to engage and motivate people to achieve their goals. Motivation is an essential requirement for effective and efficient collaboration, which is particularly challenging when people work distributedly. In this paper, we discuss the topics of collaboration, motivation, and gamification in the context of software engineering. We then introduce our long-term research goal—building a theoretical framework that defines how gamification can be used as a collaboration motivator for virtual software teams. We also highlight the roles that social and cultural issues might play in understanding the phenomenon. Finally, we give an overview of our proposed research method to foster discussion during the workshop on how to best investigate the topic. Author", "title": "" }, { "docid": "3cc6d54cb7a8507473f623a149c3c64b", "text": "The measurement of loyalty is a topic of great interest for the marketing academic literature. The relation that loyalty has with the results of organizations has been tested by numerous studies and the search to retain profitable customers has become a maxim in firm management. Tourist destinations have not remained oblivious to this trend. However, the difficulty involved in measuring the loyalty of a tourist destination is a brake on its adoption by those in charge of destination management. The usefulness of measuring loyalty lies in being able to apply strategies which enable improving it, but that also impact on the enhancement of the organization’s results. The study of tourists’ loyalty to a destination is considered relevant for the literature and from the point of view of the management of the multiple actors involved in the tourist activity. Based on these considerations, this work proposes a synthetic indictor that allows the simple measurement of the tourist’s loyalty. To do so, we used as a starting point Best’s (2007) customer loyalty index adapted to the case of tourist destinations. We also employed a variable of results – the tourist’s overnight stays in the destination – to create a typology of customers according to their levels of loyalty and the number of their overnight stays. The data were obtained from a survey carried out with 2373 tourists of the city of Seville. In accordance with the results attained, the proposal of the synthetic indicator to measure tourist loyalty is viable, as it is a question of a simple index constructed from easily obtainable data. Furthermore, four groups of tourists have been identified, according to their degree of loyalty and profitability, using the number of overnight stays of the tourists in their visit to the destination. The study’s main contribution stems from the possibility of simply measuring loyalty and from establishing four profiles of tourists for which marketing strategies of differentiated relations can be put into practice and that contribute to the improvement of the destination’s results. © 2018 Journal of Innovation & Knowledge. Published by Elsevier España, S.L.U. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/", "title": "" }, { "docid": "83651ca357b0f978400de4184be96443", "text": "The most common temporomandibular joint (TMJ) pathologic disease is anterior-medial displacement of the articular disk, which can lead to TMJ-related symptoms.The indication for disk repositioning surgery is irreversible TMJ damage associated with temporomandibular pain. We describe a surgical technique using a preauricular approach with a high condylectomy to reshape the condylar head. The disk is anchored with a bioabsorbable microanchor (Mitek Microfix QuickAnchor Plus 1.3) to the lateral aspect of the condylar head. The anchor is linked with a 3.0 Ethibond absorbable suture to fix the posterolateral side of the disk above the condyle.The aims of this surgery were to alleviate temporomandibular pain, headaches, and neck pain and to restore good jaw mobility. In the long term, we achieved these objectives through restoration of the physiological position and function of the disk and the lower articular compartment.In our opinion, the bioabsorbable anchor is the best choice for this type of surgery because it ensures the stability of the restored disk position and leaves no artifacts in the long term that might impede follow-up with magnetic resonance imaging.", "title": "" }, { "docid": "307d92caf4ff7e64db7d5f23035a7440", "text": "In this paper, the effective use of flight-time constrained unmanned aerial vehicles (UAVs) as flying base stations that provide wireless service to ground users is investigated. In particular, a novel framework for optimizing the performance of such UAV-based wireless systems in terms of the average number of bits (data service) transmitted to users as well as the UAVs’ hover duration (i.e. flight time) is proposed. In the considered model, UAVs hover over a given geographical area to serve ground users that are distributed within the area based on an arbitrary spatial distribution function. In this case, two practical scenarios are considered. In the first scenario, based on the maximum possible hover times of UAVs, the average data service delivered to the users under a fair resource allocation scheme is maximized by finding the optimal cell partitions associated to the UAVs. Using the powerful mathematical framework of optimal transport theory, this cell partitioning problem is proved to be equivalent to a convex optimization problem. Subsequently, a gradient-based algorithm is proposed for optimally partitioning the geographical area based on the users’ distribution, hover times, and locations of the UAVs. In the second scenario, given the load requirements of ground users, the minimum average hover time that the UAVs need for completely servicing their ground users is derived. To this end, first, an optimal bandwidth allocation scheme for serving the users is proposed. Then, given this optimal bandwidth allocation, optimal cell partitions associated with the UAVs are derived by exploiting the optimal transport theory. Simulation results show that our proposed cell partitioning approach leads to a significantly higher fairness among the users compared with the classical weighted Voronoi diagram. Furthermore, the results demonstrate that the average hover time of the UAVs can be reduced by 64% by adopting the proposed optimal bandwidth allocation scheme as well as the optimal cell partitioning approach. In addition, our results reveal an inherent tradeoff between the hover time of UAVs and bandwidth efficiency while serving the ground users.", "title": "" }, { "docid": "6bf2280158dca2d69501255d47322246", "text": "Distal deletion of the long arm of chromosome 10 is associated with a dysmorphic craniofacial appearance, microcephaly, behavioral issues, developmental delay, intellectual disability, and ocular, urogenital, and limb abnormalities. Herein, we present clinical, molecular, and cytogenetic investigations of four patients, including two siblings, with nearly identical terminal deletions of 10q26.3, all of whom have an atypical presentation of this syndrome. Their prominent features include ataxia, mild-to-moderate intellectual disability, and hyperemia of the hands and feet, and they do not display many of the other features commonly associated with deletions of this region. These results point to a novel gene locus associated with ataxia and highlight the variability of the clinical presentation of patients with deletions of this region.", "title": "" }, { "docid": "d611a165b088d7087415aa2c8843b619", "text": "Type synthesis of 1-DOF remote center of motion (RCM) mechanisms is the preliminary for research on many multiDOF RCM mechanisms. Since types of existing RCM mechanisms are few, it is necessary to find an efficient way to create more new RCM mechanisms. In this paper, existing 1-DOF RCM mechanisms are first classified, then base on a proposed concept of the planar virtual center (VC) mechanism, which is a more generalized concept than a RCM mechanism, two approaches of type synthesis for 1-DOF RCM mechanisms are addressed. One case is that a 1-DOF parallel or serial–parallel RCM mechanism can be constructed by assembling two planar VC mechanisms; the other case, a VC mechanism can be expanded to a serial–parallel RCM mechanism. Concrete samples are provided accordingly, some of which are new types. 2008 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "fe2870a3f36b9a042ec9cece5a64dafd", "text": "This paper provides a methodology to study the PHY layer vulnerability of wireless protocols in hostile radio environments. Our approach is based on testing the vulnerabilities of a system by analyzing the individual subsystems. By targeting an individual subsystem or a combination of subsystems at a time, we can infer the weakest part and revise it to improve the overall system performance. We apply our methodology to 4G LTE downlink by considering each control channel as a subsystem. We also develop open-source software enabling research and education using software-defined radios. We present experimental results with open-source LTE systems and shows how the different subsystems behave under targeted interference. The analysis for the LTE downlink shows that the synchronization signals (PSS/SSS) are very resilient to interference, whereas the downlink pilots or Cell-Specific Reference signals (CRS) are the most susceptible to a synchronized protocol-aware interferer. We also analyze the severity of control channel attacks for different LTE configurations. Our methodology and tools allow rapid evaluation of the PHY layer reliability in harsh signaling environments, which is an asset to improve current standards and develop new and robust wireless protocols.", "title": "" }, { "docid": "2d66994a185ee4d57c87ac8b012c86ac", "text": "The majority of projects dealing with monitoring and diagnosis of Cyber Physical Systems (CPSs) relies on models created by human experts. But these models are rarely available, are hard to verify and to maintain and are often incomplete. Data-driven approaches are a promising alternative: They leverage on the large amount of data which is collected nowadays in CPSs, this data is then used to learn the necessary models automatically. For this, several challenges have to be tackled, such as real-time data acquisition and storage solutions, data analysis and machine learning algorithms, task specific human-machine-interfaces (HMI) and feedback/control mechanisms. In this paper, we propose a cognitive reference architecture which addresses these challenges. This reference architecture should both ease the reuse of algorithms and support scientific discussions by providing a comparison schema. Use cases from different industries are outlined and support the correctness of the architecture.", "title": "" }, { "docid": "313b4f6832d45a428fe264cc16e6ff9f", "text": "This theme issue provides a comprehensive collection of original research articles on the creation of diverse types of theranostic upconversion nanoparticles, their fundamental interactions in biology, as well as their biophotonic applications in noninvasive diagnostics and therapy.", "title": "" }, { "docid": "ebc6b9c213fd20397aaabe1a15a36591", "text": "In this paper, we propose an Arabic Question-Answering (Q-A) system called QASAL «Question -Answering system for Arabic Language». QASAL accepts as an input a natural language question written in Modern Standard Arabic (MSA) and generates as an output the most efficient and appropriate answer. The proposed system is composed of three modules: A question analysis module, a passage retrieval module and an answer extraction module. To process these three modules we use the NooJ Platform which represents a linguistic development environment.", "title": "" }, { "docid": "96af91aed1c131f1c8c9d8076ed5835d", "text": "Hedge funds are unique among investment vehicles in that they are relatively unconstrained in their use of derivative investments, short-selling, and leverage. This flexibility allows investment managers to span a broad spectrum of distinct risks, such as momentum and option-like investments. Taking a revealed preference approach, we find that Capital Asset Pricing Model (CAPM) alpha explains hedge fund flows better than alphas from more sophisticated models. This result suggests that investors pool together sophisticated model alpha with returns from exposures to traditional and exotic risks. We decompose performance into traditional and exotic risk components and find that while investors chase both components, they place greater relative emphasis on returns associated with exotic risk exposures that can only be obtained through hedge funds. However, we find little evidence of persistence in performance from traditional or exotic risks, which cautions against investors’ practice of seeking out risk exposures following periods of recent success.", "title": "" }, { "docid": "9b49a4673456ab8e9f14a0fe5fb8bcc7", "text": "Legged robots offer the potential to navigate a wide variety of terrains that are inaccessible to wheeled vehicles. In this paper we consider the planning and control tasks of navigating a quadruped robot over a wide variety of challenging terrain, including terrain which it has not seen until run-time. We present a software architecture that makes use of both static and dynamic gaits, as well as specialized dynamic maneuvers, to accomplish this task. Throughout the paper we highlight two themes that have been central to our approach: 1) the prevalent use of learning algorithms, and 2) a focus on rapid recovery and replanning techniques; we present several novel methods and algorithms that we developed for the quadruped and that illustrate these two themes. We evaluate the performance of these different methods, and also present and discuss the performance of our system on the official Learning Locomotion tests.", "title": "" }, { "docid": "5f49c93d7007f0f14f1410ce7805b29a", "text": "Die Psychoedukation im Sinne eines biopsychosozialen Schmerzmodells zielt auf das Erkennen und Verändern individueller schmerzauslösender und -aufrechterhaltender Faktoren ab. Der Einfluss kognitiver Bewertungen, emotionaler Verarbeitungsprozesse und schmerzbezogener Verhaltensweisen steht dabei im Mittelpunkt. Die Anregung und Anleitung zu einer verbesserten Selbstbeobachtung stellt die Voraussetzung zum Einsatz aktiver Selbstkontrollstrategien und zur Erhöhung der Selbstwirksamkeitserwartung dar. Dazu zählt die Entwicklung und Erarbeitung von Schmerzbewältigungsstrategien wie z. B. Aufmerksamkeitslenkung und Genusstraining. Eine besondere Bedeutung kommt dem Aufbau einer Aktivitätenregulation zur Strukturierung eines angemessenen Verhältnisses von Erholungs- und Anforderungsphasen zu. Interventionsmöglichkeiten stellen hier die Vermittlung von Entspannungstechniken, Problemlösetraining, spezifisches Kompetenztraining sowie Elemente der kognitiven Therapie dar. Der Aufbau alternativer kognitiver und handlungsbezogener Lösungsansätze dient einer verbesserten Bewältigung internaler und externaler Stressoren. Genutzt werden die förderlichen Bedingungen gruppendynamischer Prozesse. Einzeltherapeutische Interventionen dienen der Bearbeitung spezifischer psychischer Komorbiditäten und der individuellen Unterstützung bei der beruflichen und sozialen Wiedereingliederung. Providing the patient with a pain model based on the biopsychosocial approach is one of the most important issues in psychological intervention. Illness behaviour is influenced by pain-eliciting and pain-aggravating thoughts. Identification and modification of these thoughts is essential and aims to change cognitive evaluations, emotional processing, and pain-referred behaviour. Improved self-monitoring concerning maladaptive thoughts, feelings, and behaviour enables functional coping strategies (e.g. attention diversion and learning to enjoy things) and enhances self-efficacy expectancies. Of special importance is the establishment of an appropriate balance between stress and recreation. Intervention options include teaching relaxation techniques, problem-solving strategies, and specific skills as well as applying appropriate elements of cognitive therapy. The development of alternative cognitive and action-based strategies improves the patient’s ability to cope with internal and external stressors. All of the psychological elements are carried out in a group setting. Additionally, individual therapy is offered to treat comorbidities or to support reintegration into the patient’s job.", "title": "" }, { "docid": "fef4ab4bebb16560135cbf4d49c63b4d", "text": "The two-fold aim of the paper is to unify and generalize on the one hand the double integrals of Beukers for ζ(2) and ζ(3), and of the second author for Euler’s constant γ and its alternating analog ln(4/π), and on the other hand the infinite products of the first author for e, of the second author for π, and of Ser for e . We obtain new double integral and infinite product representations of many classical constants, as well as a generalization to Lerch’s transcendent of Hadjicostas’s double integral formula for the Riemann zeta function, and logarithmic series for the digamma and Euler beta functions. The main tools are analytic continuations of Lerch’s function, including Hasse’s series. We also use Ramanujan’s polylogarithm formula for the sum of a particular series involving harmonic numbers, and his relations between certain dilogarithm values.", "title": "" } ]
scidocsrr
587beaec003e11de1c6ce7a00b43e31a
Improving biocuration of microRNAs in diseases: a case study in idiopathic pulmonary fibrosis
[ { "docid": "2564e804c862e3e40a5f8d0d6dada0c0", "text": "microRNAs (miRNAs) are short non-coding RNA species, which act as potent gene expression regulators. Accurate identification of miRNA targets is crucial to understanding their function. Currently, hundreds of thousands of miRNA:gene interactions have been experimentally identified. However, this wealth of information is fragmented and hidden in thousands of manuscripts and raw next-generation sequencing data sets. DIANA-TarBase was initially released in 2006 and it was the first database aiming to catalog published experimentally validated miRNA:gene interactions. DIANA-TarBase v7.0 (http://www.microrna.gr/tarbase) aims to provide for the first time hundreds of thousands of high-quality manually curated experimentally validated miRNA:gene interactions, enhanced with detailed meta-data. DIANA-TarBase v7.0 enables users to easily identify positive or negative experimental results, the utilized experimental methodology, experimental conditions including cell/tissue type and treatment. The new interface provides also advanced information ranging from the binding site location, as identified experimentally as well as in silico, to the primer sequences used for cloning experiments. More than half a million miRNA:gene interactions have been curated from published experiments on 356 different cell types from 24 species, corresponding to 9- to 250-fold more entries than any other relevant database. DIANA-TarBase v7.0 is freely available.", "title": "" } ]
[ { "docid": "7d603d154025f7160c0711bba92e1049", "text": "Since 2013, a stream of disclosures has prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be reidentified, and can be used to draw sensitive inferences.", "title": "" }, { "docid": "4322f123ff6a1bd059c41b0037bac09b", "text": "Nowadays, as a beauty-enhancing product, clothing plays an important role in human's social life. In fact, the key to a proper outfit usually lies in the harmonious clothing matching. Nevertheless, not everyone is good at clothing matching. Fortunately, with the proliferation of fashion-oriented online communities, fashion experts can publicly share their fashion tips by showcasing their outfit compositions, where each fashion item (e.g., a top or bottom) usually has an image and context metadata (e.g., title and category). Such rich fashion data offer us a new opportunity to investigate the code in clothing matching. However, challenges co-exist with opportunities. The first challenge lies in the complicated factors, such as color, material and shape, that affect the compatibility of fashion items. Second, as each fashion item involves multiple modalities (i.e., image and text), how to cope with the heterogeneous multi-modal data also poses a great challenge. Third, our pilot study shows that the composition relation between fashion items is rather sparse, which makes traditional matrix factorization methods not applicable. Towards this end, in this work, we propose a content-based neural scheme to model the compatibility between fashion items based on the Bayesian personalized ranking (BPR) framework. The scheme is able to jointly model the coherent relation between modalities of items and their implicit matching preference. Experiments verify the effectiveness of our scheme, and we deliver deep insights that can benefit future research.", "title": "" }, { "docid": "556dbae297d06aaaeb0fd78016bd573f", "text": "This paper presents a learning and scoring framework based on neural networks for speaker verification. The framework employs an autoencoder as its primary structure while three factors are jointly considered in the objective function for speaker discrimination. The first one, relating to the sample reconstruction error, makes the structure essentially a generative model, which benefits to learn most salient and useful properties of the data. Functioning in the middlemost hidden layer, the other two attempt to ensure that utterances spoken by the same speaker are mapped into similar identity codes in the speaker discriminative subspace, where the dispersion of all identity codes are maximized to some extent so as to avoid the effect of over-concentration. Finally, the decision score of each utterance pair is simply computed by cosine similarity of their identity codes. Dealing with utterances represented by i-vectors, the results of experiments conducted on the male portion of the core task in the NIST 2010 Speaker Recognition Evaluation (SRE) significantly demonstrate the merits of our approach over the conventional PLDA method.", "title": "" }, { "docid": "c6c04fe37b540df1ab54f31dd01afef6", "text": "A backtracking algorithm for testing a pair of digraphs for isomorphism is presented. The information contained in the distance matrix representation of a graph is used to establish an initial partition of the graph's vertices. This distance matrix information is then applied in a backtracking procedure to reduce the search tree of possible mappings. While the algorithm is not guaranteed to run in polynomial time, it performs efficiently for a large class of graphs.", "title": "" }, { "docid": "154c5c644171c63647e5a1c83ed06440", "text": "Recommender System are new generation internet tool that help user in navigating through information on the internet and receive information related to their preferences. Although most of the time recommender systems are applied in the area of online shopping and entertainment domains like movie and music, yet their applicability is being researched upon in other area as well. This paper presents an overview of the Recommender Systems which are currently working in the domain of online book shopping. This paper also proposes a new book recommender system that combines user choices with not only similar users but other users as well to give diverse recommendation that change over time. The overall architecture of the proposed system is presented and its implementation with a prototype design is described. Lastly, the paper presents empirical evaluation of the system based on a survey reflecting the impact of such diverse recommendations on the user choices. Key-Words: Recommender system; Collaborative filtering; Content filtering; Data mining; Time; Book", "title": "" }, { "docid": "85736b2fd608e3d109ce0f3c46dda9ac", "text": "The WHO (2001) recommends exclusive breast-feeding and delaying the introduction of solid foods to an infant's diet until 6 months postpartum. However, in many countries, this recommendation is followed by few mothers, and earlier weaning onto solids is a commonly reported global practice. Therefore, this prospective, observational study aimed to assess compliance with the WHO recommendation and examine weaning practices, including the timing of weaning of infants, and to investigate the factors that predict weaning at ≤ 12 weeks. From an initial sample of 539 pregnant women recruited from the Coombe Women and Infants University Hospital, Dublin, 401 eligible mothers were followed up at 6 weeks and 6 months postpartum. Quantitative data were obtained on mothers' weaning practices using semi-structured questionnaires and a short dietary history of the infant's usual diet at 6 months. Only one mother (0.2%) complied with the WHO recommendation to exclusively breastfeed up to 6 months. Ninety-one (22.6%) infants were prematurely weaned onto solids at ≤ 12 weeks with predictive factors after adjustment, including mothers' antenatal reporting that infants should be weaned onto solids at ≤ 12 weeks, formula feeding at 12 weeks and mothers' reporting of the maternal grandmother as the principal source of advice on infant feeding. Mothers who weaned their infants at ≤ 12 weeks were more likely to engage in other sub-optimal weaning practices, including the addition of non-recommended condiments to their infants' foods. Provision of professional advice and exploring antenatal maternal misperceptions are potential areas for targeted interventions to improve compliance with the recommended weaning practices.", "title": "" }, { "docid": "c15aa2444187dffe2be4636ad00babdd", "text": "Most people have become “big data” producers in their daily life. Our desires, opinions, sentiments, social links as well as our mobile phone calls and GPS track leave traces of our behaviours. To transform these data into knowledge, value is a complex task of data science. This paper shows how the SoBigData Research Infrastructure supports data science towards the new frontiers of big data exploitation. Our research infrastructure serves a large community of social sensing and social mining researchers and it reduces the gap between existing research centres present at European level. SoBigData integrates resources and creates an infrastructure where sharing data and methods among text miners, visual analytics researchers, socio-economic scientists, network scientists, political scientists, humanities researchers can indeed occur. The main concepts related to SoBigData Research Infrastructure are presented. These concepts support virtual and transnational (on-site) access to the resources. Creating and supporting research communities are considered to be of vital importance for the success of our research infrastructure, as well as contributing to train the new generation of data scientists. Furthermore, this paper introduces the concept of exploratory and shows their role in the promotion of the use of our research infrastructure. The exploratories presented in this paper represent also a set of real applications in the context of social mining. Finally, a special attention is given to the legal and ethical aspects. Everything in SoBigData is supervised by an ethical and legal framework.", "title": "" }, { "docid": "00d081e61bfbfa64371b4d9e30fcd452", "text": "In the coming era of social companions, many researches have been pursuing natural dialog interactions and long-term relations between social companions and users. With respect to the quick decrease of user interests after the first few interactions, various emotion and memory models are developed and integrated with social companions for better user engagement. This paper reviews related works in the effort of combining memory and emotion with natural language dialog on social companions. We separate these works into three categories: (1) Affective system with dialog, (2) Task-driven memory with dialog, (3) Chat-driven memory with dialog. In addition, we discussed limitations and challenging issues to be solved. Finally, we also introduced our framework of social companions.", "title": "" }, { "docid": "b4153b7a973b3ca413f944cdd5723033", "text": "A number of Lactobacillus species, Bifidobacterium sp, Saccharomyces boulardii, and some other microbes have been proposed as and are used as probiotic strains, i.e. live microorganisms as food supplement in order to benefit health. The health claims range from rather vague as regulation of bowel activity and increasing of well-being to more specific, such as exerting antagonistic effect on the gastroenteric pathogens Clostridium difficile, Campylobacter jejuni, Helicobacter pylori and rotavirus, neutralising food mutagens produced in colon, shifting the immune response towards a Th2 response, and thereby alleviating allergic reactions, and lowering serum cholesterol (Tannock, 2002). Unfortunately, most publications are case reports, uncontrolled studies in humans, or reports of animal or in vitro studies. Whether or not the probiotic strains employed shall be of human origin is a matter of debate but this is not a matter of concern, as long as the strains can be shown to survive the transport in the human gastrointestinal (GI) tract and to colonise the human large intestine. This includes survival in the stressful environment of the stomach - acidic pH and bile - with induction of new genes encoding a number of stress proteins. Since the availability of antioxidants decreases rostrally in the GI tract production of antioxidants by colonic bacteria provides a beneficial effect in scavenging free radicals. LAB strains commonly produce antimicrobial substance(s) with activity against the homologous strain, but LAB strains also often produce microbicidal substances with effect against gastric and intestinal pathogens and other microbes, or compete for cell surface and mucin binding sites. This could be the mechanism behind reports that some probiotic strains inhibit or decrease translocation of bacteria from the gut to the liver. A protective effect against cancer development can be ascribed to binding of mutagens by intestinal bacteria, reduction of the enzymes beta-glucuronidase and beta-glucosidase, and deconjugation of bile acids, or merely by enhancing the immune system of the host. The latter has attracted considerable interest, and LAB have been tested in several clinical trials in allergic diseases. Characteristics ascribed to a probiotic strain are in general strain specific, and individual strains have to be tested for each property. Survival of strains during production, packing and storage of a viable cell mass has to be tested and declared.", "title": "" }, { "docid": "b8429d68d520906656bb612087b1bce6", "text": "Saliva has been advocated as an alternative to serum or plasma for steroid monitoring. Little normative information is available concerning expected concentrations of the major reproductive steroids in saliva during pregnancy and the extended postpartum. Matched serum and saliva specimens controlled for time of day and collected less than 30 minutes apart were obtained in 28 women with normal singleton pregnancies between 32 and 38 weeks of gestation and in 43 women during the first six months postpartum. Concentrations of six steroids (estriol, estradiol, progesterone, testosterone, cortisol, dehydroepiandrosterone) were quantified in saliva by enzyme immunoassay. For most of the steroids examined, concentrations in antepartum saliva showed linear increases near end of gestation, suggesting an increase in the bioavailable hormone component. Observed concentrations were in agreement with the limited data available from previous reports. Modal concentrations of the ovarian steroids were undetectable in postpartum saliva and, when detectable in individual women, approximated early follicular phase values. Only low to moderate correlations between the serum and salivary concentrations were found, suggesting that during the peripartum period saliva provides information that is not redundant to serum. Low correlations in the late antepartum may be due to differential rates of change in the total and bioavailable fractions of the circulating steroid in the final weeks of the third trimester as a consequence of dynamic changes in carrier proteins such as corticosteroid binding globulin.", "title": "" }, { "docid": "9df78ef5769ed4da768d1a7b359794ab", "text": "We describe a computer-aided optimization technique for the efficient and reliable design of compact wide-band waveguide septum polarizers (WSP). Wide-band performance is obtained by a global optimization which considers not only the septum section but also several step discontinuities placed before the ridge-to-rectangular bifurcation and the square-to-circular discontinuity. The proposed technique mnakes use of a dynamical optimization procedure which has been tested by designing several WSP operating in different frequency bands. In this work two examples are reported, one operating at Ku band and a very wideband prototype (3.4-4.2 GHz) operating in the C band. The component design, entirely carried out at computer level, has demonstrated significant advantages in terms of development times and no need of post manufacturing adjustments. The very satisfactory agreement between experimental and theoretical results further confirm the validity of the proposed technique.", "title": "" }, { "docid": "da9b9a32db674e5f6366f6b9e2c4ee10", "text": "We introduce a data-driven approach to aid the repairing and conservation of archaeological objects: ORGAN, an object reconstruction generative adversarial network (GAN). By using an encoder-decoder 3D deep neural network on a GAN architecture, and combining two loss objectives: a completion loss and an Improved Wasserstein GAN loss, we can train a network to effectively predict the missing geometry of damaged objects. As archaeological objects can greatly differ between them, the network is conditioned on a variable, which can be a culture, a region or any metadata of the object. In our results, we show that our method can recover most of the information from damaged objects, even in cases where more than half of the voxels are missing, without producing many errors.", "title": "" }, { "docid": "fb729bf4edf25f082a4808bd6bb0961d", "text": "The paper reports some of the reasons behind the low use of Information and Communication Technology (ICT) by teachers. The paper has reviewed a number or studies from different parts of the world and paid greater attention to Saudi Arabia. The literature reveals a number of factors that hinder teachers’ use of ICT. This paper will focus on lack of access to technology, lack of training and lack of time.", "title": "" }, { "docid": "36484e10b0644f01e8adbb3268c20561", "text": "Label propagation is a powerful and flexible semi-supervised learning technique on graphs. Neural networks, on the other hand, have proven track records in many supervised learning tasks. In this work, we propose a training framework with a graph-regularised objective, namely Neural Graph Machines, that can combine the power of neural networks and label propagation. This work generalises previous literature on graph-augmented training of neural networks, enabling it to be applied to multiple neural architectures (Feed-forward NNs, CNNs and LSTM RNNs) and a wide range of graphs. The new objective allows the neural networks to harness both labeled and unlabeled data by: (a)~allowing the network to train using labeled data as in the supervised setting, (b)~biasing the network to learn similar hidden representations for neighboring nodes on a graph, in the same vein as label propagation. Such architectures with the proposed objective can be trained efficiently using stochastic gradient descent and scaled to large graphs, with a runtime that is linear in the number of edges. The proposed joint training approach convincingly outperforms many existing methods on a wide range of tasks (multi-label classification on social graphs, news categorization, document classification and semantic intent classification), with multiple forms of graph inputs (including graphs with and without node-level features) and using different types of neural networks.", "title": "" }, { "docid": "8c6ec02821d17fbcf79d1a42ed92a971", "text": "OBJECTIVE\nTo explore whether an association exists between oocyte meiotic spindle morphology visualized by polarized light microscopy at the time of intracytoplasmic sperm injection and the ploidy of the resulting embryo.\n\n\nDESIGN\nProspective cohort study.\n\n\nSETTING\nPrivate IVF clinic.\n\n\nPATIENT(S)\nPatients undergoing preimplantation genetic screening/diagnosis (n = 113 patients).\n\n\nINTERVENTION(S)\nOocyte meiotic spindles were assessed by polarized light microscopy and classified at the time of intracytoplasmic sperm injection as normal, dysmorphic, translucent, telophase, or no visible spindle. Single blastomere biopsy was performed on day 3 of culture for analysis by array comparative genomic hybridization.\n\n\nMAIN OUTCOME MEASURE(S)\nSpindle morphology and embryo ploidy association was evaluated by regression methods accounting for non-independence of data.\n\n\nRESULT(S)\nThe frequency of euploidy in embryos derived from oocytes with normal spindle morphology was significantly higher than all other spindle classifications combined (odds ratio [OR] 1.93, 95% confidence interval [CI] 1.33-2.79). Oocytes with translucent (OR 0.25, 95% CI 0.13-0.46) and no visible spindle morphology (OR 0.35, 95% CI 0.19-0.63) were significantly less likely to result in euploid embryos when compared with oocytes with normal spindle morphology. There was no significant difference between normal and dysmorphic spindle morphology (OR 0.73, 95% CI 0.49-1.08), whereas no telophase spindles resulted in euploid embryos (n = 11). Assessment of spindle morphology was found to be independently associated with embryo euploidy after controlling for embryo quality (OR 1.73, 95% CI 1.16-2.60).\n\n\nCONCLUSION(S)\nOocyte spindle morphology is associated with the resulting embryo's ploidy. Oocytes with normal spindle morphology are significantly more likely to produce euploid embryos compared with oocytes with meiotic spindles that are translucent or not visible.", "title": "" }, { "docid": "b4fa57fec99131cdf0cb6fc4795fce43", "text": "We propose an alternative generator architecture for generative adversarial networks, borrowing from style transfer literature. The new architecture leads to an automatically learned, unsupervised separation of high-level attributes (e.g., pose and identity when trained on human faces) and stochastic variation in the generated images (e.g., freckles, hair), and it enables intuitive, scale-specific control of the synthesis. The new generator improves the state-of-the-art in terms of traditional distribution quality metrics, leads to demonstrably better interpolation properties, and also better disentangles the latent factors of variation. To quantify interpolation quality and disentanglement, we propose two new, automated methods that are applicable to any generator architecture. Finally, we introduce a new, highly varied and high-quality dataset of human faces.", "title": "" }, { "docid": "490d63de99f1973d5bab4c1a90633d18", "text": "Flows transported across mobile ad hoc wireless networks suffer from route breakups caused by nodal mobility. In a network that aims to support critical interactive real-time data transactions, to provide for the uninterrupted execution of a transaction, or for the rapid transport of a high value file, it is essential to identify robust routes across which such transactions are transported. Noting that route failures can induce long re-routing delays that may be highly interruptive for many applications and message/stream transactions, it is beneficial to configure the routing scheme to send a flow across a route whose lifetime is longer, with sufficiently high probability, than the estimated duration of the activity that it is selected to carry. We evaluate the ability of a mobile ad hoc wireless network to distribute flows across robust routes by introducing the robust throughput measure as a performance metric. The utility gained by the delivery of flow messages is based on the level of interruption experienced by the underlying transaction. As a special case, for certain applications only transactions that are completed without being prematurely interrupted may convey data to their intended users that is of acceptable utility. We describe the mathematical calculation of a network’s robust throughput measure, as well as its robust throughput capacity. We introduce the robust flow admission and routing algorithm (RFAR) to provide for the timely and robust transport of flow transactions across mobile ad hoc wireless net-", "title": "" }, { "docid": "4ad261905326b55a40569ebbc549a67c", "text": "OBJECTIVES\nTo analyze the Spanish experience in an international study which evaluated tocilizumab in patients with rheumatoid arthritis (RA) and an inadequate response to conventional disease-modifying antirheumatic drugs (DMARDs) or tumor necrosis factor inhibitors (TNFis) in a clinical practice setting.\n\n\nMATERIAL AND METHODS\nSubanalysis of 170 patients with RA from Spain who participated in a phase IIIb, open-label, international clinical trial. Patients presented inadequate response to DMARDs or TNFis. They received 8mg/kg of tocilizumab every 4 weeks in combination with a DMARD or as monotherapy during 20 weeks. Safety and efficacy of tocilizumab were analyzed. Special emphasis was placed on differences between failure to a DMARD or to a TNFi and the need to switch to tocilizumab with or without a washout period in patients who had previously received TNFi.\n\n\nRESULTS\nThe most common adverse events were infections (25%), increased total cholesterol (38%) and transaminases (15%). Five patients discontinued the study due to an adverse event. After six months of tocilizumab treatment, 71/50/30% of patients had ACR 20/50/70 responses, respectively. A higher proportion of TNFi-naive patients presented an ACR20 response: 76% compared to 64% in the TNFi group with previous washout and 66% in the TNFi group without previous washout.\n\n\nCONCLUSIONS\nSafety results were consistent with previous results in patients with RA and an inadequate response to DMARDs or TNFis. Tocilizumab is more effective in patients who did not respond to conventional DMARDs than in patients who did not respond to TNFis.", "title": "" }, { "docid": "46b8fef519545e285a410d29340b87ad", "text": "The inferior gluteal artery is described in standard anatomy textbooks as contributing to the blood supply of the hip through an anastomosis with the medial femoral circumflex artery. The site(s) of the anastomosis has not been described previously. We undertook an injection study to define the anastomotic connections between these two arteries and to determine whether the inferior gluteal artery could supply the lateral epiphyseal arteries alone. From eight fresh-frozen cadaver pelvic specimens we were able to inject the vessels in 14 hips with latex moulding compound through either the medial femoral circumflex artery or the inferior gluteal artery. Injected vessels around the hip were then carefully exposed and documented photographically. In seven of the eight specimens a clear anastomosis was shown between the two arteries adjacent to the tendon of obturator externus. The terminal vessel arising from this anastomosis was noted to pass directly beneath the posterior capsule of the hip before ascending the superior aspect of the femoral neck and terminating in the lateral epiphyseal vessels. At no point was the terminal vessel found between the capsule and the conjoined tendon. The medial femoral circumflex artery receives a direct supply from the inferior gluteal artery immediately before passing beneath the capsule of the hip. Detailed knowledge of this anatomy may help to explain the development of avascular necrosis after hip trauma, as well as to allow additional safe surgical exposure of the femoral neck and head.", "title": "" }, { "docid": "793cd937ea1fc91e73735b2b8246f1f5", "text": "Using data from a national probability sample of heterosexual U.S. adults (N02,281), the present study describes the distribution and correlates of men’s and women’s attitudes toward transgender people. Feeling thermometer ratings of transgender people were strongly correlated with attitudes toward gay men, lesbians, and bisexuals, but were significantly less favorable. Attitudes toward transgender people were more negative among heterosexual men than women. Negative attitudes were associated with endorsement of a binary conception of gender; higher levels of psychological authoritarianism, political conservatism, and anti-egalitarianism, and (for women) religiosity; and lack of personal contact with sexual minorities. In regression analysis, sexual prejudice accounted for much of the variance in transgender attitudes, but respondent gender, educational level, authoritarianism, anti-egalitarianism, and (for women) religiosity remained significant predictors with sexual prejudice statistically controlled. Implications and directions for future research on attitudes toward transgender people are discussed.", "title": "" } ]
scidocsrr
741db789cc170256224dc080ca2f1ba1
A Corpus for Modeling Word Importance in Spoken Dialogue Transcripts
[ { "docid": "8feb5dce809acf0efb63d322f0526fcf", "text": "Recent studies of eye movements in reading and other information processing tasks, such as music reading, typing, visual search, and scene perception, are reviewed. The major emphasis of the review is on reading as a specific example of cognitive processing. Basic topics discussed with respect to reading are (a) the characteristics of eye movements, (b) the perceptual span, (c) integration of information across saccades, (d) eye movement control, and (e) individual differences (including dyslexia). Similar topics are discussed with respect to the other tasks examined. The basic theme of the review is that eye movement data reflect moment-to-moment cognitive processes in the various tasks examined. Theoretical and practical considerations concerning the use of eye movement data are also discussed.", "title": "" }, { "docid": "d2bf33fcd8d1de5cca697ef97e774feb", "text": "The accuracy of Automated Speech Recognition (ASR) technology has improved, but it is still imperfect in many settings. Researchers who evaluate ASR performance often focus on improving the Word Error Rate (WER) metric, but WER has been found to have little correlation with human-subject performance on many applications. We propose a new captioning-focused evaluation metric that better predicts the impact of ASR recognition errors on the usability of automatically generated captions for people who are Deaf or Hard of Hearing (DHH). Through a user study with 30 DHH users, we compared our new metric with the traditional WER metric on a caption usability evaluation task. In a side-by-side comparison of pairs of ASR text output (with identical WER), the texts preferred by our new metric were preferred by DHH participants. Further, our metric had significantly higher correlation with DHH participants' subjective scores on the usability of a caption, as compared to the correlation between WER metric and participant subjective scores. This new metric could be used to select ASR systems for captioning applications, and it may be a better metric for ASR researchers to consider when optimizing ASR systems.", "title": "" } ]
[ { "docid": "6075b9f909a5df033d1222685d30b1dc", "text": "Recent advances in high-throughput cDNA sequencing (RNA-seq) can reveal new genes and splice variants and quantify expression genome-wide in a single assay. The volume and complexity of data from RNA-seq experiments necessitate scalable, fast and mathematically principled analysis software. TopHat and Cufflinks are free, open-source software tools for gene discovery and comprehensive expression analysis of high-throughput mRNA sequencing (RNA-seq) data. Together, they allow biologists to identify new genes and new splice variants of known ones, as well as compare gene and transcript expression under two or more conditions. This protocol describes in detail how to use TopHat and Cufflinks to perform such analyses. It also covers several accessory tools and utilities that aid in managing data, including CummeRbund, a tool for visualizing RNA-seq analysis results. Although the procedure assumes basic informatics skills, these tools assume little to no background with RNA-seq analysis and are meant for novices and experts alike. The protocol begins with raw sequencing reads and produces a transcriptome assembly, lists of differentially expressed and regulated genes and transcripts, and publication-quality visualizations of analysis results. The protocol's execution time depends on the volume of transcriptome sequencing data and available computing resources but takes less than 1 d of computer time for typical experiments and ∼1 h of hands-on time.", "title": "" }, { "docid": "72e4d7729031d63f96b686444c9b446e", "text": "In this paper we describe the fundamentals of affective gaming from a physiological point of view, covering some of the origins of the genre, how affective videogames operate and current conceptual and technological capabilities. We ground this overview of the ongoing research by taking an in-depth look at one of our own early biofeedback-based affective games. Based on our analysis of existing videogames and our own experience with affective videogames, we propose a new approach to game design based on several high-level design heuristics: assist me, challenge me and emote me (ACE), a series of gameplay \"tweaks\" made possible through affective videogames.", "title": "" }, { "docid": "cc3f47aba00cb986bdb8234f98726c57", "text": "Gender differences in brain development and in the prevalence of neuropsychiatric disorders such as depression have been reported. Gender differences in human brain might be related to patterns of gene expression. Microarray technology is one useful method for investigation of gene expression in brain. We investigated gene expression, cell types, and regional expression patterns of differentially expressed sex chromosome genes in brain. We profiled gene expression in male and female dorsolateral prefrontal cortex, anterior cingulate cortex, and cerebellum using the Affymetrix oligonucleotide microarray platform. Differentially expressed genes between males and females on the Y chromosome (DBY, SMCY, UTY, RPS4Y, and USP9Y) and X chromosome (XIST) were confirmed using real-time PCR measurements. In situ hybridization confirmed the differential expression of gender-specific genes and neuronal expression of XIST, RPS4Y, SMCY, and UTY in three brain regions examined. The XIST gene, which silences gene expression on regions of the X chromosome, is expressed in a subset of neurons. Since a subset of neurons express gender-specific genes, neural subpopulations may exhibit a subtle sexual dimorphism at the level of differences in gene regulation and function. The distinctive pattern of neuronal expression of XIST, RPS4Y, SMCY, and UTY and other sex chromosome genes in neuronal subpopulations may possibly contribute to gender differences in prevalence noted for some neuropsychiatric disorders. Studies of the protein expression of these sex-chromosome-linked genes in brain tissue are required to address the functional consequences of the observed gene expression differences.", "title": "" }, { "docid": "0a761fba9fa9246261ca7627ff6afe91", "text": "Compositing is one of the most commonly performed operations in computer graphics. A realistic composite requires adjusting the appearance of the foreground and background so that they appear compatible; unfortunately, this task is challenging and poorly understood. We use statistical and visual perception experiments to study the realism of image composites. First, we evaluate a number of standard 2D image statistical measures, and identify those that are most significant in determining the realism of a composite. Then, we perform a human subjects experiment to determine how the changes in these key statistics influence human judgements of composite realism. Finally, we describe a data-driven algorithm that automatically adjusts these statistical measures in a foreground to make it more compatible with its background in a composite. We show a number of compositing results, and evaluate the performance of both our algorithm and previous work with a human subjects study.", "title": "" }, { "docid": "723cf2a8b6142a7e52a0ff3fb74c3985", "text": "The Internet of Mobile Things (IoMT) requires support for a data lifecycle process ranging from sorting, cleaning and monitoring data streams to more complex tasks such as querying, aggregation, and analytics. Current solutions for stream data management in IoMT have been focused on partial aspects of a data lifecycle process, with special emphasis on sensor networks. This paper aims to address this problem by developing an offline and real-time data lifecycle process that incorporates a layered, data-flow centric, and an edge/cloud computing approach that is needed for handling heterogeneous, streaming and geographicallydispersed IoMT data streams. We propose an end to end architecture to support an instant intra-layer communication that establishes a stream data flow in real-time to respond to immediate data lifecycle tasks at the edge layer of the system. Our architecture also provides offline functionalities for later analytics and visualization of IoMT data streams at the core layer of the system. Communication and process are thus the defining factors in the design of our stream data management solution for IoMT. We describe and evaluate our prototype implementation using real-time transit data feeds and a commercial edge-based platform. Preliminary results are showing the advantages of running data lifecycle tasks at the edge of the network for reducing the volume of data streams that are redundant and should not be transported to the cloud. Keywords—stream data lifecycle, edge computing, cloud computing, Internet of Mobile Things, end to end architectures", "title": "" }, { "docid": "335847313ee670dc0648392c91d8567a", "text": "Several large scale data mining applications, such as text c ategorization and gene expression analysis, involve high-dimensional data that is also inherentl y directional in nature. Often such data is L2 normalized so that it lies on the surface of a unit hyperspher e. Popular models such as (mixtures of) multi-variate Gaussians are inadequate for characteri zing such data. This paper proposes a generative mixture-model approach to clustering directional data based on the von Mises-Fisher (vMF) distribution, which arises naturally for data distributed on the unit hypersphere. In particular, we derive and analyze two variants of the Expectation Maximiza tion (EM) framework for estimating the mean and concentration parameters of this mixture. Nume rical estimation of the concentration parameters is non-trivial in high dimensions since it i nvolves functional inversion of ratios of Bessel functions. We also formulate two clustering algorit hms corresponding to the variants of EM that we derive. Our approach provides a theoretical basis fo r the use of cosine similarity that has been widely employed by the information retrieval communit y, and obtains the spherical kmeans algorithm (kmeans with cosine similarity) as a special case of both variants. Empirical results on clustering of high-dimensional text and gene-expression d ata based on a mixture of vMF distributions show that the ability to estimate the concentration pa rameter for each vMF component, which is not present in existing approaches, yields superior resu lts, especially for difficult clustering tasks in high-dimensional spaces.", "title": "" }, { "docid": "07cfc30244cb9269861a7db9ad594ad4", "text": "In this paper we report on results from a cross-sectional survey with manufacturers in four typical Chinese industries, i.e., power generating, chemical/petroleum, electrical/electronic and automobile, to evaluate their perceived green supply chain management (GSCM) practices and relate them to closing the supply chain loop. Our findings provide insights into the capabilities of Chinese organizations on the adoption of GSCM practices in different industrial contexts and that these practices are not considered equitably across the four industries. Academic and managerial implications of our findings are discussed. 2006 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "5c01d28cd3b94c2eba7435ec08f323bf", "text": "Methods to overcome metal artifacts in computed tomography (CT) images have been researched and developed for nearly 40 years. When X-rays pass through a metal object, depending on its size and density, different physical effects will negatively affect the measurements, most notably beam hardening, scatter, noise, and the non-linear partial volume effect. These phenomena severely degrade image quality and hinder the diagnostic power and treatment outcomes in many clinical applications. In this paper, we first review the fundamental causes of metal artifacts, categorize metal object types, and present recent trends in the CT metal artifact reduction (MAR) literature. To improve image quality and recover information about underlying structures, many methods and correction algorithms have been proposed and tested. We comprehensively review and categorize these methods into six different classes of MAR: metal implant optimization, improvements to the data acquisition process, data correction based on physics models, modifications to the reconstruction algorithm (projection completion and iterative reconstruction), and image-based post-processing. The primary goals of this paper are to identify the strengths and limitations of individual MAR methods and overall classes, and establish a relationship between types of metal objects and the classes that most effectively overcome their artifacts. The main challenges for the field of MAR continue to be cases with large, dense metal implants, as well as cases with multiple metal objects in the field of view. Severe photon starvation is difficult to compensate for with only software corrections. Hence, the future of MAR seems to be headed toward a combined approach of improving the acquisition process with dual-energy CT, higher energy X-rays, or photon-counting detectors, along with advanced reconstruction approaches. Additional outlooks are addressed, including the need for a standardized evaluation system to compare MAR methods.", "title": "" }, { "docid": "a431c8c717fd4452a9654e59c6974031", "text": "While advances in genome sequencing technology make population-scale genomics a possibility, current approaches for analysis of these data rely upon parallelization strategies that have limited scalability, complex implementation and lack reproducibility. Churchill, a balanced regional parallelization strategy, overcomes these challenges, fully automating the multiple steps required to go from raw sequencing reads to variant discovery. Through implementation of novel deterministic parallelization techniques, Churchill allows computationally efficient analysis of a high-depth whole genome sample in less than two hours. The method is highly scalable, enabling full analysis of the 1000 Genomes raw sequence dataset in a week using cloud resources. http://churchill.nchri.org/ .", "title": "" }, { "docid": "91d3008dcd6c351d6cc0187c59cad8df", "text": "Peer-to-peer markets such as eBay, Uber, and Airbnb allow small suppliers to compete with traditional providers of goods or services. We view the primary function of these markets as making it easy for buyers to …nd sellers and engage in convenient, trustworthy transactions. We discuss elements of market design that make this possible, including search and matching algorithms, pricing, and reputation systems. We then develop a simple model of how these markets enable entry by small or ‡exible suppliers, and the resulting impact on existing …rms. Finally, we consider the regulation of peer-to-peer markets, and the economic arguments for di¤erent approaches to licensing and certi…cation, data and employment regulation. We appreciate support from the National Science Foundation, the Stanford Institute for Economic Policy Research, the Toulouse Network on Information Technology, and the Alfred P. Sloan Foundation. yEinav and Levin: Department of Economics, Stanford University and NBER. Farronato: Harvard Business School. Email: leinav@stanford.edu, chiarafarronato@gmail.com, jdlevin@stanford.edu.", "title": "" }, { "docid": "62d3ed4ab5baeea14ccf93ae1b064dda", "text": "Many challenges are associated with the integration of geographic information systems (GISs) with models in specific applications. One of them is adapting models to the environment of GISs. Unique aspects of water resource management problems require a special approach to development of GIS data structures. Expanded development of GIS applications for handling water resources management analysis can be assisted by use of an object oriented approach. In this paper, we model a river basin water allocation problem as a collection of spatial and thematic objects. A conceptual GIS data model is formulated to integrate the physical and logical components of the modeling problem into an operational framework, based on which, extended GIS functions are developed to implement a tight linkage between the GIS and the water resources management model. Through the object-oriented approach, data, models and users interfaces are integrated in the GIS environment, creating great flexibility for modeling and analysis. The concept and methodology described in this paper is also applicable to connecting GIS with models in other fields that have a spatial dimension and hence to which GIS can provide a powerful additional component of the modeler’s tool kit.  2002 Elsevier Science Ltd. All rights reserved.", "title": "" }, { "docid": "3fb2879369216d47d5462db09be970a8", "text": "Automatic synthesis of digital circuits has played a key role in obtaining high-performance designs. While considerable work has been done in the past, emerging device technologies call for a need to re-examine the synthesis approaches, so that better circuits that harness the true power of these technologies can be developed. This paper presents a methodology for synthesis applicable to devices that support ternary logic. We present an algorithm for synthesis that combines a geometrical representation with unary operators of multivalued logic. The geometric representation facilitates scanning appropriately to obtain simple sum-of-products expressions in terms of unary operators. An implementation based on Python is described. The power of the approach lies in its applicability to a wide variety of circuits. The proposed approach leads to the savings of 26% and 22% in transistor-count, respectively, for a ternary full-adder and a ternary content-addressable memory (TCAM) over the best existing designs. Furthermore, the proposed approach requires, on an average, less than 10% of the number of the transistors in comparison with a recent decoder-based design for various ternary benchmark circuits. Extensive HSPICE simulation results show roughly 92% reduction in power-delay product (PDP) for a $12\\times 12$ TCAM and 60% reduction in PDP for a 24-ternary digit barrel shifter over recent designs.", "title": "" }, { "docid": "08dab42f86183ffcdcca88735525bddd", "text": "Do GANS (Generative Adversarial Nets) actually learn the target distribution? The foundational paper of (Goodfellow et al 2014) suggested they do, if they were given “sufficiently large” deep nets, sample size, and computation time. A recent theoretical analysis in Arora et al (to appear at ICML 2017) raised doubts whether the same holds when discriminator has finite size. It showed that the training objective can approach its optimum value even if the generated distribution has very low support —in other words, the training objective is unable to prevent mode collapse. The current note reports experiments suggesting that such problems are not merely theoretical. It presents empirical evidence that well-known GANs approaches do learn distributions of fairly low support, and thus presumably are not learning the target distribution. The main technical contribution is a new proposed test, based upon the famous birthday paradox, for estimating the support size of the generated distribution.", "title": "" }, { "docid": "aa6502972088385f0d72d5744f43779f", "text": "We are living in a cyber space with an unprecedented rapid expansion of the space and its elements. All interactive information is processed and exchanged via this space. Clearly a well-built cyber security is vital to ensure the security of the cyber space. However the definitions and scopes of both cyber space and cyber security are still not well-defined and this makes it difficult to establish sound security models and mechanisms for protecting this space. Out of existing models, maturity models offer a manageable approach for assessing the security level of a system or organization. The paper first provides a review of various definitions of cyber space and cyber security in order to ascertain a common understanding of the space and its security. The paper investigates existing security maturity models, focusing on their defining characteristics and identifying their strengths and weaknesses. Finally, the paper discusses and suggests measures for a sound and applicable cyber security model.", "title": "" }, { "docid": "e0807a0ee11caa23207d3eb7da6c87b4", "text": "Considering recent advancements and successes in the development of efficient quantum algorithms for electronic structure calculations-alongside impressive results using machine learning techniques for computation-hybridizing quantum computing with machine learning for the intent of performing electronic structure calculations is a natural progression. Here we report a hybrid quantum algorithm employing a restricted Boltzmann machine to obtain accurate molecular potential energy surfaces. By exploiting a quantum algorithm to help optimize the underlying objective function, we obtained an efficient procedure for the calculation of the electronic ground state energy for a small molecule system. Our approach achieves high accuracy for the ground state energy for H2, LiH, H2O at a specific location on its potential energy surface with a finite basis set. With the future availability of larger-scale quantum computers, quantum machine learning techniques are set to become powerful tools to obtain accurate values for electronic structures.", "title": "" }, { "docid": "4260077a3a48f3ed2a71208e2dd68924", "text": "Algorithmic image-based diagnosis and prognosis of neurodegenerative diseases on longitudinal data has drawn great interest from computer vision researchers. The current state-of-the-art models for many image classification tasks are based on the Convolutional Neural Networks (CNN). However, a key challenge in applying CNN to biological problems is that the available labeled training samples are very limited. Another issue for CNN to be applied in computer aided diagnosis applications is that to achieve better diagnosis and prognosis accuracy, one usually has to deal with the longitudinal dataset, i.e., the dataset of images scanned at different time points. Here we argue that an enhanced CNN model with transfer learning for the joint analysis of tasks from multiple time points or regions of interests may have a potential to improve the accuracy of computer aided diagnosis. To reach this goal, we innovate a CNN based deep learning multi-task dictionary learning framework to address the above challenges. Firstly, we pretrain CNN on the ImageNet dataset and transfer the knowledge from the pre-trained model to the medical imaging progression representation, generating the features for different tasks. Then, we propose a novel unsupervised learning method, termed Multi-task Stochastic Coordinate Coding (MSCC), for learning different tasks by using shared and individual dictionaries and generating the sparse features required to predict the future cognitive clinical scores. We apply our new model in a publicly available neuroimaging cohort to predict clinical measures with two different feature sets and compare them with seven other state-of-theart methods. The experimental results show our proposed method achieved superior results.", "title": "" }, { "docid": "af271bf4b478d6b46d53d9df716d75ee", "text": "The mobile technology is an ever evolving concept. The world has seen various generations of mobile technology be it 1G, 2G, 3G or 4G. The fifth generation of mobile technology i.e. 5G is seen as a futuristic notion that would help in solving the issues that are pertaining in the 4G. In this paper we have discussed various security issues of 4G with respect to Wi-max and long term evolution. These issues are discussed at MAC and physical layer level. The security issues are seen in terms of possible attacks, system vulnerabilities and privacy concerns. We have also highlighted how the notions of 5G can be tailored to provide a more secure mobile computing environment. We have considered the futuristic architectural framework for 5G networks in our discussion. The basic concepts and features of the fifth generation technology are explained here. We have also analyzed five pillars of strength for the 5G network security which would work in collaboration with each other to provide a secure mobile computing environment to the user.", "title": "" }, { "docid": "a53065d1cfb1fe898182d540d65d394b", "text": "This paper presents a novel approach for detecting affine invariant interest points. Our method can deal with significant affine transformations including large scale changes. Such transformations introduce significant changes in the point location as well as in the scale and the shape of the neighbourhood of an interest point. Our approach allows to solve for these problems simultaneously. It is based on three key ideas : 1) The second moment matrix computed in a point can be used to normalize a region in an affine invariant way (skew and stretch). 2) The scale of the local structure is indicated by local extrema of normalized derivatives over scale. 3) An affine-adapted Harris detector determines the location of interest points. A multi-scale version of this detector is used for initialization. An iterative algorithm then modifies location, scale and neighbourhood of each point and converges to affine invariant points. For matching and recognition, the image is characterized by a set of affine invariant points ; the affine transformation associated with each point allows the computation of an affine invariant descriptor which is also invariant to affine illumination changes. A quantitative comparison of our detector with existing ones shows a significant improvement in the presence of large affine deformations. Experimental results for wide baseline matching show an excellent performance in the presence of large perspective transformations including significant scale changes. Results for recognition are very good for a database with more than 5000 images.", "title": "" }, { "docid": "154f19af2518b8e4cd197847214c2410", "text": "This paper presents a generalized i-vector framework with phonetic tokenizations and tandem features for speaker verification as well as language identification. First, the tokens for calculating the zero-order statistics is extended from the MFCC trained Gaussian Mixture Models (GMM) components to phonetic phonemes, 3-grams and tandem feature trained GMM components using phoneme posterior probabilities. Second, given the calculated zero-order statistics (posterior probabilities on tokens), the feature used to calculate the first-order statistics is also extended from MFCC to tandem features and is not necessarily the same feature employed by the tokenizer. Third, the zero-order and first-order statistics vectors are then concatenated and represented by the simplified supervised i-vector approach followed by the standard back end modeling methods. We study different system setups with different tokens and features. Finally, selected effective systems are fused at the score level to further improve the performance. Experimental results are reported on the NIST SRE 2010 common condition 5 female part task and the NIST LRE 2007 closed set 30 seconds task for speaker verification and language identification, respectively. The proposed generalized i-vector framework outperforms the i-vector baseline by relatively 45% in terms of equal error rate (EER) and norm minDCF values.", "title": "" }, { "docid": "79263437dad5927ce3615edd36ca1eab", "text": "This paper gives an insight on how to develop plug-ins (signal processing blocks) for GNU Radio Companion. GRC is on the monitoring computer and does bulk of the signal processing before transmission and after reception. The coding done in order to develop any block is discussed. A block that performs Huffman coding has been built. Huffman coding is a coding technique that gives a prefix code. A block that performs convolution coding at any desired rate using any generator polynomial has also been built. Both Huffman and Convolution coding are done on data stored in file sources by these blocks. This paper thus describes the ease of signal processing that can be attained by developing blocks in demand by changing the C++ and PYTHON codes of the HOWTO package. Being an open source it is available to all, is highly cost effective and is a field with great potential.", "title": "" } ]
scidocsrr
2927f32f5913f7465b8d919564467387
Ensuring rigour and trustworthiness of qualitative research in clinical pharmacy
[ { "docid": "fd5f48aebc8fba354137dadb445846bc", "text": "BACKGROUND\nThe syntheses of multiple qualitative studies can pull together data across different contexts, generate new theoretical or conceptual models, identify research gaps, and provide evidence for the development, implementation and evaluation of health interventions. This study aims to develop a framework for reporting the synthesis of qualitative health research.\n\n\nMETHODS\nWe conducted a comprehensive search for guidance and reviews relevant to the synthesis of qualitative research, methodology papers, and published syntheses of qualitative health research in MEDLINE, Embase, CINAHL and relevant organisational websites to May 2011. Initial items were generated inductively from guides to synthesizing qualitative health research. The preliminary checklist was piloted against forty published syntheses of qualitative research, purposively selected to capture a range of year of publication, methods and methodologies, and health topics. We removed items that were duplicated, impractical to assess, and rephrased items for clarity.\n\n\nRESULTS\nThe Enhancing transparency in reporting the synthesis of qualitative research (ENTREQ) statement consists of 21 items grouped into five main domains: introduction, methods and methodology, literature search and selection, appraisal, and synthesis of findings.\n\n\nCONCLUSIONS\nThe ENTREQ statement can help researchers to report the stages most commonly associated with the synthesis of qualitative health research: searching and selecting qualitative research, quality appraisal, and methods for synthesising qualitative findings. The synthesis of qualitative research is an expanding and evolving methodological area and we would value feedback from all stakeholders for the continued development and extension of the ENTREQ statement.", "title": "" } ]
[ { "docid": "39007b91989c42880ff96e7c5bdcf519", "text": "Feature selection has aroused considerable research interests during the last few decades. Traditional learning-based feature selection methods separate embedding learning and feature ranking. In this paper, we propose a novel unsupervised feature selection framework, termed as the joint embedding learning and sparse regression (JELSR), in which the embedding learning and sparse regression are jointly performed. Specifically, the proposed JELSR joins embedding learning with sparse regression to perform feature selection. To show the effectiveness of the proposed framework, we also provide a method using the weight via local linear approximation and adding the ℓ2,1-norm regularization, and design an effective algorithm to solve the corresponding optimization problem. Furthermore, we also conduct some insightful discussion on the proposed feature selection approach, including the convergence analysis, computational complexity, and parameter determination. In all, the proposed framework not only provides a new perspective to view traditional methods but also evokes some other deep researches for feature selection. Compared with traditional unsupervised feature selection methods, our approach could integrate the merits of embedding learning and sparse regression. Promising experimental results on different kinds of data sets, including image, voice data and biological data, have validated the effectiveness of our proposed algorithm.", "title": "" }, { "docid": "9e05a37d781d8a3ee0ecca27510f1ae9", "text": "Context: Evidence-based software engineering (EBSE) provides a process for solving practical problems based on a rigorous research approach. The primary focus so far was on mapping and aggregating evidence through systematic reviews. Objectives: We extend existing work on evidence-based software engineering by using the EBSE process in an industrial case to help an organization to improve its automotive testing process. With this we contribute in (1) providing experiences on using evidence based processes to analyze a real world automotive test process; and (2) provide evidence of challenges and related solutions for automotive software testing processes. Methods: In this study we perform an in-depth investigation of an automotive test process using an extended EBSE process including case study research (gain an understanding of practical questions to define a research scope), systematic literature review (identify solutions through systematic literature), and value stream mapping (map out an improved automotive test process based on the current situation and improvement suggestions identified). These are followed by reflections on the EBSE process used. Results: In the first step of the EBSE process we identified 10 challenge areas with a total of 26 individual challenges. For 15 out of those 26 challenges our domain specific systematic literature review identified solutions. Based on the input from the challenges and the solutions, we created a value stream map of the current and future process. Conclusions: Overall, we found that the evidence-based process as presented in this study helps in technology transfer of research results to industry, but at the same time some challenges lie ahead (e.g. scoping systematic reviews to focus more on concrete industry problems, and understanding strategies of conducting EBSE with respect to effort and quality of the evidence).", "title": "" }, { "docid": "d974b1ffafd9ad738303514f28a770b9", "text": "We introduce a new algorithm for reinforcement learning called Maximum aposteriori Policy Optimisation (MPO) based on coordinate ascent on a relativeentropy objective. We show that several existing methods can directly be related to our derivation. We develop two off-policy algorithms and demonstrate that they are competitive with the state-of-the-art in deep reinforcement learning. In particular, for continuous control, our method outperforms existing methods with respect to sample efficiency, premature convergence and robustness to hyperparameter settings.", "title": "" }, { "docid": "f8bebcf8d9b544c82af547865672b06a", "text": "An instance with a bad mask might make a composite image that uses it look fake. This encourages us to learn segmentation by generating realistic composite images. To achieve this, we propose a novel framework that exploits a new proposed prior called the independence prior based on Generative Adversarial Networks (GANs). The generator produces an image with multiple category-specific instance providers, a layout module and a composition module. Firstly, each provider independently outputs a category-specific instance image with a soft mask. Then the provided instances’ poses are corrected by the layout module. Lastly, the composition module combines these instances into a final image. Training with adversarial loss and penalty for mask area, each provider learns a mask that is as small as possible but enough to cover a complete category-specific instance. Weakly supervised semantic segmentation methods widely use grouping cues modeling the association between image parts, which are either artificially designed or learned with costly segmentation labels or only modeled on local pairs. Unlike them, our method automatically models the dependence between any parts and learns instance segmentation. We apply our framework in two cases: (1) Foreground segmentation on category-specific images with box-level annotation. (2) Unsupervised learning of instance appearances and masks with only one image of homogeneous object cluster (HOC). We get appealing results in both tasks, which shows the independence prior is useful for instance segmentation and it is possible to unsupervisedly learn instance masks with only one image.", "title": "" }, { "docid": "070a1de608a35cddb69b84d5f081e94d", "text": "Identifying potentially vulnerable locations in a code base is critical as a pre-step for effective vulnerability assessment; i.e., it can greatly help security experts put their time and effort to where it is needed most. Metric-based and pattern-based methods have been presented for identifying vulnerable code. The former relies on machine learning and cannot work well due to the severe imbalance between non-vulnerable and vulnerable code or lack of features to characterize vulnerabilities. The latter needs the prior knowledge of known vulnerabilities and can only identify similar but not new types of vulnerabilities. In this paper, we propose and implement a generic, lightweight and extensible framework, LEOPARD, to identify potentially vulnerable functions through program metrics. LEOPARD requires no prior knowledge about known vulnerabilities. It has two steps by combining two sets of systematically derived metrics. First, it uses complexity metrics to group the functions in a target application into a set of bins. Then, it uses vulnerability metrics to rank the functions in each bin and identifies the top ones as potentially vulnerable. Our experimental results on 11 real-world projects have demonstrated that, LEOPARD can cover 74.0% of vulnerable functions by identifying 20% of functions as vulnerable and outperform machine learning-based and static analysis-based techniques. We further propose three applications of LEOPARD for manual code review and fuzzing, through which we discovered 22 new bugs in real applications like PHP, radare2 and FFmpeg, and eight of them are new vulnerabilities.", "title": "" }, { "docid": "d48ea163dd0cd5d80ba95beecee5102d", "text": "Foodborne pathogens (FBP) represent an important threat to the consumers' health as they are able to cause different foodborne diseases. In order to eliminate the potential risk of those pathogens, lactic acid bacteria (LAB) have received a great attention in the food biotechnology sector since they play an essential function to prevent bacterial growth and reduce the biogenic amines (BAs) formation. The foodborne illnesses (diarrhea, vomiting, and abdominal pain, etc.) caused by those microbial pathogens is due to various reasons, one of them is related to the decarboxylation of available amino acids that lead to BAs production. The formation of BAs by pathogens in foods can cause the deterioration of their nutritional and sensory qualities. BAs formation can also have toxicological impacts and lead to different types of intoxications. The growth of FBP and their BAs production should be monitored and prevented to avoid such problems. LAB is capable of improving food safety by preventing foods spoilage and extending their shelf-life. LAB are utilized by the food industries to produce fermented products with their antibacterial effects as bio-preservative agents to extent their storage period and preserve their nutritive and gustative characteristics. Besides their contribution to the flavor for fermented foods, LAB secretes various antimicrobial substances including organic acids, hydrogen peroxide, and bacteriocins. Consequently, in this paper, the impact of LAB on the growth of FBP and their BAs formation in food has been reviewed extensively.", "title": "" }, { "docid": "9ad040dc3a1bcd498436772768903525", "text": "Memory B and plasma cells (PCs) are generated in the germinal center (GC). Because follicular helper T cells (TFH cells) have high expression of the immunoinhibitory receptor PD-1, we investigated the role of PD-1 signaling in the humoral response. We found that the PD-1 ligands PD-L1 and PD-L2 were upregulated on GC B cells. Mice deficient in PD-L2 (Pdcd1lg2−/−), PD-L1 and PD-L2 (Cd274−/−Pdcd1lg2−/−) or PD-1 (Pdcd1−/−) had fewer long-lived PCs. The mechanism involved more GC cell death and less TFH cell cytokine production in the absence of PD-1; the effect was selective, as remaining PCs had greater affinity for antigen. PD-1 expression on T cells and PD-L2 expression on B cells controlled TFH cell and PC numbers. Thus, PD-1 regulates selection and survival in the GC, affecting the quantity and quality of long-lived PCs.", "title": "" }, { "docid": "0f4ac688367d3ea43643472b7d75ffc9", "text": "Many non-photorealistic rendering techniques exist to produce artistic ef fe ts from given images. Inspired by various artists, interesting effects can be produced b y using a minimal rendering, where the minimum refers to the number of tones as well as the nu mber and complexity of the primitives used for rendering. Our method is based on va rious computer vision techniques, and uses a combination of refined lines and blocks (po tentially simplified), as well as a small number of tones, to produce abstracted artistic re ndering with sufficient elements from the original image. We also considered a variety of methods to produce different artistic styles, such as colour and two-tone drawing s, and use semantic information to improve renderings for faces. By changing some intuitive par ameters a wide range of visually pleasing results can be produced. Our method is fully automatic. We demonstrate the effectiveness of our method with extensive experiments and a user study.", "title": "" }, { "docid": "754fb355da63d024e3464b4656ea5e8d", "text": "Improvements in implant designs have helped advance successful immediate anterior implant placement into fresh extraction sockets. Clinical techniques described in this case enable practitioners to achieve predictable esthetic success using a method that limits the amount of buccal contour change of the extraction site ridge and potentially enhances the thickness of the peri-implant soft tissues coronal to the implant-abutment interface. This approach involves atraumatic tooth removal without flap elevation, and placing a bone graft into the residual gap around an immediate fresh-socket anterior implant with a screw-retained provisional restoration acting as a prosthetic socket seal device.", "title": "" }, { "docid": "67989a9fe9d56e27eb42ca867a919a7d", "text": "Data remanence is the residual physical representation of data that has been erased or overwritten. In non-volatile programmable devices, such as UV EPROM, EEPROM or Flash, bits are stored as charge in the floating gate of a transistor. After each erase operation, some of this charge remains. Security protection in microcontrollers and smartcards with EEPROM/Flash memories is based on the assumption that information from the memory disappears completely after erasing. While microcontroller manufacturers successfully hardened already their designs against a range of attacks, they still have a common problem with data remanence in floating-gate transistors. Even after an erase operation, the transistor does not return fully to its initial state, thereby allowing the attacker to distinguish between previously programmed and not programmed transistors, and thus restore information from erased memory. The research in this direction is summarised here and it is shown how much information can be extracted from some microcontrollers after their memory has been ‘erased’.", "title": "" }, { "docid": "00e13bca1066e54907394b75cb40d0c0", "text": "This paper explores educational uses of virtual learning environment (VLE) concerned with issues of learning, training and entertainment. We analyze the state-of-art research of VLE based on virtual reality and augmented reality. Some examples for the purpose of education and simulation are described. These applications show that VLE can be means of enhancing, motivating and stimulating learners’ understanding of certain events, especially those for which the traditional notion of instructional learning have proven inappropriate or difficult. Furthermore, the users can learn in a quick and happy mode by playing in the virtual environments. r 2005 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "08c9a049c5f22c7d83a2e6d29982a3cc", "text": "Unsupervised image segmentation is an important component in many image understanding algorithms and practical vision systems. However, evaluation of segmentation algorithms thus far has been largely subjective, leaving a system designer to judge the effectiveness of a technique based only on intuition and results in the form of a few example segmented images. This is largely due to image segmentation being an ill-defined problem-there is no unique ground-truth segmentation of an image against which the output of an algorithm may be compared. This paper demonstrates how a recently proposed measure of similarity, the normalized probabilistic rand (NPR) index, can be used to perform a quantitative comparison between image segmentation algorithms using a hand-labeled set of ground-truth segmentations. We show that the measure allows principled comparisons between segmentations created by different algorithms, as well as segmentations on different images. We outline a procedure for algorithm evaluation through an example evaluation of some familiar algorithms - the mean-shift-based algorithm, an efficient graph-based segmentation algorithm, a hybrid algorithm that combines the strengths of both methods, and expectation maximization. Results are presented on the 300 images in the publicly available Berkeley segmentation data set", "title": "" }, { "docid": "3bfb0d2304880065227c4563c6646ce1", "text": "We propose an automatic video inpainting algorithm which relies on the optimisation of a global, patch-based functional. Our algorithm is able to deal with a variety of challenging situations which naturally arise in video inpainting, such as the correct reconstruction of dynamic textures, multiple moving objects and moving background. Furthermore, we achieve this in an order of magnitude less execution time with respect to the state-of-the-art. We are also able to achieve good quality results on high definition videos. Finally, we provide specific algorithmic details to make implementation of our algorithm as easy as possible. The resulting algorithm requires no segmentation or manual input other than the definition of the inpainting mask, and can deal with a wider variety of situations than is handled by previous work.", "title": "" }, { "docid": "6d44c4244064634deda30a5059acd87e", "text": "Currently, gene sequence genealogies of the Oligotrichea Bütschli, 1889 comprise only few species. Therefore, a cladistic approach, especially to the Oligotrichida, was made, applying Hennig's method and computer programs. Twenty-three characters were selected and discussed, i.e., the morphology of the oral apparatus (five characters), the somatic ciliature (eight characters), special organelles (four characters), and ontogenetic particulars (six characters). Nine of these characters developed convergently twice. Although several new features were included into the analyses, the cladograms match other morphological trees in the monophyly of the Oligotrichea, Halteriia, Oligotrichia, Oligotrichida, and Choreotrichida. The main synapomorphies of the Oligotrichea are the enantiotropic division mode and the de novo-origin of the undulating membranes. Although the sister group relationship of the Halteriia and the Oligotrichia contradicts results obtained by gene sequence analyses, no morphologic, ontogenetic or ultrastructural features were found, which support a branching of Halteria grandinella within the Stichotrichida. The cladistic approaches suggest paraphyly of the family Strombidiidae probably due to the scarce knowledge. A revised classification of the Oligotrichea is suggested, including all sufficiently known families and genera.", "title": "" }, { "docid": "4c30af9dd05b773ce881a312bcad9cb9", "text": "This review summarized various chemical recycling methods for PVC, such as pyrolysis, catalytic dechlorination and hydrothermal treatment, with a view to solving the problem of energy crisis and the impact of environmental degradation of PVC. Emphasis was paid on the recent progress on the pyrolysis of PVC, including co-pyrolysis of PVC with biomass/coal and other plastics, catalytic dechlorination of raw PVC or Cl-containing oil and hydrothermal treatment using subcritical and supercritical water. Understanding the advantage and disadvantage of these treatment methods can be beneficial for treating PVC properly. The dehydrochlorination of PVC mainly happed at low temperature of 250-320°C. The process of PVC dehydrochlorination can catalyze and accelerate the biomass pyrolysis. The intermediates from dehydrochlorination stage of PVC can increase char yield of co-pyrolysis of PVC with PP/PE/PS. For the catalytic degradation and dechlorination of PVC, metal oxides catalysts mainly acted as adsorbents for the evolved HCl or as inhibitors of HCl formation depending on their basicity, while zeolites and noble metal catalysts can produce lighter oil, depending the total number of acid sites and the number of accessible acidic sites. For hydrothermal treatment, PVC decomposed through three stages. In the first region (T<250°C), PVC went through dehydrochlorination to form polyene; in the second region (250°C<T<350°C), polyene decomposed to low-molecular weight compounds; in the third region (350°C<T), polyene further decomposed into a large amount of low-molecular weight compounds.", "title": "" }, { "docid": "0d8cb05f7ba3840e558247b4ee70dff6", "text": "Even though information visualization (InfoVis) research has matured in recent years, it is generally acknowledged that the field still lacks supporting, encompassing theories. In this paper, we argue that the distributed cognition framework can be used to substantiate the theoretical foundation of InfoVis. We highlight fundamental assumptions and theoretical constructs of the distributed cognition approach, based on the cognitive science literature and a real life scenario. We then discuss how the distributed cognition framework can have an impact on the research directions and methodologies we take as InfoVis researchers. Our contributions are as follows. First, we highlight the view that cognition is more an emergent property of interaction than a property of the human mind. Second, we argue that a reductionist approach to study the abstract properties of isolated human minds may not be useful in informing InfoVis design. Finally we propose to make cognition an explicit research agenda, and discuss the implications on how we perform evaluation and theory building.", "title": "" }, { "docid": "0ce92d47fdde4c7a12d34bffc30e3e62", "text": "Financial technology (Fintech) service has recently become the focus of considerable attention. Although many researchers and practitioners believe that Fintech can reshape the future of the financial services industry, others are skeptical about the adoption of Fintech because of the considerable risks involved. Therefore, we need to better understand why users are willing or hesitant to adopt Fintech, wherein, positive and negative factors affect their adoption decision. Based on the net valence framework theoretically embedded in theory of reasoned action, we propose a benefit-risk framework which integrates positive and negative factors associated with its adoption. Based on the empirical data collected from 244 Fintech users, this study initially investigates whether perceived benefit and risk significantly impact Fintech adoption intention. We then examine whether the effect of perceived benefit and risk on Fintech adoption intention differs depending on the user types. Results show that legal risk has the biggest negative effect, whereas convenience has the strongest positive effect on Fintech adoption intention. The differences between early adopters and late adopters are driven by different factors.", "title": "" }, { "docid": "dce1e76671789752cf5e6914e2acbf47", "text": "Powered exoskeletons can facilitate rehabilitation of patients with upper limb disabilities. Designs using rotary motors usually result in bulky exoskeletons to reduce the problem of moving inertia. This paper presents a new linearly actuated elbow exoskeleton that consists of a slider crank mechanism and a linear motor. The linear motor is placed beside the upper arm and closer to shoulder joint. Thus better inertia properties can be achieved while lightweight and compactness are maintained. A passive joint is introduced to compensate for the exoskeleton-elbow misalignment and intersubject size variation. A linear series elastic actuator (SEA) is proposed to obtain accurate force and impedance control at the exoskeleton-elbow interface. Bidirectional actuation between exoskeleton and forearm is verified, which is required for various rehabilitation processes. We expect this exoskeleton can provide a means of robot-aided elbow rehabilitation.", "title": "" }, { "docid": "1f278ddc0d643196ff584c7ea82dc89b", "text": "We consider an approximate version of a fundamental geometric search problem, polytope membership queries. Given a convex polytope P in REd, presented as the intersection of halfspaces, the objective is to preprocess P so that, given a query point q, it is possible to determine efficiently whether q lies inside P subject to an error bound ε. Previous solutions to this problem were based on straightforward applications of classic polytope approximation techniques by Dudley (1974) and Bentley et al. (1982). The former yields minimum storage, and the latter yields constant query time. A space-time tradeoff can be obtained by interpolating between the two. We present the first significant improvements to this tradeoff. For example, using the same storage as Dudley, we reduce the query time from O(1/ε(d-1)/2) to O(1/ε(d-1)/4). Our approach is based on a very simple algorithm. Both lower bounds and upper bounds on the performance of the algorithm are presented.\n To establish the relevance of our results, we introduce a reduction from approximate nearest neighbor searching to approximate polytope membership queries. We show that our tradeoff provides significant improvements to the best known space-time tradeoffs for approximate nearest neighbor searching. Furthermore, this is achieved with constructions that are much simpler than existing methods.", "title": "" } ]
scidocsrr
7194785b2bc4d2392b94316cef85b9d5
GSET somi: a game-specific eye tracking dataset for somi
[ { "docid": "825b567c1a08d769aa334b707176f607", "text": "A critical function in both machine vision and biological vision systems is attentional selection of scene regions worthy of further analysis by higher-level processes such as object recognition. Here we present the first model of spatial attention that (1) can be applied to arbitrary static and dynamic image sequences with interactive tasks and (2) combines a general computational implementation of both bottom-up (BU) saliency and dynamic top-down (TD) task relevance; the claimed novelty lies in the combination of these elements and in the fully computational nature of the model. The BU component computes a saliency map from 12 low-level multi-scale visual features. The TD component computes a low-level signature of the entire image, and learns to associate different classes of signatures with the different gaze patterns recorded from human subjects performing a task of interest. We measured the ability of this model to predict the eye movements of people playing contemporary video games. We found that the TD model alone predicts where humans look about twice as well as does the BU model alone; in addition, a combined BU*TD model performs significantly better than either individual component. Qualitatively, the combined model predicts some easy-to-describe but hard-to-compute aspects of attentional selection, such as shifting attention leftward when approaching a left turn along a racing track. Thus, our study demonstrates the advantages of integrating BU factors derived from a saliency map and TD factors learned from image and task contexts in predicting where humans look while performing complex visually-guided behavior.", "title": "" } ]
[ { "docid": "a1b98a7a689e4972808ccae4dc26ac52", "text": "Person re-identification is generally divided into two part: first how to represent a pedestrian by discriminative visual descriptors and second how to compare them by suitable distance metrics. Conventional methods isolate these two parts, the first part usually unsupervised and the second part supervised. The Bag-of-Words (BoW) model is a widely used image representing descriptor in part one. Its codebook is simply generated by clustering visual features in Euclidian space. In this paper, we propose to use part two metric learning techniques in the codebook generation phase of BoW. In particular, the proposed codebook is clustered under Mahalanobis distance which is learned supervised. Extensive experiments prove that our proposed method is effective. With several low level features extracted on superpixel and fused together, our method outperforms state-of-the-art on person re-identification benchmarks including VIPeR, PRID450S, and Market1501.", "title": "" }, { "docid": "348702d85126ed64ca24bdc62c1146d9", "text": "Autonomous Vehicles are currently being tested in a variety of scenarios. As we move towards Autonomous Vehicles, how should intersections look? To answer that question, we break down an intersection management into the different conundrums and scenarios involved in the trajectory planning and current approaches to solve them. Then, a brief analysis of current works in autonomous intersection is conducted. With a critical eye, we try to delve into the discrepancies of existing solutions while presenting some critical and important factors that have been addressed. Furthermore, open issues that have to be addressed are also emphasized. We also try to answer the question of how to benchmark intersection management algorithms by providing some factors that impact autonomous navigation at intersection.", "title": "" }, { "docid": "0b3e7b6b47f51dc75c99f59e3aa79b52", "text": "This brief presents a frequency-domain analysis of the latch comparator offset due to load capacitor mismatch. Although the analysis is applied to the static latch comparator, the developed method can be extended to the dynamic latch comparator.", "title": "" }, { "docid": "6154efdd165c7323c1ba9ec48e63cfc6", "text": "A RANSAC based procedure is described for detecting inliers corresponding to multiple models in a given set of data points. The algorithm we present in this paper (called multiRANSAC) on average performs better than traditional approaches based on the sequential application of a standard RANSAC algorithm followed by the removal of the detected set of inliers. We illustrate the effectiveness of our approach on a synthetic example and apply it to the problem of identifying multiple world planes in pairs of images containing dominant planar structures.", "title": "" }, { "docid": "ce95a757725fe5cff0443e4a29214390", "text": "Logistic regression is a popular technique used in machine learning to construct classification models. Since the construction of such models is based on computing with large datasets, it is an appealing idea to outsource this computation to a cloud service. The privacy-sensitive nature of the input data requires appropriate privacy preserving measures before outsourcing it. Homomorphic encryption enables one to compute on encrypted data directly, without decryption and can be used to mitigate the privacy concerns raised by using a cloud service. In this paper, we propose an algorithm (and its implementation) to train a logistic regression model on a homomorphically encrypted dataset. The core of our algorithm consists of a new iterative method that can be seen as a simplified form of the fixed Hessian method, but with a much lower multiplicative complexity. We test the new method on two interesting real life applications: the first application is in medicine and constructs a model to predict the probability for a patient to have cancer, given genomic data as input; the second application is in finance and the model predicts the probability of a credit card transaction to be fraudulent. The method produces accurate results for both applications, comparable to running standard algorithms on plaintext data. This article introduces a new simple iterative algorithm to train a logistic regression model that is tailored to be applied on a homomorphically encrypted dataset. This algorithm can be used as a privacy-preserving technique to build a binary classification model and can be applied in a wide range of problems that can be modelled with logistic regression. Our implementation results show that our method can handle the large datasets used in logistic regression training.", "title": "" }, { "docid": "431e3826c8191834d08aae4f3e85e10b", "text": "This paper presents an ultra low-power high-speed dynamic comparator. The proposed dynamic comparator is designed and simulated in a 65-nm CMOS technology. It dissipates 7 μW, 21.1 μW from a 0.9-V supply while operating at 1 GHz, 3 GHz sampling clock respectively. Proposed circuit can work up to 14 GHz. Ultra low power consumption is achieved by utilizing charge-steering concept and proper sizing. Monte Carlo simulations show that the input referred offset contribution of the internal devices is negligible compared to the effect of the input devices which results in 3.8 mV offset and 3 mV kick-back noise.", "title": "" }, { "docid": "c42edb326ec95c257b821cc617e174e6", "text": "recommendation systems support users and developers of various computer and software systems to overcome information overload, perform information discovery tasks and approximate computation, among others. They have recently become popular and have attracted a wide variety of application scenarios from business process modelling to source code manipulation. Due to this wide variety of application domains, different approaches and metrics have been adopted for their evaluation. In this chapter, we review a range of evaluation metrics and measures as well as some approaches used for evaluating recommendation systems. The metrics presented in this chapter are grouped under sixteen different dimensions, e.g., correctness, novelty, coverage. We review these metrics according to the dimensions to which they correspond. A brief overview of approaches to comprehensive evaluation using collections of recommendation system dimensions and associated metrics is presented. We also provide suggestions for key future research and practice directions. Iman Avazpour Faculty of ICT, Centre for Computing and Engineering Software and Systems (SUCCESS), Swinburne University of Technology, Hawthorn, Victoria 3122, Australia e-mail: iavazpour@swin.", "title": "" }, { "docid": "6bc5aab717d5a78c99f5d85b40c3d482", "text": "Recognition in uncontrolled situations is one of the most important bottlenecks for practical face recognition systems. In particular, few researchers have addressed the challenge to recognize noncooperative or even uncooperative subjects who try to cheat the recognition system by deliberately changing their facial appearance through such tricks as variant expressions or disguise (e.g., by partial occlusions). This paper addresses these problems within the framework of similarity matching. A novel perception-inspired nonmetric partial similarity measure is introduced, which is potentially useful in dealing with the concerned problems because it can help capture the prominent partial similarities that are dominant in human perception. Two methods, based on the general golden section rule and the maximum margin criterion, respectively, are proposed to automatically set the similarity threshold. The effectiveness of the proposed method in handling large expressions, partial occlusions, and other distortions is demonstrated on several well-known face databases.", "title": "" }, { "docid": "0cb34c6202328c57dbd1e8e7270d8aa6", "text": "Optimization of deep learning is no longer an imminent problem, due to various gradient descent methods and the improvements of network structure, including activation functions, the connectivity style, and so on. Then the actual application depends on the generalization ability, which determines whether a network is effective. Regularization is an efficient way to improve the generalization ability of deep CNN, because it makes it possible to train more complex models while maintaining a lower overfitting. In this paper, we propose to optimize the feature boundary of deep CNN through a two-stage training method (pre-training process and implicit regularization training process) to reduce the overfitting problem. In the pre-training stage, we train a network model to extract the image representation for anomaly detection. In the implicit regularization training stage, we re-train the network based on the anomaly detection results to regularize the feature boundary and make it converge in the proper position. Experimental results on five image classification benchmarks show that the two-stage training method achieves a state-of-the-art performance and that it, in conjunction with more complicated anomaly detection algorithm, obtains better results. Finally, we use a variety of strategies to explore and analyze how implicit regularization plays a role in the two-stage training process. Furthermore, we explain how implicit regularization can be interpreted as data augmentation and model ensemble.", "title": "" }, { "docid": "38fab4cc5cffea363eecbc8b2f2c6088", "text": "Domain adaptation algorithms are useful when the distributions of the training and the test data are different. In this paper, we focus on the problem of instrumental variation and time-varying drift in the field of sensors and measurement, which can be viewed as discrete and continuous distributional change in the feature space. We propose maximum independence domain adaptation (MIDA) and semi-supervised MIDA to address this problem. Domain features are first defined to describe the background information of a sample, such as the device label and acquisition time. Then, MIDA learns a subspace which has maximum independence with the domain features, so as to reduce the interdomain discrepancy in distributions. A feature augmentation strategy is also designed to project samples according to their backgrounds so as to improve the adaptation. The proposed algorithms are flexible and fast. Their effectiveness is verified by experiments on synthetic datasets and four real-world ones on sensors, measurement, and computer vision. They can greatly enhance the practicability of sensor systems, as well as extend the application scope of existing domain adaptation algorithms by uniformly handling different kinds of distributional change.", "title": "" }, { "docid": "535934dc80c666e0d10651f024560d12", "text": "The following individuals read and discussed the thesis submitted by student Mindy Elizabeth Bennett, and they also evaluated her presentation and response to questions during the final oral examination. They found that the student passed the final oral examination, and that the thesis was satisfactory for a master's degree and ready for any final modifications that they explicitly required. iii ACKNOWLEDGEMENTS During my time of study at Boise State University, I have received an enormous amount of academic support and guidance from a number of different individuals. I would like to take this opportunity to thank everyone who has been instrumental in the completion of this degree. Without the continued support and guidance of these individuals, this accomplishment would not have been possible. I would also like to thank the following individuals for generously giving their time to provide me with the help and support needed to complete this study. Without them, the completion of this study would not have been possible. Breast hypertrophy is a common medical condition whose morbidity has increased over recent decades. Symptoms of breast hypertrophy often include musculoskeletal pain in the neck, back and shoulders, and numerous psychosocial health burdens. To date, reduction mammaplasty (RM) is the only treatment shown to significantly reduce the severity of the symptoms associated with breast hypertrophy. However, due to a lack of scientific evidence in the medical literature justifying the medical necessity of RM, insurance companies often deny requests for coverage of this procedure. Therefore, the purpose of this study is to investigate biomechanical differences in the upper body of women with larger breast sizes in order to provide scientific evidence of the musculoskeletal burdens of breast hypertrophy to the medical community Twenty-two female subjects (average age 25.90, ± 5.47 years) who had never undergone or been approved for breast augmentation surgery, were recruited to participate in this study. Kinematic data of the head, thorax, pelvis and scapula was collected during static trials and during each of four different tasks of daily living. Surface electromyography (sEMG) data from the Midcervical (C-4) Paraspinal, Upper Trapezius, Lower Trapezius, Serratus Anterior, and Erector Spinae muscles were recorded in the same activities. Maximum voluntary contractions (MVC) were used to normalize the sEMG data, and %MVC during each task in the protocol was analyzed. Kinematic data from the tasks of daily living were normalized to average static posture data for each subject. Subjects were …", "title": "" }, { "docid": "be7cc41f9e8d3c9e08c5c5ff1ea79f59", "text": "A person’s emotions and state of mind are apparent in their face and eyes. As a Latin proverb states: “The face is the portrait of the mind; the eyes, its informers.”. This presents a huge challenge for computer graphics researchers in the generation of artificial entities that aim to replicate the movement and appearance of the human eye, which is so important in human-human interactions. This State of the Art Report provides an overview of the efforts made on tackling this challenging task. As with many topics in Computer Graphics, a cross-disciplinary approach is required to fully understand the workings of the eye in the transmission of information to the user. We discuss the movement of the eyeballs, eyelids, and the head from a physiological perspective and how these movements can be modelled, rendered and animated in computer graphics applications. Further, we present recent research from psychology and sociology that seeks to understand higher level behaviours, such as attention and eye-gaze, during the expression of emotion or during conversation, and how they are synthesised in Computer Graphics and", "title": "" }, { "docid": "7dfe5cc877bfe1796c6bdcd2f5114473", "text": "The main challenge in Super Resolution (SR) is to discover the mapping between the low-and high-resolution manifolds of image patches, a complex ill-posed problem which has recently been addressed through piecewise linear regression with promising results. In this paper we present a novel regression-based SR algorithm that benefits from an extended knowledge of the structure of both manifolds. We propose a transform that collapses the 16 variations induced from the dihedral group of transforms (i.e. rotations, vertical and horizontal reflections) and antipodality (i.e. diametrically opposed points in the unitary sphere) into a single primitive. The key idea of our transform is to study the different dihedral elements as a group of symmetries within the high-dimensional manifold. We obtain the respective set of mirror-symmetry axes by means of a frequency analysis of the dihedral elements, and we use them to collapse the redundant variability through a modified symmetry distance. The experimental validation of our algorithm shows the effectiveness of our approach, which obtains competitive quality with a dictionary of as little as 32 atoms (reducing other methods' dictionaries by at least a factor of 32) and further pushing the state-of-the-art with a 1024 atoms dictionary.", "title": "" }, { "docid": "f58192a1ef1686e1754f8adb3f4481de", "text": "The twenty-first century organizations are characterized by an emphasis on knowledge and information. Today’s organizations also require the acquisition, management, and exploitation of knowledge and information in order to improve their own performance. In the current economy, the foundations of organizational competitiveness have turned former tangible and intangible resources into knowledge and the focus of information systems has also changed from information management to knowledge management. Besides, the most important step in the implementation of knowledge management is to examine the significant factors in this regard and to identify the causes of failure. Therefore, the present study evaluated knowledge management failure factors in an intuitionistic fuzzy environment as a case study in Khuzestan Oil and Gas Company. For this purpose, a series of failure factors affecting knowledge management in organizations were identified based on a review of the related literature and similar studies. Then, 16 failure factors in the implementation of knowledge management in the given organization were determined on the basis of interviews with company experts. According to the specified factors as well as the integration of multiple criteria decision-making techniques in an intuitionistic fuzzy environment, knowledge management failure factors in Khuzestan Oil and Gas Company were investigated. The results indicated that lack of management commitment and leadership was the most important factor affecting the failure of knowledge management in the given company.", "title": "" }, { "docid": "5d5d301bf65031791a3f012758888d6e", "text": "Recent additive manufacturing technologies, such as 3-D printing and printed electronics, require constant speed motion for consistent material deposition. In this paper, a new path planning algorithm is developed for an \\(XY\\) -motion stage with an emphasis on aerosol printing. The continuous aerosol stream provided by the printing nozzle requires constant velocity in relative motion of a substrate to evenly deposit inks. During transitioning between print segments, a shutter prevents the aerosol from reaching the substrate, therefore wasting material. The proposed path planning algorithm can control motion of an \\(XY\\) stage for an arbitrary printing path and desired velocity while minimizing material waste. Linear segments with parabolic blends (LSPBs) trajectory planning is used during printing, and minimum time trajectory (MTT) planning is used during printer transition. Simulation results show that combining LSPB with MTT can minimize the printing time while following the desired path.", "title": "" }, { "docid": "a7cc7076d324f33d5e9b40756c5e1631", "text": "Social learning analytics introduces tools and methods that help improving the learning process by providing useful information about the actors and their activity in the learning system. This study examines the relation between SNA parameters and student outcomes, between network parameters and global course performance, and it shows how visualizations of social learning analytics can help observing the visible and invisible interactions occurring in online distance education. The findings from our empirical study show that future research should further investigate whether there are conditions under which social network parameters are reliable predictors of academic performance, but also advises against relying exclusively in social network parameters for predictive purposes. The findings also show that data visualization is a useful tool for social learning analytics, and how it may provide additional information about actors and their behaviors for decision making in online distance", "title": "" }, { "docid": "3e18a760083cd3ed169ed8dae36156b9", "text": "n engl j med 368;26 nejm.org june 27, 2013 2445 correct diagnoses as often as we think: the diagnostic failure rate is estimated to be 10 to 15%. The rate is highest among specialties in which patients are diagnostically undifferentiated, such as emergency medicine, family medicine, and internal medicine. Error in the visual specialties, such as radiology and pathology, is considerably lower, probably around 2%.1 Diagnostic error has multiple causes, but principal among them are cognitive errors. Usually, it’s not a lack of knowledge that leads to failure, but problems with the clinician’s thinking. Esoteric diagnoses are occasionally missed, but common illnesses are commonly misdiagnosed. For example, physicians know the pathophysiology of pulmonary embolus in excruciating detail, yet because its signs and symptoms are notoriously variable and overlap with those of numerous other diseases, this important diagnosis was missed a staggering 55% of the time in a series of fatal cases.2 Over the past 40 years, work by cognitive psychologists and others has pointed to the human mind’s vulnerability to cognitive biases, logical fallacies, false assumptions, and other reasoning failures. It seems that much of our everyday thinking is f lawed, and clinicians are not immune to the problem (see box). More than 100 biases affecting clinical decision making have been described, and many medical disciplines now acknowledge their pervasive influence on our thinking. Cognitive failures are best understood in the context of how our brains manage and process information. The two principal modes, automatic and controlled, are colloquially referred to as “intuitive” and “analytic”; psychologists know them as Type 1 and Type 2 processes. Various conceptualizations of the reasoning process have been proposed, but most can be incorporated into this dual-process system. This system is more than a model: it is accepted that the two processes involve different cortical mechanisms with associated neurophysiologic and neuroanatomical From Mindless to Mindful Practice — Cognitive Bias and Clinical Decision Making", "title": "" }, { "docid": "9f037fd53e6547b689f88fc1c1bed10a", "text": "We study feature selection as a means to optimize the baseline clickbait detector employed at the Clickbait Challenge 2017 [6]. The challenge’s task is to score the “clickbaitiness” of a given Twitter tweet on a scale from 0 (no clickbait) to 1 (strong clickbait). Unlike most other approaches submitted to the challenge, the baseline approach is based on manual feature engineering and does not compete out of the box with many of the deep learning-based approaches. We show that scaling up feature selection efforts to heuristically identify better-performing feature subsets catapults the performance of the baseline classifier to second rank overall, beating 12 other competing approaches and improving over the baseline performance by 20%. This demonstrates that traditional classification approaches can still keep up with deep learning on this task.", "title": "" }, { "docid": "c479983e954695014417976275030746", "text": "Semi-Non-negative Matrix Factorization is a technique that learns a low-dimensional representation of a dataset that lends itself to a clustering interpretation. It is possible that the mapping between this new representation and our original data matrix contains rather complex hierarchical information with implicit lower-level hidden attributes, that classical one level clustering methodologies cannot interpret. In this work we propose a novel model, Deep Semi-NMF, that is able to learn such hidden representations that allow themselves to an interpretation of clustering according to different, unknown attributes of a given dataset. We also present a semi-supervised version of the algorithm, named Deep WSF, that allows the use of (partial) prior information for each of the known attributes of a dataset, that allows the model to be used on datasets with mixed attribute knowledge. Finally, we show that our models are able to learn low-dimensional representations that are better suited for clustering, but also classification, outperforming Semi-Non-negative Matrix Factorization, but also other state-of-the-art methodologies variants.", "title": "" }, { "docid": "4331057bb0a3f3add576513fa71791a8", "text": "The category theoretic structures of monads and comonads can be used as an abstraction mechanism for simplifying both language semantics and programs. Monads have been used to structure impure computations, whilst comonads have been used to structure context-dependent computations. Interestingly, the class of computations structured by monads and the class of computations structured by comonads are not mutually exclusive. This paper formalises and explores the conditions under which a monad and a comonad can both structure the same notion of computation: when a comonad is left adjoint to a monad. Furthermore, we examine situations where a particular monad/comonad model of computation is deficient in capturing the essence of a computational pattern and provide a technique for calculating an alternative monad or comonad structure which fully captures the essence of the computation. Included is some discussion on how to choose between a monad or comonad structure in the case where either can be used to capture a particular notion of computation.", "title": "" } ]
scidocsrr
c8e4a79a61c855d7c527cd225c143542
Wechsler Intelligence Scale for Children-V: Test Review.
[ { "docid": "040587526c0fa1fd5ba2a28ee554329f", "text": "Data from 14 nations reveal IQ gains ranging from 5 to 25 points in a single generation. Some of the largest gains occur on culturally reduced tests and tests of fluid intelligence. The Norwegian data show that a nation can make significant gains on a culturally reduced test while suffering losses on other tests. The Dutch data prove the existence of unknown environmental factors so potent that they account for 15 of the 20 points gained. The hypothesis that best fits the results is that IQ tests do not measure intelligence but rather a correlate with a weak causal link to intelligence. This hypothesis can also explain differential trends on various mental tests, such as the combination of IQ gains and Scholastic Aptitude Test losses in the United States.", "title": "" } ]
[ { "docid": "1f81e5e9851b4750aac009da5ae578a1", "text": "This paper describes a method to automatically create dialogue resources annotated with dialogue act information by reusing existing dialogue corpora. Numerous dialogue corpora are available for research purposes and many of them are annotated with dialogue act information that captures the intentions encoded in user utterances. Annotated dialogue resources, however, differ in various respects: data collection settings and modalities used, dialogue task domains and scenarios (if any) underlying the collection, number and roles of dialogue participants involved and dialogue act annotation schemes applied. The presented study encompasses three phases of data-driven investigation. We, first, assess the importance of various types of features and their combinations for effective cross-domain dialogue act classification. Second, we establish the best predictive model comparing various cross-corpora training settings. Finally, we specify models adaptation procedures and explore late fusion approaches to optimize the overall classification decision taking process. The proposed methodology accounts for empirically motivated and technically sound classification procedures that may reduce annotation and training costs significantly.", "title": "" }, { "docid": "9b72d423e13bdd125b3a8c30b40e6b49", "text": "With the increasing popularity of the web, some new web technologies emerged and introduced dynamics to web applications, in comparison to HTML, as a static programming language. JavaScript is the language that provided a dynamic web site which actively communicates with users. JavaScript is used in today's web applications as a client script language and on the server side. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. The topic of this research is to compare the popular JavaScript frameworks: AngularJS, Ember, Knockout, Backbone. All four frameworks are based on MVC or similar architecture. In this paper, the advantages and disadvantages of each framework, the impact on application speed, the ways of testing such JS applications and ways to improve code security are presented.", "title": "" }, { "docid": "45e4a8bd1689d2f127f20b2e692b56cc", "text": "BACKGROUND\nPreventive health care promotes health and prevents disease or injuries by addressing factors that lead to the onset of a disease, and by detecting latent conditions to reduce or halt their progression. Many risk factors for costly and disabling conditions (such as cardiovascular diseases, cancer, diabetes, and chronic respiratory diseases) can be prevented, yet healthcare systems do not make the best use of their available resources to support this process. Mobile phone messaging applications, such as Short Message Service (SMS) and Multimedia Message Service (MMS), could offer a convenient and cost-effective way to support desirable health behaviours for preventive health care.\n\n\nOBJECTIVES\nTo assess the effects of mobile phone messaging interventions as a mode of delivery for preventive health care, on health status and health behaviour outcomes.\n\n\nSEARCH METHODS\nWe searched: the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library 2009, Issue 2), MEDLINE (OvidSP) (January 1993 to June 2009), EMBASE (OvidSP) (January 1993 to June 2009), PsycINFO (OvidSP) (January 1993 to June 2009), CINAHL (EbscoHOST) (January 1993 to June 2009), LILACS (January 1993 to June 2009) and African Health Anthology (January 1993 to June 2009).We also reviewed grey literature (including trial registers) and reference lists of articles.\n\n\nSELECTION CRITERIA\nWe included randomised controlled trials (RCTs), quasi-randomised controlled trials (QRCTs), controlled before-after (CBA) studies, and interrupted time series (ITS) studies with at least three time points before and after the intervention. We included studies using SMS or MMS as a mode of delivery for any type of preventive health care. We only included studies in which it was possible to assess the effects of mobile phone messaging independent of other technologies or interventions.\n\n\nDATA COLLECTION AND ANALYSIS\nTwo review authors independently assessed all studies against the inclusion criteria, with any disagreements resolved by a third review author. Study design features, characteristics of target populations, interventions and controls, and results data were extracted by two review authors and confirmed by a third author. Primary outcomes of interest were health status and health behaviour outcomes. We also considered patients' and providers' evaluation of the intervention, perceptions of safety, health service utilisation and costs, and potential harms or adverse effects. Because the included studies were heterogeneous in type of condition addressed, intervention characteristics and outcome measures, we did not consider that it was justified to conduct a meta-analysis to derive an overall effect size for the main outcome categories; instead, we present findings narratively.\n\n\nMAIN RESULTS\nWe included four randomised controlled trials involving 1933 participants.For the primary outcome category of health, there was moderate quality evidence from one study that women who received prenatal support via mobile phone messages had significantly higher satisfaction than those who did not receive the messages, both in the antenatal period (mean difference (MD) 1.25, 95% confidence interval (CI) 0.78 to 1.72) and perinatal period (MD 1.19, 95% CI 0.37 to 2.01). Their confidence level was also higher (MD 1.12, 95% CI 0.51 to 1.73) and anxiety level was lower (MD -2.15, 95% CI -3.42 to -0.88) than in the control group in the antenatal period. In this study, no further differences were observed between groups in the perinatal period. There was low quality evidence that the mobile phone messaging intervention did not affect pregnancy outcomes (gestational age at birth, infant birth weight, preterm delivery and route of delivery).For the primary outcome category of health behaviour, there was moderate quality evidence from one study that mobile phone message reminders to take vitamin C for preventive reasons resulted in higher adherence (risk ratio (RR) 1.41, 95% CI 1.14 to 1.74). There was high quality evidence from another study that participants receiving mobile phone messaging support had a significantly higher likelihood of quitting smoking than those in a control group at 6 weeks (RR 2.20, 95% CI 1.79 to 2.70) and at 12 weeks follow-up (RR 1.55, 95% CI 1.30 to 1.84). At 26 weeks, there was only a significant difference between groups if, for participants with missing data, the last known value was carried forward. There was very low quality evidence from one study that mobile phone messaging interventions for self-monitoring of healthy behaviours related to childhood weight control did not have a statistically significant effect on physical activity, consumption of sugar-sweetened beverages or screen time.For the secondary outcome of acceptability, there was very low quality evidence from one study that user evaluation of the intervention was similar between groups. There was moderate quality evidence from one study of no difference in adverse effects of the intervention, measured as rates of pain in the thumb or finger joints, and car crash rates.None of the studies reported the secondary outcomes of health service utilisation or costs of the intervention.\n\n\nAUTHORS' CONCLUSIONS\nWe found very limited evidence that in certain cases mobile phone messaging interventions may support preventive health care, to improve health status and health behaviour outcomes. However, because of the low number of participants in three of the included studies, combined with study limitations of risk of bias and lack of demonstrated causality, the evidence for these effects is of low to moderate quality. The evidence is of high quality only for interventions aimed at smoking cessation. Furthermore, there are significant information gaps regarding the long-term effects, risks and limitations of, and user satisfaction with, such interventions.", "title": "" }, { "docid": "205880d3205cb0f4844c20dcf51c4890", "text": "Recently, deep networks were proved to be more effective than shallow architectures to face complex real–world applications. However, theoretical results supporting this claim are still few and incomplete. In this paper, we propose a new topological measure to study how the depth of feedforward networks impacts on their ability of implementing high complexity functions. Upper and lower bounds on network complexity are established, based on the number of hidden units and on their activation functions, showing that deep architectures are able, with the same number of resources, to address more difficult classification problems.", "title": "" }, { "docid": "43b18a9fe6c1c67109ea7ee27285714b", "text": "Nonlinear dimensionality reduction methods have demonstrated top-notch performance in many pattern recognition and image classification tasks. Despite their popularity, they suffer from highly expensive time and memory requirements, which render them inapplicable to large-scale datasets. To leverage such cases we propose a new method called “Path-Based Isomap”. Similar to Isomap, we exploit geodesic paths to find the low-dimensional embedding. However, instead of preserving pairwise geodesic distances, the low-dimensional embedding is computed via a path-mapping algorithm. Due to the much fewer number of paths compared to number of data points, a significant improvement in time and memory complexity with a comparable performance is achieved. The method demonstrates state-of-the-art performance on well-known synthetic and real-world datasets, as well as in the presence of noise.", "title": "" }, { "docid": "bb1d208ad8f31e59ecba7eea35dcff8a", "text": "Over the past two decades, the molecular machinery that underlies autophagic responses has been characterized with ever increasing precision in multiple model organisms. Moreover, it has become clear that autophagy and autophagy-related processes have profound implications for human pathophysiology. However, considerable confusion persists about the use of appropriate terms to indicate specific types of autophagy and some components of the autophagy machinery, which may have detrimental effects on the expansion of the field. Driven by the overt recognition of such a potential obstacle, a panel of leading experts in the field attempts here to define several autophagy-related terms based on specific biochemical features. The ultimate objective of this collaborative exchange is to formulate recommendations that facilitate the dissemination of knowledge within and outside the field of autophagy research.", "title": "" }, { "docid": "c48d4bd9d5fde3fa61e600449411fd25", "text": "Shape-From-Silhouette (SFS), also known as Visual Hull (VH) construction, is a popular 3D reconstruction method which estimates the shape of an object from multiple silhouette images. The original SFS formulation assumes that all of the silhouette images are captured either at the same time or while the object is static. This assumption is violated when the object moves or changes shape. Hence the use of SFS with moving objects has been restricted to treating each time instant sequentially and independently. Recently we have successfully extended the traditional SFS formulation to refine the shape of a rigidly moving object over time. Here we further extend SFS to apply to dynamic articulated objects. Given silhouettes of a moving articulated object, the process of recovering the shape and motion requires two steps: (1) correctly segmenting (points on the boundary of) the silhouettes to each articulated part of the object, (2) estimating the motion of each individual part using the segmented silhouette. In this paper, we propose an iterative algorithm to solve this simultaneous assignment and alignment problem. Once we have estimated the shape and motion of each part of the object, the articulation points between each pair of rigid parts are obtained by solving a simple motion constraint between the connected parts. To validate our algorithm, we first apply it to segment the different body parts and estimate the joint positions of a person. The acquired kinematic (shape and joint) information is then used to track the motion of the person in new video sequences.", "title": "" }, { "docid": "b06dcdb662a8d55219c9ae1c7e507987", "text": "Most programs today are written not by professional software developers, but by people with expertise in other domains working towards goals for which they need computational support. For example, a teacher might write a grading spreadsheet to save time grading, or an interaction designer might use an interface builder to test some user interface design ideas. Although these end-user programmers may not have the same goals as professional developers, they do face many of the same software engineering challenges, including understanding their requirements, as well as making decisions about design, reuse, integration, testing, and debugging. This article summarizes and classifies research on these activities, defining the area of End-User Software Engineering (EUSE) and related terminology. The article then discusses empirical research about end-user software engineering activities and the technologies designed to support them. The article also addresses several crosscutting issues in the design of EUSE tools, including the roles of risk, reward, and domain complexity, and self-efficacy in the design of EUSE tools and the potential of educating users about software engineering principles.", "title": "" }, { "docid": "1bd2fb70817734ec1a0e96d67ca5daaf", "text": "This paper proposed a new detection and prevention system against DDoS (Distributed Denial of Service) attack in SDN (software defined network) architecture, FL-GUARD (Floodlight-based guard system). Based on characteristics of SDN and centralized control, etc., FL-GUARD applies dynamic IP address binding to solve the problem of IP spoofing, and uses 3.3.2 C-SVM algorithm to detect attacks, and finally take advantage of the centralized control of software-defined network to issue flow tables to block attacks at the source port. The experiment results show the effectiveness of our system. The modular design of FL-GUARD lays a good foundation for the future improvement.", "title": "" }, { "docid": "92c91a8e9e5eec86f36d790dec8020e7", "text": "Aspect-based opinion mining, which aims to extract aspects and their corresponding ratings from customers reviews, provides very useful information for customers to make purchase decisions. In the past few years several probabilistic graphical models have been proposed to address this problem, most of them based on Latent Dirichlet Allocation (LDA). While these models have a lot in common, there are some characteristics that distinguish them from each other. These fundamental differences correspond to major decisions that have been made in the design of the LDA models. While research papers typically claim that a new model outperforms the existing ones, there is normally no \"one-size-fits-all\" model. In this paper, we present a set of design guidelines for aspect-based opinion mining by discussing a series of increasingly sophisticated LDA models. We argue that these models represent the essence of the major published methods and allow us to distinguish the impact of various design decisions. We conduct extensive experiments on a very large real life dataset from Epinions.com (500K reviews) and compare the performance of different models in terms of the likelihood of the held-out test set and in terms of the accuracy of aspect identification and rating prediction.", "title": "" }, { "docid": "888efce805d5271f0b6571748793c4c6", "text": "Pedagogical changes and new models of delivering educational content should be considered in the effort to address the recommendations of the 2007 Institute of Medicine report and Benner's recommendations on the radical transformation of nursing. Transition to the nurse anesthesia practice doctorate addresses the importance of these recommendations, but educational models and specific strategies on how to implement changes in educational models and systems are still emerging. The flipped classroom (FC) is generating a considerable amount of buzz in academic circles. The FC is a pedagogical model that employs asynchronous video lectures, reading assignments, practice problems, and other digital, technology-based resources outside the classroom, and interactive, group-based, problem-solving activities in the classroom. This FC represents a unique combination of constructivist ideology and behaviorist principles, which can be used to address the gap between didactic education and clinical practice performance. This article reviews recent evidence supporting use of the FC in health profession education and suggests ways to implement the FC in nurse anesthesia educational programs.", "title": "" }, { "docid": "f031bd5139a31ac327c61ce3d306a376", "text": "In this paper we give an overview of the Tri-lingual Entity Discovery and Linking (EDL) task at the Knowledge Base Population (KBP) track at TAC2017, and of the Ten Low Resource Language EDL Pilot. We will summarize several new and effective research directions including multi-lingual common space construction for cross-lingual knowledge transfer, rapid approaches for silver-standard training data generation and joint entity and word representation. We will also sketch out remaining challenges and future research directions.", "title": "" }, { "docid": "e0fbfac63b894c46e3acda86adb67053", "text": "OBJECTIVE\nTo investigate the effectiveness of acupuncture compared with minimal acupuncture and with no acupuncture in patients with tension-type headache.\n\n\nDESIGN\nThree armed randomised controlled multicentre trial.\n\n\nSETTING\n28 outpatient centres in Germany.\n\n\nPARTICIPANTS\n270 patients (74% women, mean age 43 (SD 13) years) with episodic or chronic tension-type headache.\n\n\nINTERVENTIONS\nAcupuncture, minimal acupuncture (superficial needling at non-acupuncture points), or waiting list control. Acupuncture and minimal acupuncture were administered by specialised physicians and consisted of 12 sessions per patient over eight weeks.\n\n\nMAIN OUTCOME MEASURE\nDifference in numbers of days with headache between the four weeks before randomisation and weeks 9-12 after randomisation, as recorded by participants in headache diaries.\n\n\nRESULTS\nThe number of days with headache decreased by 7.2 (SD 6.5) days in the acupuncture group compared with 6.6 (SD 6.0) days in the minimal acupuncture group and 1.5 (SD 3.7) days in the waiting list group (difference: acupuncture v minimal acupuncture, 0.6 days, 95% confidence interval -1.5 to 2.6 days, P = 0.58; acupuncture v waiting list, 5.7 days, 3.9 to 7.5 days, P < 0.001). The proportion of responders (at least 50% reduction in days with headache) was 46% in the acupuncture group, 35% in the minimal acupuncture group, and 4% in the waiting list group.\n\n\nCONCLUSIONS\nThe acupuncture intervention investigated in this trial was more effective than no treatment but not significantly more effective than minimal acupuncture for the treatment of tension-type headache.\n\n\nTRIAL REGISTRATION NUMBER\nISRCTN9737659.", "title": "" }, { "docid": "08084de7a702b87bd8ffc1d36dbf67ea", "text": "In recent years, the mobile data traffic is increasing and many more frequency bands have been employed in cellular handsets. A simple π type tunable band elimination filter (BEF) with switching function has been developed using a wideband tunable surface acoustic wave (SAW) resonator circuit. The frequency of BEF is tuned approximately 31% by variable capacitors without spurious. In LTE low band, the arrangement of TX and RX frequencies is to be reversed in Band 13, 14 and 20 compared with the other bands. The steep edge slopes of the developed filter can be exchanged according to the resonance condition and switching. With combining the TX and RX tunable BEFs and the small sized broadband circulator, a new tunable duplexer has been fabricated, and its TX-RX isolation is proved to be more than 50dB in LTE low band operations.", "title": "" }, { "docid": "f154fb6af73bc0673d208716f8b77d72", "text": "Deep autoencoder networks have successfully been applied in unsupervised dimension reduction. The autoencoder has a \"bottleneck\" middle layer of only a few hidden units, which gives a low dimensional representation for the data when the full network is trained to minimize reconstruction error. We propose using a deep bottlenecked neural network in supervised dimension reduction. Instead of trying to reproduce the data, the network is trained to perform classification. Pretraining with restricted Boltzmann machines is combined with supervised finetuning. Finetuning with supervised cost functions has been done, but with cost functions that scale quadratically. Training a bottleneck classifier scales linearly, but still gives results comparable to or sometimes better than two earlier supervised methods.", "title": "" }, { "docid": "be73344151ac52835ba9307e363f36d9", "text": "BACKGROUND AND OBJECTIVE\nSmoking is the largest preventable cause of death and diseases in the developed world, and advances in modern electronics and machine learning can help us deliver real-time intervention to smokers in novel ways. In this paper, we examine different machine learning approaches to use situational features associated with having or not having urges to smoke during a quit attempt in order to accurately classify high-urge states.\n\n\nMETHODS\nTo test our machine learning approaches, specifically, Bayes, discriminant analysis and decision tree learning methods, we used a dataset collected from over 300 participants who had initiated a quit attempt. The three classification approaches are evaluated observing sensitivity, specificity, accuracy and precision.\n\n\nRESULTS\nThe outcome of the analysis showed that algorithms based on feature selection make it possible to obtain high classification rates with only a few features selected from the entire dataset. The classification tree method outperformed the naive Bayes and discriminant analysis methods, with an accuracy of the classifications up to 86%. These numbers suggest that machine learning may be a suitable approach to deal with smoking cessation matters, and to predict smoking urges, outlining a potential use for mobile health applications.\n\n\nCONCLUSIONS\nIn conclusion, machine learning classifiers can help identify smoking situations, and the search for the best features and classifier parameters significantly improves the algorithms' performance. In addition, this study also supports the usefulness of new technologies in improving the effect of smoking cessation interventions, the management of time and patients by therapists, and thus the optimization of available health care resources. Future studies should focus on providing more adaptive and personalized support to people who really need it, in a minimum amount of time by developing novel expert systems capable of delivering real-time interventions.", "title": "" }, { "docid": "6d285e0e8450791f03f95f58792c8f3c", "text": "Basic psychology research suggests the possibility that confessions-a potent form of incrimination-may taint other evidence, thereby creating an appearance of corroboration. To determine if this laboratory-based phenomenon is supported in the high-stakes world of actual cases, we conducted an archival analysis of DNA exoneration cases from the Innocence Project case files. Results were consistent with the corruption hypothesis: Multiple evidence errors were significantly more likely to exist in false-confession cases than in eyewitness cases; in order of frequency, false confessions were accompanied by invalid or improper forensic science, eyewitness identifications, and snitches and informants; and in cases containing multiple errors, confessions were most likely to have been obtained first. We believe that these findings underestimate the problem and have important implications for the law concerning pretrial corroboration requirements and the principle of \"harmless error\" on appeal.", "title": "" }, { "docid": "a0dad0be3da6f4c7672427924036d904", "text": "About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol suite, In particular, I focused on protocol-level issues, rather than implementation flaws. It is instructive to look back at that paper, to see where my focus and my predictions were accurate, where I was wrong, and where dangers have yet to happen. This is a reprint of the original paper, with added commentary.", "title": "" }, { "docid": "aa60d0d73efdf21adcc95c6ad7a7dbc3", "text": "While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we use as a case study for hardware obfuscation. In this obfuscation tool, a small custom-made obfuscell is used in conjunction with a standard cell to build a new obfuscated standard cell library called Obfusgates. This standard cell library can be used to synthesize any HDL code with standard synthesis tools, e.g. Synopsis Design Compiler. However, only obfuscating the functionality of individual gates is not enough. Not only the functionality of individual gates, but also their connectivity, leaks important important information about the design. In our tool we therefore designed the obfuscation gates to include a large number of \"dummy wires\". Due to these dummy wires, the connectivity of the gates in addition to their logic functionality is obfuscated. We argue that this aspect of obfuscation is of great importance in practice and that there are many interesting open research questions related to this.", "title": "" }, { "docid": "8115fddcf7bd64ad0976619f0a51e5a8", "text": "Current research in content-based semantic image understanding is largely confined to exemplar-based approaches built on low-level feature extraction and classification. The ability to extract both low-level and semantic features and perform knowledge integration of different types of features is expected to raise semantic image understanding to a new level. Belief networks, or Bayesian networks (BN), have proven to be an effective knowledge representation and inference engine in artificial intelligence and expert systems research. Their effectiveness is due to the ability to explicitly integrate domain knowledge in the network structure and to reduce a joint probability distribution to conditional independence relationships. In this paper, we present a general-purpose knowledge integration framework that employs BN in integrating both low-level and semantic features. The efficacy of this framework is demonstrated via three applications involving semantic understanding of pictorial images. The first application aims at detecting main photographic subjects in an image, the second aims at selecting the most appealing image in an event, and the third aims at classifying images into indoor or outdoor scenes. With these diverse examples, we demonstrate that effective inference engines can be built within this powerful and flexible framework according to specific domain knowledge and available training data to solve inherently uncertain vision problems. 2005 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.", "title": "" } ]
scidocsrr
381ab7b5b1b402b86b364ca07cf1b45a
Text Localization in Real-World Images Using Efficiently Pruned Exhaustive Search
[ { "docid": "2e5a3cd852a53b018032804f77088d03", "text": "A general method for text localization and recognition in real-world images is presented. The proposed method is novel, as it (i) departs from a strict feed-forward pipeline and replaces it by a hypothesesverification framework simultaneously processing multiple text line hypotheses, (ii) uses synthetic fonts to train the algorithm eliminating the need for time-consuming acquisition and labeling of real-world training data and (iii) exploits Maximally Stable Extremal Regions (MSERs) which provides robustness to geometric and illumination conditions. The performance of the method is evaluated on two standard datasets. On the Char74k dataset, a recognition rate of 72% is achieved, 18% higher than the state-of-the-art. The paper is first to report both text detection and recognition results on the standard and rather challenging ICDAR 2003 dataset. The text localization works for number of alphabets and the method is easily adapted to recognition of other scripts, e.g. cyrillics.", "title": "" }, { "docid": "823d77bc2d761810467c8eea87c2dd31", "text": "This paper proposes a novel hybrid method to robustly and accurately localize texts in natural scene images. A text region detector is designed to generate a text confidence map, based on which text components can be segmented by local binarization approach. A Conditional Random Field (CRF) model, considering the unary component property as well as binary neighboring component relationship, is then presented to label components as \"text\" or \"non-text\". Last, text components are grouped into text lines with an energy minimization approach. Experimental results show that the proposed method gives promising performance comparing with the existing methods on ICDAR 2003 competition dataset.", "title": "" }, { "docid": "f3d86ca456bb9e97b090ea68a82be93b", "text": "Many images—especially those used for page design on web pages—as well as videos contain visible text. If these text occurrences could be detected, segmented, and recognized automatically, they would be a valuable source of high-level semantics for indexing and retrieval. In this paper, we propose a novel method for localizing and segmenting text in complex images and videos. Text lines are identified by using a complex-valued multilayer feed-forward network trained to detect text at a fixed scale and position. The network’s output at all scales and positions is integrated into a single text-saliency map, serving as a starting point for candidate text lines. In the case of video, these candidate text lines are refined by exploiting the temporal redundancy of text in video. Localized text lines are then scaled to a fixed height of 100 pixels and segmented into a binary image with black characters on white background. For videos, temporal redundancy is exploited to improve segmentation performance. Input images and videos can be of any size due to a true multiresolution approach. Moreover, the system is not only able to locate and segment text occurrences into large binary images, but is also able to track each text line with sub-pixel accuracy over the entire occurrence in a video, so that one text bitmap is created for all instances of that text line. Therefore, our text segmentation results can also be used for object-based video encoding such as that enabled by MPEG-4.", "title": "" } ]
[ { "docid": "2b169a32d20bb4af5527be41837f17f7", "text": "This paper introduces a two-switch flyback-forward pulse-width modulated (PWM) DC-DC converter along with the steady-state analysis, simplified design procedure, and experimental verification. The proposed converter topology is the result of integrating the secondary sides of the two-switch flyback and the two-switch forward converters in an anti-parallel connection, while retaining the two-main switches and the clamping diodes on a single winding primary side. The hybrid two-switch flyback-forward converter shares the semiconductor devices on the primary side and the magnetic component on the secondary side resulting in a low volume DC-DC converter with reduced switch voltage stress. Simulation and experimental results are given for a 10-V/30-W, 100 kHz laboratory prototype to verify the theoretical analysis.", "title": "" }, { "docid": "b24f07add0da3931b23f4a13ea6983b9", "text": "Recently, with the development of artificial intelligence technologies and the popularity of mobile devices, walking detection and step counting have gained much attention since they play an important role in the fields of equipment positioning, saving energy, behavior recognition, etc. In this paper, a novel algorithm is proposed to simultaneously detect walking motion and count steps through unconstrained smartphones in the sense that the smartphone placement is not only arbitrary but also alterable. On account of the periodicity of the walking motion and sensitivity of gyroscopes, the proposed algorithm extracts the frequency domain features from three-dimensional (3D) angular velocities of a smartphone through FFT (fast Fourier transform) and identifies whether its holder is walking or not irrespective of its placement. Furthermore, the corresponding step frequency is recursively updated to evaluate the step count in real time. Extensive experiments are conducted by involving eight subjects and different walking scenarios in a realistic environment. It is shown that the proposed method achieves the precision of 93.76 % and recall of 93.65 % for walking detection, and its overall performance is significantly better than other well-known methods. Moreover, the accuracy of step counting by the proposed method is 95.74 % , and is better than both of the several well-known counterparts and commercial products.", "title": "" }, { "docid": "012bcbc6b5e7b8aaafd03f100489961c", "text": "DNA is an attractive medium to store digital information. Here we report a storage strategy, called DNA Fountain, that is highly robust and approaches the information capacity per nucleotide. Using our approach, we stored a full computer operating system, movie, and other files with a total of 2.14 × 106 bytes in DNA oligonucleotides and perfectly retrieved the information from a sequencing coverage equivalent to a single tile of Illumina sequencing. We also tested a process that can allow 2.18 × 1015 retrievals using the original DNA sample and were able to perfectly decode the data. Finally, we explored the limit of our architecture in terms of bytes per molecule and obtained a perfect retrieval from a density of 215 petabytes per gram of DNA, orders of magnitude higher than previous reports.", "title": "" }, { "docid": "d043a086f143c713e4c4e74c38e3040c", "text": "Background: The NASA Metrics Data Program data sets have been heavily used in software defect prediction experiments. Aim: To demonstrate and explain why these data sets require significant pre-processing in order to be suitable for defect prediction. Method: A meticulously documented data cleansing process involving all 13 of the original NASA data sets. Results: Post our novel data cleansing process; each of the data sets had between 6 to 90 percent less of their original number of recorded values. Conclusions: One: Researchers need to analyse the data that forms the basis of their findings in the context of how it will be used. Two: Defect prediction data sets could benefit from lower level code metrics in addition to those more commonly used, as these will help to distinguish modules, reducing the likelihood of repeated data points. Three: The bulk of defect prediction experiments based on the NASA Metrics Data Program data sets may have led to erroneous findings. This is mainly due to repeated data points potentially causing substantial amounts of training and testing data to be identical.", "title": "" }, { "docid": "dc119b4f06012c82c31fe2a30d0ccb2d", "text": "Multipliers are the most commonly used elements in today's digital devices. In order to achieve high data throughput in digital signal processing systems, hardware multiplication is the important factor. Depending on the applications which are emerging with the electronics devices, various types of multipliers are emerged. Among all the multipliers, the basic multiplier is Array Multiplier. This paper aims at design of an optimized, low power and high speed 4- bit array multiplier by proposing Modified Gate Diffusion Input (MOD-GDI) technique. With this technique the total propagation delay, power dissipation, and no. of transistors required to design are much more decreased than compared to the Gate Diffusion Input (GDI) and CMOS techniques. Simulations are carried out on mentor graphics tools with 90nm Process technology.", "title": "" }, { "docid": "22baf516cd64e54fdd74ff6fbb5076a1", "text": "In a world of global trading, maritime safety, security and efficiency are crucial issues. We propose a multi-task deep learning framework for vessel monitoring using Automatic Identification System (AIS) data streams. We combine recurrent neural networks with latent variable modeling and an embedding of AIS messages to a new representation space to jointly address key issues to be dealt with when considering AIS data streams: massive amount of streaming data, noisy data and irregular time-sampling. We demonstrate the relevance of the proposed deep learning framework on real AIS datasets for a three-task setting, namely trajectory reconstruction, anomaly detection and vessel type identification.", "title": "" }, { "docid": "876bbee05b7838f4de218b424d895887", "text": "Although it is commonplace to assume that the type or level of processing during the input of a verbal item determines the representation of that item in memory, which in turn influences later attempts to store, recognize, or recall that item or similar items, it is much less common to assume that the way in which an item is retrieved from memory is also a potent determiner of that item's subsequent representation in memory. Retrieval from memory is often assumed, implicitly or explicitly, as a process analogous to the way in which the contents of a memory location in a computer are read out, that is, as a process that does not, by itself, modify the state of the retrieved item in memory. In my opinion, however, there is ample evidence for a kind of Heisenberg principle with respect to retrieval processes: an item can seldom, if ever, be retrieved from memory without modifying the representation of that item in memory in significant ways. It is both appropriate and productive, I think, to analyze retrieval processes within the same kind of levels-of-processing framework formulated by Craik and Lockhart ( 1972) with respect to input processes; this chapter is an attempt to do so. In the first of the two main sections below, I explore the extent to which negative-recency phenomena in the long-term recall of a list of items is attributable to differences in levels of retrieval during initial recall. In the second section I present some recent results from ex-", "title": "" }, { "docid": "57dd237dda10f197c3ae99527be73f03", "text": "In this paper, we investigate the existence of nontrivial periodic solutions for an integrated pest management model which is impulsively controlled by means of biological and chemical controls used in a periodic fashion. For this model, a nonlinear incidence rate is employed to describe the transmission of the disease which is induced through the use of the biological control, while the chemical control is used with the same periodicity as the biological control, although not at the same time. Our problem is treated by means of an operator theoretic approach, being reduced first to a fixed point problem. It is then shown that once a threshold condition is reached, the trivial periodic solution loses its stability and a nontrivial periodic solution appears via a supercritical bifurcation.", "title": "" }, { "docid": "414f3647551a4cadeb05143d30230dec", "text": "Future cellular networks are faced with the challenge of coping with significant traffic growth without increasing operating costs. Network virtualization and Software Defined Networking (SDN) are emerging solutions for fine-grained control and management of networks. In this article, we present a new dynamic tunnel switching technique for SDN-based cellular core networks. The technique introduces a virtualized Evolved Packet Core (EPC) gateway with the capability to select and dynamically switch the user plane processing element for each user. Dynamic GPRS Tunneling Protocol (GTP) termination enables switching the mobility anchor of an active session between a cloud environment, where general purpose hardware is in use, and a fast path implemented with dedicated hardware. We describe a prototype implementation of the technique based on an OpenStack cloud, an OpenFlow controller with GTP tunnel switching, and a dedicated fast path element.", "title": "" }, { "docid": "4824f0ffb4a362aa113ced48a164d736", "text": "This paper presents architectures for active phased arrays for multiple scanning, hopping, and reconfigurable shaped beams for satellite applications. A comparison of the different architectures is discussed. An experimental model which incorporates active monolithic microwave integrated circuit (MMIC) components for beam control is described. The technology for this model is directly applicable to the various architectures presented.", "title": "" }, { "docid": "bae6237b21da2577c755e37280560429", "text": "Numerous models for grounded language understanding have been recently proposed, including (i) generic modules that can be used easily adapted to any given task with little adaptation and (ii) intuitively appealing modular models that require background knowledge to be instantiated. We compare generic and modular models in how much they lend themselves to a particular form of systematic generalization. Using a synthetic VQA test, we evaluate which models are capable of reasoning about all possible object pairs after training on only a small subset of them. Our findings show that the generalization of modular models is much more systematic and that it is highly sensitive to the module layout, i.e. to how exactly the modules are connected. We furthermore investigate if modular models that generalize well could be made more end-to-end by learning their layout and parametrization. We show how end-to-end methods from prior work often learn a wrong layout and a spurious parametrization that do not facilitate systematic generalization. Our results suggest that, in addition to modularity, systematic generalization in language understanding may require explicit regularizers or priors.", "title": "" }, { "docid": "142acad6b5a76543cf023bfc25cb34f7", "text": "Reasoning about ordinary human situations and activities requires the availability of diverse types of knowledge, including expectations about the probable results of actions and the lexical entailments for many predicates. We describe initial work to acquire such a collection of conditional (if–then) knowledge by exploiting presuppositional discourse patterns (such as ones involving ‘but’, ‘yet’, and ‘hoping to’) and abstracting the matched material into general rules.", "title": "" }, { "docid": "b27487fbeca0b55fef83bf09374b6251", "text": "This investigation examined whether access to sign language as a medium for instruction influences theory of mind (ToM) reasoning in deaf children with similar home language environments. Experiment 1 involved 97 deaf Italian children ages 4-12 years: 56 were from deaf families and had LIS (Italian Sign Language) as their native language, and 41 had acquired LIS as late signers following contact with signers outside their hearing families. Children receiving bimodal/bilingual instruction in LIS together with Sign-Supported and spoken Italian significantly outperformed children in oralist schools in which communication was in Italian and often relied on lipreading. Experiment 2 involved 61 deaf children in Estonia and Sweden ages 6-16 years. On a wide variety of ToM tasks, bilingually instructed native signers in Estonian Sign Language and spoken Estonian succeeded at a level similar to age-matched hearing children. They outperformed bilingually instructed late signers and native signers attending oralist schools. Particularly for native signers, access to sign language in a bilingual environment may facilitate conversational exchanges that promote the expression of ToM by enabling children to monitor others' mental states effectively.", "title": "" }, { "docid": "85fc78cc3f71b784063b8b564e6509a9", "text": "Numerous research papers have listed different vectors of personally identifiable information leaking via tradition al and mobile Online Social Networks (OSNs) and highlighted the ongoing aggregation of data about users visiting popular We b sites. We argue that the landscape is worsening and existing proposals (including the recent U.S. Federal Trade Commission’s report) do not address several key issues. We examined over 100 popular non-OSN Web sites across a number of categories where tens of millions of users representing d iverse demographics have accounts, to see if these sites leak private information to prominent aggregators. Our results raise considerable concerns: we see leakage in sites for every category we examined; fully 56% of the sites directly leak pieces of private information with this result growing to 75% if we also include leakage of a site userid. Sensitive search strings sent to healthcare Web sites and travel itineraries on flight reservation sites are leaked in 9 of the top 10 sites studied for each category. The community needs a clear understanding of the shortcomings of existing privac y protection measures and the new proposals. The growing disconnect between the protection measures and increasing leakage and linkage suggests that we need to move beyond the losing battle with aggregators and examine what roles first-party sites can play in protecting privacy of their use rs.", "title": "" }, { "docid": "1a2fe54f7456c5e726f87a401a4628f3", "text": "Starting from a neurobiological standpoint, I will propose that our capacity to understand others as intentional agents, far from being exclusively dependent upon mentalistic/linguistic abilities, be deeply grounded in the relational nature of our interactions with the world. According to this hypothesis, an implicit, prereflexive form of understanding of other individuals is based on the strong sense of identity binding us to them. We share with our conspecifics a multiplicity of states that include actions, sensations and emotions. A new conceptual tool able to capture the richness of the experiences we share with others will be introduced: the shared manifold of intersubjectivity. I will posit that it is through this shared manifold that it is possible for us to recognize other human beings as similar to us. It is just because of this shared manifold that intersubjective communication and ascription of intentionality become possible. It will be argued that the same neural structures that are involved in processing and controlling executed actions, felt sensations and emotions are also active when the same actions, sensations and emotions are to be detected in others. It therefore appears that a whole range of different \"mirror matching mechanisms\" may be present in our brain. This matching mechanism, constituted by mirror neurons originally discovered and described in the domain of action, could well be a basic organizational feature of our brain, enabling our rich and diversified intersubjective experiences. This perspective is in a position to offer a global approach to the understanding of the vulnerability to major psychoses such as schizophrenia.", "title": "" }, { "docid": "f87fea9cd76d1545c34f8e813347146e", "text": "In fault detection and isolation, diagnostic test results are commonly used to compute a set of diagnoses, where each diagnosis points at a set of components which might behave abnormally. In distributed systems consisting of multiple control units, the test results in each unit can be used to compute local diagnoses while all test results in the complete system give the global diagnoses. It is an advantage for both repair and fault-tolerant control to have access to the global diagnoses in each unit since these diagnoses represent all test results in all units. However, when the diagnoses, for example, are to be used to repair a unit, only the components that are used by the unit are of interest. The reason for this is that it is only these components that could have caused the abnormal behavior. However, the global diagnoses might include components from the complete system and therefore often include components that are superfluous for the unit. Motivated by this observation, a new type of diagnosis is proposed, namely, the condensed diagnosis. Each unit has a unique set of condensed diagnoses which represents the global diagnoses. The benefit of the condensed diagnoses is that they only include components used by the unit while still representing the global diagnoses. The proposed method is applied to an automotive vehicle, and the results from the application study show the benefit of using condensed diagnoses compared to global diagnoses.", "title": "" }, { "docid": "1648a759d2487177af4b5d62407fd6cd", "text": "This paper discusses the presence of steady-state limit cycles in digitally controlled pulse-width modulation (PWM) converters, and suggests conditions on the control law and the quantization resolution for their elimination. It then introduces single-phase and multi-phase controlled digital dither as a means of increasing the effective resolution of digital PWM (DPWM) modules, allowing for the use of low resolution DPWM units in high regulation accuracy applications. Bounds on the number of bits of dither that can be used in a particular converter are derived.", "title": "" }, { "docid": "818db2be19d63a64856909dee5d76081", "text": "Generating captions for images is a task that has recently received considerable attention. In this work we focus on caption generation for abstract scenes, or object layouts where the only information provided is a set of objects and their locations. We propose OBJ2TEXT, a sequence-tosequence model that encodes a set of objects and their locations as an input sequence using an LSTM network, and decodes this representation using an LSTM language model. We show that our model, despite encoding object layouts as a sequence, can represent spatial relationships between objects, and generate descriptions that are globally coherent and semantically relevant. We test our approach in a task of object-layout captioning by using only object annotations as inputs. We additionally show that our model, combined with a state-of-the-art object detector, improves an image captioning model from 0.863 to 0.950 (CIDEr score) in the test benchmark of the standard MS-COCO Captioning task.", "title": "" }, { "docid": "dc42ffc3d9a5833f285bac114e8a8b37", "text": "In this paper, we present a recursive algorithm for extracting classification rules from feedforward neural networks (NNs) that have been trained on data sets having both discrete and continuous attributes. The novelty of this algorithm lies in the conditions of the extracted rules: the rule conditions involving discrete attributes are disjoint from those involving continuous attributes. The algorithm starts by first generating rules with discrete attributes only to explain the classification process of the NN. If the accuracy of a rule with only discrete attributes is not satisfactory, the algorithm refines this rule by recursively generating more rules with discrete attributes not already present in the rule condition, or by generating a hyperplane involving only the continuous attributes. We show that for three real-life credit scoring data sets, the algorithm generates rules that are not only more accurate but also more comprehensible than those generated by other NN rule extraction methods.", "title": "" }, { "docid": "a3b8733ec5d0b65d2cae7fec9a856d5f", "text": "Currently, there is debate among scholars regarding how to operationalize and measure executive functions. These functions generally are referred to as “supervisory” cognitive processes because they involve higher level organization and execution of complex thoughts and behavior. Although conceptualizations vary regarding what mental processes actually constitute the “executive function” construct, there has been a historical linkage of these “higher-level” processes with the frontal lobes. In fact, many investigators have used the term “frontal functions” synonymously with “executive functions” despite evidence that contradicts this synonymous usage. The current review provides a critical analysis of lesion and neuroimaging studies using three popular executive function measures (Wisconsin Card Sorting Test, Phonemic Verbal Fluency, and Stroop Color Word Interference Test) in order to examine the validity of the executive function construct in terms of its relation to activation and damage to the frontal lobes. Empirical lesion data are examined via meta-analysis procedures along with formula derivatives. Results reveal mixed evidence that does not support a one-to-one relationship between executive functions and frontal lobe activity. The paper concludes with a discussion of the implications of construing the validity of these neuropsychological tests in anatomical, rather than cognitive and behavioral, terms.", "title": "" } ]
scidocsrr
42fbc64c151714a87558e63ee70bdfea
Deep Deterministic Policy Gradient for Urban Traffic Light Control
[ { "docid": "05a4ec72afcf9b724979802b22091fd4", "text": "Convolutional neural networks (CNNs) have greatly improved state-of-the-art performances in a number of fields, notably computer vision and natural language processing. In this work, we are interested in generalizing the formulation of CNNs from low-dimensional regular Euclidean domains, where images (2D), videos (3D) and audios (1D) are represented, to high-dimensional irregular domains such as social networks or biological networks represented by graphs. This paper introduces a formulation of CNNs on graphs in the context of spectral graph theory. We borrow the fundamental tools from the emerging field of signal processing on graphs, which provides the necessary mathematical background and efficient numerical schemes to design localized graph filters efficient to learn and evaluate. As a matter of fact, we introduce the first technique that offers the same computational complexity than standard CNNs, while being universal to any graph structure. Numerical experiments on MNIST and 20NEWS demonstrate the ability of this novel deep learning system to learn local, stationary, and compositional features on graphs, as long as the graph is well-constructed.", "title": "" } ]
[ { "docid": "aada9722cb54130151657a84417d14a1", "text": "Classical theories of sensory processing view the brain as a passive, stimulus-driven device. By contrast, more recent approaches emphasize the constructive nature of perception, viewing it as an active and highly selective process. Indeed, there is ample evidence that the processing of stimuli is controlled by top–down influences that strongly shape the intrinsic dynamics of thalamocortical networks and constantly create predictions about forthcoming sensory events. We discuss recent experiments indicating that such predictions might be embodied in the temporal structure of both stimulus-evoked and ongoing activity, and that synchronous oscillations are particularly important in this process. Coherence among subthreshold membrane potential fluctuations could be exploited to express selective functional relationships during states of expectancy or attention, and these dynamic patterns could allow the grouping and selection of distributed neuronal responses for further processing.", "title": "" }, { "docid": "1572891f4c2ab064c6d6a164f546e7c1", "text": "BACKGROUND Unexplained gastrointestinal (GI) symptoms and joint hypermobility (JHM) are common in the general population, the latter described as benign joint hypermobility syndrome (BJHS) when associated with musculo-skeletal symptoms. Despite overlapping clinical features, the prevalence of JHM or BJHS in patients with functional gastrointestinal disorders has not been examined. METHODS The incidence of JHM was evaluated in 129 new unselected tertiary referrals (97 female, age range 16-78 years) to a neurogastroenterology clinic using a validated 5-point questionnaire. A rheumatologist further evaluated 25 patients with JHM to determine the presence of BJHS. Groups with or without JHM were compared for presentation, symptoms and outcomes of relevant functional GI tests. KEY RESULTS Sixty-three (49%) patients had evidence of generalized JHM. An unknown aetiology for GI symptoms was significantly more frequent in patients with JHM than in those without (P < 0.0001). The rheumatologist confirmed the clinical impression of JHM in 23 of 25 patients, 17 (68%) of whom were diagnosed with BJHS. Patients with co-existent BJHS and GI symptoms experienced abdominal pain (81%), bloating (57%), nausea (57%), reflux symptoms (48%), vomiting (43%), constipation (38%) and diarrhoea (14%). Twelve of 17 patients presenting with upper GI symptoms had delayed gastric emptying. One case is described in detail. CONCLUSIONS & INFERENCES In a preliminary retrospective study, we have found a high incidence of JHM in patients referred to tertiary neurogastroenterology care with unexplained GI symptoms and in a proportion of these a diagnosis of BJHS is made. Symptoms and functional tests suggest GI dysmotility in a number of these patients. The possibility that a proportion of patients with unexplained GI symptoms and JHM may share a common pathophysiological disorder of connective tissue warrants further investigation.", "title": "" }, { "docid": "c6d3f20e9d535faab83fb34cec0fdb5b", "text": "Over the past two decades several attempts have been made to address the problem of face recognition and a voluminous literature has been produced. Current face recognition systems are able to perform very well in controlled environments e.g. frontal face recognition, where face images are acquired under frontal pose with strict constraints as defined in related face recognition standards. However, in unconstrained situations where a face may be captured in outdoor environments, under arbitrary illumination and large pose variations these systems fail to work. With the current focus of research to deal with these problems, much attention has been devoted in the facial feature extraction stage. Facial feature extraction is the most important step in face recognition. Several studies have been made to answer the questions like what features to use, how to describe them and several feature extraction techniques have been proposed. While many comprehensive literature reviews exist for face recognition a complete reference for different feature extraction techniques and their advantages/disadvantages with regards to a typical face recognition task in unconstrained scenarios is much needed. In this chapter we present a comprehensive review of the most relevant feature extraction techniques used in 2D face recognition and introduce a new feature extraction technique termed as Face-GLOH-signature to be used in face recognition for the first time (Sarfraz and Hellwich, 2008), which has a number of advantages over the commonly used feature descriptions in the context of unconstrained face recognition. The goal of feature extraction is to find a specific representation of the data that can highlight relevant information. This representation can be found by maximizing a criterion or can be a pre-defined representation. Usually, a face image is represented by a high dimensional vector containing pixel values (holistic representation) or a set of vectors where each vector summarizes the underlying content of a local region by using a high level 1", "title": "" }, { "docid": "0ee744ad3c75f7bb9695c47165d87043", "text": "Clustering is a critical component of many data analysis tasks, but is exceedingly difficult to fully automate. To better incorporate domain knowledge, researchers in machine learning, human-computer interaction, visualization, and statistics have independently introduced various computational tools to engage users through interactive clustering. In this work-in-progress paper, we present a cross-disciplinary literature survey, and find that existing techniques often do not meet the needs of real-world data analysis. Semi-supervised machine learning algorithms often impose prohibitive user interaction costs or fail to account for external analysis requirements. Human-centered approaches and user interface designs often fall short because of their insufficient statistical modeling capabilities. Drawing on effective approaches from each field, we identify five characteristics necessary to support effective human-in-the-loop interactive clustering: iterative, multi-objective, local updates that can operate on any initial clustering and a dynamic set of features. We outline key aspects of our technique currently under development, and share our initial evidence suggesting that all five design considerations can be incorporated into a single algorithm. We plan to demonstrate our technique on three data analysis tasks: feature engineering for classification, exploratory analysis of biomedical data, and multi-document summarization.", "title": "" }, { "docid": "4c102cb77b3992f6cb29a117994804eb", "text": "These current studies explored the impact of individual differences in personality factors on interface interaction and learning performance behaviors in both an interactive visualization and a menu-driven web table in two studies. Participants were administered 3 psychometric measures designed to assess Locus of Control, Extraversion, and Neuroticism. Participants were then asked to complete multiple procedural learning tasks in each interface. Results demonstrated that all three measures predicted completion times. Additionally, results analyses demonstrated personality factors also predicted the number of insights participants reported while completing the tasks in each interface. We discuss how these findings advance our ongoing research in the Personal Equation of Interaction.", "title": "" }, { "docid": "435200b067ebd77f69a04cc490d73fa6", "text": "Self-mutilation of genitalia is an extremely rare entity, usually found in psychotic patients. Klingsor syndrome is a condition in which such an act is based upon religious delusions. The extent of genital mutilation can vary from superficial cuts to partial or total amputation of penis to total emasculation. The management of these patients is challenging. The aim of the treatment is restoration of the genital functionality. Microvascular reanastomosis of the phallus is ideal but it is often not possible due to the delay in seeking medical attention, non viability of the excised phallus or lack of surgical expertise. Hence, it is not unusual for these patients to end up with complete loss of the phallus and a perineal urethrostomy. We describe a patient with Klingsor syndrome who presented to us with near total penile amputation. The excised phallus was not viable and could not be used. The patient was managed with surgical reconstruction of the penile stump which was covered with loco-regional flaps. The case highlights that a functional penile reconstruction is possible in such patients even when microvascular reanastomosis is not feasible. This technique should be attempted before embarking upon perineal urethrostomy.", "title": "" }, { "docid": "03a6425423516d0f978bb5f8abe0d62d", "text": "Machine ethics and robot rights are quickly becoming hot topics in artificial intelligence/robotics communities. We will argue that the attempts to allow machines to make ethical decisions or to have rights are misguided. Instead we propose a new science of safety engineering for intelligent artificial agents. In particular we issue a challenge to the scientific community to develop intelligent systems capable of proving that they are in fact safe even under recursive selfimprovement.", "title": "" }, { "docid": "6d471fcfa68cfb474f2792892e197a66", "text": "The introduction of software technology in a life-dependent environment requires the development team to execute a process that ensures a high level of software reliability and correctness. Despite their popularity, agile methods are generally assumed to be inappropriate as a process family in these environments due to their lack of emphasis on documentation, traceability, and other formal techniques. Agile methods, notably Scrum, favor empirical process control, or small constant adjustments in a tight feedback loop. This paper challenges the assumption that agile methods are inappropriate for safety-critical software development. Agile methods are flexible enough to encourage the rightamount of ceremony; therefore if safety-critical systems require greater emphasis on activities like formal specification and requirements management, then an agile process will include these as necessary activities. Furthermore, agile methods focus more on continuous process management and code-level quality than classic software engineering process models. We present our experiences on the image-guided surgical toolkit (IGSTK) project as a backdrop. IGSTK is an open source software project employing agile practices since 2004. We started with the assumption that a lighter process is better, focused on evolving code, and only adding process elements as the need arose. IGSTK has been adopted by teaching hospitals and research labs, and used for clinical trials. Agile methods have matured since the academic community suggested they are not suitable for safety-critical systems almost a decade ago, we present our experiences as a case study for renewing the discussion.", "title": "" }, { "docid": "5956e9399cfe817aa1ddec5553883bef", "text": "Most existing zero-shot learning methods consider the problem as a visual semantic embedding one. Given the demonstrated capability of Generative Adversarial Networks(GANs) to generate images, we instead leverage GANs to imagine unseen categories from text descriptions and hence recognize novel classes with no examples being seen. Specifically, we propose a simple yet effective generative model that takes as input noisy text descriptions about an unseen class (e.g. Wikipedia articles) and generates synthesized visual features for this class. With added pseudo data, zero-shot learning is naturally converted to a traditional classification problem. Additionally, to preserve the inter-class discrimination of the generated features, a visual pivot regularization is proposed as an explicit supervision. Unlike previous methods using complex engineered regularizers, our approach can suppress the noise well without additional regularization. Empirically, we show that our method consistently outperforms the state of the art on the largest available benchmarks on Text-based Zero-shot Learning.", "title": "" }, { "docid": "bdf16e241e4d33af64b7dd5a97873a2c", "text": "Although lentils (Lens culinaris L) contain several bioactive compounds that have been linked to the prevention of cancer, the in vivo chemopreventive ability of lentils against chemically induced colorectal cancer has not been examined. Our present study examined the hypothesis that lentils could suppress the early carcinogenesis in vivo by virtue of their bioactive micro- and macroconstituents and that culinary thermal treatment could affect their chemopreventive potential. To accomplish this goal, we used raw whole lentils (RWL), raw split lentils (RSL), cooked whole lentils (CWL), and cooked split lentils (CSL). Raw soybeans (RSB; Glycine max) were used for the purpose of comparison with a well-studied chemopreventive agent. Sixty weanling Fischer 344 male rats, 4 to 5 weeks of age, were randomly assigned to 6 groups (10 rats/group): the control group (C) received AIN-93G diet, and treatment leguminous groups of RWL, CWL, RSL, CSL, and RSB received the treatment diets containing AIN-93G+5% of the above-mentioned legumes. After acclimatization for 1 week (at 5th to 6th week of age), all animals were put on the control and treatment diets separately for 5 weeks (from 6th to 11th week of age). At the end of the 5th week of feeding (end of 11th week of age), all rats received 2 subcutaneous injections of azoxymethane carcinogen at 15 mg/kg rat body weight per dose once a week for 2 consecutive weeks. After 17 weeks of the last azoxymethane injection (from 12th to 29th week of age), all rats were euthanized. Chemopreventive ability was assessed using colonic aberrant crypt foci and activity of hepatic glutathione-S-transferases. Significant reductions (P < .05) were found in total aberrant crypt foci number (mean +/- SEM) for RSB (27.33 +/- 4.32), CWL (33.44 +/- 4.56), and RSL (37.00 +/- 6.02) in comparison with the C group (58.33 +/- 8.46). Hepatic glutathione-S-transferases activities increased significantly (P < .05) in rats fed all treatment diets (from 51.38 +/- 3.66 to 67.94 +/- 2.01 micromol mg(-1) min(-1)) when compared with control (C) diet (26.13 +/- 1.01 micromol mg(-1) min(-1)). Our findings indicate that consumption of lentils might be protective against colon carcinogenesis and that hydrothermal treatment resulted in an improvement in the chemopreventive potential for the whole lentils.", "title": "" }, { "docid": "dd51d7253e6e249980e4f1f945f93c84", "text": "In real-time strategy games like StarCraft, skilled players often block the entrance to their base with buildings to prevent the opponent’s units from getting inside. This technique, called “walling-in”, is a vital part of player’s skill set, allowing him to survive early aggression. However, current artificial players (bots) do not possess this skill, due to numerous inconveniences surfacing during its implementation in imperative languages like C++ or Java. In this text, written as a guide for bot programmers, we address the problem of finding an appropriate building placement that would block the entrance to player’s base, and present a ready to use declarative solution employing the paradigm of answer set programming (ASP). We also encourage the readers to experiment with different declarative approaches to this problem.", "title": "" }, { "docid": "78a0898f35113547cdc3adb567ad7afb", "text": "Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. This is called a deceptive phishing attack. In this paper, a thorough overview of a deceptive phishing attack and its countermeasure techniques, which is called anti-phishing, is presented. Firstly, technologies used by phishers and the definition, classification and future works of deceptive phishing attacks are discussed. Following with the existing anti-phishing techniques in literatures and research-stage technologies are shown, and a thorough analysis which includes the advantages and shortcomings of countermeasures is given. At last, we show the research of why people fall for phishing attack.", "title": "" }, { "docid": "cce5d75bfcfc22f7af08f6b0b599d472", "text": "In order to determine if exposure to carcinogens in fire smoke increases the risk of cancer, we examined the incidence of cancer in a cohort of 2,447 male firefighters in Seattle and Tacoma, (Washington, USA). The study population was followed for 16 years (1974–89) and the incidence of cancer, ascertained using a population-based tumor registry, was compared with local rates and with the incidence among 1,878 policemen from the same cities. The risk of cancer among firefighters was found to be similar to both the police and the general male population for most common sites. An elevated risk of prostate cancer was observed relative to the general population (standardized incidence ratio [SIR]=1.4, 95 percent confidence interval [CI]=1.1–1.7) but was less elevated compared with rates in policement (incidence density ratio [IDR]=1.1, CI=0.7–1.8) and was not related to duration of exposure. The risk of colon cancer, although only slightly elevated relative to the general population (SIR=1.1, CI=0.7–1.6) and the police (IDR=1.3, CI=0.6–3.0), appeared to increase with duration of employment. Although the relationship between firefighting and colon cancer is consistent with some previous studies, it is based on small numbers and may be due to chance. While this study did not find strong evidence for an excess risk of cancer, the presence of carcinogens in the firefighting environment warrants periodic re-evaluation of cancer incidence in this population and the continued use of protective equipment.", "title": "" }, { "docid": "b3840c076852c5bc9a2f50e1a1938780", "text": "The rapid progress in medical and technical innovations in the neonatal intensive care unit (NICU) has been accompanied by concern for outcomes of NICU graduates. Although advances in neonatal care have led to significant changes in survival rates of very small and extremely preterm neonates, early feeding difficulties with the transition from tube feeding to oral feeding are prominent and often persist beyond discharge to home. Progress in learning to feed in the NICU and continued growth in feeding skills after the NICU may be closely tied to fostering neuroprotection and safety. The experience of learning to feed in the NICU may predispose preterm neonates to feeding problems that persist. Neonatal feeding as an area of specialized clinical practice has grown considerably in the last decade. This article is the first in a two-part series devoted to neonatal feeding. Part 1 explores factors in NICU feeding experiences that may serve to constrain or promote feeding skill development, not only in the NICU but long after discharge to home. Part II describes approaches to intervention that support neuroprotection and safety.", "title": "" }, { "docid": "80b86f424d8f99a28f0bd4d16a89fe3d", "text": "Programming is traditionally taught using a bottom-up approach, where details of syntax and implementation of data structures are the predominant concepts. The top-down approach proposed focuses instead on understanding the abstractions represented by the classical data structures without regard to their physical implementation. Only after the students are comfortable with the behavior and applications of the major data structures do they learn about their implementations or the basic data types like arrays and pointers that are used. This paper discusses the benefits of such an approach and how it is being used in a Computer Science curriculum.", "title": "" }, { "docid": "430d74071a8b399675d10d43b3b337ac", "text": "Machine learning systems can often achieve high performance on a test set by relying on heuristics that are effective for frequent example types but break down in more challenging cases. We study this issue within natural language inference (NLI), the task of determining whether one sentence entails another. Based on an analysis of the task, we hypothesize three fallible syntactic heuristics that NLI models are likely to adopt: the lexical overlap heuristic, the subsequence heuristic, and the constituent heuristic. To determine whether models have adopted these heuristics, we introduce a controlled evaluation set called HANS (Heuristic Analysis for NLI Systems), which contains many examples where the heuristics fail. We find that models trained on MNLI, including the state-of-the-art model BERT, perform very poorly on HANS, suggesting that they have indeed adopted these heuristics. We conclude that there is substantial room for improvement in NLI systems, and that the HANS dataset can motivate and measure progress in this area.", "title": "" }, { "docid": "dfc44cd25a729035e93dbd1a04806510", "text": "Recommender systems are firmly established as a standard technology for assisting users with their choices; however, little attention has been paid to the application of the user model in recommender systems, particularly the variability and noise that are an intrinsic part of human behavior and activity. To enable recommender systems to suggest items that are useful to a particular user, it can be essential to understand the user and his or her interactions with the system. These interactions typically manifest themselves as explicit and implicit user feedback that provides the key indicators for modeling users’ preferences for items and essential information for personalizing recommendations. In this article, we propose a classification framework for the use of explicit and implicit user feedback in recommender systems based on a set of distinct properties that include Cognitive Effort, User Model, Scale of Measurement, and Domain Relevance. We develop a set of comparison criteria for explicit and implicit user feedback to emphasize the key properties. Using our framework, we provide a classification of recommender systems that have addressed questions about user feedback, and we review state-of-the-art techniques to improve such user feedback and thereby improve the performance of the recommender system. Finally, we formulate challenges for future research on improvement of user feedback.", "title": "" }, { "docid": "e9006af64364e6dcd1ea4684642539de", "text": "Since the publication of the PDP volumes in 1986,1 learning by backpropagation has become the most popular method of training neural networks. The reason for the popularity is the underlying simplicity and relative power of the algorithm. Its power derives from the fact that, unlike its precursors, the perceptron learning rule and the Widrow-Hoff learning rule, it can be employed for training nonlinear networks of arbitrary connectivity. Since such networks are often required for real-world applications, such a learning procedure is critical. Nearly as important as its power in explaining its popularity is its simplicity. The basic igea is old and simple; namely define an error function and use hill climbing (or gradient descent if you prefer going downhill) to find a set of weights which optimize performance on a particular task. The algorithm is so simple that it can be implemented in a few lines' of code, and there have been no doubt many thousands of implementations of the algorithm by now. The name back propagation actually comes from the term employed by Rosenblatt (1962) for his attempt to generalize the perceptron learning algorithm to the multilayer case. There were many attempts to generalize the perceptron learning procedure to multiple layers during the 1960s and 1970s, but none of them were especially successful. There appear to have been at least three independent inventions of the modem version of the back-propagation algorithm: Paul Werbos developed the basic idea in 1974 in a Ph.D. dissertation entitled", "title": "" }, { "docid": "d1c4e0da79ceb8893f63aa8ea7c8041c", "text": "This paper describes the GOLD (Generic Obstacle and Lane Detection) system, a stereo vision-based hardware and software architecture developed to increment road safety of moving vehicles: it allows to detect both generic obstacles (without constraints on symmetry or shape) and the lane position in a structured environment (with painted lane markings). It has been implemented on the PAPRICA system and works at a rate of 10 Hz.", "title": "" }, { "docid": "19339fa01942ad3bf33270aa1f6ceae2", "text": "This study investigated query formulations by users with {\\it Cognitive Search Intents} (CSIs), which are users' needs for the cognitive characteristics of documents to be retrieved, {\\em e.g. comprehensibility, subjectivity, and concreteness. Our four main contributions are summarized as follows (i) we proposed an example-based method of specifying search intents to observe query formulations by users without biasing them by presenting a verbalized task description;(ii) we conducted a questionnaire-based user study and found that about half our subjects did not input any keywords representing CSIs, even though they were conscious of CSIs;(iii) our user study also revealed that over 50\\% of subjects occasionally had experiences with searches with CSIs while our evaluations demonstrated that the performance of a current Web search engine was much lower when we not only considered users' topical search intents but also CSIs; and (iv) we demonstrated that a machine-learning-based query expansion could improve the performances for some types of CSIs.Our findings suggest users over-adapt to current Web search engines,and create opportunities to estimate CSIs with non-verbal user input.", "title": "" } ]
scidocsrr
5f8cd134cbf9965c9a961a4bebcc312d
An Agile Approach to Building RISC-V Microprocessors
[ { "docid": "35f4a8131a27298b1aa04859450e6620", "text": "Data transport across short electrical wires is limited by both bandwidth and power density, which creates a performance bottleneck for semiconductor microchips in modern computer systems—from mobile phones to large-scale data centres. These limitations can be overcome by using optical communications based on chip-scale electronic–photonic systems enabled by silicon-based nanophotonic devices8. However, combining electronics and photonics on the same chip has proved challenging, owing to microchip manufacturing conflicts between electronics and photonics. Consequently, current electronic–photonic chips are limited to niche manufacturing processes and include only a few optical devices alongside simple circuits. Here we report an electronic–photonic system on a single chip integrating over 70 million transistors and 850 photonic components that work together to provide logic, memory, and interconnect functions. This system is a realization of a microprocessor that uses on-chip photonic devices to directly communicate with other chips using light. To integrate electronics and photonics at the scale of a microprocessor chip, we adopt a ‘zero-change’ approach to the integration of photonics. Instead of developing a custom process to enable the fabrication of photonics, which would complicate or eliminate the possibility of integration with state-of-the-art transistors at large scale and at high yield, we design optical devices using a standard microelectronics foundry process that is used for modern microprocessors. This demonstration could represent the beginning of an era of chip-scale electronic–photonic systems with the potential to transform computing system architectures, enabling more powerful computers, from network infrastructure to data centres and supercomputers.", "title": "" } ]
[ { "docid": "cf751df3c52306a106fcd00eef28b1a4", "text": "Mul-T is a parallel Lisp system, based on Multilisp's future construct, that has been developed to run on an Encore Multimax multiprocessor. Mul-T is an extended version of the Yale T system and uses the T system's ORBIT compiler to achieve “production quality” performance on stock hardware — about 100 times faster than Multilisp. Mul-T shows that futures can be implemented cheaply enough to be useful in a production-quality system. Mul-T is fully operational, including a user interface that supports managing groups of parallel tasks.", "title": "" }, { "docid": "dae877409dca88fc6fed5cf6536e65ad", "text": "My 1971 Turing Award Lecture was entitled \"Generality in Artificial Intelligence.\" The topic turned out to have been overambitious in that I discovered I was unable to put my thoughts on the subject in a satisfactory written form at that time. It would have been better to have reviewed my previous work rather than attempt something new, but such was not my custom at that time.\nI am grateful to ACM for the opportunity to try again. Unfortunately for our science, although perhaps fortunately for this project, the problem of generality in artificial intelligence (AI) is almost as unsolved as ever, although we now have many ideas not available in 1971. This paper relies heavily on such ideas, but it is far from a full 1987 survey of approaches for achieving generality. Ideas are therefore discussed at a length proportional to my familiarity with them rather than according to some objective criterion.\nIt was obvious in 1971 and even in 1958 that AI programs suffered from a lack of generality. It is still obvious; there are many more details. The first gross symptom is that a small addition to the idea of a program often involves a complete rewrite beginning with the data structures. Some progress has been made in modularizing data structures, but small modifications of the search strategies are even less likely to be accomplished without rewriting.\nAnother symptom is no one knows how to make a general database of commonsense knowledge that could be used by any program that needed the knowledge. Along with other information, such a database would contain what a robot would need to know about the effects of moving objects around, what a person can be expected to know about his family, and the facts about buying and selling. This does not depend on whether the knowledge is to be expressed in a logical language or in some other formalism. When we take the logic approach to AI, lack of generality shows up in that the axioms we devise to express commonsense knowledge are too restricted in their applicability for a general commonsense database. In my opinion, getting a language for expressing general commonsense knowledge for inclusion in a general database is the key problem of generality in AI.\nHere are some ideas for achieving generality proposed both before and after 1971. I repeat my disclaimer of comprehensiveness.", "title": "" }, { "docid": "25cd669a4fcf62ff56669bff22974634", "text": "In this paper, we introduce a novel framework for combining scientific knowledge within physicsbased models and recurrent neural networks to advance scientific discovery in many dynamical systems. We will first describe the use of outputs from physics-based models in learning a hybrid-physics-data model. Then, we further incorporate physical knowledge in real-world dynamical systems as additional constraints for training recurrent neural networks. We will apply this approach on modeling lake temperature and quality where we take into account the physical constraints along both the depth dimension and time dimension. By using scientific knowledge to guide the construction and learning the data-driven model, we demonstrate that this method can achieve better prediction accuracy as well as scientific consistency of results.", "title": "" }, { "docid": "1feaf48291b7ea83d173b70c23a3b7c0", "text": "Machine learning plays a critical role in extracting meaningful information out of the zetabytes of sensor data collected every day. For some applications, the goal is to analyze and understand the data to identify trends (e.g., surveillance, portable/wearable electronics); in other applications, the goal is to take immediate action based the data (e.g., robotics/drones, self-driving cars, smart Internet of Things). For many of these applications, local embedded processing near the sensor is preferred over the cloud due to privacy or latency concerns, or limitations in the communication bandwidth. However, at the sensor there are often stringent constraints on energy consumption and cost in addition to throughput and accuracy requirements. Furthermore, flexibility is often required such that the processing can be adapted for different applications or environments (e.g., update the weights and model in the classifier). In many applications, machine learning often involves transforming the input data into a higher dimensional space, which, along with programmable weights, increases data movement and consequently energy consumption. In this paper, we will discuss how these challenges can be addressed at various levels of hardware design ranging from architecture, hardware-friendly algorithms, mixed-signal circuits, and advanced technologies (including memories and sensors).", "title": "" }, { "docid": "4f64b2b2b50de044c671e3d0d434f466", "text": "Optical flow estimation is one of the oldest and still most active research domains in computer vision. In 35 years, many methodological concepts have been introduced and have progressively improved performances , while opening the way to new challenges. In the last decade, the growing interest in evaluation benchmarks has stimulated a great amount of work. In this paper, we propose a survey of optical flow estimation classifying the main principles elaborated during this evolution, with a particular concern given to recent developments. It is conceived as a tutorial organizing in a comprehensive framework current approaches and practices. We give insights on the motivations, interests and limitations of modeling and optimization techniques, and we highlight similarities between methods to allow for a clear understanding of their behavior. Motion analysis is one of the main tasks of computer vision. From an applicative viewpoint, the information brought by the dynamical behavior of observed objects or by the movement of the camera itself is a decisive element for the interpretation of observed phenomena. The motion characterizations can be extremely variable among the large number of application domains. Indeed, one can be interested in tracking objects, quantifying deformations, retrieving dominant motion, detecting abnormal behaviors, and so on. The most low-level characterization is the estimation of a dense motion field, corresponding to the displacement of each pixel, which is called optical flow. Most high-level motion analysis tasks employ optical flow as a fundamental basis upon which more semantic interpretation is built. Optical flow estimation has given rise to a tremendous quantity of works for 35 years. If a certain continuity can be found since the seminal works of [120,170], a number of methodological innovations have progressively changed the field and improved performances. Evaluation benchmarks and applicative domains have followed this progress by proposing new challenges allowing methods to face more and more difficult situations in terms of motion discontinuities, large displacements, illumination changes or computational costs. Despite great advances, handling these issues in a unique method still remains an open problem. Comprehensive surveys of optical flow literature were carried out in the nineties [21,178,228]. More recently, reviewing works have focused on variational approaches [264], benchmark results [13], specific applications [115], or tutorials restricted to a certain subset of methods [177,260]. However, covering all the main estimation approaches and including recent developments in a comprehensive classification is still lacking in the optical flow field. This survey …", "title": "" }, { "docid": "77d73cf3aa583e12cc102f48be184100", "text": "The combinatorial cross-regulation of hundreds of sequence-specific transcription factors (TFs) defines a regulatory network that underlies cellular identity and function. Here we use genome-wide maps of in vivo DNaseI footprints to assemble an extensive core human regulatory network comprising connections among 475 sequence-specific TFs and to analyze the dynamics of these connections across 41 diverse cell and tissue types. We find that human TF networks are highly cell selective and are driven by cohorts of factors that include regulators with previously unrecognized roles in control of cellular identity. Moreover, we identify many widely expressed factors that impact transcriptional regulatory networks in a cell-selective manner. Strikingly, in spite of their inherent diversity, all cell-type regulatory networks independently converge on a common architecture that closely resembles the topology of living neuronal networks. Together, our results provide an extensive description of the circuitry, dynamics, and organizing principles of the human TF regulatory network.", "title": "" }, { "docid": "427ebc0500e91e842873c4690cdacf79", "text": "Bounding volume hierarchy (BVH) has been widely adopted as the acceleration structure in broad-phase collision detection. Previous state-of-the-art BVH-based collision detection approaches exploited the spatio-temporal coherence of simulations by maintaining a bounding volume test tree (BVTT) front. A major drawback of these algorithms is that large deformations in the scenes decrease culling efficiency and slow down collision queries. Moreover, for front-based methods, the inefficient caching on GPU caused by the arbitrary layout of BVH and BVTT front nodes becomes a critical performance issue. We present a fast and robust BVH-based collision detection scheme on GPU that addresses the above problems by ordering and restructuring BVHs and BVTT fronts. Our techniques are based on the use of histogram sort and an auxiliary structure BVTT front log, through which we analyze the dynamic status of BVTT front and BVH quality. Our approach efficiently handles interand intra-object collisions and performs especially well in simulations where there is considerable spatio-temporal coherence. The benchmark results demonstrate that our approach is significantly faster than the previous BVH-based method, and also outperforms other state-of-the-art spatial subdivision schemes in terms of speed. CCS Concepts •Computing methodologies → Collision detection; Physical simulation;", "title": "" }, { "docid": "eff7d3775d12687c81ae91b130c7c562", "text": "We propose a novel approach for sparse probabilistic principal component analysis, that combines a low rank representation for the latent factors and loadings with a novel sparse variational inference approach for estimating distributions of latent variables subject to sparse support constraints. Inference and parameter estimation for the resulting model is achieved via expectation maximization with a novel variational inference method for the E-step that induces sparsity. We show that this inference problem can be reduced to discrete optimal support selection. The discrete optimization is submodular, hence, greedy selection is guaranteed to achieve 1-1/e fraction of the optimal. Empirical studies indicate effectiveness of the proposed approach for the recovery of a parsimonious decomposition as compared to established baseline methods. We also evaluate our method against state-of-the-art methods on high dimensional fMRI data, and show that the method performs as well as or better than other methods.", "title": "" }, { "docid": "2855a1f420ed782317c1598c9d9c185e", "text": "Ranking authors is vital for identifying a researcher’s impact and his standing within a scientific field. There are many different ranking methods (e.g., citations, publications, h-index, PageRank, and weighted PageRank), but most of them are topic-independent. This paper proposes topic-dependent ranks based on the combination of a topic model and a weighted PageRank algorithm. The Author-Conference-Topic (ACT) model was used to extract topic distribution of individual authors. Two ways for combining the ACT model with the PageRank algorithm are proposed: simple combination (I_PR) or using a topic distribution as a weighted vector for PageRank (PR_t). Information retrieval was chosen as the test field and representative authors for different topics at different time phases were identified. Principal Component Analysis (PCA) was applied to analyze the ranking difference between I_PR and PR_t.", "title": "" }, { "docid": "091eedcd69373f99419a745f2215e345", "text": "Society is increasingly reliant upon complex and interconnected cyber systems to conduct daily life activities. From personal finance to managing defense capabilities to controlling a vast web of aircraft traffic, digitized information systems and software packages have become integrated at virtually all levels of individual and collective activity. While such integration has been met with immense increases in efficiency of service delivery, it has also been subject to a diverse body of threats from nefarious hackers, groups, and even state government bodies. Such cyber threats have shifted over time to affect various cyber functionalities, such as with Direct Denial of Service (DDoS), data theft, changes to data code, infection via computer virus, and many others.", "title": "" }, { "docid": "8acfcaaa00cbfe275f6809fdaa3c6a78", "text": "Internet usage has drastically shifted from host-centric end-to-end communication to receiver-driven content retrieval. In order to adapt to this change, a handful of innovative information/content centric networking (ICN) architectures have recently been proposed. One common and important feature of these architectures is to leverage built-in network caches to improve the transmission efficiency of content dissemination. Compared with traditional Web Caching and CDN Caching, ICN Cache takes on several new characteristics: cache is transparent to applications, cache is ubiquitous, and content to be cached is more ine-grained. These distinguished features pose new challenges to ICN caching technologies. This paper presents a comprehensive survey of state-of-art techniques aiming to address these issues, with particular focus on reducing cache redundancy and improving the availability of cached content. As a new research area, this paper also points out several interesting yet challenging research directions in this subject. 2013 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "33bb646417d0ebbe01747b97323df5d0", "text": "Semantic search or text-to-video search in video is a novel and challenging problem in information and multimedia retrieval. Existing solutions are mainly limited to text-to-text matching, in which the query words are matched against the user-generated metadata. This kind of text-to-text search, though simple, is of limited functionality as it provides no understanding about the video content. This paper presents a state-of-the-art system for event search without any user-generated metadata or example videos, known as text-to-video search. The system relies on substantial video content understanding and allows for searching complex events over a large collection of videos. The proposed text-to-video search can be used to augment the existing text-to-text search for video. The novelty and practicality are demonstrated by the evaluation in NIST TRECVID 2014, where the proposed system achieves the best performance. We share our observations and lessons in building such a state-of-the-art system, which may be instrumental in guiding the design of the future system for video search and analysis.", "title": "" }, { "docid": "ce3f09b04cc8a5445e009d65169f1ad1", "text": "Current methods in treating chronic wounds have had limited success in large part due to the open loop nature of the treatment. We have created a localized 3D-printed smart wound dressing platform that will allow for real-time data acquisition of oxygen concentration, which is an important indicator of wound healing. This will serve as the first leg of a feedback loop for a fully optimized treatment mechanism tailored to the individual patient. A flexible oxygen sensor was designed and fabricated with high sensitivity and linear current output. With a series of off-the-shelf electronic components including a programmable-gain analog front-end, a microcontroller and wireless radio, an integrated electronic system with data readout and wireless transmission capabilities was assembled in a compact package. Using an elastomeric material, a bandage with exceptional flexibility and tensile strength was 3D-printed. The bandage contains cavities for both the oxygen sensor and the electronic systems, with contacts interfacing the two systems. Our integrated, flexible platform is the first step toward providing a self-operating, highly optimized remote therapy for chronic wounds.", "title": "" }, { "docid": "135b9476e787624b899686664b03e6a1", "text": "Amyotrophic lateral sclerosis (ALS) is the most common neurodegenerative disease of the motor system. Bulbar symptoms such as dysphagia and dysarthria are frequent features of ALS and can result in reductions in life expectancy and quality of life. These dysfunctions are assessed by clinical examination and by use of instrumented methods such as fiberendoscopic evaluation of swallowing and videofluoroscopy. Laryngospasm, another well-known complication of ALS, commonly comes to light during intubation and extubation procedures in patients undergoing surgery. Laryngeal and pharyngeal complications are treated by use of an array of measures, including body positioning, compensatory techniques, voice and breathing exercises, communication devices, dietary modifications, various safety strategies, and neuropsychological assistance. Meticulous monitoring of clinical symptoms and close cooperation within a multidisciplinary team (physicians, speech and language therapists, occupational therapists, dietitians, caregivers, the patients and their relatives) are vital.", "title": "" }, { "docid": "cd56f2a6a5187476c8e63370a14c0dd0", "text": "This complex infection has a number of objective manifestations, including a characteristic skin lesion called erythema migrans (the most common presentation of early Lyme disease), certain neurologic and cardiac manifestations, and pauciarticular arthritis (the most common presentation of late Lyme disease), all of which usually respond well to conventional antibiotic therapy. Despite resolution of the objective manifestations of infection after antibiotic treatment, a minority of patients have fatigue, musculoskeletal pain, difficulties with concentration or short-term memory, or all of these symptoms. In this article, we refer to these usually mild and self-limiting subjective symptoms as “post–Lyme disease symptoms,” and if they last longer than 6 months, we call them “post–Lyme disease syndrome.”", "title": "" }, { "docid": "99d57cef03e21531be9f9663ec023987", "text": "Anton Schwartz Dept. of Computer Science Stanford University Stanford, CA 94305 Email: schwartz@cs.stanford.edu Reinforcement learning addresses the problem of learning to select actions in order to maximize one's performance in unknown environments. To scale reinforcement learning to complex real-world tasks, such as typically studied in AI, one must ultimately be able to discover the structure in the world, in order to abstract away the myriad of details and to operate in more tractable problem spaces. This paper presents the SKILLS algorithm. SKILLS discovers skills, which are partially defined action policies that arise in the context of multiple, related tasks. Skills collapse whole action sequences into single operators. They are learned by minimizing the compactness of action policies, using a description length argument on their representation. Empirical results in simple grid navigation tasks illustrate the successful discovery of structure in reinforcement learning.", "title": "" }, { "docid": "9ff912ad71c84cfba286f1be7bd8d4b3", "text": "This article compares traditional industrial-organizational psychology (I-O) research published in Journal of Applied Psychology (JAP) with organizational behavior management (OBM) research published in Journal of Organizational Behavior Management (JOBM). The purpose of this comparison was to identify similarities and differences with respect to research topics and methodologies, and to offer suggestions for what OBM researchers and practitioners can learn from I-O. Articles published in JAP from 1987-1997 were reviewed and compared to articles published during the same decade in JOBM (Nolan, Jarema, & Austin, 1999). This comparison includes Barbara R. Bucklin, Alicia M. Alvero, Alyce M. Dickinson, John Austin, and Austin K. Jackson are affiliated with Western Michigan University. Address correspondence to Alyce M. Dickinson, Department of Psychology, Western Michigan University, Kalamazoo, MI 49008-5052 (E-mail: alyce.dickinson@ wmich.edu.) Journal of Organizational Behavior Management, Vol. 20(2) 2000 E 2000 by The Haworth Press, Inc. All rights reserved. 27 D ow nl oa de d by [ W es te rn M ic hi ga n U ni ve rs ity ] at 1 1: 14 0 3 Se pt em be r 20 12 JOURNAL OF ORGANIZATIONAL BEHAVIOR MANAGEMENT 28 (a) author characteristics, (b) authors published in both journals, (c) topics addressed, (d) type of article, and (e) research characteristics and methodologies. Among the conclusions are: (a) the primary relative strength of OBM is its practical significance, demonstrated by the proportion of research addressing applied issues; (b) the greatest strength of traditional I-O appears to be the variety and complexity of organizational research topics; and (c) each field could benefit from contact with research published in the other. [Article copies available for a fee from The Haworth Document Delivery Service: 1-800-342-9678. E-mail address: <getinfo@haworthpressinc.com> Website: <http://www.HaworthPress.com>]", "title": "" }, { "docid": "2648ec04733bbe56c1740e574c2a08e8", "text": "Most work on tweet sentiment analysis is mono-lingual and the models that are generated by machine learning strategies do not generalize across multiple languages. Cross-language sentiment analysis is usually performed through machine translation approaches that translate a given source language into the target language of choice. Machine translation is expensive and the results that are provided by theses strategies are limited by the quality of the translation that is performed. In this paper, we propose a language-agnostic translation-free method for Twitter sentiment analysis, which makes use of deep convolutional neural networks with character-level embeddings for pointing to the proper polarity of tweets that may be written in distinct (or multiple) languages. The proposed method is more accurate than several other deep neural architectures while requiring substantially less learnable parameters. The resulting model is capable of learning latent features from all languages that are employed during the training process in a straightforward fashion and it does not require any translation process to be performed whatsoever. We empirically evaluate the efficiency and effectiveness of the proposed approach in tweet corpora based on tweets from four different languages, showing that our approach comfortably outperforms the baselines. Moreover, we visualize the knowledge that is learned by our method to qualitatively validate its effectiveness for tweet sentiment classification.", "title": "" }, { "docid": "7ec93b17c88d09f8a442dd32127671d8", "text": "Understanding the 3D structure of a scene is of vital importance, when it comes to developing fully autonomous robots. To this end, we present a novel deep learning based framework that estimates depth, surface normals and surface curvature by only using a single RGB image. To the best of our knowledge this is the first work to estimate surface curvature from colour using a machine learning approach. Additionally, we demonstrate that by tuning the network to infer well designed features, such as surface curvature, we can achieve improved performance at estimating depth and normals. This indicates that network guidance is still a useful aspect of designing and training a neural network. We run extensive experiments where the network is trained to infer different tasks while the model capacity is kept constant resulting in different feature maps based on the tasks at hand. We outperform the previous state-of-the-art benchmarks which jointly estimate depths and surface normals while predicting surface curvature in parallel.", "title": "" }, { "docid": "7297a6317a3fc515d2d46943a2792c69", "text": "The present work elaborates the process design methodology for the evaluation of the distillation systems based on the economic, exergetic and environmental point of view, the greenhouse gas (GHG) emissions. The methodology proposes the Heat Integrated Pressure Swing Distillation Sequence (HiPSDS) is economic and reduces the GHG emissions than the conventional Extractive Distillation Sequence (EDS) and the Pressure Swing Distillation Sequence (PSDS) for the case study of isobutyl alcohol and isobutyl acetate with the solvents for EDS and with low pressure variations for PSDS and HiPSDS. The study demonstrates that the exergy analysis can predict the results of the economic and environmental evaluation associated with the process design.", "title": "" } ]
scidocsrr
52cd6d7d61d23ad6857c32ab4a8b159c
Women's partnered orgasm consistency is associated with greater duration of penile-vaginal intercourse but not of foreplay.
[ { "docid": "172aaf47ee3f89818abba35a463ecc76", "text": "I examined the relationship of recalled and diary recorded frequency of penile-vaginal intercourse (FSI), noncoital partnered sexual activity, and masturbation to measured waist and hip circumference in 120 healthy adults aged 19-38. Slimmer waist (in men and in the sexes combined) and slimmer hips (in men and women) were associated with greater FSI. Slimmer waist and hips were associated with rated importance of intercourse for men. Noncoital partnered sexual activity had a less consistent association with slimness. Slimmer waist and hips were associated with less masturbation (in men and in the sexes combined). I discuss the results in terms of differences between different sexual behaviors, attractiveness, emotional relatedness, physical sensitivity, sexual dysfunction, sociobiology, psychopharmacological aspects of excess fat and carbohydrate consumption, and implications for sex therapy.", "title": "" } ]
[ { "docid": "77233d4f7a7bb0150b5376c7bb93c108", "text": "In-filled frame structures are commonly used in buildings, even in those located in seismically active regions. Precent codes unfortunately, do not have adequate guidance for treating the modelling, analysis and design of in-filled frame structures. This paper addresses this need and first develops an appropriate technique for modelling the infill-frame interface and then uses it to study the seismic response of in-filled frame structures. Finite element time history analyses under different seismic records have been carried out and the influence of infill strength, openings and soft-storey phenomenon are investigated. Results in terms of tip deflection, fundamental period, inter-storey drift ratio and stresses are presented and they will be useful in the seismic design of in-filled frame structures.", "title": "" }, { "docid": "dcc56a831c040a1ac8e08fcd177962d1", "text": "Clothing image recognition has recently received considerable attention from many communities, such as multimedia information processing and computer vision, due to its commercial and social applications. However, the large variations in clothing images’ appearances and styles and their complicated formation conditions make the problem challenging. In addition, a generic treatment with convolutional neural networks (CNNs) cannot provide a satisfactory solution considering the training time and recognition performance. Therefore, how to balance those two factors for clothing image recognition is an interesting problem. Motivated by the fast training and straightforward solutions exhibited by extreme learning machines (ELMs), in this paper, we propose a recognition framework that is based on multiple sources of features and ELM neural networks. In this framework, three types of features are first extracted, including CNN features with pre-trained networks, histograms of oriented gradients and color histograms. Second, those low-level features are concatenated and taken as the inputs to an autoencoder version of the ELM for deep feature-level fusion. Third, we propose an ensemble of adaptive ELMs for decision-level fusion using the previously obtained feature-level fusion representations. Extensive experiments are conducted on an up-to-date large-scale clothing image data set. Those experimental results show that the proposed framework is competitive and efficient.", "title": "" }, { "docid": "707828ef765512b0b5ebef27ca133504", "text": "In the mammalian myocardium, potassium (K(+)) channels control resting potentials, action potential waveforms, automaticity, and refractory periods and, in most cardiac cells, multiple types of K(+) channels that subserve these functions are expressed. Molecular cloning has revealed the presence of a large number of K(+) channel pore forming (alpha) and accessory (beta) subunits in the heart, and considerable progress has been made recently in defining the relationships between expressed K(+) channel subunits and functional cardiac K(+) channels. To date, more than 20 mouse models with altered K(+) channel expression/functioning have been generated using dominant-negative transgenic and targeted gene deletion approaches. In several instances, the genetic manipulation of K(+) channel subunit expression has revealed the role of specific K(+) channel subunit subfamilies or individual K(+) channel subunit genes in the generation of myocardial K(+) channels. In other cases, however, the phenotypic consequences have been unexpected. This review summarizes what has been learned from the in situ genetic manipulation of cardiac K(+) channel functioning in the mouse, discusses the limitations of the models developed to date, and explores the likely directions of future research.", "title": "" }, { "docid": "0d1ff6f8cfc8022138565116f832db03", "text": "Suppose X is a uniformly distributed n-dimensional binary vector and Y is obtained by passing X through a binary symmetric channel with crossover probability α. A recent conjecture by Courtade and Kumar postulates that I(f(X); Y ) ≤ 1 - h(α) for any Boolean function f. So far, the best known upper bound was essentially I(f(X); Y ) ≤ (1 - 2α)2. In this paper, we derive a new upper bound that holds for all balanced functions, and improves upon the best known previous bound for α > 1 over 3.", "title": "" }, { "docid": "d3b82bc0ec07047abf4965e982a436cf", "text": "An adaptive control system, using a recurrent cerebellar model articulation controller (RCMAC) and based on a sliding mode technique, is developed for uncertain nonlinear systems. The proposed dynamic structure of RCMAC has superior capability to the conventional static cerebellar model articulation controller in an efficient learning mechanism and dynamic response. Temporal relations are embedded in RCMAC by adding feedback connections in the association memory space so that the RCMAC provides a dynamical structure. The proposed control system consists of an adaptive RCMAC and a compensated controller. The adaptive RCMAC is used to mimic an ideal sliding mode controller, and the compensated controller is designed to compensate for the approximation error between the ideal sliding mode controller and the adaptive RCMAC. The online adaptive laws of the control system are derived based on the Lyapunov stability theorem, so that the stability of the system can be guaranteed. In addition, in order to relax the requirement of the approximation error bound, an estimation law is derived to estimate the error bound. Finally, the simulation and experimental studies demonstrate the effectiveness of the proposed control scheme for the nonlinear systems with unknown dynamic functions", "title": "" }, { "docid": "ef2ef7812c88e7db8010590dd6dc38b4", "text": "A robust adaptive control approach is proposed to solve the consensus problem of multiagent systems. Compared with the previous work, the agent's dynamics includes the uncertainties and external disturbances, which is more practical in real-world applications. Due to the approximation capability of neural networks, the uncertain dynamics is compensated by the adaptive neural network scheme. The effects of the approximation error and external disturbances are counteracted by employing the robustness signal. The proposed algorithm is decentralized because the controller for each agent only utilizes the information of its neighbor agents. By the theoretical analysis, it is proved that the consensus error can be reduced as small as desired. The proposed method is then extended to two cases: agents form a prescribed formation, and agents have the higher order dynamics. Finally, simulation examples are given to demonstrate the satisfactory performance of the proposed method.", "title": "" }, { "docid": "0dd334ac819bfb77094e06dc0c00efee", "text": "How to propagate label information from labeled examples to unlabeled examples over a graph has been intensively studied for a long time. Existing graph-based propagation algorithms usually treat unlabeled examples equally, and transmit seed labels to the unlabeled examples that are connected to the labeled examples in a neighborhood graph. However, such a popular propagation scheme is very likely to yield inaccurate propagation, because it falls short of tackling ambiguous but critical data points (e.g., outliers). To this end, this paper treats the unlabeled examples in different levels of difficulties by assessing their reliability and discriminability, and explicitly optimizes the propagation quality by manipulating the propagation sequence to move from simple to difficult examples. In particular, we propose a novel iterative label propagation algorithm in which each propagation alternates between two paradigms, teaching-to-learn and learning-to-teach (TLLT). In the teaching-to-learn step, the learner conducts the propagation on the simplest unlabeled examples designated by the teacher. In the learning-to-teach step, the teacher incorporates the learner’s feedback to adjust the choice of the subsequent simplest examples. The proposed TLLT strategy critically improves the accuracy of label propagation, making our algorithm substantially robust to the values of tuning parameters, such as the Gaussian kernel width used in graph construction. The merits of our algorithm are theoretically justified and empirically demonstrated through experiments performed on both synthetic and real-world data sets.", "title": "" }, { "docid": "7d09c7f94dda81e095b80736e229d00e", "text": "With the constant deepening of research on marine environment simulation and information expression, there are higher and higher requirements for the sense of reality of ocean data visualization results and the real-time interaction in the visualization process. This paper tackle the challenge of key technology of three-dimensional interaction and volume rendering technology based on GPU technology, develops large scale marine hydrological environmental data-oriented visualization software and realizes oceanographic planar graph, contour line rendering, isosurface rendering, factor field volume rendering and dynamic simulation of current field. To express the spatial characteristics and real-time update of massive marine hydrological environmental data better, this study establishes nodes in the scene for the management of geometric objects to realize high-performance dynamic rendering. The system employs CUDA (Computing Unified Device Architecture) parallel computing for the improvement of computation rate, uses NetCDF (Network Common Data Form) file format for data access and applies GPU programming technology to realize fast volume rendering of marine water environmental factors. The visualization software of marine hydrological environment developed can simulate and show properties and change process of marine water environmental factors efficiently and intuitively. © 2016 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "90d0d75ca8413dad8ffe42b6d064905b", "text": "BACKGROUND\nDebate continues about the consequences of adolescent cannabis use. Existing data are limited in statistical power to examine rarer outcomes and less common, heavier patterns of cannabis use than those already investigated; furthermore, evidence has a piecemeal approach to reporting of young adult sequelae. We aimed to provide a broad picture of the psychosocial sequelae of adolescent cannabis use.\n\n\nMETHODS\nWe integrated participant-level data from three large, long-running longitudinal studies from Australia and New Zealand: the Australian Temperament Project, the Christchurch Health and Development Study, and the Victorian Adolescent Health Cohort Study. We investigated the association between the maximum frequency of cannabis use before age 17 years (never, less than monthly, monthly or more, weekly or more, or daily) and seven developmental outcomes assessed up to age 30 years (high-school completion, attainment of university degree, cannabis dependence, use of other illicit drugs, suicide attempt, depression, and welfare dependence). The number of participants varied by outcome (N=2537 to N=3765).\n\n\nFINDINGS\nWe recorded clear and consistent associations and dose-response relations between the frequency of adolescent cannabis use and all adverse young adult outcomes. After covariate adjustment, compared with individuals who had never used cannabis, those who were daily users before age 17 years had clear reductions in the odds of high-school completion (adjusted odds ratio 0·37, 95% CI 0·20-0·66) and degree attainment (0·38, 0·22-0·66), and substantially increased odds of later cannabis dependence (17·95, 9·44-34·12), use of other illicit drugs (7·80, 4·46-13·63), and suicide attempt (6·83, 2·04-22·90).\n\n\nINTERPRETATION\nAdverse sequelae of adolescent cannabis use are wide ranging and extend into young adulthood. Prevention or delay of cannabis use in adolescence is likely to have broad health and social benefits. Efforts to reform cannabis legislation should be carefully assessed to ensure they reduce adolescent cannabis use and prevent potentially adverse developmental effects.\n\n\nFUNDING\nAustralian Government National Health and Medical Research Council.", "title": "" }, { "docid": "18b744209b3918d6636a87feed2597c6", "text": "Robot learning is critically enabled by the availability of appropriate state representations. We propose a robotics-specific approach to learning such state representations. As robots accomplish tasks by interacting with the physical world, we can facilitate representation learning by considering the structure imposed by physics; this structure is reflected in the changes that occur in the world and in the way a robot can effect them. By exploiting this structure in learning, robots can obtain state representations consistent with the aspects of physics relevant to the learning task. We name this prior knowledge about the structure of interactions with the physical world robotic priors. We identify five robotic priors and explain how they can be used to learn pertinent state representations. We demonstrate the effectiveness of this approach in simulated and real robotic experiments with distracting moving objects. We show that our method extracts task-relevant state representations from high-dimensional observations, even in the presence of taskirrelevant distractions. We also show that the state representations learned by our method greatly improve generalization in reinforcement learning.", "title": "" }, { "docid": "4f57be0a248769b0b8a46b879c42b1e0", "text": "This study tested whether mental training alone can produce a gain in muscular strength. Thirty male university athletes, including football, basketball and rugby players, were randomly assigned to perform mental training of their hip flexor muscles, to use weight machines to physically exercise their hip flexors, or to form a control group which received neither mental nor physical training. The hip strength of each group was measured before and after training. Physical strength was increased by 24% through mental practice (p = .008). Strength was also increased through physical training, by 28%, but did not change significantly in the control condition. The strength gain was greatest among the football players given mental training. Mental and physical training produced similar decreases in heart rate, and both yielded a marginal reduction in systolic blood pressure. The results support the related findings of Ranganathan, Siemionow, Liu, Sahgal, and Yue (2004).", "title": "" }, { "docid": "fcf70e8f0a35ae805ec682a0d8cacae2", "text": "One of the most important factors in training object recognition networks using convolutional neural networks (CNN) is the provision of annotated data accompanying human judgment. Particularly, in object detection or semantic segmentation, the annotation process requires considerable human effort. In this paper, we propose a semi-supervised learning (SSL)-based training methodology for object detection, which makes use of automatic labeling of un-annotated data by applying a network previously trained from an annotated dataset. Because an inferred label by the trained network is dependent on the learned parameters, it is often meaningless for re-training the network. To transfer a valuable inferred label to the unlabeled data, we propose a re-alignment method based on co-occurrence matrix analysis that takes into account one-hot-vector encoding of the estimated label and the correlation between the objects in the image. We used an MS-COCO detection dataset to verify the performance of the proposed SSL method and deformable neural networks (D-ConvNets) [1] as an object detector for basic training. The performance of the existing state-of-the-art detectors (D-ConvNets, YOLO v2 [2], and single shot multi-box detector (SSD) [3]) can be improved by the proposed SSL method without using the additional model parameter or modifying the network architecture.", "title": "" }, { "docid": "fb34a0868942928ada71cf8d1c746c19", "text": "We introduce the new Multimodal Named Entity Disambiguation (MNED) task for multimodal social media posts such as Snapchat or Instagram captions, which are composed of short captions with accompanying images. Social media posts bring significant challenges for disambiguation tasks because 1) ambiguity not only comes from polysemous entities, but also from inconsistent or incomplete notations, 2) very limited context is provided with surrounding words, and 3) there are many emerging entities often unseen during training. To this end, we build a new dataset called SnapCaptionsKB, a collection of Snapchat image captions submitted to public and crowd-sourced stories, with named entity mentions fully annotated and linked to entities in an external knowledge base. We then build a deep zeroshot multimodal network for MNED that 1) extracts contexts from both text and image, and 2) predicts correct entity in the knowledge graph embeddings space, allowing for zeroshot disambiguation of entities unseen in training set as well. The proposed model significantly outperforms the stateof-the-art text-only NED models, showing efficacy and potentials of the MNED task.", "title": "" }, { "docid": "73e6f03d67508bd2f04b955fc750c18d", "text": "Interleaving is a key component of many digital communication systems involving error correction schemes. It provides a form of time diversity to guard against bursts of errors. Recently, interleavers have become an even more integral part of the code design itself, if we consider for example turbo and turbo-like codes. In a non-cooperative context, such as passive listening, it is a challenging problem to estimate the interleaver parameters. In this paper we propose an algorithm that allows us to estimate the parameters of the interleaver at the output of a binary symmetric channel and to locate the codewords in the interleaved block. This gives us some clues about the interleaving function used.", "title": "" }, { "docid": "a6d0c3a9ca6c2c4561b868baa998dace", "text": "Diprosopus or duplication of the lower lip and mandible is a very rare congenital anomaly. We report this unusual case occurring in a girl who presented to our hospital at the age of 4 months. Surgery and problems related to this anomaly are discussed.", "title": "" }, { "docid": "87748c1fc9dc379c2225c92d2218e278", "text": "If components (denoted by horizontal and vertical axis in Figure 2a) are correlated, then samples (points in Figure 2a) are in a non-spherical shape, then eigenvalues are mutually different. Hence correlation leads to non-uniformity of eigenvalues. Since the eigenvectors are orthogonal by design, it suffices to focus on eigenvalues only. To reduce correlation, we encourage the eigenvalues to be uniform (Figure 2b). Rotation does not affect eigenvalues or uncorrelation. For a component matrix A and rotation matrix R, A>A equals to A>R>RA and they have the same eigendecomposition (say UEU>). Ensuring the eigenvalue matrix E is close to identity implies the latent components are rotations of the orthonormal (and hence uncorrelated) eigenvectors.", "title": "" }, { "docid": "6c784fc34cf7a8e700c67235e05d8cb0", "text": "Fully automatic methods that extract lists of objects from the Web have been studied extensively. Record extraction, the first step of this object extraction process, identifies a set of Web page segments, each of which represents an individual object (e.g., a product). State-of-the-art methods suffice for simple search, but they often fail to handle more complicated or noisy Web page structures due to a key limitation -- their greedy manner of identifying a list of records through pairwise comparison (i.e., similarity match) of consecutive segments. This paper introduces a new method for record extraction that captures a list of objects in a more robust way based on a holistic analysis of a Web page. The method focuses on how a distinct tag path appears repeatedly in the DOM tree of the Web document. Instead of comparing a pair of individual segments, it compares a pair of tag path occurrence patterns (called visual signals) to estimate how likely these two tag paths represent the same list of objects. The paper introduces a similarity measure that captures how closely the visual signals appear and interleave. Clustering of tag paths is then performed based on this similarity measure, and sets of tag paths that form the structure of data records are extracted. Experiments show that this method achieves higher accuracy than previous methods.", "title": "" }, { "docid": "c8d56c100db663ba532df4766e458345", "text": "Decomposing sensory measurements into relevant parts is a fundamental prerequisite for solving complex tasks, e.g., in the field of mobile manipulation in domestic environments. In this paper, we present a fast approach to surface reconstruction in range images by means of approximate polygonal meshing. The obtained local surface information and neighborhoods are then used to 1) smooth the underlying measurements, and 2) segment the image into planar regions and other geometric primitives. An evaluation using publicly available data sets shows that our approach does not rank behind state-of-the-art algorithms while allowing to process range images at high frame rates.", "title": "" }, { "docid": "796dc233bbf4e9e063485f26ab7b5b64", "text": "Anomaly detection refers to identifying the patterns in data that deviate from expected behavior. These non-conforming patterns are often termed as outliers, malwares, anomalies or exceptions in different application domains. This paper presents a novel, generic real-time distributed anomaly detection framework for multi-source stream data. As a case study, we have decided to detect anomaly for multi-source VMware-based cloud data center. The framework monitors VMware performance stream data (e.g., CPU load, memory usage, etc.) continuously. It collects these data simultaneously from all the VMwares connected to the network. It notifies the resource manager to reschedule its resources dynamically when it identifies any abnormal behavior of its collected data. We have used Apache Spark, a distributed framework for processing performance stream data and making prediction without any delay. Spark is chosen over a traditional distributed framework (e.g., Hadoop and MapReduce, Mahout, etc.) that is not ideal for stream data processing. We have implemented a flat incremental clustering algorithm to model the benign characteristics in our distributed Spark based framework. We have compared the average processing latency of a tuple during clustering and prediction in Spark with Storm, another distributed framework for stream data processing. We experimentally find that Spark processes a tuple much quicker than Storm on average.", "title": "" } ]
scidocsrr
4194903a33c18bc27d20c9fdfd20ac7c
Image Classification Using Generative Neuro Evolution for Deep Learning
[ { "docid": "31dbe722d956df236c7ebe2535fc4125", "text": "Intelligence in nature is the product of living brains, which are themselves the product of natural evolution. Although researchers in the field of neuroevolution (NE) attempt to recapitulate this process, artificial neural networks (ANNs) so far evolved through NE algorithms do not match the distinctive capabilities of biological brains. The recently introduced hypercube-based neuroevolution of augmenting topologies (HyperNEAT) approach narrowed this gap by demonstrating that the pattern of weights across the connectivity of an ANN can be generated as a function of its geometry, thereby allowing large ANNs to be evolved for high-dimensional problems. Yet the positions and number of the neurons connected through this approach must be decided a priori by the user and, unlike in living brains, cannot change during evolution. Evolvable-substrate HyperNEAT (ES-HyperNEAT), introduced in this article, addresses this limitation by automatically deducing the node geometry from implicit information in the pattern of weights encoded by HyperNEAT, thereby avoiding the need to evolve explicit placement. This approach not only can evolve the location of every neuron in the network, but also can represent regions of varying density, which means resolution can increase holistically over evolution. ES-HyperNEAT is demonstrated through multi-task, maze navigation, and modular retina domains, revealing that the ANNs generated by this new approach assume natural properties such as neural topography and geometric regularity. Also importantly, ES-HyperNEAT's compact indirect encoding can be seeded to begin with a bias toward a desired class of ANN topographies, which facilitates the evolutionary search. The main conclusion is that ES-HyperNEAT significantly expands the scope of neural structures that evolution can discover.", "title": "" } ]
[ { "docid": "ca75dfe870d902884c8ad827001711e1", "text": "Impact of pre-sowing exposure of seeds to static magnetic field were studied on 1 month old maize [Zea mays . var: HQPM.1] plants under field conditions. Pre-standardized magnetic field strength of 100 mT (2 h) and 200 mT (1 h), which were proven best for improving different seedling parameters under laboratory condition, were used for this study. Magnetic field treatment altered growth, superoxide radical level, antioxidant enzymes and photosynthesis. Among the different growth parameters, leaf area and root length were the most enhanced parameters (78–40%, respectively), over untreated plants. Electron paramagnetic resonance spectroscopy study showed that superoxide radical was reduced and hydroxyl radical was unaffected after magnetic field treatment. With decrease in free radical content, antioxidant enzymes like superoxide dismutase and peroxidase were also reduced by 43 and 23%, respectively, in plants that emerged from magnetically treated seeds. Measurement of Chlorophyll a fluorescence by plant efficiency analyzer showed that the potential of processing light energy through photosynthetic machinery was enhanced by magnetic field treatment. Performance index of the plant enhanced up to two-fold and phenomenological leaf model showed more active reaction centers after magnetic field treatment. Among the two field strengths used, 200 mT (1 h) was more effective in altering all these parameters. It is concluded that pre-sowing magnetic field treatment can be effectively used for improving plant growth and development under field conditions.", "title": "" }, { "docid": "b67f797eecc9ff2c29d383d15426c520", "text": "A two-stack 42-45GHz power amplifier is implemented in 45nm SOI CMOS. Transistor stacking allows increased drain biasing to increase output power. Additionally, shunt inter-stage matching is used and improves PAE by more than 6%. This amplifier exhibits 18.6dBm saturated output power, with peak power gain of 9.5dB. It occupies 0.3mm2 including pads while achieving a peak PAE of 34%. The PAE remains above 30% from 42 to 45GHz.", "title": "" }, { "docid": "efae02feebc4a2efe2cf98ab4d19cd34", "text": "User behavior on the Web changes over time. For example, the queries that people issue to search engines, and the underlying informational goals behind the queries vary over time. In this paper, we examine how to model and predict this temporal user behavior. We develop a temporal modeling framework adapted from physics and signal processing that can be used to predict time-varying user behavior using smoothing and trends. We also explore other dynamics of Web behaviors, such as the detection of periodicities and surprises. We develop a learning procedure that can be used to construct models of users' activities based on features of current and historical behaviors. The results of experiments indicate that by using our framework to predict user behavior, we can achieve significant improvements in prediction compared to baseline models that weight historical evidence the same for all queries. We also develop a novel learning algorithm that explicitly learns when to apply a given prediction model among a set of such models. Our improved temporal modeling of user behavior can be used to enhance query suggestions, crawling policies, and result ranking.", "title": "" }, { "docid": "5e2ee8afe2f74c8bc30e48fb9dc6409c", "text": "Change detection can be treated as a generative learning procedure, in which the connection between bitemporal images and the desired change map can be modeled as a generative one. In this letter, we propose an unsupervised change detection method based on generative adversarial networks (GANs), which has the ability of recovering the training data distribution from noise input. Here, the joint distribution of the two images to be detected is taken as input and an initial difference image (DI), generated by traditional change detection method such as change vector analysis, is used to provide prior knowledge for sampling the training data based on Bayesian theorem and GAN’s min–max game theory. Through the continuous adversarial learning, the shared mapping function between the training data and their corresponding image patches can be built in GAN’s generator, from which a better DI can be generated. Finally, an unsupervised clustering algorithm is used to analyze the better DI to obtain the desired binary change map. Theoretical analysis and experimental results demonstrate the effectiveness and robustness of the proposed method.", "title": "" }, { "docid": "c056fa934bbf9bc6a286cd718f3a7217", "text": "The advent of deep sub-micron technology has exacerbated reliability issues in on-chip interconnects. In particular, single event upsets, such as soft errors, and hard faults are rapidly becoming a force to be reckoned with. This spiraling trend highlights the importance of detailed analysis of these reliability hazards and the incorporation of comprehensive protection measures into all network-on-chip (NoC) designs. In this paper, we examine the impact of transient failures on the reliability of on-chip interconnects and develop comprehensive counter-measures to either prevent or recover from them. In this regard, we propose several novel schemes to remedy various kinds of soft error symptoms, while keeping area and power overhead at a minimum. Our proposed solutions are architected to fully exploit the available infrastructures in an NoC and enable versatile reuse of valuable resources. The effectiveness of the proposed techniques has been validated using a cycle-accurate simulator", "title": "" }, { "docid": "ddc556ae150e165dca607e4a674583ae", "text": "Increasing patient numbers, changing demographics and altered patient expectations have all contributed to the current problem with 'overcrowding' in emergency departments (EDs). The problem has reached crisis level in a number of countries, with significant implications for patient safety, quality of care, staff 'burnout' and patient and staff satisfaction. There is no single, clear definition of the cause of overcrowding, nor a simple means of addressing the problem. For some hospitals, the option of ambulance diversion has become a necessity, as overcrowded waiting rooms and 'bed-block' force emergency staff to turn patients away. But what are the options when ambulance diversion is not possible? Christchurch Hospital, New Zealand is a tertiary level facility with an emergency department that sees on average 65,000 patients per year. There are no other EDs to whom patients can be diverted, and so despite admission rates from the ED of up to 48%, other options need to be examined. In order to develop a series of unified responses, which acknowledge the multifactorial nature of the problem, the Emergency Department Cardiac Analogy model of ED flow, was developed. This model highlights the need to intervene at each of three key points, in order to address the issue of overcrowding and its associated problems.", "title": "" }, { "docid": "405fd8fd4d08cd26605b93f75c3038ae", "text": "Query-processing costs on large text databases are dominated by the need to retrieve and scan the inverted list of each query term. Retrieval time for inverted lists can be greatly reduced by the use of compression, but this adds to the CPU time required. Here we show that the CPU component of query response time for conjunctive Boolean queries and for informal ranked queries can be similarly reduced, at little cost in terms of storage, by the inclusion of an internal index in each compressed inverted list. This method has been applied in a retrieval system for a collection of nearly two million short documents. Our experimental results show that the self-indexing strategy adds less than 20% to the size of the compressed inverted file, which itself occupies less than 10% of the indexed text, yet can reduce processing time for Boolean queries of 5-10 terms to under one fifth of the previous cost. Similarly, ranked queries of 40-50 terms can be evaluated in as little as 25% of the previous time, with little or no loss of retrieval effectiveness.", "title": "" }, { "docid": "555ad116b9b285051084423e2807a0ba", "text": "The performance of particle swarm optimization using an inertia weight is compared with performance using a constriction factor. Five benchmark functions are used for the comparison. It is concluded that the best approach is to use the constriction factor while limiting the maximum velocity Vmax to the dynamic range of the variable Xmax on each dimension. This approach provides performance on the benchmark functions superior to any other published results known by the authors. '", "title": "" }, { "docid": "42d2cdb17f23e22da74a405ccb71f09b", "text": "Nostalgia is a psychological phenomenon we all can relate to but have a hard time to define. What characterizes the mental state of feeling nostalgia? What psychological function does it serve? Different published materials in a wide range of fields, from consumption research and sport science to clinical psychology, psychoanalysis and sociology, all have slightly different definition of this mental experience. Some claim it is a psychiatric disease giving melancholic emotions to a memory you would consider a happy one, while others state it enforces positivity in our mood. First in this paper a thorough review of the history of nostalgia is presented, then a look at the body of contemporary nostalgia research to see what it could be constituted of. Finally, we want to dig even deeper to see what is suggested by the literature in terms of triggers and functions. Some say that digitally recorded material like music and videos has a potential nostalgic component, which could trigger a reflection of the past in ways that was difficult before such inventions. Hinting towards that nostalgia as a cultural phenomenon is on a rising scene. Some authors say that odors have the strongest impact on nostalgic reverie due to activating it without too much cognitive appraisal. Cognitive neuropsychology has shed new light on a lot of human psychological phenomena‘s and even though empirical testing have been scarce in this field, it should get a fair scrutiny within this perspective as well and hopefully helping to clarify the definition of the word to ease future investigations, both scientifically speaking and in laymen‘s retro hysteria.", "title": "" }, { "docid": "f7792dbc29356711c2170d5140030142", "text": "A C-Ku band GaN monolithic microwave integrated circuit (MMIC) transmitter/receiver (T/R) frontend module with a novel RF interface structure has been successfully developed by using multilayer ceramics technology. This interface improves the insertion loss with wideband characteristics operating up to 40 GHz. The module contains a GaN power amplifier (PA) with output power higher than 10 W over 6–18 GHz and a GaN low-noise amplifier (LNA) with a gain of 15.9 dB over 3.2–20.4 GHz and noise figure (NF) of 2.3–3.7 dB over 4–18 GHz. A fabricated T/R module occupying only 12 × 30 mm2 delivers an output power of 10 W up to the Ku-band. To our knowledge, this is the first demonstration of a C-Ku band T/R frontend module using GaN MMICs with wide bandwidth, 10W output power, and small size operating up to the Ku-band.", "title": "" }, { "docid": "74dda39eb1b5afaf088daa9b93ecceac", "text": "BACKGROUND AND PURPOSE\nWe aimed to assess the prevalence of depressive symptoms among caregivers of stroke survivors and to determine which patient- or stroke-related factors are associated with and can be used to predict caregiver depression during an 18-month follow-up after stroke.\n\n\nMETHODS\nWe examined 98 caregivers of 100 consecutive patients experiencing their first ischemic stroke in Helsinki University Central Hospital. The caregivers were interviewed at the acute phase and at 6 months and 18 months. Depression was assessed with the Beck Depression Inventory. The neurological, functional, cognitive, and emotional status of the patients was assessed 5x during the follow-up with a comprehensive test battery.\n\n\nRESULTS\nA total of 30% to 33% of all caregivers were depressed during the follow-up; the rates were higher than those of the patients. At the acute phase, caregiver depression was associated with stroke severity and older age of the patient, and at 18 months the older age of the patient was associated with depression of the spouses. In later follow-up, caregiver depression was best predicted by the caregiver's depression at acute phase.\n\n\nCONCLUSIONS\nIdentifying those caregivers at highest risk for poor emotional outcome in follow-up requires not only assessment of patient-related factors but also interview of the caregiver during the early poststroke period.", "title": "" }, { "docid": "369af16d8d6bcaaa22b1ef727768e5e3", "text": "We catalogue available software solutions for non-rigid image registration to support scientists in selecting suitable tools for specific medical registration purposes. Registration tools were identified using non-systematic search in Pubmed, Web of Science, IEEE Xplore® Digital Library, Google Scholar, and through references in identified sources (n = 22). Exclusions are due to unavailability or inappropriateness. The remaining (n = 18) tools were classified by (i) access and technology, (ii) interfaces and application, (iii) living community, (iv) supported file formats, and (v) types of registration methodologies emphasizing the similarity measures implemented. Out of the 18 tools, (i) 12 are open source, 8 are released under a permissive free license, which imposes the least restrictions on the use and further development of the tool, 8 provide graphical processing unit (GPU) support; (ii) 7 are built on software platforms, 5 were developed for brain image registration; (iii) 6 are under active development but only 3 have had their last update in 2015 or 2016; (iv) 16 support the Analyze format, while 7 file formats can be read with only one of the tools; and (v) 6 provide multiple registration methods and 6 provide landmark-based registration methods. Based on open source, licensing, GPU support, active community, several file formats, algorithms, and similarity measures, the tools Elastics and Plastimatch are chosen for the platform ITK and without platform requirements, respectively. Researchers in medical image analysis already have a large choice of registration tools freely available. However, the most recently published algorithms may not be included in the tools, yet.", "title": "" }, { "docid": "8f1a5420deb75a2b664ceeaae8fc03f9", "text": "A stretchable and multiple-force-sensitive electronic fabric based on stretchable coaxial sensor electrodes is fabricated for artificial-skin application. This electronic fabric, with only one kind of sensor unit, can simultaneously map and quantify the mechanical stresses induced by normal pressure, lateral strain, and flexion.", "title": "" }, { "docid": "4ed39cd28d2891d79cd6a062e5f64518", "text": "We evaluate the applicability of a biologically-motivated algorithm to select visually-salient regions of interest in video streams for multiply-foveated video compression. Regions are selected based on a nonlinear integration of low-level visual cues, mimicking processing in primate occipital, and posterior parietal cortex. A dynamic foveation filter then blurs every frame, increasingly with distance from salient locations. Sixty-three variants of the algorithm (varying number and shape of virtual foveas, maximum blur, and saliency competition) are evaluated against an outdoor video scene, using MPEG-1 and constant-quality MPEG-4 (DivX) encoding. Additional compression radios of 1.1 to 8.5 are achieved by foveation. Two variants of the algorithm are validated against eye fixations recorded from four to six human observers on a heterogeneous collection of 50 video clips (over 45 000 frames in total). Significantly higher overlap than expected by chance is found between human and algorithmic foveations. With both variants, foveated clips are, on average, approximately half the size of unfoveated clips, for both MPEG-1 and MPEG-4. These results suggest a general-purpose usefulness of the algorithm in improving compression ratios of unconstrained video.", "title": "" }, { "docid": "45d3c305f6ab96489540819059d0521d", "text": "Over 80% of people with social anxiety disorder (SAD) do not receive any type of treatment, despite the existence of effective evidence-based treatments. Barriers to treatment include lack of trained therapists (particularly in nonmetropolitan areas), logistical difficulties (e.g., cost, time, transportation), concerns regarding social stigma, and fear of negative evaluation from health care providers. Interventions conducted through electronic communication media, such as the Internet, have the potential to reach individuals who otherwise would not have access to evidence-based treatments. Second Life is an online virtual world that holds great promise in the widespread delivery of evidence-based treatments. We assessed the feasibility, acceptability, and initial efficacy of an acceptance-based behavior therapy in Second Life to treat adults with generalized SAD. Participants (n=14) received 12 sessions of weekly therapy and were assessed at pretreatment, midtreatment, posttreatment, and follow-up. Participants and therapists rated the treatment program as acceptable and feasible, despite frequently encountered technical difficulties. Analyses showed significant pretreatment to follow-up improvements in social anxiety symptoms, depression, disability, and quality of life, with effect sizes comparable to previously published results of studies delivering in-person cognitive behavior therapy for SAD. Implications and future directions are discussed.", "title": "" }, { "docid": "7f82ff12310f74b17ba01cac60762a8c", "text": "For worst case parameter mismatch, modest levels of unbalance are predicted through the use of minimum gate decoupling, dynamic load lines with high Q values, common source inductance or high yield screening. Each technique is evaluated in terms of current unbalance, transition energy, peak turn-off voltage and parasitic oscillations, as appropriate, for various pulse duty cycles and frequency ranges.", "title": "" }, { "docid": "157f5ef02675b789df0f893311a5db72", "text": "We present a novel spectral shading model for human skin. Our model accounts for both subsurface and surface scattering, and uses only four parameters to simulate the interaction of light with human skin. The four parameters control the amount of oil, melanin and hemoglobin in the skin, which makes it possible to match specific skin types. Using these parameters we generate custom wavelength dependent diffusion profiles for a two-layer skin model that account for subsurface scattering within the skin. These diffusion profiles are computed using convolved diffusion multipoles, enabling an accurate and rapid simulation of the subsurface scattering of light within skin. We combine the subsurface scattering simulation with a Torrance-Sparrow BRDF model to simulate the interaction of light with an oily layer at the surface of the skin. Our results demonstrate that this four parameter model makes it possible to simulate the range of natural appearance of human skin including African, Asian, and Caucasian skin types.", "title": "" }, { "docid": "8decf7a6eb2f057fe622fdd3b25511ae", "text": "FinFET has been proposed as an alternative for bulk CMOS in current and future technology nodes due to more effective channel control, reduced random dopant fluctuation, high ON/OFF current ratio, lower energy consumption, etc. Key characteristics of FinFET operating in the sub/near-threshold region are very different from those in the strong-inversion region. This paper first introduces an analytical transregional FinFET model with high accuracy in both sub- and near-threshold regimes. Next, the paper extends the well-known and widely-adopted logical effort delay calculation and optimization method to FinFET circuits operating in multiple voltage (sub/near/super-threshold) regimes. More specifically, a joint optimization of gate sizing and adaptive independent gate control is presented and solved in order to minimize the delay of FinFET circuits operating in multiple voltage regimes. Experimental results on a 32nm Predictive Technology Model for FinFET demonstrate the effectiveness of the proposed logical effort-based delay optimization framework.", "title": "" }, { "docid": "cd0aa599211f4d3c6298297f021c59b3", "text": "INTRODUCTION\nDespite today's standard procedure for staging and treating non-muscle-invasive bladder cancer by transurethral resection via a wire loop (TURBT), several other publications have dealt with a different concept of en bloc resection of bladder tumors using different energy sources.\n\n\nMATERIAL AND METHODS\nMEDLINE and the Cochrane central register were searched for the following terms: en bloc, mucosectomy, laser, resection, ablation, Neodym, Holmium, Thulium, transitional cell carcinoma.\n\n\nRESULTS\nFourteen research articles dealing with en bloc resection of non-muscle-invasive bladder cancer could be identified (modified resection loops: six, laser: six, waterjet hydrodissection: two).\n\n\nCONCLUSION\nEn bloc resection of bladder tumors >1 cm can be performed safely with very low complication rates independent of the power source. By using laser, complication rates might even be decreased, based on their good hemostatic effect and by avoiding the obturator nerve reflex. A further advantage seems to be accurate pathologic staging of en bloc tumors. Randomized controlled trials are still needed to support the assumed advantages of en bloc resection over the standard TURBT with regard to primary targets: First-time clearance of disease, accurate staging and recurrence rates.", "title": "" }, { "docid": "9f53016723d5064e3790cd316399e082", "text": "We investigated the processing effort during visual search and counting tasks using a pupil dilation measure. Search difficulty was manipulated by varying the number of distractors as well as the heterogeneity of the distractors. More difficult visual search resulted in more pupil dilation than did less difficult search. These results confirm a link between effort and increased pupil dilation. The pupil dilated more during the counting task than during target-absent search, even though the displays were identical, and the two tasks were matched for reaction time. The moment-to-moment dilation pattern during search suggests little effort in the early stages, but increasingly more effort towards response, whereas the counting task involved an increased initial effort, which was sustained throughout the trial. These patterns can be interpreted in terms of the differential memory load for item locations in each task. In an additional experiment, increasing the spatial memory requirements of the search evoked a corresponding increase in pupil dilation. These results support the view that search tasks involve some, but limited, memory for item locations, and the effort associated with this memory load increases during the trials. In contrast, counting involves a heavy locational memory component from the start.", "title": "" } ]
scidocsrr
021a235d989467e03d929077557323b1
An Efficient Data Fingerprint Query Algorithm Based on Two-Leveled Bloom Filter
[ { "docid": "7add673c4f72e6a7586109ac3bdab2ec", "text": "Bigtable is a distributed storage system for managing structured data that is designed to scale to a very large size: petabytes of data across thousands of commodity servers. Many projects at Google store data in Bigtable, including web indexing, Google Earth, and Google Finance. These applications place very different demands on Bigtable, both in terms of data size (from URLs to web pages to satellite imagery) and latency requirements (from backend bulk processing to real-time data serving). Despite these varied demands, Bigtable has successfully provided a flexible, high-performance solution for all of these Google products. In this article, we describe the simple data model provided by Bigtable, which gives clients dynamic control over data layout and format, and we describe the design and implementation of Bigtable.", "title": "" }, { "docid": "26b415f796b85dea5e63db9c58b6c790", "text": "A predominant portion of Internet services, like content delivery networks, news broadcasting, blogs sharing and social networks, etc., is data centric. A significant amount of new data is generated by these services each day. To efficiently store and maintain backups for such data is a challenging task for current data storage systems. Chunking based deduplication (dedup) methods are widely used to eliminate redundant data and hence reduce the required total storage space. In this paper, we propose a novel Frequency Based Chunking (FBC) algorithm. Unlike the most popular Content-Defined Chunking (CDC) algorithm which divides the data stream randomly according to the content, FBC explicitly utilizes the chunk frequency information in the data stream to enhance the data deduplication gain especially when the metadata overhead is taken into consideration. The FBC algorithm consists of two components, a statistical chunk frequency estimation algorithm for identifying the globally appeared frequent chunks, and a two-stage chunking algorithm which uses these chunk frequencies to obtain a better chunking result. To evaluate the effectiveness of the proposed FBC algorithm, we conducted extensive experiments on heterogeneous datasets. In all experiments, the FBC algorithm persistently outperforms the CDC algorithm in terms of achieving a better dedup gain or producing much less number of chunks. Particularly, our experiments show that FBC produces 2.5 ~ 4 times less number of chunks than that of a baseline CDC which achieving the same Duplicate Elimination Ratio (DER). Another benefit of FBC over CDC is that the FBC with average chunk size greater than or equal to that of CDC achieves up to 50% higher DER than that of a CDC algorithm.", "title": "" }, { "docid": "4bf6c59cdd91d60cf6802ae99d84c700", "text": "This paper describes a network storage system, called Venti, intended for archival data. In this system, a unique hash of a block’s contents acts as the block identifier for read and write operations. This approach enforces a write-once policy, preventing accidental or malicious destruction of data. In addition, duplicate copies of a block can be coalesced, reducing the consumption of storage and simplifying the implementation of clients. Venti is a building block for constructing a variety of storage applications such as logical backup, physical backup, and snapshot file systems. We have built a prototype of the system and present some preliminary performance results. The system uses magnetic disks as the storage technology, resulting in an access time for archival data that is comparable to non-archival data. The feasibility of the write-once model for storage is demonstrated using data from over a decade’s use of two Plan 9 file systems.", "title": "" } ]
[ { "docid": "b69a39dd203eb6d2a27dae650ef7e6cb", "text": "In this paper, a high-power high-efficiency wireless-power-transfer system using the class-E operation for transmitter via inductive coupling has been designed and fabricated using the proposed design approach. The system requires no complex external control system but relies on its natural impedance response to achieve the desired power-delivery profile across a wide range of load resistances while maintaining high efficiency to prevent any heating issues. The proposed system consists of multichannels with independent gate drive to control power delivery. The fabricated system is compact and capable of 295 W of power delivery at 75.7% efficiency with forced air cooling and of 69 W of power delivery at 74.2% efficiency with convection cooling. This is the highest power and efficiency of a loosely coupled planar wireless-power-transfer system reported to date.", "title": "" }, { "docid": "b0840d44b7ec95922eeed4ef71b338f9", "text": "Decoding DNA symbols using next-generation sequencers was a major breakthrough in genomic research. Despite the many advantages of next-generation sequencers, e.g., the high-throughput sequencing rate and relatively low cost of sequencing, the assembly of the reads produced by these sequencers still remains a major challenge. In this review, we address the basic framework of next-generation genome sequence assemblers, which comprises four basic stages: preprocessing filtering, a graph construction process, a graph simplification process, and postprocessing filtering. Here we discuss them as a framework of four stages for data analysis and processing and survey variety of techniques, algorithms, and software tools used during each stage. We also discuss the challenges that face current assemblers in the next-generation environment to determine the current state-of-the-art. We recommend a layered architecture approach for constructing a general assembler that can handle the sequences generated by different sequencing platforms.", "title": "" }, { "docid": "d2a89459ca4a0e003956d6fe4871bb34", "text": "In this paper, a high-efficiency high power density LLC resonant converter with a matrix transformer is proposed. A matrix transformer can help reduce leakage inductance and the ac resistance of windings so that the flux cancellation method can then be utilized to reduce core size and loss. Synchronous rectifier (SR) devices and output capacitors are integrated into the secondary windings to eliminate termination-related winding losses, via loss and reduce leakage inductance. A 1 MHz 390 V/12 V 1 kW LLC resonant converter prototype is built to verify the proposed structure. The efficiency can reach as high as 95.4%, and the power density of the power stage is around 830 W/in3.", "title": "" }, { "docid": "c07a0053f43d9e1f98bb15d4af92a659", "text": "We present a zero-shot learning approach for text classification, predicting which natural language understanding domain can handle a given utterance. Our approach can predict domains at runtime that did not exist at training time. We achieve this extensibility by learning to project utterances and domains into the same embedding space while generating each domain-specific embedding from a set of attributes that characterize the domain. Our model is a neural network trained via ranking loss. We evaluate the performance of this zero-shot approach on a subset of a virtual assistant’s third-party domains and show the effectiveness of the technique on new domains not observed during training. We compare to generative baselines and show that our approach requires less storage and performs better on new domains.", "title": "" }, { "docid": "2e73406dd4ebd7ba90c9c20a142a9684", "text": "Blocking characteristics of diamond junction field-effect transistors were evaluated at room temperature (RT) and 200 <sup>°</sup>C. A high source-drain bias (breakdown voltage) of 566 V was recorded at RT, whereas it increased to 608 V at 200 <sup>°</sup>C. The positive temperature coefficient of the breakdown voltage indicates the avalanche breakdown of the device. We found that the breakdown occurred at the drain edge of the p-n junction between p-channel and the n<sup>+</sup>-gates. All four devices measured in this letter showed a maximum gate-drain bias over 500 V at RT and 600 V at 200 <sup>°</sup>C.", "title": "" }, { "docid": "8ec6132195c10eedfa3e2ffa70d271b5", "text": "Devise metrics. Scientists, social scientists and economists need to design a set of practical indices for tracking progress on each SDG. Ensuring access to sustainable and modern energy for all (goal 7), for example, will require indicators of improvements in energy efficiency and carbon savings from renewable-energy technologies (see go.nature.com/pkij7y). Parameters other than just economic growth must be included, such as income inequality, carbon emissions, population and lifespans 1 .", "title": "" }, { "docid": "7280754ec81098fe38023efcb25871ba", "text": "In this paper, we present a complete framework to inverse render faces with a 3D Morphable Model (3DMM). By decomposing the image formation process into geometric and photometric parts, we are able to state the problem as a multilinear system which can be solved accurately and efficiently. As we treat each contribution as independent, the objective function is convex in the parameters and a global solution is guaranteed. We start by recovering 3D shape using a novel algorithm which incorporates generalization error of the model obtained from empirical measurements. We then describe two methods to recover facial texture, diffuse lighting, specular reflectance, and camera properties from a single image. The methods make increasingly weak assumptions and can be solved in a linear fashion. We evaluate our findings on a publicly available database, where we are able to outperform an existing state-of-the-art algorithm. We demonstrate the usability of the recovered parameters in a recognition experiment conducted on the CMU-PIE database.", "title": "" }, { "docid": "463543546eeca427eb348df6c019c986", "text": "Blockchains have recently generated explosive interest from both academia and industry, with many proposed applications. But descriptions of many these proposals are more visionary projections than realizable proposals, and even basic definitions are often missing. We define “blockchain” and “blockchain network”, and then discuss two very different, well known classes of blockchain networks: cryptocurrencies and Git repositories. We identify common primitive elements of both and use them to construct a framework for explicitly articulating what characterizes blockchain networks. The framework consists of a set of questions that every blockchain initiative should address at the very outset. It is intended to help one decide whether or not blockchain is an appropriate approach to a particular application, and if it is, to assist in its initial design stage.", "title": "" }, { "docid": "299e7f7d1c48d4a6a22c88dcf422f7a1", "text": "Due to the advantages of deep learning, in this paper, a regularized deep feature extraction (FE) method is presented for hyperspectral image (HSI) classification using a convolutional neural network (CNN). The proposed approach employs several convolutional and pooling layers to extract deep features from HSIs, which are nonlinear, discriminant, and invariant. These features are useful for image classification and target detection. Furthermore, in order to address the common issue of imbalance between high dimensionality and limited availability of training samples for the classification of HSI, a few strategies such as L2 regularization and dropout are investigated to avoid overfitting in class data modeling. More importantly, we propose a 3-D CNN-based FE model with combined regularization to extract effective spectral-spatial features of hyperspectral imagery. Finally, in order to further improve the performance, a virtual sample enhanced method is proposed. The proposed approaches are carried out on three widely used hyperspectral data sets: Indian Pines, University of Pavia, and Kennedy Space Center. The obtained results reveal that the proposed models with sparse constraints provide competitive results to state-of-the-art methods. In addition, the proposed deep FE opens a new window for further research.", "title": "" }, { "docid": "753b5f366412b0d6b088baf6cbf154a2", "text": "We introduce a highly structured family of hard satisfiable 3-SAT formulas corresponding to an ordered spin-glass model from statistical physics. This model has provably “glassy” behavior; that is, it has many local optima with large energy barriers between them, so that local search algorithms get stuck and have difficulty finding the true ground state, i.e., the unique satisfying assignment. We test the hardness of our formulas with two complete Davis-Putnam solvers, Satz and zChaff, and two incomplete solvers, WalkSAT and the recently introduced Survey Propagation algorithm SP. We compare our formulas to random XOR-SAT formulas and to two other generators of hard satisfiable instances, the minimum disagreement parity formulas of Crawford et al., and Hirsch’s hgen2. For the complete solvers the running time of our formulas grows exponentially in √ n, and exceeds that of random XOR-SAT formulas for small problem sizes. More interestingly, our formulas appear to be harder for WalkSAT than any other known generator of satisfiable instances.", "title": "" }, { "docid": "cac3a510f876ed255ff87f2c0db2ed8e", "text": "The resurgence of cancer immunotherapy stems from an improved understanding of the tumor microenvironment. The PD-1/PD-L1 axis is of particular interest, in light of promising data demonstrating a restoration of host immunity against tumors, with the prospect of durable remissions. Indeed, remarkable clinical responses have been seen in several different malignancies including, but not limited to, melanoma, lung, kidney, and bladder cancers. Even so, determining which patients derive benefit from PD-1/PD-L1-directed immunotherapy remains an important clinical question, particularly in light of the autoimmune toxicity of these agents. The use of PD-L1 (B7-H1) immunohistochemistry (IHC) as a predictive biomarker is confounded by multiple unresolved issues: variable detection antibodies, differing IHC cutoffs, tissue preparation, processing variability, primary versus metastatic biopsies, oncogenic versus induced PD-L1 expression, and staining of tumor versus immune cells. Emerging data suggest that patients whose tumors overexpress PD-L1 by IHC have improved clinical outcomes with anti-PD-1-directed therapy, but the presence of robust responses in some patients with low levels of expression of these markers complicates the issue of PD-L1 as an exclusionary predictive biomarker. An improved understanding of the host immune system and tumor microenvironment will better elucidate which patients derive benefit from these promising agents.", "title": "" }, { "docid": "06a1d19d18e1f23cd252c34b8b9aa0ec", "text": "To solve crimes, investigators often rely on interviews with witnesses, victims, or criminals themselves. The interviews are transcribed and the pertinent data is contained in narrative form. To solve one crime, investigators may need to interview multiple people and then analyze the narrative reports. There are several difficulties with this process: interviewing people is time consuming, the interviews - sometimes conducted by multiple officers - need to be combined, and the resulting information may still be incomplete. For example, victims or witnesses are often too scared or embarrassed to report or prefer to remain anonymous. We are developing an online reporting system that combines natural language processing with insights from the cognitive interview approach to obtain more information from witnesses and victims. We report here on information extraction from police and witness narratives. We achieved high precision, 94% and 96% and recall, 85% and 90%, for both narrative types.", "title": "" }, { "docid": "898b5800e6ff8a599f6a4ec27310f89a", "text": "Jenni Anttonen: Using the EMFi chair to measure the user's emotion-related heart rate responses Master's thesis, 55 pages, 2 appendix pages May 2005 The research reported here is part of a multidisciplinary collaborative project that aimed at developing embedded measurement devices using electromechanical film (EMFi) as a basic measurement technology. The present aim was to test if an unobtrusive heart rate measurement device, the EMFi chair, had the potential to detect heart rate changes associated with emotional stimulation. Six-second long visual, auditory, and audiovisual stimuli with negative, neutral, and positive emotional content were presented to 24 participants. Heart rate responses were measured with the EMFi chair and with earlobe photoplethysmography (PPG). Also, subjective ratings of the stimuli were collected. Firstly, the high correlation between the measurement results of the EMFi chair and PPG, r = 0.99, p < 0.001, indicated that the EMFi chair measured heart rate reliably. Secondly, heart rate showed a decelerating response to visual, auditory, and audiovisual emotional stimulation. The emotional stimulation caused statistically significant changes in heart rate at the 6 th second from stimulus onset so that the responses to negative stimulation were significantly lower than the responses to positive stimulation. The results were in line with previous research. The results show that heart rate responses measured with the EMFi chair differed significantly for positive and negative emotional stimulation. These results suggest that the EMFi chair could be used in HCI to measure the user's emotional responses unobtrusively.", "title": "" }, { "docid": "8750fc51d19bbf0cbae2830638f492fd", "text": "Smartphones are increasingly becoming an ordinary part of our daily lives. With their remarkable capacity, applications used in these devices are extremely varied. In terms of language teaching, the use of these applications has opened new windows of opportunity, innovatively shaping the way instructors teach and students learn. This 4 week-long study aimed to investigate the effectiveness of a mobile application on teaching 40 figurative idioms from the Michigan Corpus of Academic Spoken English (MICASE) corpus compared to traditional activities. Quasi-experimental research design with pretest and posttest was employed to determine the differences between the scores of the control (n=25) and the experimental group (n=25) formed with convenience sampling. Results indicate that participants in the experimental group performed significantly better in the posttest, demonstrating the effectiveness of the mobile application used in this study on learning idioms. The study also provides recommendations towards the use of mobile applications in teaching vocabulary.", "title": "" }, { "docid": "da48aae7960f0871c91d4c6c9f5f44bf", "text": "It is often difficult to ground text to precise time intervals due to the inherent uncertainty arising from either missing or multiple expressions at year, month, and day time granularities. We address the problem of estimating an excerpt-time model capturing the temporal scope of a given news article excerpt as a probability distribution over chronons. For this, we propose a semi-supervised distribution propagation framework that leverages redundancy in the data to improve the quality of estimated time models. Our method generates an event graph with excerpts as nodes and models various inter-excerpt relations as edges. It then propagates empirical excerpt-time models estimated for temporally annotated excerpts, to those that are strongly related but miss annotations. In our experiments, we first generate a test query set by randomly sampling 100 Wikipedia events as queries. For each query, making use of a standard text retrieval model, we then obtain top-10 documents with an average of 150 excerpts. From these, each temporally annotated excerpt is considered as gold standard. The evaluation measures are first computed for each gold standard excerpt for a single query, by comparing the estimated model with our method to the empirical model from the original expressions. Final scores are reported by averaging over all the test queries. Experiments on the English Gigaword corpus show that our method estimates significantly better time models than several baselines taken from the literature.", "title": "" }, { "docid": "1062f37de56db35202f8979a7ea88efd", "text": "This paper attempts to evaluate the anti-inflammatory potential and the possible mechanism of action of the leaf extracts and isolated compound(s) of Aerva sanguinolenta (Amaranthaceae), traditionally used in ailments related to inflammation. The anti-inflammatory activity of ethanol extract (ASE) was evaluated by acute, subacute and chronic models of inflammation, while a new cerebroside (‘trans’, ASE-1), isolated from the bioactive ASE and characterized spectroscopically, was tested by carrageenan-induced mouse paw oedema and protein exudation model. To understand the underlying mechanism, we measured the release of pro-inflammatory mediators such as nitric oxide (NO) and prostaglandin (PG)E2, along with the cytokines like tumour necrosis factor (TNF)-α, and interleukins(IL)-1β, IL-6 and IL-12 from lipopolysaccharide (LPS)-stimulated peritoneal macrophages. The results revealed that ASE at 400 mg/kg caused significant reduction of rat paw oedema, granuloma and exudative inflammation, while the inhibition of mouse paw oedema and exudative inflammation by ASE-1 (20 mg/kg) was comparable to that of the standard drug indomethacin (10 mg/kg). Interestingly, both ASE and ASE-1 showed significant inhibition of the expressions of iNOS2 and COX-2, and the down-regulation of the expressions of IL-1β, IL-6, IL-12 and TNF-α, in LPS-stimulated macrophages, via the inhibition of COX-2-mediated PGE2 release. Thus, our results validated the traditional use of A. sanguinolenta leaves in inflammation management.", "title": "" }, { "docid": "4add7de7ed94bc100de8119ebd74967e", "text": "Wireless signal strength is susceptible to the phenomena of interference, jumping, and instability, which often appear in the positioning results based on Wi-Fi field strength fingerprint database technology for indoor positioning. Therefore, a Wi-Fi and PDR (pedestrian dead reckoning) real-time fusion scheme is proposed in this paper to perform fusing calculation by adaptively determining the dynamic noise of a filtering system according to pedestrian movement (straight or turning), which can effectively restrain the jumping or accumulation phenomena of wireless positioning and the PDR error accumulation problem. Wi-Fi fingerprint matching typically requires a quite high computational burden: To reduce the computational complexity of this step, the affinity propagation clustering algorithm is adopted to cluster the fingerprint database and integrate the information of the position domain and signal domain of respective points. An experiment performed in a fourth-floor corridor at the School of Environment and Spatial Informatics, China University of Mining and Technology, shows that the traverse points of the clustered positioning system decrease by 65%–80%, which greatly improves the time efficiency. In terms of positioning accuracy, the average error is 4.09 m through the Wi-Fi positioning method. However, the positioning error can be reduced to 2.32 m after integration of the PDR algorithm with the adaptive noise extended Kalman filter (EKF).", "title": "" }, { "docid": "df29784edea11d395547ca23830f2f62", "text": "The clinical efficacy of current antidepressant therapies is unsatisfactory; antidepressants induce a variety of unwanted effects, and, moreover, their therapeutic mechanism is not clearly understood. Thus, a search for better and safer agents is continuously in progress. Recently, studies have demonstrated that zinc and magnesium possess antidepressant properties. Zinc and magnesium exhibit antidepressant-like activity in a variety of tests and models in laboratory animals. They are active in forced swim and tail suspension tests in mice and rats, and, furthermore, they enhance the activity of conventional antidepressants (e.g., imipramine and citalopram). Zinc demonstrates activity in the olfactory bulbectomy, chronic mild and chronic unpredictable stress models in rats, while magnesium is active in stress-induced depression-like behavior in mice. Clinical studies demonstrate that the efficacy of pharmacotherapy is enhanced by supplementation with zinc and magnesium. The antidepressant mechanisms of zinc and magnesium are discussed in the context of glutamate, brain-derived neurotrophic factor (BDNF) and glycogen synthase kinase-3 (GSK-3) hypotheses. All the available data indicate the importance of zinc and magnesium homeostasis in the psychopathology and therapy of affective disorders.", "title": "" }, { "docid": "feef714b024ad00086a5303a8b74b0a4", "text": "Detecting and recognizing text in natural scene images is a challenging, yet not completely solved task. In recent years several new systems that try to solve at least one of the two sub-tasks (text detection and text recognition) have been proposed. In this paper we present STN-OCR, a step towards semi-supervised neural networks for scene text recognition that can be optimized end-to-end. In contrast to most existing works that consist of multiple deep neural networks and several pre-processing steps we propose to use a single deep neural network that learns to detect and recognize text from natural images in a semi-supervised way. STN-OCR is a network that integrates and jointly learns a spatial transformer network [16], that can learn to detect text regions in an image, and a text recognition network that takes the identified text regions and recognizes their textual content. We investigate how our model behaves on a range of different tasks (detection and recognition of characters, and lines of text). Experimental results on public benchmark datasets show the ability of our model to handle a variety of different tasks, without substantial changes in its overall network structure.", "title": "" }, { "docid": "332d517d07187d2403a672b08365e5ef", "text": "Please cite this article in press as: C. Galleguillos doi:10.1016/j.cviu.2010.02.004 The goal of object categorization is to locate and identify instances of an object category within an image. Recognizing an object in an image is difficult when images include occlusion, poor quality, noise or background clutter, and this task becomes even more challenging when many objects are present in the same scene. Several models for object categorization use appearance and context information from objects to improve recognition accuracy. Appearance information, based on visual cues, can successfully identify object classes up to a certain extent. Context information, based on the interaction among objects in the scene or global scene statistics, can help successfully disambiguate appearance inputs in recognition tasks. In this work we address the problem of incorporating different types of contextual information for robust object categorization in computer vision. We review different ways of using contextual information in the field of object categorization, considering the most common levels of extraction of context and the different levels of contextual interactions. We also examine common machine learning models that integrate context information into object recognition frameworks and discuss scalability, optimizations and possible future approaches. 2010 Elsevier Inc. All rights reserved.", "title": "" } ]
scidocsrr
918bbff49a2dc80244b34fa50592d0dc
Deep Learning: An Introduction for Applied Mathematicians
[ { "docid": "9e243ada78a3920a9af58f9958408399", "text": "The problem of non-iterative one-shot and non-destructive correction of unavoidable mistakes arises in all Artificial Intelligence applications in the real world. Its solution requires robust separation of samples with errors from samples where the system works properly. We demonstrate that in (moderately) high dimension this separation could be achieved with probability close to one by linear discriminants. Based on fundamental properties of measure concentration, we show that for M1-ϑ, where 1>ϑ>0 is a given small constant. Exact values of a,b>0 depend on the probability distribution that determines how the random M-element sets are drawn, and on the constant ϑ. These stochastic separation theorems provide a new instrument for the development, analysis, and assessment of machine learning methods and algorithms in high dimension. Theoretical statements are illustrated with numerical examples.", "title": "" }, { "docid": "938395ce421e0fede708e3b4ab7185b5", "text": "This paper provides a review and commentary on the past, present, and future of numerical optimization algorithms in the context of machine learning applications. Through case studies on text classification and the training of deep neural networks, we discuss how optimization problems arise in machine learning and what makes them challenging. A major theme of our study is that large-scale machine learning represents a distinctive setting in which the stochastic gradient (SG) method has traditionally played a central role while conventional gradient-based nonlinear optimization techniques typically falter. Based on this viewpoint, we present a comprehensive theory of a straightforward, yet versatile SG algorithm, discuss its practical behavior, and highlight opportunities for designing algorithms with improved performance. This leads to a discussion about the next generation of optimization methods for large-scale machine learning, including an investigation of two main streams of research on techniques that diminish noise in the stochastic directions and methods that make use of second-order derivative approximations.", "title": "" } ]
[ { "docid": "e9e7cb42ed686ace9e9785fafd3c72f8", "text": "We present a fully automated multimodal medical image matching technique. Our method extends the concepts used in the computer vision SIFT technique for extracting and matching distinctive scale invariant features in 2D scalar images to scalar images of arbitrary dimensionality. This extension involves using hyperspherical coordinates for gradients and multidimensional histograms to create the feature vectors. These features were successfully applied to determine accurate feature point correspondence between pairs of medical images (3D) and dynamic volumetric data (3D+time).", "title": "" }, { "docid": "2a059577ca2a186c53ac76c6a3eae82d", "text": "• Talk with faculty members who are best acquainted with the field(s) of study that interest you. • Talk with professionals in the occupations you wish to enter about the types of degrees and/or credentials they hold or recommend for entry or advancement in field. • Browse program websites or look through catalogs and graduate school reference books (some of these are available in the CSC Resource Library) and determine prerequisites, length and scope of program, etc. • Narrow down your choices based on realistic assessment of your strengths and the programs, which will meet your needs.", "title": "" }, { "docid": "06e58f46c989f22037f443ccf38198ce", "text": "Many biological surfaces in both the plant and animal kingdom possess unusual structural features at the micro- and nanometre-scale that control their interaction with water and hence wettability. An intriguing example is provided by desert beetles, which use micrometre-sized patterns of hydrophobic and hydrophilic regions on their backs to capture water from humid air. As anyone who has admired spider webs adorned with dew drops will appreciate, spider silk is also capable of efficiently collecting water from air. Here we show that the water-collecting ability of the capture silk of the cribellate spider Uloborus walckenaerius is the result of a unique fibre structure that forms after wetting, with the ‘wet-rebuilt’ fibres characterized by periodic spindle-knots made of random nanofibrils and separated by joints made of aligned nanofibrils. These structural features result in a surface energy gradient between the spindle-knots and the joints and also in a difference in Laplace pressure, with both factors acting together to achieve continuous condensation and directional collection of water drops around spindle-knots. Submillimetre-sized liquid drops have been driven by surface energy gradients or a difference in Laplace pressure, but until now neither force on its own has been used to overcome the larger hysteresis effects that make the movement of micrometre-sized drops more difficult. By tapping into both driving forces, spider silk achieves this task. Inspired by this finding, we designed artificial fibres that mimic the structural features of silk and exhibit its directional water-collecting ability.", "title": "" }, { "docid": "f773798785419625b8f283fc052d4ab2", "text": "The increasing interest in energy storage for the grid can be attributed to multiple factors, including the capital costs of managing peak demands, the investments needed for grid reliability, and the integration of renewable energy sources. Although existing energy storage is dominated by pumped hydroelectric, there is the recognition that battery systems can offer a number of high-value opportunities, provided that lower costs can be obtained. The battery systems reviewed here include sodium-sulfur batteries that are commercially available for grid applications, redox-flow batteries that offer low cost, and lithium-ion batteries whose development for commercial electronics and electric vehicles is being applied to grid storage.", "title": "" }, { "docid": "2074ab39d5cec1f9e645ff2ad457f3e3", "text": "[Context and motivation] The current breakthrough of natural language processing (NLP) techniques can provide the requirements engineering (RE) community with powerful tools that can help addressing specific tasks of natural language (NL) requirements analysis, such as traceability, ambiguity detection and requirements classification, to name a few. [Question/problem] However, modern NLP techniques are mainly statistical, and need large NL requirements datasets, to support appropriate training, test and validation of the techniques. The RE community has experimented with NLP since long time, but datasets were often proprietary, or limited to few software projects for which requirements were publicly available. Hence, replication of the experiments and generalization have always been an issue. [Principal idea/results] Our near future commitment is to provide a publicly available NL requirements dataset. [Contribution] To this end, we are collecting requirements documents from the Web, and we are representing them in a common XML format. In this paper, we present the current version of the dataset, together with our agenda concerning formatting, extension, and annotation of the dataset.", "title": "" }, { "docid": "9ca71bbeb4643a6a347050002f1317f5", "text": "In modern society, we are increasingly disconnected from natural light/dark cycles and beset by round-the-clock exposure to artificial light. Light has powerful effects on physical and mental health, in part via the circadian system, and thus the timing of light exposure dictates whether it is helpful or harmful. In their compelling paper, Obayashi et al. (Am J Epidemiol. 2018;187(3):427-434.) offer evidence that light at night can prospectively predict an elevated incidence of depressive symptoms in older adults. Strengths of the study include the longitudinal design and direct, objective assessment of light levels, as well as accounting for multiple plausible confounders during analyses. Follow-up studies should address the study's limitations, including reliance on a global self-report of sleep quality and a 2-night assessment of light exposure that may not reliably represent typical light exposure. In addition, experimental studies including physiological circadian measures will be necessary to determine whether the light effects on depression are mediated through the circadian system or are so-called \"direct\" effects of light. In any case, these exciting findings could inform novel approaches to preventing depressive disorders in older adults.", "title": "" }, { "docid": "58858f0cd3561614f1742fe7b0380861", "text": "This study focuses on how technology can encourage and ease awkwardness-free communications between people in real-world scenarios. We propose a device, The Wearable Aura, able to project a personalized animation onto one's Personal Distance zone. This projection, as an extension of one-self is reactive to user's cognitive status, aware of its environment, context and user's activity. Our user study supports the idea that an interactive projection around an individual can indeed benefit the communications with other individuals.", "title": "" }, { "docid": "2705142c78ee84292a13d06a593e99e6", "text": "The objective of this paper is to conduct a critical review of cybersecurity procedures and practices in the water distribution sector. Specifically, this paper provides a characterization of the current state of cybersecurity practice and risk management in drinking water systems. This characterization is critically important due to the number of cyber attacks that have occurred against water systems recently. While organizations such as AWWA (American Water Works Association) have provided guidelines for implementing cybersecurity measures, limited formal research is being done in the field of risk analysis to assess the nature and impact of risks, and ways to mitigate them. Our work illuminates areas of concern: lack of detailed risk guidance and decision making strategies, and a need for a cost-benefit analysis to be performed. Addressing these will allow future research to address risks and decision making strategies. We believe this characterization is the next step towards developing a comprehensive risk assessment methodology that can identify cyber vulnerabilities and prioritize cyber measures in drinking water systems.", "title": "" }, { "docid": "7d314a77d3b853f37b2b3d59d1255af7", "text": "The paper introduces first insights into a methodology for developing eBusiness business models, which was elaborated at evolaris and is currently validated in various business cases. This methodology relies upon a definition of the term business model, which is first examined and upon which prerequisites for such a methodology are presented. A business model is based on a mental representation of certain aspects of the real world that are relevant for the business. Supporting this change of the mental model is therefore a major prerequisite for a methodology for developing business models. This paper demonstrates that it addition, a business model discussion should be theory based, able to handle complex systems, provide a way for risk free experiments and be practically applicable. In order to fulfill the above critieria, the evolaris methodology is grounded on system theory and combines aspects of system dynamics and action research.", "title": "" }, { "docid": "513ae13c6848f3a83c36dc43d34b43a5", "text": "In this paper, we describe the design, analysis, implementation, and operational deployment of a real-time trip information system that provides passengers with the expected fare and trip duration of the taxi ride they are planning to take. This system was built in cooperation with a taxi operator that operates more than 15,000 taxis in Singapore. We first describe the overall system design and then explain the efficient algorithms used to achieve our predictions based on up to 21 months of historical data consisting of approximately 250 million paid taxi trips. We then describe various optimisations (involving region sizes, amount of history, and data mining techniques) and accuracy analysis (involving routes and weather) we performed to increase both the runtime performance and prediction accuracy. Our large scale evaluation demonstrates that our system is (a) accurate --- with the mean fare error under 1 Singapore dollar (~ 0.76 US$) and the mean duration error under three minutes, and (b) capable of real-time performance, processing thousands to millions of queries per second. Finally, we describe the lessons learned during the process of deploying this system into a production environment.", "title": "" }, { "docid": "dd5bb8731211666b4f7ab6362d0b62b9", "text": "This paper proposes a new trajectory clustering scheme for objects moving on road networks. A trajectory on road networks can be defined as a sequence of road segments a moving object has passed by. We first propose a similarity measurement scheme that judges the degree of similarity by considering the total length of matched road segments. Then, we propose a new clustering algorithm based on such similarity measurement criteria by modifying and adjusting the FastMap and hierarchical clustering schemes. To evaluate the performance of the proposed clustering scheme, we also develop a trajectory generator considering the fact that most objects tend to move from the starting point to the destination point along their shortest path. The performance result shows that our scheme has the accuracy of over 95%.", "title": "" }, { "docid": "70176231436f713c426028c34a76a6c6", "text": "This paper reports the first millimeter-wave double-balanced up-conversion mixer that is realized using a standard CMOS 90nm process. The circuit integrates passive on-chip baluns for single-ended to differential-ended conversions at the high frequency LO and RF ports and an active balun at the IF port. The passive baluns use a stacked configuration and also provide impedance matching to improve conversion gain. The active balun employs the quasi-symmetric properties of the drain and the source of the MOSFET to provide a balanced output. The mixer has a measured 11dB conversion loss and a LO rejection of 26.5dB. The power consumption is 13.2mW.", "title": "" }, { "docid": "26cecceea22566025c22e66376dbb138", "text": "The development of technologies related to the Internet of Things (IoT) provides a new perspective on applications pertaining to smart cities. Smart city applications focus on resolving issues facing people in everyday life, and have attracted a considerable amount of research interest. The typical issue encountered in such places of daily use, such as stations, shopping malls, and stadiums is crowd dynamics management. Therefore, we focus on crowd dynamics management to resolve the problem of congestion using IoT technologies. Real-time crowd dynamics management can be achieved by gathering information relating to congestion and propose less crowded places. Although many crowd dynamics management applications have been proposed in various scenarios and many models have been devised to this end, a general model for evaluating the control effectiveness of crowd dynamics management has not yet been developed in IoT research. Therefore, in this paper, we propose a model to evaluate the performance of crowd dynamics management applications. In other words, the objective of this paper is to present the proof-of-concept of control effectiveness of crowd dynamics management. Our model uses feedback control theory, and enables an integrated evaluation of the control effectiveness of crowd dynamics management methods under various scenarios. We also provide extensive numerical results to verify the effectiveness of the model.", "title": "" }, { "docid": "91979667e2846ab489db4dad8df1df0a", "text": "Performance of speaker identification SID systems is known to degrade rapidly in the presence of mismatch such as noise and channel degradations. This study introduces a novel class of curriculum learning CL based algorithms for noise robust speaker recognition. We introduce CL-based approaches at two stages within a state-of-the-art speaker verification system: at the i-Vector extractor estimation and at the probabilistic linear discriminant PLDA back-end. Our proposed CL-based approaches operate by categorizing the available training data into progressively more challenging subsets using a suitable difficulty criterion. Next, the corresponding training algorithms are initialized with a subset that is closest to a clean noise-free set, and progressively moving to subsets that are more challenging for training as the algorithms progress. We evaluate the performance of our proposed approaches on the noisy and severely degraded data from the DARPA RATS SID task, and show consistent and significant improvement across multiple test sets over a baseline SID framework with a standard i-Vector extractor and multisession PLDA-based back-end. We also construct a very challenging evaluation set by adding noise to the NIST SRE 2010 C5 extended condition trials, where our proposed CL-based PLDA is shown to offer significant improvements over a traditional PLDA based back-end.", "title": "" }, { "docid": "5e4c4a9f298a2eb015ce96fa2c82c2c2", "text": "Tendons are able to respond to mechanical forces by altering their structure, composition, and mechanical properties--a process called tissue mechanical adaptation. The fact that mechanical adaptation is effected by cells in tendons is clearly understood; however, how cells sense mechanical forces and convert them into biochemical signals that ultimately lead to tendon adaptive physiological or pathological changes is not well understood. Mechanobiology is an interdisciplinary study that can enhance our understanding of mechanotransduction mechanisms at the tissue, cellular, and molecular levels. The purpose of this article is to provide an overview of tendon mechanobiology. The discussion begins with the mechanical forces acting on tendons in vivo, tendon structure and composition, and its mechanical properties. Then the tendon's response to exercise, disuse, and overuse are presented, followed by a discussion of tendon healing and the role of mechanical loading and fibroblast contraction in tissue healing. Next, mechanobiological responses of tendon fibroblasts to repetitive mechanical loading conditions are presented, and major cellular mechanotransduction mechanisms are briefly reviewed. Finally, future research directions in tendon mechanobiology research are discussed.", "title": "" }, { "docid": "424fe4ffd8077d390ddee2a05ff5dcea", "text": "A re-emergence of research on EEG-neurofeedback followed controlled evidence of clinical benefits and validation of cognitive/affective gains in healthy participants including correlations in support of feedback learning mediating outcome. Controlled studies with healthy and elderly participants, which have increased exponentially, are reviewed including protocols from the clinic: sensory-motor rhythm, beta1 and alpha/theta ratios, down-training theta maxima, and from neuroscience: upper-alpha, theta, gamma, alpha desynchronisation. Outcome gains include sustained attention, orienting and executive attention, the P300b, memory, spatial rotation, RT, complex psychomotor skills, implicit procedural memory, recognition memory, perceptual binding, intelligence, mood and well-being. Twenty-three of the controlled studies report neurofeedback learning indices along with beneficial outcomes, of which eight report correlations in support of a meditation link, results which will be supplemented by further creativity and the performing arts evidence in Part II. Validity evidence from optimal performance studies represents an advance for the neurofeedback field demonstrating that cross fertilisation between clinical and optimal performance domains will be fruitful. Theoretical and methodological issues are outlined further in Part III.", "title": "" }, { "docid": "08134d0d76acf866a71d660062f2aeb8", "text": "Colorization methods using deep neural networks have become a recent trend. However, most of them do not allow user inputs, or only allow limited user inputs (only global inputs or only local inputs), to control the output colorful images. The possible reason is that it’s difficult to differentiate the influence of different kind of user inputs in network training. To solve this problem, we present a novel deep colorization method, which allows simultaneous global and local inputs to better control the output colorized images. The key step is to design an appropriate loss function that can differentiate the influence of input data, global inputs and local inputs. With this design, our method accepts no inputs, or global inputs, or local inputs, or both global and local inputs, which is not supported in previous deep colorization methods. In addition, we propose a global color theme recommendation system to help users determine global inputs. Experimental results shows that our methods can better control the colorized images and generate state-of-art results.", "title": "" }, { "docid": "e91e350cd2e3f385333be9156d38feac", "text": "Mobile devices store a diverse set of private user data and have gradually become a hub to control users' other personal Internet-of-Things devices. Access control on mobile devices is therefore highly important. The widely accepted solution is to protect access by asking for a password. However, password authentication is tedious, e.g., a user needs to input a password every time she wants to use the device. Moreover, existing biometrics such as face, fingerprint, and touch behaviors are vulnerable to forgery attacks. We propose a new touch-based biometric authentication system that is passive and secure against forgery attacks. In our touch-based authentication, a user's touch behaviors are a function of some random \"secret\". The user can subconsciously know the secret while touching the device's screen. However, an attacker cannot know the secret at the time of attack, which makes it challenging to perform forgery attacks even if the attacker has already obtained the user's touch behaviors. We evaluate our touch-based authentication system by collecting data from 25 subjects. Results are promising: the random secrets do not influence user experience and, for targeted forgery attacks, our system achieves 0.18 smaller Equal Error Rates (EERs) than previous touch-based authentication.", "title": "" }, { "docid": "21eddfd81b640fc1810723e93f94ae5d", "text": "R. B. Gnanajothi, Topics in graph theory, Ph. D. thesis, Madurai Kamaraj University, India, 1991. E. M. Badr, On the Odd Gracefulness of Cyclic Snakes With Pendant Edges, International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol. 4, No. 4, December 2012. E. M. Badr, M. I. Moussa & K. Kathiresan (2011): Crown graphs and subdivision of ladders are odd graceful, International Journal of Computer Mathematics, 88:17, 3570-3576. A. Rosa, On certain valuation of the vertices of a graph, Theory of Graphs (International Symposium, Rome, July 1966), Gordon and Breach, New York and Dunod Paris (1967) 349-355. A. Solairaju & P. Muruganantham, Even Vertex Gracefulness of Fan Graph,", "title": "" }, { "docid": "09f8641595d946e85f985aa4e3140b37", "text": "Wavelet transform combined with the set partitioning coders (SPC) are the most widely used fingerprint image compression approach. Many different SPC coders have been proposed in the literature to encode the wavelet transform coefficients a common feature of which is trying to maximize the global peak-signal-to-noise ratio (PSNR) at a given bit rate. Unfortunately, they have not considered the local variations of SNR within the compressed fingerprint image; therefore, different regions in the compressed image will have different ridge-valley qualities. This problem causes the verification performance to be decreased because minutiae and other useful features cannot be extracted precisely from the low-bit-rate-compressed fingerprint images. Contrast variation within the original image worsens the problem. This paper deals with those applications of fingerprint image compression in which high compression ratios and preserving or improving the verification performance of the compressed images are the main concern. We propose a compression scheme in which the local-SNR (signal-to-noise ratio) variations within the compressed image are minimized (and thus, general quality is maximized everywhere) by means of an iterative procedure. The proposed procedure can be utilized in conjunction with any SPC coder without the need to modify the SPC coder’s algorithm. In addition, we used image enhancement to further improve the ridge-valley quality as well as the verification performance of the compressed fingerprint images through alleviating the leakage effect. We evaluated the compression and verification performances of some conventional and modern SPC coders including STW, EZW, SPIHT, WDR, and ASWDR combined with the proposed scheme. This evaluation was performed on the FVC2004 dataset with respect to measures including average PSNR curve versus bit rate, verification accuracy, detection error trade-off (DET) curve, and correlation of matching scores versus the average quality of involved fingerprint images. Simulation results showed considerable improvement on verification performance of all examined SPC coders, especially the SPIHT coder, by using the proposed scheme.", "title": "" } ]
scidocsrr
62c2666f78c3d16db14c058e12d2651c
Behavioral Assessment of Emotion Discrimination, Emotion Regulation, and Cognitive Control in Childhood, Adolescence, and Adulthood
[ { "docid": "9beaf6c7793633dceca0c8df775e8959", "text": "The course, antecedents, and implications for social development of effortful control were examined in this comprehensive longitudinal study. Behavioral multitask batteries and parental ratings assessed effortful control at 22 and 33 months (N = 106). Effortful control functions encompassed delaying, slowing down motor activity, suppressing/initiating activity to signal, effortful attention, and lowering voice. Between 22 and 33 months, effortful control improved considerably, its coherence increased, it was stable, and it was higher for girls. Behavioral and parent-rated measures converged. Children's focused attention at 9 months, mothers' responsiveness at 22 months, and mothers' self-reported socialization level all predicted children's greater effortful control. Effortful control had implications for concurrent social development. Greater effortful control at 22 months was linked to more regulated anger, and at 33 months, to more regulated anger and joy and to stronger restraint.", "title": "" } ]
[ { "docid": "f513165fd055b04544dff6eb5b7ec771", "text": "Low power wide area (LPWA) networks are attracting a lot of attention primarily because of their ability to offer affordable connectivity to the low-power devices distributed over very large geographical areas. In realizing the vision of the Internet of Things, LPWA technologies complement and sometimes supersede the conventional cellular and short range wireless technologies in performance for various emerging smart city and machine-to-machine applications. This review paper presents the design goals and the techniques, which different LPWA technologies exploit to offer wide-area coverage to low-power devices at the expense of low data rates. We survey several emerging LPWA technologies and the standardization activities carried out by different standards development organizations (e.g., IEEE, IETF, 3GPP, ETSI) as well as the industrial consortia built around individual LPWA technologies (e.g., LoRa Alliance, Weightless-SIG, and Dash7 alliance). We further note that LPWA technologies adopt similar approaches, thus sharing similar limitations and challenges. This paper expands on these research challenges and identifies potential directions to address them. While the proprietary LPWA technologies are already hitting the market with large nationwide roll-outs, this paper encourages an active engagement of the research community in solving problems that will shape the connectivity of tens of billions of devices in the next decade.", "title": "" }, { "docid": "4ff5953f4c81a6c77f46c66763d791dc", "text": "We propose a system that finds text in natural scenes using a variety of cues. Our novel data-driven method incorporates coarse-to-fine detection of character pixels using convolutional features (Text-Conv), followed by extracting connected components (CCs) from characters using edge and color features, and finally performing a graph-based segmentation of CCs into words (Word-Graph). For Text-Conv, the initial detection is based on convolutional feature maps similar to those used in Convolutional Neural Networks (CNNs), but learned using Convolutional k-means. Convolution masks defined by local and neighboring patch features are used to improve detection accuracy. The Word-Graph algorithm uses contextual information to both improve word segmentation and prune false character/word detections. Different definitions for foreground (text) regions are used to train the detection stages, some based on bounding box intersection, and others on bounding box and pixel intersection. Our system obtains pixel, character, and word detection f-measures of 93.14%, 90.26%, and 86.77% respectively for the ICDAR 2015 Robust Reading Focused Scene Text dataset, out-performing state-of-the-art systems. This approach may work for other detection targets with homogenous color in natural scenes.", "title": "" }, { "docid": "b163fb3faa31f6db35599d32d7946523", "text": "Humans learn how to behave directly through environmental experience and indirectly through rules and instructions. Behavior analytic research has shown that instructions can control behavior, even when such behavior leads to sub-optimal outcomes (Hayes, S. (Ed.). 1989. Rule-governed behavior: cognition, contingencies, and instructional control. Plenum Press.). Here we examine the control of behavior through instructions in a reinforcement learning task known to depend on striatal dopaminergic function. Participants selected between probabilistically reinforced stimuli, and were (incorrectly) told that a specific stimulus had the highest (or lowest) reinforcement probability. Despite experience to the contrary, instructions drove choice behavior. We present neural network simulations that capture the interactions between instruction-driven and reinforcement-driven behavior via two potential neural circuits: one in which the striatum is inaccurately trained by instruction representations coming from prefrontal cortex/hippocampus (PFC/HC), and another in which the striatum learns the environmentally based reinforcement contingencies, but is \"overridden\" at decision output. Both models capture the core behavioral phenomena but, because they differ fundamentally on what is learned, make distinct predictions for subsequent behavioral and neuroimaging experiments. Finally, we attempt to distinguish between the proposed computational mechanisms governing instructed behavior by fitting a series of abstract \"Q-learning\" and Bayesian models to subject data. The best-fitting model supports one of the neural models, suggesting the existence of a \"confirmation bias\" in which the PFC/HC system trains the reinforcement system by amplifying outcomes that are consistent with instructions while diminishing inconsistent outcomes.", "title": "" }, { "docid": "4fea04d8f04012b0dbbf45a6ab3a5951", "text": "Nowadays large-scale distributed machine learning systems have been deployed to support various analytics and intelligence services in IT firms. To train a large dataset and derive the prediction/inference model, e.g., a deep neural network, multiple workers are run in parallel to train partitions of the input dataset, and update shared model parameters. In a shared cluster handling multiple training jobs, a fundamental issue is how to efficiently schedule jobs and set the number of concurrent workers to run for each job, such that server resources are maximally utilized and model training can be completed in time. Targeting a distributed machine learning system using the parameter server framework, $w$ e design an online algorithm for scheduling the arriving jobs and deciding the adjusted numbers of concurrent workers and parameter servers for each job over its course, to maximize overall utility of all jobs, contingent on their completion times. Our online algorithm design utilizes a primal-dual framework coupled with efficient dual subroutines, achieving good long-term performance guarantees with polynomial time complexity. Practical effectiveness of the online algorithm is evaluated using trace-driven simulation and testbed experiments, which demonstrate its outperformance as compared to commonly adopted scheduling algorithms in today's cloud systems.", "title": "" }, { "docid": "27775805c45a82cbd31fd9a5e93f3df1", "text": "In a dynamic world, mechanisms allowing prediction of future situations can provide a selective advantage. We suggest that memory systems differ in the degree of flexibility they offer for anticipatory behavior and put forward a corresponding taxonomy of prospection. The adaptive advantage of any memory system can only lie in what it contributes for future survival. The most flexible is episodic memory, which we suggest is part of a more general faculty of mental time travel that allows us not only to go back in time, but also to foresee, plan, and shape virtually any specific future event. We review comparative studies and find that, in spite of increased research in the area, there is as yet no convincing evidence for mental time travel in nonhuman animals. We submit that mental time travel is not an encapsulated cognitive system, but instead comprises several subsidiary mechanisms. A theater metaphor serves as an analogy for the kind of mechanisms required for effective mental time travel. We propose that future research should consider these mechanisms in addition to direct evidence of future-directed action. We maintain that the emergence of mental time travel in evolution was a crucial step towards our current success.", "title": "" }, { "docid": "2efe399d3896f78c6f152d98aa6d33a0", "text": "We consider the problem of verifying the identity of a distribution: Given the description of a distribution over a discrete support p = (p<sub>1</sub>, p<sub>2</sub>, ... , p<sub>n</sub>), how many samples (independent draws) must one obtain from an unknown distribution, q, to distinguish, with high probability, the case that p = q from the case that the total variation distance (L<sub>1</sub> distance) ||p - q||1≥ ϵ? We resolve this question, up to constant factors, on an instance by instance basis: there exist universal constants c, c' and a function f(p, ϵ) on distributions and error parameters, such that our tester distinguishes p = q from ||p-q||1≥ ϵ using f(p, ϵ) samples with success probability > 2/3, but no tester can distinguish p = q from ||p - q||1≥ c · ϵ when given c' · f(p, ϵ) samples. The function f(p, ϵ) is upperbounded by a multiple of ||p||2/3/ϵ<sup>2</sup>, but is more complicated, and is significantly smaller in some cases when p has many small domain elements, or a single large one. This result significantly generalizes and tightens previous results: since distributions of support at most n have L<sub>2/3</sub> norm bounded by √n, this result immediately shows that for such distributions, O(√n/ϵ<sup>2</sup>) samples suffice, tightening the previous bound of O(√npolylog/n<sup>4</sup>) for this class of distributions, and matching the (tight) known results for the case that p is the uniform distribution over support n. The analysis of our very simple testing algorithm involves several hairy inequalities. To facilitate this analysis, we give a complete characterization of a general class of inequalities- generalizing Cauchy-Schwarz, Holder's inequality, and the monotonicity of L<sub>p</sub> norms. Specifically, we characterize the set of sequences (a)<sub>i</sub> = a<sub>1</sub>, . . . , ar, (b)i = b<sub>1</sub>, . . . , br, (c)i = c<sub>1</sub>, ... , cr, for which it holds that for all finite sequences of positive numbers (x)<sub>j</sub> = x<sub>1</sub>,... and (y)<sub>j</sub> = y<sub>1</sub>,...,Π<sub>i=1</sub><sup>r</sup> (Σ<sub>j</sub>x<sup>a</sup><sub>j</sub><sup>i</sup><sub>y</sub><sub>i</sub><sup>b</sup><sup>i</sup>)<sup>ci</sup>≥1. For example, the standard Cauchy-Schwarz inequality corresponds to the sequences a = (1, 0, 1/2), b = (0,1, 1/2), c = (1/2 , 1/2 , -1). Our characterization is of a non-traditional nature in that it uses linear programming to compute a derivation that may otherwise have to be sought throu.gh trial and error, by hand. We do not believe such a characterization has appeared in the literature, and hope its computational nature will be useful to others, and facilitate analyses like the one here.", "title": "" }, { "docid": "6f0283efa932663c83cc2c63d19fd6cf", "text": "Most research that explores the emotional state of users of spoken dialog systems does not fully utilize the contextual nature that the dialog structure provides. This paper reports results of machine learning experiments designed to automatically classify the emotional state of user turns using a corpus of 5,690 dialogs collected with the “How May I Help You” spoken dialog system. We show that augmenting standard lexical and prosodic features with contextual features that exploit the structure of spoken dialog and track user state increases classification accuracy by 2.6%.", "title": "" }, { "docid": "c94460bfeeec437b751e987f399778c0", "text": "The Steiner packing problem is to find the maximum number of edge-disjoint subgraphs of a given graph G that connect a given set of required points S. This problem is motivated by practical applications in VLSI- layout and broadcasting, as well as theoretical reasons. In this paper, we study this problem and present an algorithm with an asymptotic approximation factor of |S|/4. This gives a sufficient condition for the existence of k edge-disjoint Steiner trees in a graph in terms of the edge-connectivity of the graph. We will show that this condition is the best possible if the number of terminals is 3. At the end, we consider the fractional version of this problem, and observe that it can be reduced to the minimum Steiner tree problem via the ellipsoid algorithm.", "title": "" }, { "docid": "1a91e143f4430b11f3af242d6e07cbba", "text": "Random graph matching refers to recovering the underlying vertex correspondence between two random graphs with correlated edges; a prominent example is when the two random graphs are given by Erdős-Rényi graphs G(n, d n ). This can be viewed as an average-case and noisy version of the graph isomorphism problem. Under this model, the maximum likelihood estimator is equivalent to solving the intractable quadratic assignment problem. This work develops an Õ(nd + n)-time algorithm which perfectly recovers the true vertex correspondence with high probability, provided that the average degree is at least d = Ω(log n) and the two graphs differ by at most δ = O(log−2(n)) fraction of edges. For dense graphs and sparse graphs, this can be improved to δ = O(log−2/3(n)) and δ = O(log−2(d)) respectively, both in polynomial time. The methodology is based on appropriately chosen distance statistics of the degree profiles (empirical distribution of the degrees of neighbors). Before this work, the best known result achieves δ = O(1) and n ≤ d ≤ n for some constant c with an n-time algorithm [BCL18] and δ = Õ((d/n)) and d = Ω̃(n) with a polynomial-time algorithm [DCKG18].", "title": "" }, { "docid": "08731e24a7ea5e8829b03d79ef801384", "text": "A new power-rail ESD clamp circuit designed with PMOS as main ESD clamp device has been proposed and verified in a 65nm 1.2V CMOS process. The new proposed design with adjustable holding voltage controlled by the ESD detection circuit has better immunity against mis-trigger or transient-induced latch-on event. The layout area and the standby leakage current of this new proposed design are much superior to that of traditional RC-based power-rail ESD clamp circuit with NMOS as main ESD clamp device.", "title": "" }, { "docid": "29025f061a22aed656e8d24416c52002", "text": "This contribution deals with the Heeger-Bergen pyramid-based texture analysis/synthesis algorithm. It brings a detailed explanation of the original algorithm tested on many characteristic examples. Our analysis reproduces the original results, but also brings a minor improvement concerning non-periodic textures. Inspired by visual perception theories, Heeger and Bergen proposed to characterize a texture by its first-order statistics of both its color and its responses to multiscale and multi-orientation filters, namely the steerable pyramid. The Heeger-Bergen algorithm consists in the following procedure: starting from a white noise image, histogram matchings are performed to the image alternately in the image domain and the steerable pyramid domain, so that the corresponding output histograms match the ones of the input texture. Source Code An on-line demo1 of the Heeger-Bergen pyramid-based texture synthesis algorithm is available. The demo permits to upload a color image to extract a subimage and to run the texture synthesis algorithm on this subimage. The algorithm available in the demo is a slightly improved version treating non-periodic textures by a “periodic+smooth” decomposition [13]. The algorithm works with color textures and is able to synthesize textures with larger size than the input image. The original version of the Heeger-Bergen algorithm (where the boundaries are handled by mirror symmetrization) is optional in the source code. An ANSI C implementation is available for download here2. It is provided with: • An illustrated html documentation; • Source code; This code requires libpng, libfftw3, openmp, and getopt. Compilation and usage instructions are included in the README.txt file of the zip archive. The illustrated HTML documentation can be reproduced from the source code by using doxygen (see the README.txt file of the zip archive for details).", "title": "" }, { "docid": "abc48ae19e2ea1e1bb296ff0ccd492a2", "text": "This paper reports the results achieved by Carnegie Mellon University on the Topic Detection and Tracking Project’s secondyear evaluation for the segmentation, detection, and tracking tasks. Additional post-evaluation improvements are also", "title": "" }, { "docid": "4a6e382b9db87bf5915fec8de4a67b55", "text": "BACKGROUND\nThe aim of the study is to analyze the nature, extensions, and dural relationships of hormonally inactive giant pituitary tumors. The relevance of the anatomic relationships to surgery is analyzed.\n\n\nMETHODS\nThere were 118 cases of hormonally inactive pituitary tumors analyzed with the maximum dimension of more than 4 cm. These cases were surgically treated in our neurosurgical department from 1995 to 2002. Depending on the anatomic extensions and the nature of their meningeal coverings, these tumors were divided into 4 grades. The grades reflected an increasing order of invasiveness of adjacent dural and arachnoidal compartments. The strategy and outcome of surgery and radiotherapy was analyzed for these 4 groups. Average duration of follow-up was 31 months.\n\n\nRESULTS\nThere were 54 giant pituitary tumors, which remained within the confines of sellar dura and under the diaphragma sellae and did not enter into the compartment of cavernous sinus (Grade I). Transgression of the medial wall and invasion into the compartment of the cavernous sinus (Grade II) was seen in 38 cases. Elevation of the dura of the superior wall of the cavernous sinus and extension of this elevation into various compartments of brain (Grade III) was observed in 24 cases. Supradiaphragmatic-subarachnoid extension (Grade IV) was seen in 2 patients. The majority of patients were treated by transsphenoidal route.\n\n\nCONCLUSIONS\nGiant pituitary tumors usually have a meningeal cover and extend into well-defined anatomic pathways. Radical surgery by a transsphenoidal route is indicated and possible in Grade I-III pituitary tumors. Such a strategy offers a reasonable opportunity for recovery in vision and a satisfactory postoperative and long-term outcome. Biopsy of the tumor followed by radiotherapy could be suitable for Grade IV pituitary tumors.", "title": "" }, { "docid": "a75e29521b04d5e09228918e4ed560a6", "text": "This study assessed motives for social network site (SNS) use, group belonging, collective self-esteem, and gender effects among older adolescents. Communication with peer group members was the most important motivation for SNS use. Participants high in positive collective self-esteem were strongly motivated to communicate with peer group via SNS. Females were more likely to report high positive collective self-esteem, greater overall use, and SNS use to communicate with peers. Females also posted higher means for group-in-self, passing time, and entertainment. Negative collective self-esteem correlated with social compensation, suggesting that those who felt negatively about their social group used SNS as an alternative to communicating with other group members. Males were more likely than females to report negative collective self-esteem and SNS use for social compensation and social identity gratifications.", "title": "" }, { "docid": "dd32079de1ca0b5cac5b2dc5fc146d17", "text": "In this paper, we propose a new authentication method to prevent authentication vulnerability of Claim Token method of Membership Service provide in Private BlockChain. We chose Hyperledger Fabric v1.0 using JWT authentication method of membership service. TOTP, which generate OTP tokens and user authentication codes that generate additional time-based password on existing authentication servers, has been applied to enforce security and two-factor authentication method to provide more secure services.", "title": "" }, { "docid": "cb1a99cc1bb705d8ad5f26cc9a61e695", "text": "In the smart grid system, dynamic pricing can be an efficient tool for the service provider which enables efficient and automated management of the grid. However, in practice, the lack of information about the customers' time-varying load demand and energy consumption patterns and the volatility of electricity price in the wholesale market make the implementation of dynamic pricing highly challenging. In this paper, we study a dynamic pricing problem in the smart grid system where the service provider decides the electricity price in the retail market. In order to overcome the challenges in implementing dynamic pricing, we develop a reinforcement learning algorithm. To resolve the drawbacks of the conventional reinforcement learning algorithm such as high computational complexity and low convergence speed, we propose an approximate state definition and adopt virtual experience. Numerical results show that the proposed reinforcement learning algorithm can effectively work without a priori information of the system dynamics.", "title": "" }, { "docid": "0b67a35902f4a027032e5b9034997342", "text": "In order to make software applications simpler to write and easier to maintain, a software digital signal processing library that performs essential signal and image processing functions is an important part of every DSP developer’s toolset. In general, such a library provides high-level interface and mechanisms, therefore developers only need to known how to use algorithm, not the details of how they work. Then, complex signal transformations become function calls, e.g. C-callable functions. Considering the 2-D convolver function as an example of great significance for DSPs, this work proposes to replace this software function by an emulation on a FPGA initially configured by software programming. Therefore, the exploration of the 2-D convolver’s design space will provide guidelines for the development of a library of DSP-oriented hardware configurations intended to significantly speed-up the performance of general DSP processors. Based on the specific convolver, and considering operators supported in the library as hardware accelerators, a series of trade-offs for efficiently exploiting the bandwidth between the general purpose DSP and the accelerators are proposed. In terms of implementation, this work explores the performance and architectural tradeoffs involved in the design of an FPGA-based 2D convolution coprocessor for the TMS320C40 DSP microprocessor from Texas Instruments. However, the proposed concept is not limited to a particular processor. Copyright  1999 IEEE . This paper is an extended version of a paper accepted in the IEEE VLSI Systems Transaction. The paper will be published in 1999. Personnel use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collectives works for resale or redistribution to servers or lists, or to reuse any copyrithed component of this work in other works, must be obtained from the IEEE. Contact: Manager, Copyrights and Permissions / IEEE service Center / 445 Hoes Lane / P.O. Box 1331 / Pistacataway, NJ 08855-1331, USA. Telephone: + Intl. 732562-3966.", "title": "" }, { "docid": "c17e6363762e0e9683b51c0704d43fa7", "text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.", "title": "" }, { "docid": "0fd37a459c95b20e3d80021da1bb281d", "text": "Social media data are increasingly used as the source of research in a variety of domains. A typical example is urban analytics, which aims at solving urban problems by analyzing data from different sources including social media. The potential value of social media data in tourism studies, which is one of the key topics in urban research, however has been much less investigated. This paper seeks to understand the relationship between social media dynamics and the visiting patterns of visitors to touristic locations in real-world cases. By conducting a comparative study, we demonstrate how social media characterizes touristic locations differently from other data sources. Our study further shows that social media data can provide real-time insights of tourists’ visiting patterns in big events, thus contributing to the understanding of social media data utility in tourism studies.", "title": "" }, { "docid": "3df9e73ce61d6168dba668dc9f02078a", "text": "Web mail search is an emerging topic, which has not been the object of as many studies as traditional Web search. In particular, little is known about the characteristics of mail searchers and of the queries they issue. We study here the characteristics of Web mail searchers, and explore how demographic signals such as location, age, gender, and inferred income, influence their search behavior. We try to understand for instance, whether women exhibit different mail search patterns than men, or whether senior people formulate more precise queries than younger people. We compare our results, obtained from the analysis of a Yahoo Web mail search query log, to similar work conducted in Web and Twitter search. In addition, we demonstrate the value of the user’s personal query log, as well as of the global query log and of the demographic signals, in a key search task: dynamic query auto-completion. We discuss how going beyond users’ personal query logs (their search history) significantly improves the quality of suggestions, in spite of the fact that a user’s mailbox is perceived as being highly personal. In particular, we note the striking value of demographic features for queries relating to companies/organizations, thus verifying our assumption that query completion benefits from leveraging queries issued by “people like me\". We believe that demographics and other such global features can be leveraged in other mail applications, and hope that this work is a first step in this direction.", "title": "" } ]
scidocsrr
57f36a8928d1b9e5bd5b8fc40c0f21a5
Why Is an Event Affective? Classifying Affective Events Based on Human Needs
[ { "docid": "9c0b58f0a2a71052fc4349ba750d6ce4", "text": "The ability to comprehend wishes or desires and their fulfillment is important to Natural Language Understanding. This paper introduces the task of identifying if a desire expressed by a subject in a given short piece of text was fulfilled. We propose various unstructured and structured models that capture fulfillment cues such as the subject’s emotional state and actions. Our experiments with two different datasets demonstrate the importance of understanding the narrative and discourse structure to address this task.", "title": "" }, { "docid": "4d8cc4d8a79f3d35ccc800c9f4f3dfdc", "text": "Many common events in our daily life affect us in positive and negative ways. For example, going on vacation is typically an enjoyable event, while being rushed to the hospital is an undesirable event. In narrative stories and personal conversations, recognizing that some events have a strong affective polarity is essential to understand the discourse and the emotional states of the affected people. However, current NLP systems mainly depend on sentiment analysis tools, which fail to recognize many events that are implicitly affective based on human knowledge about the event itself and cultural norms. Our goal is to automatically acquire knowledge of stereotypically positive and negative events from personal blogs. Our research creates an event context graph from a large collection of blog posts and uses a sentiment classifier and semi-supervised label propagation algorithm to discover affective events. We explore several graph configurations that propagate affective polarity across edges using local context, discourse proximity, and event-event co-occurrence. We then harvest highly affective events from the graph and evaluate the agreement of the polarities with human judgements.", "title": "" }, { "docid": "e6f506c3c90a15b5e4079ccb75eb3ff0", "text": "Stories of people's everyday experiences have long been the focus of psychology and sociology research, and are increasingly being used in innovative knowledge-based technologies. However, continued research in this area is hindered by the lack of standard corpora of sufficient size and by the costs of creating one from scratch. In this paper, we describe our efforts to develop a standard corpus for researchers in this area by identifying personal stories in the tens of millions of blog posts in the ICWSM 2009 Spinn3r Dataset. Our approach was to employ statistical text classification technology on the content of blog entries, which required the creation of a sufficiently large set of annotated training examples. We describe the development and evaluation of this classification technology and how it was applied to the dataset in order to identify nearly a million", "title": "" }, { "docid": "e67b9b48507dcabae92debdb9df9cb08", "text": "This paper presents an annotation scheme for events that negatively or positively affect entities (benefactive/malefactive events) and for the attitude of the writer toward their agents and objects. Work on opinion and sentiment tends to focus on explicit expressions of opinions. However, many attitudes are conveyed implicitly, and benefactive/malefactive events are important for inferring implicit attitudes. We describe an annotation scheme and give the results of an inter-annotator agreement study. The annotated corpus is available online.", "title": "" } ]
[ { "docid": "51e78c504a3977ea7e706da7e3a06c25", "text": "This work introduces an affordance characterization employing mechanical wrenches as a metric for predicting and planning with workspace affordances. Although affordances are a commonly used high-level paradigm for robotic task-level planning and learning, the literature has been sparse regarding how to characterize the agent in this object-agent-environment framework. In this work, we propose decomposing a behavior into a vocabulary of characteristic requirements and capabilities that are suitable to predict the affordances of various parts of the workspace. Specifically, we investigate mechanical wrenches as a viable representation of these affordance requirements and capabilities. We then use this vocabulary in a planning system to compose complex motions from simple behavior types in continuous space. The utility of the framework for complex planning is demonstrated on example scenarios both in simulation and with real-world industrial manipulators.", "title": "" }, { "docid": "8af777a64f8f2127552a05c8ea462416", "text": "This work addresses the issue of fire and smoke detection in a scene within a video surveillance framework. Detection of fire and smoke pixels is at first achieved by means of a motion detection algorithm. In addition, separation of smoke and fire pixels using colour information (within appropriate spaces, specifically chosen in order to enhance specific chromatic features) is performed. In parallel, a pixel selection based on the dynamics of the area is carried out in order to reduce false detection. The output of the three parallel algorithms are eventually fused by means of a MLP.", "title": "" }, { "docid": "9244b687b0031e895cea1fcf5a0b11da", "text": "Bacopa monnieri (L.) Wettst., a traditional Indian medicinal plant with high commercial potential, is used as a potent nervine tonic. A slow growth protocol was developed for medium-term conservation using mineral oil (MO) overlay. Nodal segments of B. monnieri (two genotypes; IC249250, IC468878) were conserved using MO for 24 months. Single node explants were implanted on MS medium supplemented with 0.2 mg l−1 BA and were covered with MO. Subculture duration could be significantly enhanced from 6 to 24 months, on the above medium. Normal plants regenerated from conserved cultures were successfully established in soil. On the basis of 20 random amplified polymorphic DNA and 5 inter-simple sequence repeat primers analyses and bacoside A content using HPLC, no significant reproducible variation was observed between the controls and in vitro-conserved plants. The results demonstrate the feasibility of using MO for medium-term conservation of B. monnieri germplasm without any adverse genetical and biochemical effects.", "title": "" }, { "docid": "080f29a336c0188eeec82d27aa80092c", "text": "Do physically attractive individuals truly possess a multitude of better characteristics? The current study aimed to answer the age old question, “Do looks matter?” within the context of online dating and framed itself using cursory research performed by Brand and colleagues (2012). Good Genes Theory, Halo Effect, Physical Attractiveness Stereotype, and Social Information Procession theory were also used to explore what function appearance truly plays in online dating and how it influences a user’s written text. 83 men were surveyed and asked to rate 84 women’s online dating profiles (photos and texts) independently of one another to determine if those who were perceived as physically attractive also wrote more attractive texts as well. Results indicated that physical attractiveness was correlated with text attractiveness but not with text confidence. Findings also indicated the more attractive a woman’s photo, the less discrepancy there was between her photo attractiveness and text attractiveness scores. Finally, photo attractiveness did not differ significantly for men’s ratings of women in this study and women’s ratings of men in the Brand et al. (2012) study.", "title": "" }, { "docid": "aea474fcacb8af1d820413b5f842056f", "text": ".4 video sequence can be reprmented as a trajectory curve in a high dmensiond feature space. This video curve can be an~yzed by took Mar to those devdoped for planar cnrv=. h partidar, the classic biiary curve sphtting algorithm has been fonnd to be a nseti tool for video analysis. With a spEtting condition that checks the dimension&@ of the curve szgrnent being spht, the video curve can be recursivdy sirnpMed and repr~ented as a tree stmcture, and the framm that are fomtd to be junctions betieen curve segments at Merent, lev& of the tree can be used as ke-fiarn~s to summarize the tideo sequences at Merent levds of det ti. The-e keyframes can be combmed in various spatial and tempord configurations for browsing purposes. We describe a simple video player that displays the ke.fiarn~ seqnentifly and lets the user change the summarization level on the fly tith an additiond shder. 1.1 Sgrrlficance of the Problem Recent advances in digitd technology have promoted video as a vdnable information resource. I$le can now XCaS Se lected &ps from archives of thousands of hours of video footage host instantly. This new resource is e~citing, yet the sheer volume of data makes any retried task o~emhehning and its dcient. nsage impowible. Brow= ing tools that wodd flow the user to qnitiy get an idea of the content of video footage are SW important ti~~ ing components in these video database syst-Fortunately, the devdopment of browsing took is a very active area of research [13, 16, 17], and pow~ solutions are in the horizon. Browsers use as balding blocks subsets of fiarnes c~ed ke.frames, sdected because they smnmarize the video content better than their neighbors. Obviously, sdecting one keytiarne per shot does not adeqnatdy surnPermisslonlo rna~edigitalorhardcopi= of aftorpartof this v:ork for personalor classroomuse is granted v;IIhouIfee providedlhat copies are nol made or distributed for profitor commercial advantage, andthat copiesbear!hrsnoticeandihe full citationon ihe first page.To copyoxhem,se,IOrepublishtopostonservers or lo redistribute10 lists, requiresprior specific pzrrnisston znt’or a fe~ AChl hlultimedia’9S. BnsIol.UK @ 199sAchi 1-5s11>036s!9s/000s S.oo 211 marize the complex information content of long shots in which camera pan and zoom as we~ as object motion pr~ gr=sivdy unvd entirely new situations. Shots shotid be sampled by a higher or lower density of keyfrarnes according to their activity level. Sampbg techniques that would attempt to detect sigficant information changes simply by looking at pairs of frames or even several consecutive frames are bound to lack robustness in presence of noise, such as jitter occurring during camera motion or sudden ~urnination changes due to fluorescent Eght ticker, glare and photographic flash. kterestin~y, methods devdoped to detect perceptually signi$mnt points and &continuities on noisy 2D curves have succes~y addressed this type of problem, and can be extended to the mdtidimensiond curves that represent video sequences. h this paper, we describe an algorithm that can de compose a curve origin~y defined in a high dmensiond space into curve segments of low dimension. In partictiar, a video sequence can be mapped to a high dimensional polygonal trajectory curve by mapping each frame to a time dependent feature usctor, and representing these feature vectors as points. We can apply this algorithm to segment the curve of the video sequence into low ditnensiond curve segments or even fine segments. Th=e segments correspond to video footage where activity is low and frames are redundant. The idea is to detect the constituent segments of the video curoe rather than attempt to lomte the jtmctions between these segments directly. In such a dud aPProach, the curve is decomposed into segments \\vhich exkibit hearity or low dirnensiontity. Curvature discontinuiti~ are then assigned to the junctions between these segments. Detecting generrd stmcture in the video curves to derive frame locations of features such as cuts and shot transitions, rather than attempting to locate the features thernsdv~ by Iocrd analysis of frame changes, ensures that the detected positions of these features are more stable in the presence of noise which is effectively faltered out. h addition, the proposed technique butids a binary tree representation of a video sequence where branches cent tin frarn= corresponding to more dettied representations of the sequence. The user can view the video sequence at coarse or fine lev& of detds, zooming in by displaying keyfrantes corresponding to the leaves of the tree, or zooming out by displaying keyframes near the root of the tree. ●", "title": "" }, { "docid": "eea288f275b0eab62dddd64a469a2d63", "text": "Glucose control serves as the primary method of diabetes management. Current digital therapeutic approaches for subjects with Type 1 diabetes mellitus (T1DM) such as the artificial pancreas and bolus calculators leverage machine learning techniques for predicting subcutaneous glucose for improved control. Deep learning has recently been applied in healthcare and medical research to achieve state-of-the-art results in a range of tasks including disease diagnosis, and patient state prediction among others. In this work, we present a deep learning model that is capable of predicting glucose levels over a 30-minute horizon with leading accuracy for simulated patient cases (RMSE = 10.02±1.28 [mg/dl] and MARD = 5.95±0.64%) and real patient cases (RMSE = 21.23±1.15 [mg/dl] and MARD = 10.53±1.28%). In addition, the model also provides competitive performance in forecasting adverse glycaemic events with minimal time lag both in a simulated patient dataset (MCChyperglycaemia = 0.82±0.06 and MCChypoglycaemia = 0.76±0.13) and in a real patient dataset (MCChyperglycaemia = 0.79±0.04 and MCChypoglycaemia = 0.28±0.11). This approach is evaluated on a dataset of 10 simulated cases generated from the UVa/Padova simulator and a clinical dataset of 5 real cases each containing glucose readings, insulin bolus, and meal (carbohydrate) data. Performance of the recurrent convolutional neural network is benchmarked against four state-of-the-art algorithms: support vector regression (SVR), latent variable (LVX) model, autoregressive model (ARX), and neural network for predicting glucose algorithm (NNPG).", "title": "" }, { "docid": "8d8e7327f79b256b1ee9dac9a2573b55", "text": "The objective of this work is set-based face recognition, i.e. to decide if two sets of images of a face are of the same person or not. Conventionally, the set-wise feature descriptor is computed as an average of the descriptors from individual face images within the set. In this paper, we design a neural network architecture that learns to aggregate based on both “visual” quality (resolution, illumination), and “content” quality (relative importance for discriminative classification). To this end, we propose a Multicolumn Network (MN) that takes a set of images (the number in the set can vary) as input, and learns to compute a fix-sized feature descriptor for the entire set. To encourage high-quality representations, each individual input image is first weighted by its “visual” quality, determined by a self-quality assessment module, and followed by a dynamic recalibration based on “content” qualities relative to the other images within the set. Both of these qualities are learnt implicitly during training for setwise classification. Comparing with the previous state-of-the-art architectures trained with the same dataset (VGGFace2), our Multicolumn Networks show an improvement of between 2-6% on the IARPA IJB face recognition benchmarks, and exceed the state of the art for all methods on these benchmarks.", "title": "" }, { "docid": "1ebf198459b98048404b706e4852eae2", "text": "Network forensics is a branch of digital forensics, which applies to network security. It is used to relate monitoring and analysis of the computer network traffic, that helps us in collecting information and digital evidence, for the protection of network that can use as firewall and IDS. Firewalls and IDS can&apos;t always prevent and find out the unauthorized access within a network. This paper presents an extensive survey of several forensic frameworks. There is a demand of a system which not only detects the complex attack, but also it should be able to understand what had happened. Here it talks about the concept of the distributed network forensics. The concept of the Distributed network forensics is based on the distributed techniques, which are useful for providing an integrated platform for the automatic forensic evidence gathering and important data storage, valuable support and an attack attribution graph generation mechanism to depict hacking events.", "title": "" }, { "docid": "970a1c802a4c731c3fcb03855d5cfb8c", "text": "Visual prior from generic real-world images can be learned and transferred for representing objects in a scene. Motivated by this, we propose an algorithm that transfers visual prior learned offline for online object tracking. From a collection of real-world images, we learn an overcomplete dictionary to represent visual prior. The prior knowledge of objects is generic, and the training image set does not necessarily contain any observation of the target object. During the tracking process, the learned visual prior is transferred to construct an object representation by sparse coding and multiscale max pooling. With this representation, a linear classifier is learned online to distinguish the target from the background and to account for the target and background appearance variations over time. Tracking is then carried out within a Bayesian inference framework, in which the learned classifier is used to construct the observation model and a particle filter is used to estimate the tracking result sequentially. Experiments on a variety of challenging sequences with comparisons to several state-of-the-art methods demonstrate that more robust object tracking can be achieved by transferring visual prior.", "title": "" }, { "docid": "3ff13bb873dd9a8deada0a7837c5eca4", "text": "This work investigates the use of deep fully convolutional neural networks (DFCNN) for pixel-wise scene labeling of Earth Observation images. Especially, we train a variant of the SegNet architecture on remote sensing data over an urban area and study different strategies for performing accurate semantic segmentation. Our contributions are the following: 1) we transfer efficiently a DFCNN from generic everyday images to remote sensing images; 2) we introduce a multi-kernel convolutional layer for fast aggregation of predictions at multiple scales; 3) we perform data fusion from heterogeneous sensors (optical and laser) using residual correction. Our framework improves state-of-the-art accuracy on the ISPRS Vaihingen 2D Semantic Labeling dataset.", "title": "" }, { "docid": "d2ee6e2e3c7e851e75558ab69d159e08", "text": "the later stages of the development life cycle versus during production (Brooks 1995). Therefore, testing is one of the most critical and time-consuming phases of the software development life cycle, which accounts for 50 percent of the total cost of development (Brooks 1995). The testing phase should be planned carefully in order to save time and effort while detecting as many defects as possible. Different verification, validation, and testing strategies have been proposed so far to optimize the time and effort utilized during the testing phase: code reviews (Adrian, Branstad, and Cherniavsky 1982; Shull et al. 2002), inspections (Fagan 1976), and automated tools (Menzies, Greenwald, and Frank 2007; Nagappan, Ball, and Murphy 2006; Ostrand, Weyuker, and Bell 2005). Defect predictors improve the efficiency of the testing phase in addition to helping developers assess the quality and defectproneness of their software product (Fenton and Neil 1999). They also help managers in allocating resources. Most defect prediction models combine well-known methodologies and algorithms such as statistical techniques (Nagappan, Ball, and Murphy 2006; Ostrand, Weyuker, and Bell 2005; Zimmermann et al. 2004) and machine learning (Munson and Khoshgoftaar 1992; Fenton and Neil 1999; Lessmann et al. 2008; Moser, Pedrycz, and Succi 2008). They require historical data in terms of software metrics and actual defect rates, and combine these metrics and defect information as training data to learn which modules seem to be defect prone. Based on the knowledge from training data and software metrics acquired from a recently completed project, such tools can estimate defect-prone modules of that project. IAAI Articles", "title": "" }, { "docid": "e53678707c57dce8d2e91afa04e99aaa", "text": "Forensic facial identification examiners are required to match the identity of faces in images that vary substantially, owing to changes in viewing conditions and in a person's appearance. These identifications affect the course and outcome of criminal investigations and convictions. Despite calls for research on sources of human error in forensic examination, existing scientific knowledge of face matching accuracy is based, almost exclusively, on people without formal training. Here, we administered three challenging face matching tests to a group of forensic examiners with many years' experience of comparing face images for law enforcement and government agencies. Examiners outperformed untrained participants and computer algorithms, thereby providing the first evidence that these examiners are experts at this task. Notably, computationally fusing responses of multiple experts produced near-perfect performance. Results also revealed qualitative differences between expert and non-expert performance. First, examiners' superiority was greatest at longer exposure durations, suggestive of more entailed comparison in forensic examiners. Second, experts were less impaired by image inversion than non-expert students, contrasting with face memory studies that show larger face inversion effects in high performers. We conclude that expertise in matching identity across unfamiliar face images is supported by processes that differ qualitatively from those supporting memory for individual faces.", "title": "" }, { "docid": "b3911204471f409cf243558f1a7c11db", "text": "Process mining allows for the automated discovery of process models from event logs. These models provide insights and enable various types of model-based analysis. This paper demonstrates that the discovered process models can be extended with information to predict the completion time of running instances. There are many scenarios where it is useful to have reliable time predictions. For example, when a customer phones her insurance company for information about her insurance claim, she can be given an estimate for the remaining processing time. In order to do this, we provide a configurable approach to construct a process model, augment this model with time information learned from earlier instances, and use this to predict e.g. the completion time. To provide meaningful time predictions we use a configurable set of abstractions that allow for a good balance between “overfitting” and “underfitting”. The approach has been implemented in ProM and through several experiments using real-life event logs we demonstrate its applicability.", "title": "" }, { "docid": "c45d911aea9d06208a4ef273c9ab5ff3", "text": "A wide range of research has used face data to estimate a person's engagement, in applications from advertising to student learning. An interesting and important question not addressed in prior work is if face-based models of engagement are generalizable and context-free, or do engagement models depend on context and task. This research shows that context-sensitive face-based engagement models are more accurate, at least in the space of web-based tools for trauma recovery. Estimating engagement is important as various psychological studies indicate that engagement is a key component to measure the effectiveness of treatment and can be predictive of behavioral outcomes in many applications. In this paper, we analyze user engagement in a trauma-recovery regime during two separate modules/tasks: relaxation and triggers. The dataset comprises of 8M+ frames from multiple videos collected from 110 subjects, with engagement data coming from 800+ subject self-reports. We build an engagement prediction model as sequence learning from facial Action Units (AUs) using Long Short Term Memory (LSTMs). Our experiments demonstrate that engagement prediction is contextual and depends significantly on the allocated task. Models trained to predict engagement on one task are only weak predictors for another and are much less accurate than context-specific models. Further, we show the interplay of subject mood and engagement using a very short version of Profile of Mood States (POMS) to extend our LSTM model.", "title": "" }, { "docid": "bb6c42de5906f0f1d83f2be31c6c07e3", "text": "Correlation is a very effective way to align intensity images. We extend the correlation technique to point set registration using a method we call kernel correlation. Kernel correlation is an affinity measure, and it is also a function of the point set entropy. We define the point set registration problem as finding the maximum kernel correlation configuration of the the two point sets to be registered. The new registration method has intuitive interpretations, simple to implement algorithm and easy to prove convergence property. Our method shows favorable performance when compared with the iterative closest point (ICP) and EM-ICP methods.", "title": "" }, { "docid": "c89be5ba71893ce4bca2b941c1f4a21a", "text": "Accurate indoor human localization without requiring any pre-installed infrastructure is essential for many applications, such as search and rescue in fire disaster areas or human social interaction. Ultra-wideband (UWB) is a very promising technology for accurate indoor positioning with pre-installed receivers. An infrastructure-free methodology, called Pedestrian Dead-Reckoning (PDR), which uses an inertial measurement unit (IMU), can also be used for position estimation. In this approach, the drift errors of IMU in each step length estimation are compensated based on zero-velocity update (ZUPT), zero angular rate update (ZARU) and heuristic heading drift reduction (HDR) algorithms. An accurate step detection can be achieved by relying on the data provided by accelerometers and gyroscopes. In order to further improve the accuracy, a novel approach, which combines IMU PDR and UWB ranging measurements by Extended Kalman filter (EKF) without any pre-installed infrastructure, is proposed. All the components in this approach, the IMU, the mobile station (MS) and the receiver of the UWB are mounted on the feet. The biases in the IMU measurements, which cause inaccurate step length estimation, can be compensated by range measurements provided by UWB. The performance of the normal PDR with EKF is evaluated as comparison to the proposed approach. The real test results show that the proposed approach with EKF is the most effective way to reduce the error.", "title": "" }, { "docid": "7f27e9b29e6ed2800ef850e6022d29ba", "text": "In 2004, the US Center for Disease Control (CDC) published a paper showing that there is no link between the age at which a child is vaccinated with MMR and the vaccinated children's risk of a subsequent diagnosis of autism. One of the authors, William Thompson, has now revealed that statistically significant information was deliberately omitted from the paper. Thompson first told Dr S Hooker, a researcher on autism, about the manipulation of the data. Hooker analysed the raw data from the CDC study afresh. He confirmed that the risk of autism among African American children vaccinated before the age of 2 years was 340% that of those vaccinated later.", "title": "" }, { "docid": "73ce00cee1b2c1895ea5faa40929d2b7", "text": "This paper describes Luminoso’s participation in SemEval 2017 Task 2, “Multilingual and Cross-lingual Semantic Word Similarity”, with a system based on ConceptNet. ConceptNet is an open, multilingual knowledge graph that focuses on general knowledge that relates the meanings of words and phrases. Our submission to SemEval was an update of previous work that builds high-quality, multilingual word embeddings from a combination of ConceptNet and distributional semantics. Our system took first place in both subtasks. It ranked first in 4 out of 5 of the separate languages, and also ranked first in all 10 of the cross-lingual language pairs.", "title": "" }, { "docid": "edc578384d991eefa0929a1f41cfda4b", "text": "This paper investigates the use of additive layer manufacturing (ALM) for waveguide components based on two Ku-band sidearm orthomode transducers (OMT). The advantages and disadvantages of the ALM manufacturing regarding RF waveguide components are discussed and measurement results are compared to those of an equal OMT manufactured by conventional techniques. The paper concludes with an outlook to the capability of advanced manufacturing techniques for RF space applications as well as ongoing development activities.", "title": "" } ]
scidocsrr
fb12b45b035245d2d504113f04709f1c
Anonymity of Bitcoin Transactions An Analysis of Mixing Services
[ { "docid": "bc8b40babfc2f16144cdb75b749e3a90", "text": "The Bitcoin scheme is a rare example of a large scale global payment system in which all the transactions are publicly accessible (but in an anonymous way). We downloaded the full history of this scheme, and analyzed many statistical properties of its associated transaction graph. In this paper we answer for the first time a variety of interesting questions about the typical behavior of users, how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, and how they move bitcoins between their various accounts in order to better protect their privacy. In addition, we isolated all the large transactions in the system, and discovered that almost all of them are closely related to a single large transaction that took place in November 2010, even though the associated users apparently tried to hide this fact with many strange looking long chains and fork-merge structures in the transaction graph.", "title": "" } ]
[ { "docid": "dff035a6e773301bd13cd0b71d874861", "text": "Over the last few years, with the immense popularity of the Kinect, there has been renewed interest in developing methods for human gesture and action recognition from 3D skeletal data. A number of approaches have been proposed to extract representative features from 3D skeletal data, most commonly hard wired geometric or bio-inspired shape context features. We propose a hierarchial dynamic framework that first extracts high level skeletal joints features and then uses the learned representation for estimating emission probability to infer action sequences. Currently gaussian mixture models are the dominant technique for modeling the emission distribution of hidden Markov models. We show that better action recognition using skeletal features can be achieved by replacing gaussian mixture models by deep neural networks that contain many layers of features to predict probability distributions over states of hidden Markov models. The framework can be easily extended to include a ergodic state to segment and recognize actions simultaneously.", "title": "" }, { "docid": "b4622c9a168cd6e6f852bcc640afb4b3", "text": "New developments in osteotomy techniques and methods of fixation have caused a revival of interest of osteotomies around the knee. The current consensus on the indications, patient selection and the factors influencing the outcome after high tibial osteotomy is presented. This paper highlights recent research aimed at joint pressure redistribution, fixation stability and bone healing that has led to improved surgical techniques and a decrease of post-operative time to full weight-bearing.", "title": "" }, { "docid": "d5c72dd4b660376b122bbe71005335d7", "text": "The effect of television violence on boys' aggression was investigated with consideration of teacher-rated characteristic aggressiveness, timing of frustration, and violence-related cues as moderators. Boys in Grades 2 and 3 (N = 396) watched violent or nonviolent TV in groups of 6, and half the groups were later exposed to a cue associated with the violent TV program. They were frustrated either before or after TV viewing. Aggression was measured by naturalistic observation during a game of floor hockey. Groups containing more characteristically high-aggressive boys showed higher aggression following violent TV plus the cue than following violent TV alone, which in turn produced more aggression than did the nonviolent TV condition. There was evidence that both the violent content and the cue may have suppressed aggression among groups composed primarily of boys low in characteristic aggressiveness. Results were interpreted in terms of current information-processing theories of media effects on aggression.", "title": "" }, { "docid": "78d1a0f7a66d3533b1a00d865eeb6abd", "text": "Motivated by a real-life problem of sharing social network data that contain sensitive personal information, we propose a novel approach to release and analyze synthetic graphs in order to protect privacy of individual relationships captured by the social network while maintaining the validity of statistical results. A case study using a version of the Enron e-mail corpus dataset demonstrates the application and usefulness of the proposed techniques in solving the challenging problem of maintaining privacy and supporting open access to network data to ensure reproducibility of existing studies and discovering new scientific insights that can be obtained by analyzing such data. We use a simple yet effective randomized response mechanism to generate synthetic networks under -edge differential privacy, and then use likelihood based inference for missing data and Markov chain Monte Carlo techniques to fit exponential-family random graph models to the generated synthetic networks.", "title": "" }, { "docid": "8d25383c229a3a585d54ac71e2f22fb4", "text": "This study aimed to determine the effects of a flipped classroom (i.e., reversal of time allotment for lecture and homework) and innovative learning activities on academic success and the satisfaction of nursing students. A quasi-experimental design was used to compare three approaches to learning: traditional lecture only (LO), lecture and lecture capture back-up (LLC), and the flipped classroom approach of lecture capture with innovative classroom activities (LCI). Examination scores were higher for the flipped classroom LCI group (M = 81.89, SD = 5.02) than for both the LLC group (M = 80.70, SD = 4.25), p = 0.003, and the LO group (M = 79.79, SD = 4.51), p < 0.001. Students were less satisfied with the flipped classroom method than with either of the other methods (p < 0.001). Blending new teaching technologies with interactive classroom activities can result in improved learning but not necessarily improved student satisfaction.", "title": "" }, { "docid": "641610a41dc50be68cc570068bd6d451", "text": "Preschool children (N = 107) were divided into 4 groups on the basis of maternal report; home and shelter groups exposed to verbal and physical conflict, a home group exposed to verbal conflict only, and a home control group. Parental ratings of behavior problems and competencies and children's self-report data were collected. Results show that verbal conflict only was associated with a moderate level of conduct problems: verbal plus physical conflict was associated with clinical levels of conduct problems and moderate levels of emotional problems; and verbal plus physical conflict plus shelter residence was associated with clinical levels of conduct problems, higher level of emotional problems, and lower levels of social functioning and perceived maternal acceptance. Findings suggests a direct relationship between the nature of the conflict and residence and type and extent of adjustment problems.", "title": "" }, { "docid": "1adabe21b99d7b26851d78c9a607b01d", "text": "Text Summarization is a way to produce a text, which contains the significant portion of information of the original text(s). Different methodologies are developed till now depending upon several parameters to find the summary as the position, format and type of the sentences in an input text, formats of different words, frequency of a particular word in a text etc. But according to different languages and input sources, these parameters are varied. As result the performance of the algorithm is greatly affected. The proposed approach summarizes a text without depending upon those parameters. Here, the relevance of the sentences within the text is derived by Simplified Lesk algorithm and WordNet, an online dictionary. This approach is not only independent of the format of the text and position of a sentence in a text, as the sentences are arranged at first according to their relevance before the summarization process, the percentage of summarization can be varied according to needs. The proposed approach gives around 80% accurate results on 50% summarization of the original text with respect to the manually summarized result, performed on 50 different types and lengths of texts. We have achieved satisfactory results even upto 25% summarization of the original text.", "title": "" }, { "docid": "224cb33193938d5bfb8d604a86d3641a", "text": "We show how machine vision, learning, and planning can be combined to solve hierarchical consensus tasks. Hierarchical consensus tasks seek correct answers to a hierarchy of subtasks, where branching depends on answers at preceding levels of the hierarchy. We construct a set of hierarchical classification models that aggregate machine and human effort on different subtasks and use these inferences in planning. Optimal solution of hierarchical tasks is intractable due to the branching of task hierarchy and the long horizon of these tasks. We study Monte Carlo planning procedures that can exploit task structure to constrain the policy space for tractability. We evaluate the procedures on data collected from Galaxy Zoo II in allocating human effort and show that significant gains can be achieved.", "title": "" }, { "docid": "1d356c920fb720252d827164752dffe5", "text": "In the early days of machine learning, Donald Michie introduced two orthogonal dimensions to evaluate performance of machine learning approaches – predictive accuracy and comprehensibility of the learned hypotheses. Later definitions narrowed the focus to measures of accuracy. As a consequence, statistical/neuronal approaches have been favoured over symbolic approaches to machine learning, such as inductive logic programming (ILP). Recently, the importance of comprehensibility has been rediscovered under the slogan ‘explainable AI’. This is due to the growing interest in black-box deep learning approaches in many application domains where it is crucial that system decisions are transparent and comprehensible and in consequence trustworthy. I will give a short history of machine learning research followed by a presentation of two specific approaches of symbolic machine learning – inductive logic programming and end-user programming. Furthermore, I will present current work on explanation generation. Die Arbeitsweise der Algorithmen, die über uns entscheiden, muss transparent gemacht werden, und wir müssen die Möglichkeit bekommen, die Algorithmen zu beeinflussen. Dazu ist es unbedingt notwendig, dass die Algorithmen ihre Entscheidung begründen! Peter Arbeitsloser zu John of Us, Qualityland, Marc-Uwe Kling, 2017", "title": "" }, { "docid": "2382ab2b71be5dfbd1ba9fb4bf6536fc", "text": "A full-bridge converter which employs a coupled inductor to achieve zero-voltage switching of the primary switches in the entire line and load range is described. Because the coupled inductor does not appear as a series inductance in the load current path, it does not cause a loss of duty cycle or severe voltage ringing across the output rectifier. The operation and performance of the proposed converter is verified on a 670-W prototype.", "title": "" }, { "docid": "295ec5187615caec8b904c81015f4999", "text": "As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit predecessors, most research projects assume that strong in-process memory isolation is no longer an affordable option. Instead of strong, deterministic isolation, new defense systems therefore rely on the probabilistic pseudo-isolation provided by randomization to \"hide\" sensitive (or safe) regions. However, recent attacks have shown that such protection is insufficient; attackers can leak these safe regions in a variety of ways.\n In this paper, we revisit isolation for x86-64 and argue that hardware features enabling efficient deterministic isolation do exist. We first present a comprehensive study on commodity hardware features that can be repurposed to isolate safe regions in the same address space (e.g., Intel MPX and MPK). We then introduce MemSentry, a framework to harden modern defense systems with commodity hardware features instead of information hiding. Our results show that some hardware features are more effective than others in hardening such defenses in each scenario and that features originally conceived for other purposes (e.g., Intel MPX for bounds checking) are surprisingly efficient at isolating safe regions compared to their software equivalent (i.e., SFI).", "title": "" }, { "docid": "33fe68214ea062f2cdb310a74a9d6d8b", "text": "In this study, the authors examine the relationship between abusive supervision and employee workplace deviance. The authors conceptualize abusive supervision as a type of aggression. They use work on retaliation and direct and displaced aggression as a foundation for examining employees' reactions to abusive supervision. The authors predict abusive supervision will be related to supervisor-directed deviance, organizational deviance, and interpersonal deviance. Additionally, the authors examine the moderating effects of negative reciprocity beliefs. They hypothesized that the relationship between abusive supervision and supervisor-directed deviance would be stronger when individuals hold higher negative reciprocity beliefs. The results support this hypothesis. The implications of the results for understanding destructive behaviors in the workplace are examined.", "title": "" }, { "docid": "18acdeb37257f2f7f10a5baa8957a257", "text": "Time-memory trade-off methods provide means to invert one way functions. Such attacks offer a flexible trade-off between running time and memory cost in accordance to users' computational resources. In particular, they can be applied to hash values of passwords in order to recover the plaintext. They were introduced by Martin Hellman and later improved by Philippe Oechslin with the introduction of rainbow tables. The drawbacks of rainbow tables are that they do not always guarantee a successful inversion. We address this issue in this paper. In the context of passwords, it is pertinent that frequently used passwords are incorporated in the rainbow table. It has been known that up to 4 given passwords can be incorporated into a chain but it is an open problem if more than 4 passwords can be achieved. We solve this problem by showing that it is possible to incorporate more of such passwords along a chain. Furthermore, we prove that this results in faster recovery of such passwords during the online running phase as opposed to assigning them at the beginning of the chains. For large chain lengths, the average improvement translates to 3 times the speed increase during the online recovery time.", "title": "" }, { "docid": "2d7ff73a3fb435bd11633f650b23172e", "text": "This study determined the effect of Tetracarpidium conophorum (black walnut) leaf extract on the male reproductive organs of albino rats. The effects of the leaf extracts were determined on the Epididymal sperm concentration, Testicular histology, and on testosterone concentration in the rat serum by a micro plate enzyme immunoassay (Testosterone assay). A total of sixteen (16) male albino wistar rats were divided into four (1, 2, 3 and 4) groups of four rats each. Group 1 served as the control and was fed with normal diet only, while groups 2, 3 and 4 were fed with 200, 400 and 600 mg/kg body weight (BW) of the extract for a period of two weeks. The Epididymal sperm concentration were not significantly affected (p>0.05) across the groups. The level of testosterone for the treatment groups 2 and 4 showed no significant difference (p>0.05) compared to the control while group 4 showed significant increase compared to that of the control (p<0.05). Pathologic changes were observed in testicular histology across the treatment groups. Robust seminiferous tubular lumen containing sperm cells and increased production of Leydig cells and Sertoli cells were observed across different treatment groups compared to that of the control.", "title": "" }, { "docid": "ec4bf9499f16c415ccb586a974671bf1", "text": "Memory circuit elements, namely memristive, memcapacitive and meminductive systems, are gaining considerable attention due to their ubiquity and use in diverse areas of science and technology. Their modeling within the most widely used environment, SPICE, is thus critical to make substantial progress in the design and analysis of complex circuits. Here, we present a collection of models of different memory circuit elements and provide a methodology for their accurate and reliable modeling in the SPICE environment. We also provide codes of these models written in the most popular SPICE versions (PSpice, LTspice, HSPICE) for the benefit of the reader. We expect this to be of great value to the growing community of scientists interested in the wide range of applications of memory circuit elements.", "title": "" }, { "docid": "cff062b48160fd1551e530125a03d1f8", "text": "In this paper, we consider a multiple-input multiple-output wireless powered communication network, where multiple users harvest energy from a dedicated power station in order to be able to transmit their information signals to an information receiving station. Employing a practical non-linear energy harvesting (EH) model, we propose a joint time allocation and power control scheme, which takes into account the uncertainty regarding the channel state information (CSI) and provides robustness against imperfect CSI knowledge. In particular, we formulate two non-convex optimization problems for different objectives, namely system sum throughput maximization and the maximization of the minimum individual throughput across all wireless powered users. To overcome the non-convexity, we apply several transformations along with a one-dimensional search to obtain an efficient resource allocation algorithm. Numerical results reveal that a significant performance gain can be achieved when the resource allocation is designed based on the adopted non-linear EH model instead of the conventional linear EH model. Besides, unlike a non-robust baseline scheme designed for perfect CSI, the proposed resource allocation schemes are shown to be robust against imperfect CSI knowledge.", "title": "" }, { "docid": "acf6a62e487b79fc0500aa5e6bbb0b0b", "text": "This paper proposes a low-cost, easily realizable strategy to equip a reinforcement learning (RL) agent the capability of behaving ethically. Our model allows the designers of RL agents to solely focus on the task to achieve, without having to worry about the implementation of multiple trivial ethical patterns to follow. Based on the assumption that the majority of human behavior, regardless which goals they are achieving, is ethical, our design integrates human policy with the RL policy to achieve the target objective with less chance of violating the ethical code that human beings normally obey.", "title": "" }, { "docid": "1ffc6db796b8e8a03165676c1bc48145", "text": "UMAP (Uniform Manifold Approximation and Projection) is a novel manifold learning technique for dimension reduction. UMAP is constructed from a theoretical framework based in Riemannian geometry and algebraic topology. Œe result is a practical scalable algorithm that applies to real world data. Œe UMAP algorithm is competitive with t-SNE for visualization quality, and arguably preserves more of the global structure with superior run time performance. Furthermore, UMAP has no computational restrictions on embedding dimension, making it viable as a general purpose dimension reduction technique for machine learning.", "title": "" }, { "docid": "f3a8e58eec0f243ae9fdfae78f75657d", "text": "This paper studies the decentralized coded caching for a Fog Radio Access Network (F-RAN), whereby two edge-nodes (ENs) connected to a cloud server via fronthaul links with limited capacity are serving the requests of K r users. We consider all ENs and users are equipped with caches. A decentralized content placement is proposed to independently store contents at each network node during the off-peak hours. After that, we design a coded delivery scheme in order to deliver the user demands during the peak-hours under the objective of minimizing the normalized delivery time (NDT), which refers to the worst case delivery latency. An information-theoretic lower bound on the minimum NDT is derived for arbitrary number of ENs and users. We evaluate numerically the performance of the decentralized scheme. Additionally, we prove the approximate optimality of the decentralized scheme for a special case when the caches are only available at the ENs.", "title": "" } ]
scidocsrr
38edf8a767f0dfa70e5bef9a0df404a6
From Word Embeddings to Item Recommendation
[ { "docid": "b04f91a739f634f36536fb68795840ce", "text": "This work presents an empirical comparison among three widespread word embedding techniques as Latent Semantic Indexing, Random Indexing and the more recent Word2Vec. Specifically, we employed these techniques to learn a lowdimensional vector space word representation and we exploited it to represent both items and user profiles in a content-based recommendation scenario. The performance of the techniques has been evaluated against two state-ofthe-art datasets, and experimental results provided good insights which pave the way to several future directions. 1. MOTIVATIONS AND METHODOLOGY Word Embedding techniques learn in a totally unsupervised way a low-dimensional vector space representation of words by analyzing their usage in (very) large corpora of textual documents. These approaches are recently gaining more and more attention, since they showed very good performance in a broad range of natural language processingrelated scenarios, ranging from sentiment analysis and machine translation to more challenging ones as learning a textual description of a given image. In a nutshell, all these techniques employ a large corpora of documents to encode the co-occurences between the terms, in order to learn both linguistic regularities as well as semantic nuances, according to their usage. Next, given this huge co-occurrences matrix, each technique use a different approach to obtain a smaller low-dimensional representation of each word occurring in the original corpus. An important feature which is common to all these technique is that the dimension of the representation (that is to say, the size of the vectors) is just a parameter of the model, so it can be set according to specific constraint or peculiarities of the data. However, although the effectiveness of such techniques (especially when combined with deep neural network architectures) is already taken for granted, just a few work inveshttp://googleresearch.blogspot.it/2014/11/a-picture-isworth-thousand-coherent.html Copyright is held by the author/owner(s). RecSys 2015 Poster Proceedings, September 16-20, 2015, Vienna, Austria. tigated how well they do perform in recommender systemsrelated tasks. To this aim, in this work we defined a very simple content-based recommendation framework based on word embeddings, in order to assess about the effectiveness of such techniques in these scenarios as well. Specifically, we first exploited word embedding techniques to represent words in vector spaces. Next, we inferred a vector-space representation of the items by summing the representation of the words occurring in the document. Similarly, user profiles are represented by summing the document representation of the items the user liked. Finally, by exploiting classic similarity measures the available items can be ranked according to their descending similarity with respect to the user profile, and recommendations can be provided, in a typical Top-N recommendation setting. Clearly, this is a very basic formulation, since more finegrained representations can be learned for both items and users profiles. However, this work just aims to preliminarily evaluate the effectiveness of such representations in a simplified recommendation framework, in order to pave the way to several future research directions in the area. Overview of the techniques. Latent Semantic Indexing (LSI) [1] is a word embedding technique which applies Singular Value Decomposition (SVD) over a word-document matrix. The goal of the approach is to compress the original information space through SVD in order to obtain a smallerscale word-concepts matrix, in which each column models a latent concept occurring the original vector space. Specifically, SVD is employed to unveil the latent relationships between terms according to their usage in the corpus. Next, Random Indexing (RI) [3], is an incremental technique to learn a low-dimensional word representation relying on the principles of the Random Projection. It works in two steps: first, a context vector is defined for each context (the definition of the context is typically scenario-dependant, it may be a paragraph, a sentence or the whole document). Each context vector is ternary (it contains values in {−1, 0, 1}) very sparse, and its values are randomly distributed. Given such context vectors, the vector space representation of each word is obtained by just summing over all the representations of the contexts in which the word occurs. An important peculiarity of this approach is that it is incremental and scalable: if any new documents come into play, the vector space representation of the terms is updated by just adding the new occurrences of the terms in the new documents. Finally, Word2Vec (W2V) is a recent technique proposed by Mikolov et al. [2]. The approach learns a vector-space representation of the terms by exploiting a two-layers neuTable 1: Results of the experiments. The best word embedding approach is highlighted in bold. The best overall configuration is highlighted in bold and underlined. The baselines which are overcame by at least a word embedding are put in italics. MovieLens W2V RI LSI U2U I2I BPRMF Vector Size 300 500 300 500 300 500 F1@5 0.5056 0.5054 0.4921 0.4910 0.4645 0.4715 0.5217 0.5022 0.5141 F1@10 0.5757 0.5751 0.5622 0.5613 0.5393 0.5469 0.5969 0.5836 0.5928 F1@15 0.5672 0.5674 0.5349 0.5352 0.5187 0.5254 0.5911 0.5814 0.5876 DBbook W2V RI LSI U2U I2I BPRMF 300 500 300 500 300 500 F1@5 0.5183 0.5186 0.5064 0.5039 0.5056 0.5076 0.5193 0.5111 0.5290 F1@10 0.6207 0.6209 0.6239 0.6244 0.6256 0.6260 0.6229 0.6194 0.6263 F1@15 0.5829 0.5828 0.5892 0.5887 0.5908 0.5909 0.5777 0.5776 0.5778 ral network. In the first step, weights in the network are randomly distributed as in RI. Next, the network is trained by using the Skip-gram methodology in order to model finegrained regularities in word usage. At each step, weights are updated through Stochastic Gradient Descent and a vectorspace representation of each term is obtained by extracting the weights of the network at the end of the training. 2. EXPERIMENTAL EVALUATION In the experimental evaluation the performance of word embedding representations were compared against two stateof-the-art datasets as MovieLens (ML) and DBbook (DB). Moreover, we also compared the effectiveness of the bestperforming configurations to some widespead baselines. Experimental Design. Experiments were performed by adopting different protocols: as regards ML, we carried out a 5-folds cross validation, while a single training/test split was used for DB. Textual content was obtained by mapping items to Wikipedia pages. For each word embedding technique we compared two different size of learned vectors: 300 and 500. As regards the baselines, we exploited MyMediaLite library. We evaluated User-to-User (U2U-KNN) and Item-to-Item Collaborative Filtering (I2I-KNN) as well as the Bayesian Personalized Ranking Matrix Factorization (BPRMF). U2U and I2I neighborhood size was set to 80. while BPRMF was run by setting the factor parameter equal to 100. In both cases we chose the optimal values for the parameters. Finally, statistical significance was assessed by exploiting Wilcoxon and Friedman tests, chosen after running the Shapiro-Wilk test which revealed the non-normal distribution of the data. Discussion of the results. The first six columns of Table 1 provide the results of the comparison among the word embedding techniques. As regards ML, W2V emerged as the best-performing configuration for all the metrics took into account. The gap is significant when compared to both RI and LSI. Moreover, results show that the size of the vectors did not significantly affect the overall accuracy of the algorithms (with the exception of LSI). This is an interesting outcome since with an even smaller word representation, word embeddings can obtain good results. However, the outcomes emerging from this first experiments are controversial, since DBbook data provided opposite results: in this dataset W2V is the best-performing configuration only for F1@5. On the other side, LSI, which performed the worst http://challenges.2014.eswc-conferences.org/index.php/RecSys http://www.mymedialite.net/ on MovieLens data, overcomes both W2V and RI on F1@10 and F1@15. On a first sights these results indicate nongeneralizable outcomes. However, it is likely that such behavior depends on specific pecularities of the datasets which in turn influence the way the approaches learn their vectorspace representations. A more throrough analysis is needed to obtain general guidelines which drive the behavior of such approaches. Next, we compared our techniques to the above described baselines. Results clearly show that the effectiveness of word embedding approaches is directly dependent on the sparsity of the data. This is an expected behavior since contentbased approaches can better deal with cold-start situations. In highly sparse dataset as DBbook (99.13% against 93.59% of MovieLens), content-based approaches based on word embedding tend to overcome the baselines. Indeed, all the approaches overcome I2I and U2U on F1@10 and F1@15 (W2V also overcomes I2I on F1@5). Furthermore, it is worth to note that on F1@10 and F@15 word embeddings can obtain results which are comparable (or even better on F1@15) to those obtained by BPRMF. This is a very important outcome, which definitely confirms the effectiveness of such techniques. Conversely, on less sparse datasets as MovieLens, CF algorithms overcome their content-based counterpart. However, the overall outcomes emerging from this preliminary investigations are very promising: given that no specific NLP task was performed on the data, it is likely that a more thorough processing of the content can lead to even better results. Thus, this investigation showed that word embedding approaches can represent a very interesting alternative to widespread CF approaches. In the following, we will further validate our r", "title": "" }, { "docid": "3d00dcb252435194d4852c7a8df6cd1c", "text": "Social networks, personal blog pages, on-line transaction web-sites, expertise web pages and location based social networks provide an attractive platform for millions of users to share opinions, comments, ratings, etc. Having this kind of diverse and comprehensive information leads to difficulties for users to reach the most appropriate and reliable conclusions. Recommendation systems form one of the solutions to deal with the information overload problem by providing personalized services. Using spatial, temporal and social information on recommender systems is a recent trend that increases the performance. Also, taking into account more than one criterion can improve the performance of the recommender systems. In this paper, a location and social network aware recommender system enhanced with multi objective filtering is proposed and described. The results show that the proposed method reaches high coverage while preserving precision. Besides, the proposed method is not affected by the range of ratings and provides persistent results in different settings.", "title": "" } ]
[ { "docid": "24d827caa4402e5cb560216eb55ca321", "text": "This study examined the narrative features of 20 life histories gathered from psychiatric patients with the Occupational Performance History Interview. The aim was to identify how narrative features were present in the patient interview responses and to illustrate how such narrative features can be located. We found that the patients organized their interview responses with deep metaphors that served to \"emplot,\" or give meaning to, the life story. This article illustrates how patients used the deep metaphors to both circumscribe and frame possible solutions to the problems in their lives. Deep metaphors are consistent, recurring images of a life story that give coherence to, and aid in, the interpretation of the events of that life. Moreover, we explored how metaphors can be located in patient life histories and their implications for occupational therapy.", "title": "" }, { "docid": "6dbf49c714f6e176273317d4274b93de", "text": "Categorical compositional distributional model of [9] sug gests a way to combine grammatical composition of the formal, type logi cal models with the corpus based, empirical word representations of distribut ional semantics. This paper contributes to the project by expanding the model to al so capture entailment relations. This is achieved by extending the representatio s of words from points in meaning space to density operators, which are probabilit y d stributions on the subspaces of the space. A symmetric measure of similarity an d an asymmetric measure of entailment is defined, where lexical entailment i s measured using von Neumann entropy, the quantum variant of Kullback-Leibl er divergence. Lexical entailment, combined with the composition map on wo rd representations, provides a method to obtain entailment relations on the leve l of sentences. Truth theoretic and corpus-based examples are provided.", "title": "" }, { "docid": "b81f30a692d57ebc2fdef7df652d0ca2", "text": "Suppose that Alice wishes to send messages to Bob through a communication channel C1, but her transmissions also reach an eavesdropper Eve through another channel C2. This is the wiretap channel model introduced by Wyner in 1975. The goal is to design a coding scheme that makes it possible for Alice to communicate both reliably and securely. Reliability is measured in terms of Bob's probability of error in recovering the message, while security is measured in terms of the mutual information between the message and Eve's observations. Wyner showed that the situation is characterized by a single constant Cs, called the secrecy capacity, which has the following meaning: for all ε >; 0, there exist coding schemes of rate R ≥ Cs-ε that asymptotically achieve the reliability and security objectives. However, his proof of this result is based upon a random-coding argument. To date, despite consider able research effort, the only case where we know how to construct coding schemes that achieve secrecy capacity is when Eve's channel C2 is an erasure channel, or a combinatorial variation thereof. Polar codes were recently invented by Arikan; they approach the capacity of symmetric binary-input discrete memoryless channels with low encoding and decoding complexity. In this paper, we use polar codes to construct a coding scheme that achieves the secrecy capacity for a wide range of wiretap channels. Our construction works for any instantiation of the wiretap channel model, as long as both C1 and C2 are symmetric and binary-input, and C2 is degraded with respect to C1. Moreover, we show how to modify our construction in order to provide strong security, in the sense defined by Maurer, while still operating at a rate that approaches the secrecy capacity. In this case, we cannot guarantee that the reliability condition will also be satisfied unless the main channel C1 is noiseless, although we believe it can be always satisfied in practice.", "title": "" }, { "docid": "18e019622188ab6ddb2beca69d51e1c9", "text": "The rhesus macaque (Macaca mulatta) is the most utilized primate model in the biomedical and psychological sciences. Expressive behavior is of interest to scientists studying these animals, both as a direct variable (modeling neuropsychiatric disease, where expressivity is a primary deficit), as an indirect measure of health and welfare, and also in order to understand the evolution of communication. Here, intramuscular electrical stimulation of facial muscles was conducted in the rhesus macaque in order to document the relative contribution of each muscle to the range of facial movements and to compare the expressive function of homologous muscles in humans, chimpanzees and macaques. Despite published accounts that monkeys possess less differentiated and less complex facial musculature, the majority of muscles previously identified in humans and chimpanzees were stimulated successfully in the rhesus macaque and caused similar appearance changes. These observations suggest that the facial muscular apparatus of the monkey has extensive homology to the human face. The muscles of the human face, therefore, do not represent a significant evolutionary departure from those of a monkey species. Thus, facial expressions can be compared between humans and rhesus macaques at the level of the facial musculature, facilitating the systematic investigation of comparative facial communication.", "title": "" }, { "docid": "ffb9fc5d737b47d60b4a39ccb853d63a", "text": "For better controllability and energy-efficiency, more vehicle functions are being implemented via electronic control systems in place of traditional mechanical control systems. However, such transitions are creating new, unprecedented risks such as software bugs or hardware glitches, all of which can lead to serious safety risks. Recent real-world examples and research literature have been covering them under the name of vehicle misbehavior. In this paper, we present a new way of checking norm operations, called BAD (Brake Anomaly Detection), which detects any vehicle misbehavior in the Brake-by-Wire system. We focus on the braking system since it is a prototypical safety-critical and cyber-physical system. We first propose a new method for constructing norm models of braking and then show how anomalies are detected by BAD using the constructed models. Finally, we discuss how to verify the results, especially in the context of false positives. Our evaluation results show that BAD can effectively detect various types of anomaly in the braking system.", "title": "" }, { "docid": "6694e24a338302da90d820c1b29c9db7", "text": "In this paper we present a rule-based personalization framework for encapsulating and combining personalization algorithms known from adaptive hypermedia and recommender systems. We show how this personalization framework can be integrated into existing systems by example of the educational online board Comtella-D, which exploits the framework for recommending relevant discussions to the users. In our evaluations we compare different recommender strategies, investigate usage behavior over time, and show that a small amount of user data is sufficient to generate precise recommendations.", "title": "" }, { "docid": "5daa99fa5e6dbfacbdd299c95d53cb6a", "text": "Data from the Indian National Family Health Survey, 2005-06 were used to explore how pregnancy intention at the time of conception influences a variety of maternal and child health and health care outcomes. Results indicate that mistimed children are more likely than wanted children to be delivered without a skilled attendant present (OR = 1.3), to not receive all recommended vaccinations (OR = 1.4), and to die during the neonatal and postneonatal periods (OR = 1.8 and 2.6, respectively). Unwanted children are more likely than wanted children to not receive all recommended vaccinations (OR = 2.2), to be stunted (OR = 1.3), and to die during the neonatal, postneonatal, and early childhood periods (OR = 2.2, 3.6, and 5.9, respectively). Given the high levels of unintended fertility in India (21 per cent of all births), these are striking findings that underscore the importance of investments in family planning.", "title": "" }, { "docid": "0105070bd23400083850627b1603af0b", "text": "This research covers an endeavor by the author on the usage of automated vision and navigation framework; the research is conducted by utilizing a Kinect sensor requiring minimal effort framework for exploration purposes in the zone of robot route. For this framework, GMapping (a highly efficient Rao-Blackwellized particle filer to learn grid maps from laser range data) parameters have been optimized to improve the accuracy of the map generation and the laser scan. With the use of Robot Operating System (ROS), the open source GMapping bundle was utilized as a premise for a map era and Simultaneous Localization and Mapping (SLAM). Out of the many different map generation techniques, the tele-operation used is interactive marker, which controls the TurtleBot 2 movements via RVIZ (3D visualization tool for ROS). Test results completed with the multipurpose robot in a counterfeit and regular environment represents the preferences of the proposed strategy. From experiments, it is found that Kinect sensor produces a more accurate map compared to non-filtered laser range finder data, which is excellent since the price of a Kinect sensor is much cheaper than a laser range finder. An expansion of experimental results was likewise done to test the performance of the portable robot frontier exploring in an obscure environment while performing SLAM alongside the proposed technique.", "title": "" }, { "docid": "ac2e1a27ae05819d213efe7d51d1b988", "text": "Gigantic rates of data production in the era of Big Data, Internet of Thing (IoT) / Internet of Everything (IoE), and Cyber Physical Systems (CSP) pose incessantly escalating demands for massive data processing, storage, and transmission while continuously interacting with the physical world under unpredictable, harsh, and energy-/power-constrained scenarios. Therefore, such systems need to support not only the high performance capabilities at tight power/energy envelop, but also need to be intelligent/cognitive, self-learning, and robust. As a result, a hype in the artificial intelligence research (e.g., deep learning and other machine learning techniques) has surfaced in numerous communities. This paper discusses the challenges and opportunities for building energy-efficient and adaptive architectures for machine learning. In particular, we focus on brain-inspired emerging computing paradigms, such as approximate computing; that can further reduce the energy requirements of the system. First, we guide through an approximate computing based methodology for development of energy-efficient accelerators, specifically for convolutional Deep Neural Networks (DNNs). We show that in-depth analysis of datapaths of a DNN allows better selection of Approximate Computing modules for energy-efficient accelerators. Further, we show that a multi-objective evolutionary algorithm can be used to develop an adaptive machine learning system in hardware. At the end, we summarize the challenges and the associated research roadmap that can aid in developing energy-efficient and adaptable hardware accelerators for machine learning.", "title": "" }, { "docid": "e1651c1f329b8caa53e5322be5bf700b", "text": "Personalized curriculum sequencing is an important research issue for web-based learning systems because no fixed learning paths will be appropriate for all learners. Therefore, many researchers focused on developing e-learning systems with personalized learning mechanisms to assist on-line web-based learning and adaptively provide learning paths in order to promote the learning performance of individual learners. However, most personalized e-learning systems usually neglect to consider if learner ability and the difficulty level of the recommended courseware are matched to each other while performing personalized learning services. Moreover, the problem of concept continuity of learning paths also needs to be considered while implementing personalized curriculum sequencing because smooth learning paths enhance the linked strength between learning concepts. Generally, inappropriate courseware leads to learner cognitive overload or disorientation during learning processes, thus reducing learning performance. Therefore, compared to the freely browsing learning mode without any personalized learning path guidance used in most web-based learning systems, this paper assesses whether the proposed genetic-based personalized e-learning system, which can generate appropriate learning paths according to the incorrect testing responses of an individual learner in a pre-test, provides benefits in terms of learning performance promotion while learning. Based on the results of pre-test, the proposed genetic-based personalized e-learning system can conduct personalized curriculum sequencing through simultaneously considering courseware difficulty level and the concept continuity of learning paths to support web-based learning. Experimental results indicated that applying the proposed genetic-based personalized e-learning system for web-based learning is superior to the freely browsing learning mode because of high quality and concise learning path for individual learners. 2007 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "e7d334dbbfba465f49a924ff39ef0e1f", "text": "Information security is important in proportion to an organization's dependence on information technology. When an organization's information is exposed to risk, the use of information security technology is obviously appropriate. Current information security technology, however, deals with only a small fraction of the problem of information risk. In fact, the evidence increasingly suggests that information security technology does not reduce information risk very effectively.This paper argues that we must reconsider our approach to information security from the ground up if we are to deal effectively with the problem of information risk, and proposes a new model inspired by the history of medicine.", "title": "" }, { "docid": "1eeeb9120eb5496cbd2a3105ba6f2d40", "text": "Without benefit of an up-to-date, in-depth appraisal of any specific multi-facility's organization, the healthcare facility's mission statement and philosophy, and a detailed understanding of the current situation within each of the IS divisions and/or Data Processing departments, it is merely possible to generically assess the needs in light of today's readily available technology, and to subjectively and logically apply ones past experience to determine a preferred approach. Therefore, this overview of strategic planning considerations ought to be used with caution. A workable plan requires extensive on-going effort, and comes alive only when it is adopted by management. In the event that no previous information services planning activity has occurred within the organization, or where a prior strategic plan is more than three years old, prudent advice would include a strong recommendation to begin such a process without delay.", "title": "" }, { "docid": "9cdaa5b2c14a4bf793a824b9941f6909", "text": "Search engines provide result summaries to help users quickly identify whether or not it is worthwhile to click on a result and read in detail. However, users may visit non-relevant results and/or skip relevant ones. These actions are usually harmful to the user experience, but few considered this problem in search result ranking. This paper optimizes relevance of results and user click and skip activities at the same time. Comparing two equally relevant results, our approach learns to rank the one that users are more likely to click on at a higher position. Similarly, it demotes non-relevant web pages with high click probabilities. Experimental results show this approach reduces about 10%-20% of the click and skip errors with a trade off of 2.1% decline in nDCG@10.", "title": "" }, { "docid": "971692db73441f7c68a0cc32927ae0b2", "text": "This letter presents a new lattice-form complex adaptive IIR notch filter to estimate and track the frequency of a complex sinusoid signal. The IIR filter is a cascade of a direct-form all-pole prefilter and an adaptive lattice-form all-zero filter. A complex domain exponentially weighted recursive least square algorithm is adopted instead of the widely used least mean square algorithm to increase the convergence rate. The convergence property of this algorithm is investigated, and an expression for the steady-state asymptotic bias is derived. Analysis results indicate that the frequency estimate for a single complex sinusoid is unbiased. Simulation results demonstrate that the proposed method achieves faster convergence and better tracking performance than all traditional algorithms.", "title": "" }, { "docid": "62818ee0abe188240a41368454945b89", "text": "In this paper, we discuss the use of a robotic arm for testing phone software features, such as image rectification, on mobile devices. The problem statement is that we needed an accurate and a precise test automation system for testing and validating the computer vision algorithms used for image rectification in a mobile phone. Manual testing may be error-prone and tedious and thereby the need for a reliable test automation system is of utmost necessity to check the software quality of the image rectification algorithms. The solution to this problem was to design and develop a test automation system using a robotic arm to validate the image rectification algorithms. The robotic arm-based software test automation was deployed and has performed functional performance-based stability tests on multiple software products. The reason for using a robotic arm setup is because it provides us with the flexibility to run our test cases using different speeds, rotation angles, and tilting angles. In this paper, we describe how the robotic arm rotation works. We first measure the center coordinate of the test subject relative to the base of the robotic arm. Then, a 3-D model of the subject is created with those coordinates via simulation mode to represent the real distance ratio setup. Then, the tip of the robotic arm is moved to the proper distance facing the subject. The tests were executed with clear and blurry images containing text with and without image rectification enabled. The result shows the increase in accuracy of text recognition with image rectification algorithm enabled. This paper talks about the design and development of the test automation for the image rectification feature and how we have used a robotic arm for automating this use case.", "title": "" }, { "docid": "fcd0c523e74717c572c288a90c588259", "text": "From analyzing 100 assessments of coping, the authors critiqued strategies and identified best practices for constructing category systems. From current systems, a list of 400 ways of coping was compiled. For constructing lower order categories, the authors concluded that confirmatory factor analysis should replace the 2 most common strategies (exploratory factor analysis and rational sorting). For higher order categories, they recommend that the 3 most common distinctions (problem- vs. emotion-focused, approach vs. avoidance, and cognitive vs. behavioral) no longer be used. Instead, the authors recommend hierarchical systems of action types (e.g., proximity seeking, accommodation). From analysis of 6 such systems, 13 potential core families of coping were identified. Future steps involve deciding how to organize these families, using their functional homogeneity and distinctiveness, and especially their links to adaptive processes.", "title": "" }, { "docid": "6301ec034b04323bf0437cc7b829cfad", "text": "Selective mutism (SM) is a relatively rare childhood disorder and is underdiagnosed and undertreated. The purpose of the retrospective naturalistic study was to examine the long-term outcome of children with SM who were treated with specifically designed modular cognitive behavioral therapy (MCBT). Parents of 36 children who met diagnostic criteria of SM that received MCBT treatment were invited for a follow-up evaluation. Parents were interviewed using structured scales and completed questionnaires regarding the child, including the Selective Mutism Questionnaire (SMQ). Twenty-four subjects were identified and evaluated. Their mean age ± SD of onset of SM symptoms, beginning of treatment, and age at follow-up were 3.4 ± 1.4, 6.4 ± 3.1, and 9.3 ± 3.4 years, respectively. There was robust improvement from beginning of treatment to follow-up evaluation in SM, social anxiety disorder, and specific phobia symptoms. The recovery rate from SM was 84.2 %. Conclusion: SM-focused MCBT is feasible in children and possibly effective in inducing long-term reduction of SM and comorbid anxiety symptoms. What is Known: • There are limited empirical data on selective mutism (SM) treatment outcome and specifically on cognitive-behavioral therapy, with the majority of studies being uncontrolled case reports of 1 to 2 cases each. • There is also limited data on the long-term outcome of children with SM following treatment. What is New: • Modular cognitive behavioral treatment is a feasible and possibly effective treatment for SM. Intervention at a younger age is more effective comparing to an older age. • Treatment for SM also decreases the rate of psychiatric comorbidities, including separation anxiety disorder and specific phobia.", "title": "" }, { "docid": "036cbf58561de8bfa01ddc4fa8d7b8f2", "text": "The purpose of this paper is to discover a semi-optimal set of trading rules and to investigate its effectiveness as applied to Egyptian Stocks. The aim is to mix different categories of technical trading rules and let an automatic evolution process decide which rules are to be used for particular time series. This difficult task can be achieved by using genetic algorithms (GA's), they permit the creation of artificial experts taking their decisions from an optimal subset of the a given set of trading rules. The GA's based on the survival of the fittest, do not guarantee a global optimum but they are known to constitute an effective approach in optimizing non-linear functions. Selected liquid stocks are tested and GA trading rules were compared with other conventional and well known technical analysis rules. The Proposed GA system showed clear better average profit and in the same high sharpe ratio, which indicates not only good profitability but also better risk-reward trade-off", "title": "" }, { "docid": "9dba6e85d76a187f29271c18be41e7ca", "text": "The ability of music to induce or convey emotions ensures the importance of its role in human life. Consequently, research on methods for identifying the high-level emotion states of a music segment from its low-level features has attracted attention. This paper offers new insights on music emotion recognition methods based on different combinations of data features that they use during the modeling phase from three aspects, music features only, ground-truth data only, and their combination, and provides a comprehensive review of them. Then, focusing on the relatively popular methods in which the two types of data, music features and ground-truth data, are combined, we further subdivide the methods in the literature according to the label- and numerical-type ground-truth data, and analyze the development of music emotion recognition with the cue of modeling methods and time sequence. Three current important research directions are then summarized. Although much has been achieved in the area of music emotion recognition, many issues remain. We review these issues and put forward some suggestions for future work.", "title": "" }, { "docid": "20d3b85b2ef27e54707463e45e1cf11e", "text": "Beam-scanning antennas are attractive for high-bit-rate data communication systems and high resolution sensing systems in millimeter-wave band. Waveguide antenna is one of the most attractive antennas for such millimeter-wave systems because of its low loss and high efficiency characteristics in high frequency band. Horizontally-beam-scanning antennas such as phased arrays and DBF (Digital Beam Forming) systems consist of multiple vertically-long sub-arrays arranged in horizontal direction as shown in Fig. 1. Beam scanning is achieved by giving individual phase to each sub-array from beamforming network. We developed a vertically-long slot-array antenna composed of two feeding waveguides in the millimeter-wave band. One of the solutions for grating lobe suppression is introduced in this paper. Feasibility of the proposed antenna is confirmed by experiments.", "title": "" } ]
scidocsrr
8f3ae7840f3b78d037caf594fdc690f3
Structuring Cooperative Behavior Planning Implementations for Automated Driving
[ { "docid": "045a56e333b1fe78677b8f4cc4c20ecc", "text": "Swarm robotics is an approach to collective robotics that takes inspiration from the self-organized behaviors of social animals. Through simple rules and local interactions, swarm robotics aims at designing robust, scalable, and flexible collective behaviors for the coordination of large numbers of robots. In this paper, we analyze the literature from the point of view of swarm engineering: we focus mainly on ideas and concepts that contribute to the advancement of swarm robotics as an engineering field and that could be relevant to tackle real-world applications. Swarm engineering is an emerging discipline that aims at defining systematic and well founded procedures for modeling, designing, realizing, verifying, validating, operating, and maintaining a swarm robotics system. We propose two taxonomies: in the first taxonomy, we classify works that deal with design and analysis methods; in the second taxonomy, we classify works according to the collective behavior studied. We conclude with a discussion of the current limits of swarm robotics as an engineering discipline and with suggestions for future research directions.", "title": "" }, { "docid": "fc2c995d20c83a72ea46f5055d1847a1", "text": "In this paper, we present a novel probabilistic compact representation of the on-road environment, i.e., the dynamic probabilistic drivability map (DPDM), and demonstrate its utility for predictive lane change and merge (LCM) driver assistance during highway and urban driving. The DPDM is a flexible representation and readily accepts data from a variety of sensor modalities to represent the on-road environment as a spatially coded data structure, encapsulating spatial, dynamic, and legal information. Using the DPDM, we develop a general predictive system for LCMs. We formulate the LCM assistance system to solve for the minimum-cost solution to merge or change lanes, which is solved efficiently using dynamic programming over the DPDM. Based on the DPDM, the LCM system recommends the required acceleration and timing to safely merge or change lanes with minimum cost. System performance has been extensively validated using real-world on-road data, including urban driving, on-ramp merges, and both dense and free-flow highway conditions.", "title": "" } ]
[ { "docid": "da1cecae4f925f331fda67c784e6635d", "text": "This paper surveys recent literature on vehicular social networks that are a particular class of vehicular ad hoc networks, characterized by social aspects and features. Starting from this pillar, we investigate perspectives on next-generation vehicles under the assumption of social networking for vehicular applications (i.e., safety and entertainment applications). This paper plays a role as a starting point about socially inspired vehicles and mainly related applications, as well as communication techniques. Vehicular communications can be considered the “first social network for automobiles” since each driver can share data with other neighbors. For instance, heavy traffic is a common occurrence in some areas on the roads (e.g., at intersections, taxi loading/unloading areas, and so on); as a consequence, roads become a popular social place for vehicles to connect to each other. Human factors are then involved in vehicular ad hoc networks, not only due to the safety-related applications but also for entertainment purposes. Social characteristics and human behavior largely impact on vehicular ad hoc networks, and this arises to the vehicular social networks, which are formed when vehicles (individuals) “socialize” and share common interests. In this paper, we provide a survey on main features of vehicular social networks, from novel emerging technologies to social aspects used for mobile applications, as well as main issues and challenges. Vehicular social networks are described as decentralized opportunistic communication networks formed among vehicles. They exploit mobility aspects, and basics of traditional social networks, in order to create novel approaches of message exchange through the detection of dynamic social structures. An overview of the main state-of-the-art on safety and entertainment applications relying on social networking solutions is also provided.", "title": "" }, { "docid": "c4ff647b5962d3d713577c16a7a9cae5", "text": "In this paper we propose the use of an illumination invariant transform to improve many aspects of visual localisation, mapping and scene classification for autonomous road vehicles. The illumination invariant colour space stems from modelling the spectral properties of the camera and scene illumination in conjunction, and requires only a single parameter derived from the image sensor specifications. We present results using a 24-hour dataset collected using an autonomous road vehicle, demonstrating increased consistency of the illumination invariant images in comparison to raw RGB images during daylight hours. We then present three example applications of how illumination invariant imaging can improve performance in the context of vision-based autonomous vehicles: 6-DoF metric localisation using monocular cameras over a 24-hour period, life-long visual localisation and mapping using stereo, and urban scene classification in changing environments. Our ultimate goal is robust and reliable vision-based perception and navigation an attractive proposition for low-cost autonomy for road vehicles.", "title": "" }, { "docid": "90a1fc43ee44634bce3658463503994e", "text": "Large-scale distributed training requires significant communication bandwidth for gradient exchange that limits the scalability of multi-node training, and requires expensive high-bandwidth network infrastructure. The situation gets even worse with distributed training on mobile devices (federated learning), which suffers from higher latency, lower throughput, and intermittent poor connections. In this paper, we find 99.9% of the gradient exchange in distributed SGD are redundant, and propose Deep Gradient Compression (DGC) to greatly reduce the communication bandwidth. To preserve accuracy during this compression, DGC employs four methods: momentum correction, local gradient clipping, momentum factor masking, and warm-up training. We have applied Deep Gradient Compression to image classification, speech recognition, and language modeling with multiple datasets including Cifar10, ImageNet, Penn Treebank, and Librispeech Corpus. On these scenarios, Deep Gradient Compression achieves a gradient compression ratio from 270× to 600× without losing accuracy, cutting the gradient size of ResNet-50 from 97MB to 0.35MB, and for DeepSpeech from 488MB to 0.74MB. Deep gradient compression enables large-scale distributed training on inexpensive commodity 1Gbps Ethernet and facilitates distributed training on mobile.", "title": "" }, { "docid": "ab7d6a9c9c07ee1a60f01d4017a3a25b", "text": "[Context and Motivation] Many a tool for finding ambiguities in natural language (NL) requirements specifications (RSs) is based on a parser and a parts-of-speech identifier, which are inherently imperfect on real NL text. Therefore, any such tool inherently has less than 100% recall. Consequently, running such a tool on a NL RS for a highly critical system does not eliminate the need for a complete manual search for ambiguity in the RS. [Question/Problem] Can an ambiguity-finding tool (AFT) be built that has 100% recall on the types of ambiguities that are in the AFT’s scope such that a manual search in an RS for ambiguities outside the AFT’s scope is significantly easier than a manual search of the RS for all ambiguities? [Principal Ideas/Results] This paper presents the design of a prototype AFT, SREE (Systemized Requirements Engineering Environment), whose goal is achieving a 100% recall rate for the ambiguities in its scope, even at the cost of a precision rate of less than 100%. The ambiguities that SREE searches for by lexical analysis are the ones whose keyword indicators are found in SREE’s ambiguity-indicator corpus that was constructed based on studies of several industrial strength RSs. SREE was run on two of these industrial strength RSs, and the time to do a completely manual search of these RSs is compared to the time to reject the false positives in SREE’s output plus the time to do a manual search of these RSs for only ambiguities not in SREE’s scope. [Contribution] SREE does not achieve its goals. However, the time comparison shows that the approach to divide ambiguity finding between an AFT with 100% recall for some types of ambiguity and a manual search for only the other types of ambiguity is promising enough to justify more work to improve the implementation of the approach. Some specific improvement suggestions are offered.", "title": "" }, { "docid": "1f4376dcc726b7ac5726620d887c60c3", "text": "Recently sparse representation has been applied to visual tracker by modeling the target appearance using a sparse approximation over a template set, which leads to the so-called L1 trackers as it needs to solve an ℓ1 norm related minimization problem for many times. While these L1 trackers showed impressive tracking accuracies, they are very computationally demanding and the speed bottleneck is the solver to ℓ1 norm minimizations. This paper aims at developing an L1 tracker that not only runs in real time but also enjoys better robustness than other L1 trackers. In our proposed L1 tracker, a new ℓ1 norm related minimization model is proposed to improve the tracking accuracy by adding an ℓ1 norm regularization on the coefficients associated with the trivial templates. Moreover, based on the accelerated proximal gradient approach, a very fast numerical solver is developed to solve the resulting ℓ1 norm related minimization problem with guaranteed quadratic convergence. The great running time efficiency and tracking accuracy of the proposed tracker is validated with a comprehensive evaluation involving eight challenging sequences and five alternative state-of-the-art trackers.", "title": "" }, { "docid": "4c0869847079b11ec8e0a6b9714b2d09", "text": "This paper provides a tutorial overview of the latest generation of passive optical network (PON) technology standards nearing completion in ITU-T. The system is termed NG-PON2 and offers a fiber capacity of 40 Gbit/s by exploiting multiple wavelengths at dense wavelength division multiplexing channel spacing and tunable transceiver technology in the subscriber terminals (ONUs). Here, the focus is on the requirements from network operators that are driving the standards developments and the technology selection prior to standardization. A prestandard view of the main physical layer optical specifications is also given, ahead of final ITU-T approval.", "title": "" }, { "docid": "5236f684bc0fdf11855a439c9d3256f6", "text": "The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. As the homes become smarter, more complex, and technology dependent, the need for an adequate security mechanism with minimum individual’s intervention is growing. The recent serious security attacks have shown how the Internet-enabled smart homes can be turned into very dangerous spots for various ill intentions, and thus lead the privacy concerns for the individuals. For instance, an eavesdropper is able to derive the identity of a particular device/appliance via public channels that can be used to infer in the life pattern of an individual within the home area network. This paper proposes an anonymous secure framework (ASF) in connected smart home environments, using solely lightweight operations. The proposed framework in this paper provides efficient authentication and key agreement, and enables devices (identity and data) anonymity and unlinkability. One-time session key progression regularly renews the session key for the smart devices and dilutes the risk of using a compromised session key in the ASF. It is demonstrated that computation complexity of the proposed framework is low as compared with the existing schemes, while security has been significantly improved.", "title": "" }, { "docid": "c84d012151d270892c38d80ccd46764a", "text": "Signal processing algorithms for near end listening enhancement allow to improve the intelligibility of clean (far end) speech for the near end listener who perceives not only the far end speech but also ambient background noise. A typical scenario is mobile communication conducted in the presence of acoustical background noise such as traffic or babble noise. In this contribution we analyze the calculation rules of the Speech Intelligibility Index (SII) and derive a simple condition for the speech spectrum level of every subband that maximizes the SII for a given noise spectrum level. This rule is used to derive a theoretical bound for a maximum achievable SII as well as a new SII optimized algorithm for near end listening enhancement. The impact of ignoring masking effects in the algorithm is also investigated and seconds our SNR recovery algorithm proposed earlier. Instrumental evaluation shows that the new algorithm performs close to the established theoretical bound.", "title": "" }, { "docid": "75fa6fce044972e5b0946161a5d2281c", "text": "The concept of a glucose-responsive insulin (GRI) has been a recent objective of diabetes technology. The idea behind the GRI is to create a therapeutic that modulates its potency, concentration or dosing relative to a patient's dynamic glucose concentration, thereby approximating aspects of a normally functioning pancreas. From the perspective of the medicinal chemist, the GRI is also important as a generalized model of a potentially new generation of therapeutics that adjust potency in response to a critical therapeutic marker. The aim of this Perspective is to highlight emerging concepts, including mathematical modelling and the molecular engineering of insulin itself and its potency, towards a viable GRI. We briefly outline some of the most important recent progress toward this goal and also provide a forward-looking viewpoint, which asks if there are new approaches that could spur innovation in this area as well as to encourage synthetic chemists and chemical engineers to address the challenges and promises offered by this therapeutic approach.", "title": "" }, { "docid": "916fe1c8bac1d6d9f1df4179d6674ff2", "text": "The UN High-Level Meeting on Non-Communicable Diseases (NCDs) in September, 2011, is an unprecedented opportunity to create a sustained global movement against premature death and preventable morbidity and disability from NCDs, mainly heart disease, stroke, cancer, diabetes, and chronic respiratory disease. The increasing global crisis in NCDs is a barrier to development goals including poverty reduction, health equity, economic stability, and human security. The Lancet NCD Action Group and the NCD Alliance propose five overarching priority actions for the response to the crisis--leadership, prevention, treatment, international cooperation, and monitoring and accountability--and the delivery of five priority interventions--tobacco control, salt reduction, improved diets and physical activity, reduction in hazardous alcohol intake, and essential drugs and technologies. The priority interventions were chosen for their health effects, cost-effectiveness, low costs of implementation, and political and financial feasibility. The most urgent and immediate priority is tobacco control. We propose as a goal for 2040, a world essentially free from tobacco where less than 5% of people use tobacco. Implementation of the priority interventions, at an estimated global commitment of about US$9 billion per year, will bring enormous benefits to social and economic development and to the health sector. If widely adopted, these interventions will achieve the global goal of reducing NCD death rates by 2% per year, averting tens of millions of premature deaths in this decade.", "title": "" }, { "docid": "d2e56a45e0b901024776d36eaa5fa998", "text": "In this paper, we present our results of automatic gesture recognition systems using different types of cameras in order to compare them in reference to their performances in segmentation. The acquired image segments provide the data for further analysis. The images of a single camera system are mostly used as input data in the research area of gesture recognition. In comparison to that, the analysis results of a stereo color camera and a thermal camera system are used to determine the advantages and disadvantages of these camera systems. On this basis, a real-time gesture recognition system is proposed to classify alphabets (A-Z) and numbers (0-9) with an average recognition rate of 98% using Hidden Markov Models (HMM).", "title": "" }, { "docid": "817f9509afcdbafc60ecac2d0b8ef02d", "text": "Abstract—In most regards, the twenty-first century may not bring revolutionary changes in electronic messaging technology in terms of applications or protocols. Security issues that have long been a concern in messaging application are finally being solved using a variety of products. Web-based messaging systems are rapidly evolving the text-based conversation. The users have the right to protect their privacy from the eavesdropper, or other parties which interferes the privacy of the users for such purpose. The chatters most probably use the instant messages to chat with others for personal issue; in which no one has the right eavesdrop the conversation channel and interfere this privacy. This is considered as a non-ethical manner and the privacy of the users should be protected. The author seeks to identify the security features for most public instant messaging services used over the internet and suggest some solutions in order to encrypt the instant messaging over the conversation channel. The aim of this research is to investigate through forensics and sniffing techniques, the possibilities of hiding communication using encryption to protect the integrity of messages exchanged. Authors used different tools and methods to run the investigations. Such tools include Wireshark packet sniffer, Forensics Tool Kit (FTK) and viaForensic mobile forensic toolkit. Finally, authors will report their findings on the level of security that encryption could provide to instant messaging services.", "title": "" }, { "docid": "926db14af35f9682c28a64e855fb76e5", "text": "This paper reports about the development of a Named Entity Recognition (NER) system for Bengali using the statistical Conditional Random Fields (CRFs). The system makes use of the different contextual information of the words along with the variety of features that are helpful in predicting the various named entity (NE) classes. A portion of the partially NE tagged Bengali news corpus, developed from the archive of a leading Bengali newspaper available in the web, has been used to develop the system. The training set consists of 150K words and has been manually annotated with a NE tagset of seventeen tags. Experimental results of the 10-fold cross validation test show the effectiveness of the proposed CRF based NER system with an overall average Recall, Precision and F-Score values of 93.8%, 87.8% and 90.7%, respectively.", "title": "" }, { "docid": "e5f5aa53a90f482fb46a7f02bae27b20", "text": "Machinima is a low-cost alternative to full production filmmaking. However, creating quality cinematic visualizations with existing machinima techniques still requires a high degree of talent and effort. We introduce a lightweight artificial intelligence system, Cambot, that can be used to assist in machinima production. Cambot takes a script as input and produces a cinematic visualization. Unlike other virtual cinematography systems, Cambot favors an offline algorithm coupled with an extensible library of specific modular and reusable facets of cinematic knowledge. One of the advantages of this approach to virtual cinematography is a tight coordination between the positions and movements of the camera and the actors.", "title": "" }, { "docid": "55d08da55a64d35f3115911f3cc22e82", "text": "Process modeling has become an essential part of many organizations for documenting, analyzing and redesigning their business operations and to support them with suitable information systems. In order to serve this purpose, it is important for process models to be well grounded in formal and precise semantics. While behavioural semantics of process models are well understood, there is a considerable gap of research into the semantic aspects of their text labels and natural language descriptions. The aim of this paper is to make this research gap more transparent. To this end, we clarify the role of textual content in process models and the challenges that are associated with the interpretation, analysis, and improvement of their natural language parts. More specifically, we discuss particular use cases of semantic process modeling to identify 25 challenges. For each challenge, we identify prior research and discuss directions for addressing them.", "title": "" }, { "docid": "7660ad596801203d1c9d1635be6b90d9", "text": "a r t i c l e i n f o This study investigates the role of dynamic capabilities in the resource-based view framework, and also explores the relationships among different resources, different dynamic capabilities and firm performance. Employing samples of top 1000 Taiwanese companies, the findings show that dynamic capabilities can mediate the firm's valuable, rare, inimitable and non-substitutable (VRIN) resources to improve performance. On the contrary, non-VRIN resources have an insignificant mediating effect. Among three types of dynamic capabilities, dynamic learning capability most effectively mediates the influence of VRIN resources on performance. Furthermore, the important role of VRIN resources is addressed because of their direct effects on performance based on RBV, as well as their indirect effect via the mediation of dynamic capabilities.", "title": "" }, { "docid": "ba901f44b42820202d0e81671e7f189e", "text": "In this paper, we present a novel method for visual loop-closure detection in autonomous robot navigation. Our method, which we refer to as bag-of-raw-features or BoRF, uses scale-invariant visual features (such as SIFT) directly, rather than their vector-quantized representation or bag-of-words (BoW), which is popular in recent studies of the problem. BoRF avoids the offline process of vocabulary construction, and does not suffer from the perceptual aliasing problem of BoW, thereby significantly improving the recall performance. To reduce the computational cost of direct feature matching, we exploit the fact that images in the case of robot navigation are acquired sequentially, and that feature matching repeatability with respect to scale can be learned and used to reduce the number of the features considered for matching. The proposed method is tested experimentally using indoor visual SLAM image sequences.", "title": "" }, { "docid": "6f22283e5142035d6f6f9d5e06ab1cd2", "text": "We present a novel technique to automatically colorize grayscale images that combines both global priors and local image features. Based on Convolutional Neural Networks, our deep network features a fusion layer that allows us to elegantly merge local information dependent on small image patches with global priors computed using the entire image. The entire framework, including the global and local priors as well as the colorization model, is trained in an end-to-end fashion. Furthermore, our architecture can process images of any resolution, unlike most existing approaches based on CNN. We leverage an existing large-scale scene classification database to train our model, exploiting the class labels of the dataset to more efficiently and discriminatively learn the global priors. We validate our approach with a user study and compare against the state of the art, where we show significant improvements. Furthermore, we demonstrate our method extensively on many different types of images, including black-and-white photography from over a hundred years ago, and show realistic colorizations.", "title": "" }, { "docid": "1af4ccae8012df51fb9c435a49aeb7d7", "text": "The Common N-Gram (CNG) classifier is a text classification algorithm based on the comparison of frequencies of character n-grams (strings of characters of length n) that are the most common in the considered documents and classes of documents. We present a text analytic visualization system that employs the CNG approach for text classification and uses the differences in frequency values of common n-grams in order to visually compare documents at the sub-word level. The visualization method provides both an insight into n-gram characteristics of documents or classes of documents and a visual interpretation of the workings of the CNG classifier.", "title": "" }, { "docid": "7d8dcb65acd5e0dc70937097ded83013", "text": "This paper addresses the problem of mapping natural language sentences to lambda–calculus encodings of their meaning. We describe a learning algorithm that takes as input a training set of sentences labeled with expressions in the lambda calculus. The algorithm induces a grammar for the problem, along with a log-linear model that represents a distribution over syntactic and semantic analyses conditioned on the input sentence. We apply the method to the task of learning natural language interfaces to databases and show that the learned parsers outperform previous methods in two benchmark database domains.", "title": "" } ]
scidocsrr
ae769afa440512df288c07c271ba997e
2 Characteristics of low Reynolds number aerodynamics applied to flapping MAV
[ { "docid": "1726729c32f43917802b902267769dda", "text": "The creation of micro air vehicles (MAVs) of the same general sizes and weight as natural fliers has spawned renewed interest in flapping wing flight. With a wingspan of approximately 15 cm and a flight speed of a few meters per second, MAVs experience the same low Reynolds number (10–10) flight conditions as their biological counterparts. In this flow regime, rigid fixed wings drop dramatically in aerodynamic performance while flexible flapping wings gain efficacy and are the preferred propulsion method for small natural fliers. Researchers have long realized that steady-state aerodynamics does not properly capture the physical phenomena or forces present in flapping flight at this scale. Hence, unsteady flow mechanisms must dominate this regime. Furthermore, due to the low flight speeds, any disturbance such as gusts or wind will dramatically change the aerodynamic conditions around the MAV. In response, a suitable feedback control system and actuation technology must be developed so that the wing can maintain its aerodynamic efficiency in this extremely dynamic situation; one where the unsteady separated flow field and wing structure are tightly coupled and interact nonlinearly. For instance, birds and bats control their flexible wings with muscle tissue to successfully deal with rapid changes in the flow environment. Drawing from their example, perhaps MAVs can use lightweight actuators in conjunction with adaptive feedback control to shape the wing and achieve active flow control. This article first reviews the scaling laws and unsteady flow regime constraining both biological and man-made fliers. Then a summary of vortex dominated unsteady aerodynamics follows. Next, aeroelastic coupling and its effect on lift and thrust are discussed. Afterwards, flow control strategies found in nature and devised by man to deal with separated flows are examined. Recent work is also presented in using microelectromechanical systems (MEMS) actuators and angular speed variation to achieve active flow control for MAVs. Finally, an explanation for aerodynamic gains seen in flexible versus rigid membrane wings, derived from an unsteady three-dimensional computational fluid dynamics model with an integrated distributed control algorithm, is presented. r 2003 Elsevier Ltd. All rights reserved.", "title": "" } ]
[ { "docid": "afae94714340326278c1629aa4ecc48c", "text": "The purpose of this investigation was to examine the influence of upper-body static stretching and dynamic stretching on upper-body muscular performance. Eleven healthy men, who were National Collegiate Athletic Association Division I track and field athletes (age, 19.6 +/- 1.7 years; body mass, 93.7 +/- 13.8 kg; height, 183.6 +/- 4.6 cm; bench press 1 repetition maximum [1RM], 106.2 +/- 23.0 kg), participated in this study. Over 4 sessions, subjects participated in 4 different stretching protocols (i.e., no stretching, static stretching, dynamic stretching, and combined static and dynamic stretching) in a balanced randomized order followed by 4 tests: 30% of 1 RM bench throw, isometric bench press, overhead medicine ball throw, and lateral medicine ball throw. Depending on the exercise, test peak power (Pmax), peak force (Fmax), peak acceleration (Amax), peak velocity (Vmax), and peak displacement (Dmax) were measured. There were no differences among stretch trials for Pmax, Fmax, Amax, Vmax, or Dmax for the bench throw or for Fmax for the isometric bench press. For the overhead medicine ball throw, there were no differences among stretch trials for Vmax or Dmax. For the lateral medicine ball throw, there was no difference in Vmax among stretch trials; however, Dmax was significantly larger (p </= 0.05) for the static and dynamic condition compared to the static-only condition. In general, there was no short-term effect of stretching on upper-body muscular performance in young adult male athletes, regardless of stretch mode, potentially due to the amount of rest used after stretching before the performances. Since throwing performance was largely unaffected by static or dynamic upper-body stretching, athletes competing in the field events could perform upper-body stretching, if enough time were allowed before the performance. However, prior studies on lower-body musculature have demonstrated dramatic negative effects on speed and power. Therefore, it is recommended that a dynamic warm-up be used for the entire warm-up.", "title": "" }, { "docid": "cb6c816afcca2401b72f7ba224cd601b", "text": "Smart city services are enabled by a massive use of Internet of Things (IoT) technologies. The huge amount of sensors, and terminals with a great variety of typologies and applications, requires a secure way to manage them. Capillary networks can be seen as a short range extension of conventional access network in order to efficiently capture the IoT traffic, and are enablers for smart city services. They can include both IP and non-IP devices, and security can become an issue, especially when simple unidirectional communication devices are considered. The main goal of this paper is to analyze security aspects in IoT capillary networks including unidirectional and bidirectional IP or non-IP devices. We propose an algorithm for secure access for uni- and bi-directional devices. The security procedure is based on a secure key renewal (without any exchange in air), considering a local clock time and a time interval of key validity. Following previous work in 2014 by Giuliano et al., in this paper we assess the duration of the validity of the time window, and present extended simulation results in terms of (average) transmission time in a realistic scenario, i.e., including the presence of disturber(s), then providing indications for the setting of the duration of the key validity time window. Finally, we present the benchmark analysis in order to assess the effectiveness of our approach with respect to other existing standards, as well as the security analysis in terms of typical attacks.", "title": "" }, { "docid": "193aaba6fb6584304fc3183dacd8d527", "text": "We discuss the rationale and design of a Generic Memory management Interface, for a family of scalable operating systems. It consists of a general interface for managing virtual memory, independently of the underlying hardware architecture (e.g. paged versus segmented memory), and independently of the operating system kernel in which it is to be integrated. In particular, this interface provides abstractions for support of a single, consistent cache for both mapped objects and explicit I/O, and control of data caching in real memory. Data management policies are delegated to external managers.\nA portable implementation of the Generic Memory management Interface for paged architectures, the Paged Virtual Memory manager, is detailed. The PVM uses the novel history object technique for efficient deferred copying. The GMI is used by the Chorus Nucleus, in particular to support a distributed version of Unix. Performance measurements compare favorably with other systems.", "title": "" }, { "docid": "27465b2c8ce92ccfbbda6c802c76838f", "text": "Nonlinear hyperelastic energies play a key role in capturing the fleshy appearance of virtual characters. Real-world, volume-preserving biological tissues have Poisson’s ratios near 1/2, but numerical simulation within this regime is notoriously challenging. In order to robustly capture these visual characteristics, we present a novel version of Neo-Hookean elasticity. Our model maintains the fleshy appearance of the Neo-Hookean model, exhibits superior volume preservation, and is robust to extreme kinematic rotations and inversions. We obtain closed-form expressions for the eigenvalues and eigenvectors of all of the system’s components, which allows us to directly project the Hessian to semipositive definiteness, and also leads to insights into the numerical behavior of the material. These findings also inform the design of more sophisticated hyperelastic models, which we explore by applying our analysis to Fung and Arruda-Boyce elasticity. We provide extensive comparisons against existing material models.", "title": "" }, { "docid": "677278590ec735be485cf47eb527a3eb", "text": "This paper presents a probabilistic framework, QARLA, for the evaluation of text summarisation systems. The input of the framework is a set of manual (reference) summaries, a set of baseline (automatic) summaries and a set of similarity metrics between summaries. It provides i) a measure to evaluate the quality of any set of similarity metrics, ii) a measure to evaluate the quality of a summary using an optimal set of similarity metrics, and iii) a measure to evaluate whether the set of baseline summaries is reliable or may produce biased results. Compared to previous approaches, our framework is able to combine different metrics and evaluate the quality of a set of metrics without any a-priori weighting of their relative importance. We provide quantitative evidence about the effectiveness of the approach to improve the automatic evaluation of text summarisation systems by combining several similarity metrics.", "title": "" }, { "docid": "0d30cfe8755f146ded936aab55cb80d3", "text": "In this study, we investigated a pattern-recognition technique based on an artificial neural network (ANN), which is called a massive training artificial neural network (MTANN), for reduction of false positives in computerized detection of lung nodules in low-dose computed tomography (CT) images. The MTANN consists of a modified multilayer ANN, which is capable of operating on image data directly. The MTANN is trained by use of a large number of subregions extracted from input images together with the teacher images containing the distribution for the \"likelihood of being a nodule.\" The output image is obtained by scanning an input image with the MTANN. The distinction between a nodule and a non-nodule is made by use of a score which is defined from the output image of the trained MTANN. In order to eliminate various types of non-nodules, we extended the capability of a single MTANN, and developed a multiple MTANN (Multi-MTANN). The Multi-MTANN consists of plural MTANNs that are arranged in parallel. Each MTANN is trained by using the same nodules, but with a different type of non-nodule. Each MTANN acts as an expert for a specific type of non-nodule, e.g., five different MTANNs were trained to distinguish nodules from various-sized vessels; four other MTANNs were applied to eliminate some other opacities. The outputs of the MTANNs were combined by using the logical AND operation such that each of the trained MTANNs eliminated none of the nodules, but removed the specific type of non-nodule with which the MTANN was trained, and thus removed various types of non-nodules. The Multi-MTANN consisting of nine MTANNs was trained with 10 typical nodules and 10 non-nodules representing each of nine different non-nodule types (90 training non-nodules overall) in a training set. The trained Multi-MTANN was applied to the reduction of false positives reported by our current computerized scheme for lung nodule detection based on a database of 63 low-dose CT scans (1765 sections), which contained 71 confirmed nodules including 66 biopsy-confirmed primary cancers, from a lung cancer screening program. The Multi-MTANN was applied to 58 true positives (nodules from 54 patients) and 1726 false positives (non-nodules) reported by our current scheme in a validation test; these were different from the training set. The results indicated that 83% (1424/1726) of non-nodules were removed with a reduction of one true positive (nodule), i.e., a classification sensitivity of 98.3% (57 of 58 nodules). By using the Multi-MTANN, the false-positive rate of our current scheme was improved from 0.98 to 0.18 false positives per section (from 27.4 to 4.8 per patient) at an overall sensitivity of 80.3% (57/71).", "title": "" }, { "docid": "c4ca4238a0b923820dcc509a6f75849b", "text": "1", "title": "" }, { "docid": "51f400ce30094e1b2fe1c235ea2af55d", "text": "Machine learning is a quickly evolving field which now looks really different from what it was 15 years ago, when classification and clustering were major issues. This document proposes several trends to explore the new questions of modern machine learning, with the strong afterthought that the belief function framework has a major role to play.", "title": "" }, { "docid": "92cc028267bc3f8d44d11035a8212948", "text": "The limitations of current state-of-the-art methods for single-view depth estimation and semantic segmentations are closely tied to the property of perspective geometry, that the perceived size of the objects scales inversely with the distance. In this paper, we show that we can use this property to reduce the learning of a pixel-wise depth classifier to a much simpler classifier predicting only the likelihood of a pixel being at an arbitrarily fixed canonical depth. The likelihoods for any other depths can be obtained by applying the same classifier after appropriate image manipulations. Such transformation of the problem to the canonical depth removes the training data bias towards certain depths and the effect of perspective. The approach can be straight-forwardly generalized to multiple semantic classes, improving both depth estimation and semantic segmentation performance by directly targeting the weaknesses of independent approaches. Conditioning the semantic label on the depth provides a way to align the data to their physical scale, allowing to learn a more discriminative classifier. Conditioning depth on the semantic class helps the classifier to distinguish between ambiguities of the otherwise ill-posed problem. We tested our algorithm on the KITTI road scene dataset and NYU2 indoor dataset and obtained obtained results that significantly outperform current state-of-the-art in both single-view depth and semantic segmentation domain.", "title": "" }, { "docid": "4e1a8239889f95f159a086f4c2fb20c6", "text": "Advances in machine learning have led to broad deployment of systems with impressive performance on important problems. Nonetheless, these systems can be induced to make errors on data that are surprisingly similar to examples the learned system handles correctly. The existence of these errors raises a variety of questions about out-of-sample generalization and whether bad actors might use such examples to abuse deployed systems. As a result of these security concerns, there has been a flurry of recent papers proposing algorithms to defend against such malicious perturbations of correctly handled examples. It is unclear how such misclassifications represent a different kind of security problem than other errors, or even other attacker-produced examples that have no specific relationship to an uncorrupted input. In this paper, we argue that adversarial example defense papers have, to date, mostly considered abstract, toy games that do not relate to any specific security concern. Furthermore, toy games that do not relate to any specific security concern. Furthermore, defense papers have not yet precisely described all the abilities and limitations of attackers that would be relevant in practical security. Towards this end, we establish a taxonomy of motivations, constraints, and abilities for more plausible adversaries. Finally, we provide a series of recommendations outlining a path forward for future work to more clearly articulate the threat model and perform more meaningful evaluation.", "title": "" }, { "docid": "ac2f179099dc727bc0c065244a66cf19", "text": "Software applications continue to grow in terms of the number of features they offer, making personalization increasingly important. Research has shown that most users prefer the control afforded by an adaptable approach to personalization rather than a system-controlled adaptive approach. No study, however, has compared the efficiency of the two approaches. In a controlled lab study with 27 subjects we compared the measured and perceived efficiency of three menu conditions: static, adaptable and adaptive. Each was implemented as a split menu, in which the top four items remained static, were adaptable by the subject, or adapted according to the subject's frequently and recently used items. The static menu was found to be significantly faster than the adaptive menu, and the adaptable menu was found to be significantly faster than the adaptive menu under certain conditions. The majority of users preferred the adaptable menu overall. Implications for interface design are discussed.", "title": "" }, { "docid": "7061903ca787db46b11ca709f748e8f4", "text": "We introduce Chinese Text in the Wild, a very large dataset of Chinese text in street view images. While optical character recognition (OCR) in document images is well studied and many commercial tools are available, detection and recognition of text in natural images is still a challenging problem, especially for more complicated character sets such as Chinese text. Lack of training data has always been a problem, especially for deep learning methods which require massive training data. In this paper we provide details of a newly created dataset of Chinese text with about 1 million Chinese characters annotated by experts in over 30 thousand street view images. This is a challenging dataset with good diversity. It contains planar text, raised text, text in cities, text in rural areas, text under poor illumination, distant text, partially occluded text, etc. For each character in the dataset, the annotation includes its underlying character, its bounding box, and 6 attributes. The attributes indicate whether it has complex background, whether it is raised, whether it is handwritten or printed, etc. The large size and diversity of this dataset make it suitable for training robust neural networks for various tasks, particularly detection and recognition. We give baseline results using several state-ofthe-art networks, including AlexNet, OverFeat, Google Inception and ResNet for character recognition, and YOLOv2 for character detection in images. Overall Google Inception has the best performance on recognition with 80.5% top-1 accuracy, while YOLOv2 achieves an mAP of 71.0% on detection. Dataset, source code and trained models will all be publicly available on the website1. 1https://ctwdataset.github.io/ Figure 1. High intra-class variance versus low inter-class variance. Each row shows instances of a Chinese character. The first character differs from the second character by a single stroke, and the second character differs from the third character by another stroke. While the three characters are very similar in shape, the instances of the same character have very different appearance, due to color, font, occlusion, and background differences, etc. The most right column shows the corresponding Chinese character.", "title": "" }, { "docid": "56b2e01034ea18f5705b8e6ea18a327e", "text": "Facial expression is central to human experience. Its efficient and valid measurement is a challenge that automated facial image analysis seeks to address. Most publically available databases are limited to 2D static images or video of posed facial behavior. Because posed and un-posed (aka “spontaneous”) facial expressions differ along several dimensions including complexity and timing, well-annotated video of un-posed facial behavior is needed. Moreover, because the face is a three-dimensional deformable object, 2D video may be insufficient, and therefore 3D video archives are needed. We present a newly developed 3D video database of spontaneous facial expressions in a diverse group of young adults. Well-validated emotion inductions were used to elicit expressions of emotion and paralinguistic communication. Frame-level ground-truth for facial actions was obtained using the Facial Action Coding System. Facial features were tracked in both 2D and 3D domains using both person-specific and generic approaches. The work promotes the exploration of 3D spatiotemporal features in subtle facial expression, better understanding of the relation between pose and motion dynamics in facial action units, and deeper understanding of naturally occurring facial action.", "title": "" }, { "docid": "910375f4a3c875d983511b419c14668e", "text": "Machine learning has become an important component for many systems and applications including computer vision, spam filtering, malware and network intrusion detection, among others. Despite the capabilities of machine learning algorithms to extract valuable information from data and produce accurate predictions, it has been shown that these algorithms are vulnerable to attacks. Data poisoning is one of the most relevant security threats against machine learning systems, where attackers can subvert the learning process by injecting malicious samples in the training data. Recent work in adversarial machine learning has shown that the so-called optimal attack strategies can successfully poison linear classifiers, degrading the performance of the system dramatically after compromising a small fraction of the training dataset. In this paper we propose a defence mechanism to mitigate the effect of these optimal poisoning attacks based on outlier detection. We show empirically that the adversarial examples generated by these attack strategies are quite different from genuine points, as no detectability constrains are considered to craft the attack. Hence, they can be detected with an appropriate pre-filtering of the training dataset.", "title": "" }, { "docid": "06c3f32f07418575c700e2f0925f4398", "text": "The spacing of a fixed amount of study time across multiple sessions usually increases subsequent test performance*a finding known as the spacing effect. In the spacing experiment reported here, subjects completed multiple learning trials, and each included a study phase and a test. Once a subject achieved a perfect test, the remaining learning trials within that session comprised what is known as overlearning. The number of these overlearning trials was reduced when learning trials were spaced across multiple sessions rather than massed in a single session. In addition, the degree to which spacing reduced overlearning predicted the size of the spacing effect, which is consistent with the possibility that spacing increases subsequent recall by reducing the occurrence of overlearning. By this account, overlearning is an inefficient use of study time, and the efficacy of spacing depends at least partly on the degree to which it reduces the occurrence of overlearning.", "title": "" }, { "docid": "6b4b33878553d4b36a583b56c9b13c02", "text": "BACKGROUND\nIn this study we investigated gastrointestinal (GI) bleeding and its relationship to arteriovenous malformations (AVMs) in patients with the continuous-flow HeartMate II (HMII) left ventricular assist device (LVAD).\n\n\nMETHODS\nThe records of 172 patients who received HMII support between November 2003 and June 2010 were reviewed. Patients were considered to have GI bleeding if they had 1 or more of the following symptoms: guaiac-positive stool; hematemesis; melena; active bleeding at the time of endoscopy or colonoscopy; and blood within the stomach at endoscopy or colonoscopy. The symptom(s) had to be accompanied by a decrease of >1 g/dl in the patient's hemoglobin level. The location of the bleeding was identified as upper GI tract, lower GI tract or both according to esophagogastroduodenoscopy, colonoscopy, small-bowel enteroscopy or mesenteric angiography. Post-LVAD implantation anti-coagulation therapy consisted of warfarin, aspirin and dipyridamole.\n\n\nRESULTS\nThirty-two of the 172 patients (19%) had GI bleeding after 63 ± 62 (range 8 to 241) days of HMII support. Ten patients had GI bleeding from an AVM; these included 3 patients who had 2 bleeding episodes and 2 patients who had 5 episodes each. Sixteen patients had upper GI bleeding (10 hemorrhagic gastritis, 4 gastric AVM, 2 Mallory-Weiss syndrome), 15 had lower GI bleeding (6 diverticulosis, 6 jejunal AVM, 1 drive-line erosion of the colon, 1 sigmoid polyp, 1 ischemic colitis) and 1 had upper and lower GI bleeding (1 colocutaneous and gastrocutaneous fistula). All GI bleeding episodes were successfully managed medically.\n\n\nCONCLUSIONS\nArteriovenous malformations can cause GI bleeding in patients with continuous-flow LVADs. In all cases in this series, GI bleeding was successfully managed without the need for surgical intervention.", "title": "" }, { "docid": "a1c1b4193d30007f820e86c424a96843", "text": "Water leakage is a significant problem in both developing and developed countries causing water loss in water-distribution systems. Leakage causes economic loss in the form of wastage of water, damage to pipe networks and foundations of roads and buildings, and also poses risk to public health due to water contamination. The lost or unaccounted amount of water is typically 20-30 percent of production. Some older systems may lose even up to 50 percent. The water pipe networks in houses as well as public places are generally concealed and hence detecting water leakage in the initial stages before an upcoming damage is difficult. The existing technologies for detecting leakage have various limitations such as efficiency being dependent on size, material and depth of pipes, need for manual intervention, dependency on weather and surface conditions and effect of water pressure. In this paper, we propose an automated water leakage detection system using a wireless sensor network created along the distribution pipes based on thermal (IR) imaging. Thermal imaging has the capability to work in low lighting or dark conditions and helps in capturing the contrast between hot and cold areas created due to water leakage. A network of low cost, low power thermal imaging sensors each having its own processing and Radiofrequency (RF) Transreceiver units and operating independent of pipe, weather or surface conditions is proposed in this paper. A central database is updated on a real-time basis, enabling very early leakage detection and initiating subsequent action to address the problem. An example system evaluation is performed and results highlighting the power and cost impact of the sensor network system are presented.", "title": "" }, { "docid": "7359729fe4bb369798c05c8c7c258111", "text": "By considering various situations of climatologically phenomena affecting local weather conditions in various parts of the world. These weather conditions have a direct effect on crop yield. Various researches have been done exploring the connections between large-scale climatologically phenomena and crop yield. Artificial neural networks have been demonstrated to be powerful tools for modeling and prediction, to increase their effectiveness. Crop prediction methodology is used to predict the suitable crop by sensing various parameter of soil and also parameter related to atmosphere. Parameters like type of soil, PH, nitrogen, phosphate, potassium, organic carbon, calcium, magnesium, sulphur, manganese, copper, iron, depth, temperature, rainfall, humidity. For that purpose we are used artificial neural network (ANN).", "title": "" }, { "docid": "adfe1398a35e63b0bfbf2fd55e7a9d81", "text": "Neutrosophic numbers easily allow modeling uncertainties of prices universe, thus justifying the growing interest for theoretical and practical aspects of arithmetic generated by some special numbers in our work. At the beginning of this paper, we reconsider the importance in applied research of instrumental discernment, viewed as the main support of the final measurement validity. Theoretically, the need for discernment is revealed by decision logic, and more recently by the new neutrosophic logic and by constructing neutrosophic-type index numbers, exemplified in the context and applied to the world of prices, and, from a practical standpoint, by the possibility to use index numbers in characterization of some cyclical phenomena and economic processes, e.g. inflation rate. The neutrosophic index numbers or neutrosophic indexes are the key topic of this article. The next step is an interrogative and applicative one, drawing the coordinates of an optimized discernment centered on neutrosophic-type index numbers. The inevitable conclusions are optimistic in relation to the common future of the index method and neutrosophic logic, with statistical and economic meaning and utility.", "title": "" }, { "docid": "90d9360a3e769311a8d7611d8c8845d9", "text": "We introduce a learning-based approach to detect repeatable keypoints under drastic imaging changes of weather and lighting conditions to which state-of-the-art keypoint detectors are surprisingly sensitive. We first identify good keypoint candidates in multiple training images taken from the same viewpoint. We then train a regressor to predict a score map whose maxima are those points so that they can be found by simple non-maximum suppression. As there are no standard datasets to test the influence of these kinds of changes, we created our own, which we will make publicly available. We will show that our method significantly outperforms the state-of-the-art methods in such challenging conditions, while still achieving state-of-the-art performance on untrained standard datasets.", "title": "" } ]
scidocsrr
c9bdb5a1cb7a73df7e988268fe0b066b
Cross Processor Cache Attacks
[ { "docid": "de8415d1674a0e5e84cfc067fd3940cc", "text": "We apply the FLUSH+RELOAD side-channel attack based on cache hits/misses to extract a small amount of data from OpenSSL ECDSA signature requests. We then apply a “standard” lattice technique to extract the private key, but unlike previous attacks we are able to make use of the side-channel information from almost all of the observed executions. This means we obtain private key recovery by observing a relatively small number of executions, and by expending a relatively small amount of post-processing via lattice reduction. We demonstrate our analysis via experiments using the curve secp256k1 used in the Bitcoin protocol. In particular we show that with as little as 200 signatures we are able to achieve a reasonable level of success in recovering the secret key for a 256-bit curve. This is significantly better than prior methods of applying lattice reduction techniques to similar side channel information.", "title": "" } ]
[ { "docid": "b42f3575dad9615a40f491291661e7c5", "text": "Novel neural models have been proposed in recent years for learning under domain shift. Most models, however, only evaluate on a single task, on proprietary datasets, or compare to weak baselines, which makes comparison of models difficult. In this paper, we re-evaluate classic general-purpose bootstrapping approaches in the context of neural networks under domain shifts vs. recent neural approaches and propose a novel multi-task tri-training method that reduces the time and space complexity of classic tri-training. Extensive experiments on two benchmarks are negative: while our novel method establishes a new state-of-the-art for sentiment analysis, it does not fare consistently the best. More importantly, we arrive at the somewhat surprising conclusion that classic tri-training, with some additions, outperforms the state of the art. We conclude that classic approaches constitute an important and strong baseline.", "title": "" }, { "docid": "b974a8d8b298bfde540abc451f76bf90", "text": "This chapter provides information on commonly used equipment in industrial mammalian cell culture, with an emphasis on bioreactors. The actual equipment used in the cell culture process can vary from one company to another, but the main steps remain the same. The process involves expansion of cells in seed train and inoculation train processes followed by cultivation of cells in a production bioreactor. Process and equipment options for each stage of the cell culture process are introduced and examples are provided. Finally, the use of disposables during seed train and cell culture production is discussed.", "title": "" }, { "docid": "9ac81079d4e957a87cfec465a4a69a7c", "text": "AIMS\nThe UK has one of the largest systems of immigration detention in Europe.. Those detained include asylum-seekers and foreign national prisoners, groups with a higher prevalence of mental health vulnerabilities compared with the general population. In light of little published research on the mental health status of detainees in immigration removal centres (IRCs), the primary aim of this study was to explore whether it was feasible to conduct psychiatric research in such a setting. A secondary aim was to compare the mental health of those seeking asylum with the rest of the detainees.\n\n\nMETHODS\nCross-sectional study with simple random sampling followed by opportunistic sampling. Exclusion criteria included inadequate knowledge of English and European Union nationality. Six validated tools were used to screen for mental health disorders including developmental disorders like Personality Disorder, Attention Deficit Hyperactivity Disorder (ADHD), Autistic Spectrum Disorder (ASD) and Intellectual Disability, as well as for needs assessment. These were the MINI v6, SAPAS, AQ-10, ASRS, LDSQ and CANFOR. Demographic data were obtained using a participant demographic sheet. Researchers were trained in the use of the screening battery and inter-rater reliability assessed by joint ratings.\n\n\nRESULTS\nA total of 101 subjects were interviewed. Overall response rate was 39%. The most prevalent screened mental disorder was depression (52.5%), followed by personality disorder (34.7%) and post-traumatic stress disorder (20.8%). 21.8% were at moderate to high suicidal risk. 14.9 and 13.9% screened positive for ASD and ADHD, respectively. The greatest unmet needs were in the areas of intimate relationships (76.2%), psychological distress (72.3%) and sexual expression (71.3%). Overall presence of mental disorder was comparable with levels found in prisons. The numbers in each group were too small to carry out any further analysis.\n\n\nCONCLUSION\nIt is feasible to undertake a psychiatric morbidity survey in an IRC. Limitations of the study include potential selection bias, use of screening tools, use of single-site study, high refusal rates, the lack of interpreters and lack of women and children in study sample. Future studies should involve the in-reach team to recruit participants and should be run by a steering group consisting of clinicians from the IRC as well as academics.", "title": "" }, { "docid": "e4f96495e32e1cf7e3c92d6344251b66", "text": "Self-transcendence has been found to be an important correlate of mental health in older adults and adults facing the end of life. This study extends current theory by examining the relationship of transcendence and other transcendence variables to depression in middle-age adults (N = 133). Reed's Self-Transcendence Scale, the Center for Epidemiological Studies-Depression Scale, and measures of parenting, acceptance and spirituality were administered. Findings indicating significant inverse correlations between self-transcendence and depression, as well as between other measures of transcendence and depression support Reed's (1991b) theory. Multiple regression analysis indicated that acceptance may be another significant correlate of depression. Significant gender differences and age-related patterns of increased levels of self-transcendence were found. Study results illuminate the need to continue research into developmentally based transcendence variables related to various experiences of health and well-being across the life span.", "title": "" }, { "docid": "e1001ebf3a30bcb2599fae6dae8f83e9", "text": "The notion of the \"stakeholders\" of the firm has drawn ever-increasing attention since Freeman published his seminal book on Strategic Management: A Stakeholder Approach in 1984. In the understanding of most scholars in the field, stakeholder theory is not a special theory on a firm's constituencies but sets out to replace today's prevailing neoclassical economic concept of the firm. As such, it is seen as the superior theory of the firm. Though stakeholder theory explicitly is a theory on the firm, that is, on a private sector entity, some scholars try to apply it to public sector organizations, and, in particular, to e-government settings. This paper summarizes stakeholder theory, discusses its premises and justifications, compares its tracks, sheds light on recent attempts to join the two tracks, and discusses the benefits and limits of its practical applicability to the public sector using the case of a recent e-government initiative in New York State.", "title": "" }, { "docid": "24387104af78fd752c20764e81e4aaa5", "text": "This paper considers the problem of tracking a dynamic sparse channel in a broadband wireless communication system. A probabilistic signal model is firstly proposed to describe the special features of temporal correlations of dynamic sparse channels: path delays change slowly over time, while path gains evolve faster. Based on such temporal correlations, we then propose the differential orthogonal matching pursuit (D-OMP) algorithm to track a dynamic sparse channel in a sequential way by updating the small channel variation over time. Compared with other channel tracking algorithms, simulation results demonstrate that the proposed D-OMP algorithm can track dynamic sparse channels faster with improved accuracy.", "title": "" }, { "docid": "29ec3374525e0ced36520dd36e18b3d9", "text": "Graph-based operationalizations of space are used in architecture as well as in cognitive science. In such models, environments are usually described by means of nodes and edges, roughly corresponding to places and their spatial relations. In the field of cognitive science, view and place graphs are models of mental representations of environments and used for the explanation of wayfinding behavior such as exploration and route planning. In architecture, space syntax and visibility graph analysis aim at identifying and describing structural properties of built environments that determine their usage and experience. In cognitive science, mental representations of space cannot be seen independently from the formal and configurational properties of the corresponding environments that are well captured by architectural description systems. Vice versa, formal descriptions of space as used in architecture gain plausibility and relevance by incorporating results from cognitive research that allow the prediction and explanation of actual human behavior. In this paper approaches from the two different disciplines are therefore reviewed and compared. Special interest concerns their scope, structure, and representational content. Parallels, differences, and specific strengths are discussed. Furthermore, based on recent empiric work, strategies to integrate aspects from both disciplines are outlined.", "title": "" }, { "docid": "6323d02c10ab093262eafc0bab3d70a7", "text": "and Applied Analysis 3 Definition 12. Let (X, d) be a metric space. We say that G : X → CL(X) is a subintegral type (α∗, ψ)-contractive if there exist two functions ψ ∈ Ψ and φ ∈ Φ s such that for each x ∈ X and y ∈ Gx, there exists z ∈ Gy satisfying", "title": "" }, { "docid": "7ca0ceb19e47f9848db1a5946c19d561", "text": "This thesis performs an empirical analysis of Word2Vec by comparing its output to WordNet, a well-known, human-curated lexical database. It finds that Word2Vec tends to uncover more of certain types of semantic relations than others – with Word2Vec returning more hypernyms, synonomyns and hyponyms than hyponyms or holonyms. It also shows the probability that neighbors separated by a given cosine distance in Word2Vec are semantically related in WordNet. This result both adds to our understanding of the stillunknown Word2Vec and helps to benchmark new semantic tools built from word vectors. Word2Vec, Natural Language Processing, WordNet, Distributional Semantics", "title": "" }, { "docid": "089c003534670cf6ab296828bf2604a3", "text": "The development of ultra-low power LSIs is a promising area of research in microelectronics. Such LSIs would be suitable for use in power-aware LSI applications such as portable mobile devices, implantable medical devices, and smart sensor networks [1]. These devices have to operate with ultra-low power, i.e., a few microwatts or less, because they will probably be placed under conditions where they have to get the necessary energy from poor energy sources such as microbatteries or energy scavenging devices [2]. As a step toward such LSIs, we first need to develop voltage and current reference circuits that can operate with an ultra-low current, several tens of nanoamperes or less, i.e., sub-microwatt operation. To achieve such low-power operation, the circuits have to be operated in the subthreshold region, i.e., a region at which the gate-source voltage of MOSFETs is lower than the threshold voltage [3; 4]. Voltage and current reference circuits are important building blocks for analog, digital, and mixed-signal circuit systems in microelectronics, because the performance of these circuits is determined mainly by their bias voltages and currents. The circuits generate a constant reference voltage and current for various other components such as operational amplifiers, comparators, AD/DA converters, oscillators, and PLLs. For this purpose, bandgap reference circuits with CMOS-based vertical bipolar transistors are conventionally used in CMOS LSIs [5; 6]. However, they need resistors with a high resistance of several hundred megaohms to achieve low-current, subthreshold operation. Such a high resistance needs a large area to be implemented, and this makes conventional bandgap references unsuitable for use in ultra-low power LSIs. Therefore, modified voltage and current reference circuits for lowpower LSIs have been reported (see [7]-[12], [14]-[17]). However, these circuits have various problems. For example, their power dissipations are still large, their output voltages and currents are sensitive to supply voltage and temperature variations, and they have complex circuits with many MOSFETs; these problems are inconvenient for practical use in ultra-low power LSIs. Moreover, the effect of process variations on the reference signal has not been discussed in detail. To solve these problems, I and my colleagues reported new voltage and current reference circuits [13; 18] that can operate with sub-microwatt power dissipation and with low sensitivity to temperature and supply voltage. Our circuits consist of subthreshold MOSFET circuits and use no resistors.", "title": "" }, { "docid": "bc121dff9e8e0e8a48c3bbda3417f32b", "text": "This report reflects, from a software engineering perspective, on the experience of designing and implementing protection mechanisms for ASP.NET Web services. The limitations of Microsoft ASP.NET container security mechanisms render them inadequate for hosting enterprise-scale applications that have to be protected according to diverse and/or complex application-specific security policies. In this paper we report on our experience of designing and implementing a component-based architecture for protecting enterprise-grade Web service applications hosted by ASP.NET. Due to its flexibility and extensibility, this architecture enables the integration of ASP.NET into the organizational security infrastructure with less effort by Web service developers. The architecture has been implemented in a real-world security solution. This paper also contributes a best practice on constructing flexible and extensible authentication and authorization logic for Web services by using Resource Access Decision and Attribute Function (AF) architectural styles. Furthermore, the lessons learned from our design and implementation experiences are discussed throughout the paper.", "title": "" }, { "docid": "420a6ef979920fd6a41706d0dc7386d6", "text": "The research is essentially to modularize the structure of utilities and develop a system for following up the activities electronically on the city scale. The GIS operational platform will be the base for managing the infrastructure development components with the systems interoperability for the available city infrastructure related systems. The concentration will be on the available utility networks in order to develop a comprehensive, common, standardized geospatial data models. The construction operations for the utility networks such as electricity, water, Gas, district cooling, irrigation, sewerage and communication networks; are need to be fully monitored on daily basis, in order to utilize the involved huge resources and man power. These resources are allocated only to convey the operational status for the construction and execution sections that used to do the required maintenance. The need for a system that serving the decision makers for following up these activities with a proper geographical representation will definitely reduce the operational cost for the long term.", "title": "" }, { "docid": "69ccc6fa6c1d9dd0a7b5206b70d33359", "text": "In medical applications, sensitivity in detecting medical problems and accuracy of detection are often in conflict. A single classifier usually cannot achieve both high sensitivity and accuracy at the same time. Methods of combining classifiers have been proposed in the literature. This paper presents a study of probabilistic combination methods applied to the detection of bone fractures in X-ray images. Test results show that the effectiveness of a method in improving both accuracy and sensitivity depends on the nature of the method as well as the proportion of positive samples.", "title": "" }, { "docid": "d1e055bcdcbf6fe964e45f41efc95504", "text": "Microcycle conidiation is a survival mechanism of fungi encountering unfavorable conditions. In this phenomenon, asexual spores germinate secondary spores directly without formation of mycelium. As Penicillium camemberti conidia have the ability to produce conidiophores after germination in liquid culture induced by a thermal stress (18 and 30 °C), our work has aimed at producing conidia through this mean. Incubation at 18 and 30 °C increased the swelling of conidia and their proportion thereby producing conidiophores. Our results showed that the microcycle of conidiation can produce 5 × 108 conidia ml−1 after 7 days at 18 °C of culture. The activity of these conidia was checked through culture on a solid medium. Conidia produced by microcycle conidiation formed a normal mycelium on the surface of solid media and 25 % could still germinate after 5 months of storage.", "title": "" }, { "docid": "42d31b6b66192552d0f0aa1ce9a36e21", "text": "OBJECTIVE\nAlthough stress is often presumed to cause sleep disturbances, little research has documented the role of stressful life events in primary insomnia. The present study examined the relationship of stress and coping skills, and the potential mediating role of presleep arousal, to sleep patterns in good sleepers and insomnia sufferers.\n\n\nMETHODS\nThe sample was composed of 67 participants (38 women, 29 men; mean age, 39.6 years), 40 individuals with insomnia and 27 good sleepers. Subjects completed prospective, daily measures of stressful events, presleep arousal, and sleep for 21 consecutive days. In addition, they completed several retrospective and global measures of depression, anxiety, stressful life events, and coping skills.\n\n\nRESULTS\nThe results showed that poor and good sleepers reported equivalent numbers of minor stressful life events. However, insomniacs rated both the impact of daily minor stressors and the intensity of major negative life events higher than did good sleepers. In addition, insomniacs perceived their lives as more stressful, relied more on emotion-oriented coping strategies, and reported greater presleep arousal than good sleepers. Prospective daily data showed significant relationships between daytime stress and nighttime sleep, but presleep arousal and coping skills played an important mediating role.\n\n\nCONCLUSIONS\nThe findings suggest that the appraisal of stressors and the perceived lack of control over stressful events, rather than the number of stressful events per se, enhance the vulnerability to insomnia. Arousal and coping skills play an important mediating role between stress and sleep. The main implication of these results is that insomnia treatments should incorporate clinical methods designed to teach effective stress appraisal and coping skills.", "title": "" }, { "docid": "395ae6ab0506de5fc2f1b9815b49cfec", "text": "Subjectivity and sentiment analysis focuses on the automatic identification of private states, such as opinions, emotions, sentiments, evaluations, beliefs, and speculations in natural language. While subjectivity classification labels text as either subjective or objective, sentiment classification adds an additional level of granularity, by further classifying subjective text as either positive, negative or neutral. To date, a large number of text processing applications have already used techniques for automatic sentiment and subjectivity analysis, including automatic expressive text-to-speech synthesis [1], tracking sentiment timelines in on-line forums and news [22, 2], and mining opinions from product reviews [11]. In many natural language processing tasks, subjectivity and sentiment classification have been used as a first phase filtering to generate more viable data. Research that benefitted from this additional layering ranges from question answering [48], to conversation summarization [7] and text semantic analysis [41, 8]. Much of the research work to date on sentiment and subjectivity analysis has been applied to English, but work on other languages is growing, including Japanese [19, 34, 35, 15], Chinese [12, 49], German [18], and Romanian [23, 4]. In addition, several participants in the Chinese and Japanese Opinion Extraction tasks of NTCIR-6 [17] performed subjectivity and sentiment analysis in languages other than English.1 As only 29.4% of Internet users speak English,2 the construction of resources and tools for subjectivity and sentiment analysis in languages other than English is a growing need. In this chapter, we review the main directions of research focusing on the development of resources and tools for multilingual subjectivity and sentiment analysis. Specifically, we identify and overview three main categories of methods: (1) those focusing on word and phrase level annotations, overviewed in Section 4; (2) methods targeting the labeling of sentences, described in Section 5; and finally (3) methods for document-level annotations, presented in Section 6. We address both multilingual and cross-lingual methods. For multilingual methods, we review work concerned with languages other than English, where the resources and tools have been specifically developed for a given target language. In this category, in Section 3 we also briefly overview the main directions of work on English data, highlighting the methods that can be easily", "title": "" }, { "docid": "40d8c7f1d24ef74fa34be7e557dca920", "text": "the rapid changing Internet environment has formed a competitive business setting, which provides opportunities for conducting businesses online. Availability of online transaction systems enable users to buy and make payment for products and services using the Internet platform. Thus, customers’ involvements in online purchasing have become an important trend. However, since the market is comprised of many different people and cultures, with diverse viewpoints, e-commerce businesses are being challenged by the reality of complex behavior of consumers. Therefore, it is vital to identify the factors that affect consumers purchasing decision through e-commerce in respective cultures and societies. In response to this claim, the purpose of this study is to explore the factors affecting customers’ purchasing decision through e-commerce (online shopping). Several factors such as trust, satisfaction, return policy, cash on delivery, after sale service, cash back warranty, business reputation, social and individual attitude, are considered. At this stage, the factors mentioned above, which are commonly considered influencing purchasing decision through online shopping in literature, are hypothesized to measure the causal relationship within the framework.", "title": "" }, { "docid": "63934b1fdc9b7c007302cdc41a42744e", "text": "Recently, various energy harvesting techniques from ambient environments were proposed as alternative methods for powering sensor nodes, which convert the ambient energy from environments into electricity to power sensor nodes. However, those techniques are not applicable to the wireless sensor networks (WSNs) in the environment with no ambient energy source. To overcome this problem, an RF energy transfer method was proposed to power wireless sensor nodes. However, the RF energy transfer method also has a problem of unfairness among sensor nodes due to the significant difference between their energy harvesting rates according to their positions. In this paper, we propose a medium access control (MAC) protocol for WSNs based on RF energy transfer. The proposed MAC protocol adaptively manages the duty cycle of sensor nodes according to their the amount of harvested energy as well as the contention time of sensor nodes considering fairness among them. Through simulations, we show that our protocol can achieve a high degree of fairness, while maintaining duty cycle of sensor nodes appropriately according to the amount of their harvested energy.", "title": "" } ]
scidocsrr
bb37cd6a960f92b14ad7f59d859508e0
Deep Relative Tracking
[ { "docid": "001104ca832b10553b28bbd713e6cbd5", "text": "In this paper we present a tracker, which is radically different from state-of-the-art trackers: we apply no model updating, no occlusion detection, no combination of trackers, no geometric matching, and still deliver state-of-the-art tracking performance, as demonstrated on the popular online tracking benchmark (OTB) and six very challenging YouTube videos. The presented tracker simply matches the initial patch of the target in the first frame with candidates in a new frame and returns the most similar patch by a learned matching function. The strength of the matching function comes from being extensively trained generically, i.e., without any data of the target, using a Siamese deep neural network, which we design for tracking. Once learned, the matching function is used as is, without any adapting, to track previously unseen targets. It turns out that the learned matching function is so powerful that a simple tracker built upon it, coined Siamese INstance search Tracker, SINT, which only uses the original observation of the target from the first frame, suffices to reach state-of-the-art performance. Further, we show the proposed tracker even allows for target re-identification after the target was absent for a complete video shot.", "title": "" }, { "docid": "483ab105bfe99c867690891f61bb0336", "text": "In this paper we propose a robust object tracking algorithm using a collaborative model. As the main challenge for object tracking is to account for drastic appearance change, we propose a robust appearance model that exploits both holistic templates and local representations. We develop a sparsity-based discriminative classifier (SD-C) and a sparsity-based generative model (SGM). In the S-DC module, we introduce an effective method to compute the confidence value that assigns more weights to the foreground than the background. In the SGM module, we propose a novel histogram-based method that takes the spatial information of each patch into consideration with an occlusion handing scheme. Furthermore, the update scheme considers both the latest observations and the original template, thereby enabling the tracker to deal with appearance change effectively and alleviate the drift problem. Numerous experiments on various challenging videos demonstrate that the proposed tracker performs favorably against several state-of-the-art algorithms.", "title": "" } ]
[ { "docid": "12e088ccb86094d58c682e4071cce0a6", "text": "Are there systematic differences between people who use social network sites and those who stay away, despite a familiarity with them? Based on data from a survey administered to a diverse group of young adults, this article looks at the predictors of SNS usage, with particular focus on Facebook, MySpace, Xanga, and Friendster. Findings suggest that use of such sites is not randomly distributed across a group of highly wired users. A person's gender, race and ethnicity, and parental educational background are all associated with use, but in most cases only when the aggregate concept of social network sites is disaggregated by service. Additionally, people with more experience and autonomy of use are more likely to be users of such sites. Unequal participation based on user background suggests that differential adoption of such services may be contributing to digital inequality.", "title": "" }, { "docid": "cc4c946bc42180e51912b53e915a4e1a", "text": "Background: Photovoltaic (PV) array which is composed of modules is considered as the fundamental power conversion unit of a PV generator system. The PV array has nonlinear characteristics and it is quite expensive and takes much time to get the operating curves of PV array under varying operating conditions. In order to overcome these obstacles, common and simple models of solar panel have been developed and integrated to many engineering software including Matlab/Simulink. However, these models are not adequate for application involving hybrid energy system since they need a flexible tuning of some parameters in the system and not easily understandable for readers to use by themselves. Therefore, this paper presents a step-by-step procedure for the simulation of PV cells/modules/ arrays with Tag tools in Matlab/Simulink. A DS-100M solar panel is used as reference model. The operation characteristics of PV array are also investigated at a wide range of operating conditions and physical parameters. Result: The output characteristics curves of the model match the characteristics of DS-100M solar panel. The output power, current and voltage decreases when the solar irradiation reduces from 1000 to 100 W/m. When the temperature decreases, the output power and voltage increases marginally whereas the output current almost keeps constant. Shunt resistance has significant effect on the operating curves of solar PV array as low power output is recorded if the value of shunt resistance varies from 1000 ohms to 0.1 ohms. Conclusion: The proposed procedure provides an accurate, reliable and easy-to-tune model of photovoltaic array. Furthermore, it also robust advantageous in investigating the solar PV array operation from different physical parameters (series, shunt resistance, ideality factor, etc.) and working condition ( varying temperature, irradiation and especially partial shadow effect) aspects.", "title": "" }, { "docid": "7e1e475f5447894a6c246e7d47586c4b", "text": "Between 1983 and 2003 forty accidental autoerotic deaths (all males, 13-79 years old) have been investigated at the Institute of Legal Medicine in Hamburg. Three cases with a rather unusual scenery are described in detail: (1) a 28-year-old fireworker was found hanging under a bridge in a peculiar bound belt system. The autopsy and the reconstruction revealed signs of asphyxiation, feminine underwear, and several layers of plastic clothing. (2) A 16-year-old pupil dressed with feminine plastic and rubber utensils fixed and strangulated himself with an electric wire. (3) A 28-year-old handicapped man suffered from progressive muscular dystrophy and was nearly unable to move. His bizarre sexual fantasies were exaggerating: he induced a nurse to draw plastic bags over his body, close his mouth with plastic strips, and put him in a rubbish container where he died from suffocation.", "title": "" }, { "docid": "981a03df711c7c9aabdf163487887824", "text": "We introduce a new paradigm to investigate unsupervised learning, reducing unsupervised learning to supervised learning. Specifically, we mitigate the subjectivity in unsupervised decision-making by leveraging knowledge acquired from prior, possibly heterogeneous, supervised learning tasks. We demonstrate the versatility of our framework via comprehensive expositions and detailed experiments on several unsupervised problems such as (a) clustering, (b) outlier detection, and (c) similarity prediction under a common umbrella of meta-unsupervised-learning. We also provide rigorous PAC-agnostic bounds to establish the theoretical foundations of our framework, and show that our framing of metaclustering circumvents Kleinberg’s impossibility theorem for clustering.", "title": "" }, { "docid": "1a98d48ae733670a641c0467d962d9b4", "text": "Translation Look aside Buffers (TLBs) are critical to system performance, particularly as applications demand larger working sets and with the adoption of virtualization. Architectural support for super pages has previously been proposed to improve TLB performance. By allocating contiguous physical pages to contiguous virtual pages, the operating system (OS) constructs super pages which need just one TLB entry rather than the hundreds required for the constituent base pages. While this greatly reduces TLB misses, these gains are often offset by the implementation difficulties of generating and managing ample contiguity for super pages. We show, however, that basic OS memory allocation mechanisms such as buddy allocators and memory compaction naturally assign contiguous physical pages to contiguous virtual pages. Our real-system experiments show that while usually insufficient for super pages, these intermediate levels of contiguity exist under various system conditions and even under high load. In response, we propose Coalesced Large-Reach TLBs (CoLT), which leverage this intermediate contiguity to coalesce multiple virtual-to-physical page translations into single TLB entries. We show that CoLT implementations eliminate 40\\% to 58\\% of TLB misses on average, improving performance by 14\\%. Overall, we demonstrate that the OS naturally generates page allocation contiguity. CoLT exploits this contiguity to eliminate TLB misses for next-generation, big-data applications with low-overhead implementations.", "title": "" }, { "docid": "9963e1f7126812d9111a4cb6a8eb8dc6", "text": "The renewed interest in grapheme to phoneme conversion (G2P), due to the need of developing multilingual speech synthesizers and recognizers, suggests new approaches more efficient than the traditional rule&exception ones. A number of studies have been performed to investigate the possible use of machine learning techniques to extract phonetic knowledge in a automatic way starting from a lexicon. In this paper, we present the results of our experiments in this research field. Starting from the state of art, our contribution is in the development of a language-independent learning scheme for G2P based on Classification and Regression Trees (CART). To validate our approach, we realized G2P converters for the following languages: British English, American English, French and Brazilian Portuguese.", "title": "" }, { "docid": "a76332501ef8140176ed434b20483e3b", "text": "As the integration level of power electronics equipment increases, the coupling between multi-domain physical effects becomes more and more relevant for design optimization. At the same time, virtual analysis capability acquires a critical importance and is conditioned by the achievement of an adequate compromise between accuracy and computational effort. This paper proposes the compact model development of a 6.5 kV field-stop IGBT module, for use in a circuit simulation environment. The model considers the realistic connection of IGBT and anti-parallel freewheeling diode pairs: the description of semiconductor physics is coupled with self-heating effects, both at device and module level; electro-magnetic phenomena associated with the package and layout are also taken into account. The modeling approach follows a mixed physical and behavioral description, resulting in an ideal compromise for realistic analysis of multi-chip structures. Finally, selected examples, derived from a railway traction application scenario, demonstrate the validity of the proposed solution, both for simulation of short transients and periodic operation, qualifying the model as a support tool of general validity, from system design development to reliability investigations.", "title": "" }, { "docid": "4b8470edc0d643e9baeceae7d15a3c8b", "text": "The authors have investigated potential applications of artificial neural networks for electrocardiographic QRS detection and beat classification. For the task of QRS detection, the authors used an adaptive multilayer perceptron structure to model the nonlinear background noise so as to enhance the QRS complex. This provided more reliable detection of QRS complexes even in a noisy environment. For electrocardiographic QRS complex pattern classification, an artificial neural network adaptive multilayer perceptron was used as a pattern classifier to distinguish between normal and abnormal beat patterns, as well as to classify 12 different abnormal beat morphologies. Preliminary results using the MIT/BIH (Massachusetts Institute of Technology/Beth Israel Hospital, Cambridge, MA) arrhythmia database are encouraging.", "title": "" }, { "docid": "087f9c2abb99d8576645a2460298c1b5", "text": "In a community cloud, multiple user groups dynamically share a massive number of data blocks. The authors present a new associative data sharing method that uses virtual disks in the MeePo cloud, a research storage cloud built at Tsinghua University. Innovations in the MeePo cloud design include big data metering, associative data sharing, data block prefetching, privileged access control (PAC), and privacy preservation. These features are improved or extended from competing features implemented in DropBox, CloudViews, and MySpace. The reported results support the effectiveness of the MeePo cloud.", "title": "" }, { "docid": "5d40cae84395cc94d68bd4352383d66b", "text": "Scalable High Efficiency Video Coding (SHVC) is the extension of the High Efficiency Video Coding (HEVC). This standard is developed to ameliorate the coding efficiency for the spatial and quality scalability. In this paper, we investigate a survey for SHVC extension. We describe also its types and explain the different additional coding tools that further improve the Enhancement Layer (EL) coding efficiency. Furthermore, we assess through experimental results the performance of the SHVC for different coding configurations. The effectiveness of the SHVC was demonstrated, using two layers, by comparing its coding adequacy compared to simulcast configuration and HEVC for enhancement layer using HM16 for several test sequences and coding conditions.", "title": "" }, { "docid": "83b5da6ab8ab9a906717fda7aa66dccb", "text": "Image quality assessment (IQA) tries to estimate human perception based image visual quality in an objective manner. Existing approaches target this problem with or without reference images. For no-reference image quality assessment, there is no given reference image or any knowledge of the distortion type of the image. Previous approaches measure the image quality from signal level rather than semantic analysis. They typically depend on various features to represent local characteristic of an image. In this paper we propose a new no-reference (NR) image quality assessment (IQA) framework based on semantic obviousness. We discover that semantic-level factors affect human perception of image quality. With such observation, we explore semantic obviousness as a metric to perceive objects of an image. We propose to extract two types of features, one to measure the semantic obviousness of the image and the other to discover local characteristic. Then the two kinds of features are combined for image quality estimation. The principles proposed in our approach can also be incorporated with many existing IQA algorithms to boost their performance. We evaluate our approach on the LIVE dataset. Our approach is demonstrated to be superior to the existing NR-IQA algorithms and comparable to the state-of-the-art full-reference IQA (FR-IQA) methods. Cross-dataset experiments show the generalization ability of our approach.", "title": "" }, { "docid": "ace30c4ad4a74f1ba526b4868e47b5c5", "text": "China and India are home to two of the world's largest populations, and both populations are aging rapidly. Our data compare health status, risk factors, and chronic diseases among people age forty-five and older in China and India. By 2030, 65.6 percent of the Chinese and 45.4 percent of the Indian health burden are projected to be borne by older adults, a population with high levels of noncommunicable diseases. Smoking (26 percent in both China and India) and inadequate physical activity (10 percent and 17.7 percent, respectively) are highly prevalent. Health policy and interventions informed by appropriate data will be needed to avert this burden.", "title": "" }, { "docid": "83533345743229694e055c27240b295c", "text": "OBJECTIVES\nTo assess existing research on the effects of various interventions on levels of bicycling. Interventions include infrastructure (e.g., bike lanes and parking), integration with public transport, education and marketing programs, bicycle access programs, and legal issues.\n\n\nMETHODS\nA comprehensive search of peer-reviewed and non-reviewed research identified 139 studies. Study methodologies varied considerably in type and quality, with few meeting rigorous standards. Secondary data were gathered for 14 case study cities that adopted multiple interventions.\n\n\nRESULTS\nMany studies show positive associations between specific interventions and levels of bicycling. The 14 case studies show that almost all cities adopting comprehensive packages of interventions experienced large increases in the number of bicycle trips and share of people bicycling.\n\n\nCONCLUSIONS\nMost of the evidence examined in this review supports the crucial role of public policy in encouraging bicycling. Substantial increases in bicycling require an integrated package of many different, complementary interventions, including infrastructure provision and pro-bicycle programs, supportive land use planning, and restrictions on car use.", "title": "" }, { "docid": "4f51f0e0f4aa51251575695572964f59", "text": "The problem of extracting features from given input data is of critical importance for the successful application of machine learning. Feature extraction, as usually understood, seeks an optimal transformation from input data into a (typically real-valued) feature vector that can be used as an input for a learning algorithm. Over time, this problem has been attacked using a growing number of diverse techniques that originated in separate research communities, including feature selection, dimensionality reduction, manifold learning, distance metric learning and representation learning. The goal of this paper is to contrast and compare feature extraction techniques coming from different machine learning areas, discuss the modern challenges and open problems in feature extraction and suggest novel solutions to some of them.", "title": "" }, { "docid": "5a6f964ceb0e06ec429456bca9b7764d", "text": "The increasing availability of rich and complex data in a variety of scientific domains poses a pressing need for tools to enable scientists to rapidly make sense of and gather insights from data. One proposed solution is to design visual query systems (VQSs) that allow scientists to search for desired patterns in their datasets. While many existing VQSs promise to accelerate exploratory data analysis by facilitating this search, they are unfortunately not widely used in practice. Through a year-long collaboration with scientists in three distinct domains—astronomy, genetics, and material science— we study the impact of various features within VQSs that can aid rapid visual data analysis, and how VQSs fit into a scientists’ analysis workflow. Our findings offer design guidelines for improving the usability and adoption of next-generation VQSs, paving the way for VQSs to be applied to a variety of scientific domains.", "title": "" }, { "docid": "30c67c52cb258f86998263b378e0c66d", "text": "This paper presents a robust and efficient method for license plate detection with the purpose of accurately localizing vehicle license plates from complex scenes in real time. A simple yet effective image downscaling method is first proposed to substantially accelerate license plate localization without sacrificing detection performance compared with that achieved using the original image. Furthermore, a novel line density filter approach is proposed to extract candidate regions, thereby significantly reducing the area to be analyzed for license plate localization. Moreover, a cascaded license plate classifier based on linear support vector machines using color saliency features is introduced to identify the true license plate from among the candidate regions. For performance evaluation, a data set consisting of 3977 images captured from diverse scenes under different conditions is also presented. Extensive experiments on the widely used Caltech license plate data set and our newly introduced data set demonstrate that the proposed approach substantially outperforms state-of-the-art methods in terms of both detection accuracy and run-time efficiency, increasing the detection ratio from 91.09% to 96.62% while decreasing the run time from 672 to 42 ms for processing an image with a resolution of $1082\\times 728$ . The executable code and our collected data set are publicly available.", "title": "" }, { "docid": "c22b598200cf68ab26c0c92cbb182b4a", "text": "With the rise of Web-based applications, it is both important and feasible for human-computer interaction practitioners to measure a product’s user experience. While quantifying user attitudes at a small scale has been heavily studied, in this industry case study, we detail best Happiness Tracking Surveys (HaTS) for collecting attitudinal data at a large scale directly in the product and over time. This method was developed at Google to track attitudes and open-ended feedback over time, and to characterize products’ user bases. This case study of HaTS goes beyond the design of the questionnaire to also suggest best practices for appropriate sampling, invitation techniques, and its data analysis. HaTS has been deployed successfully across dozens of Google’s products to measure progress towards product goals and to inform product decisions; its sensitivity to product changes has been demonstrated widely. We are confident that teams in other organizations will be able to embrace HaTS as well, and, if necessary, adapt it for their unique needs.", "title": "" }, { "docid": "d010a2f8240ff9f6704cde917cb85cf0", "text": "OBJECTIVE\nAlthough psychological modulation of immune function is now a well-established phenomenon, much of the relevant literature has been published within the last decade. This article speculates on future directions for psychoneuroimmunology research, after reviewing the history of the field.\n\n\nMETHODS\nThis review focuses on human psychoneuroimmunology studies published since 1939, particularly those that have appeared in Psychosomatic Medicine. Studies were clustered according to key themes, including stressor duration and characteristics (laboratory stressors, time-limited naturalistic stressors, or chronic stress), as well as the influences of psychopathology, personality, and interpersonal relationships; the responsiveness of the immune system to behavioral interventions is also addressed. Additionally, we describe trends in populations studied and the changing nature of immunological assessments. The final section focuses on health outcomes and future directions for the field.\n\n\nRESULTS\nThere are now sufficient data to conclude that immune modulation by psychosocial stressors or interventions can lead to actual health changes, with the strongest direct evidence to date in infectious disease and wound healing. Furthermore, recent medical literature has highlighted a spectrum of diseases whose onset and course may be influenced by proinflammatory cytokines, from cardiovascular disease to frailty and functional decline; proinflammatory cytokine production can be directly stimulated by negative emotions and stressful experiences and indirectly stimulated by chronic or recurring infections. Accordingly, distress-related immune dysregulation may be one core mechanism behind a diverse set of health risks associated with negative emotions.\n\n\nCONCLUSIONS\nWe suggest that psychoneuroimmunology may have broad implications for the basic biological sciences and medicine.", "title": "" }, { "docid": "22f3fbb237d6c31bb01e5bb576c7ce66", "text": "Author Information Baltimore, MD Our propensity to believe that an outline of the human brain is inscribed in one of the most famous paintings of the godhead is both a reflection of the revolution initiated by the Renaissance and a function of how the organ of our humanity psychophysically interprets images. In 1306, Giotto completed a cycle of frescoes in the Arena Chapel in Padua and signed them, thus forsaking the anonymity of the old art of the Middle Ages and Byzantium and initiating the Italian Renaissance, a period in which the personality of the Western artist became a conspicuous component of his artwork. The figures in Giotto's paintings bore strong resemblances to living models, and the emotive content of their faces was true to life. The rediscovery of Greek and Roman artifacts, with their idealized conception of the human form, and the importation into Europe via Arab scholars of the humanistic works of Greek philosophers prepared the Italian soil for the straightforward assertion of individual identity and the inexorable evolution of the cultural craftsman from artisan to artist. Whereas the primitive simplifications and flatness of Byzantium remained a strong influence on artists in Spain and in the Germanic north, the innovations of Giotto and his successors radically changed the depiction of the human form throughout the south; as a consequence of the discovery of single point perspective before 1413 by the architect Filippo Brunellschi (4), this revolution reached its apogee towards the end of the fifteenth century in the city-states of Florence, Venice, and Rome. Almost two centuries after the completion of the Arena Chapel, artists regularly received commissions for both secular and religious subjects; in each realm they attempted to meld the religious prescriptions of the Catholic", "title": "" }, { "docid": "b75a73a61c3934c76d754069c0834b99", "text": "Software re-engineering can dramatically improve an organization’s ability to maintain and upgrade its legacy production systems. But the risks that accompany traditional re-engineering tend to offset the potential benefits. Incremental software re-engineering is the practice of re-engineering a system’s software components on a phased basis, and then re-incorporating those components into production also on a phased basis. Incremental software re-engineering allows for safer re-engineering, increased flexibility and more immediate return on investment. But commercial automation to support incremental software re-engineering is currently weak. In addition, project managers need a methodology to plan and implement software re-engineering projects based on the incremental approach. This paper covers the advantages of incremental software re-engineering and what is available concerning support technology. The paper describes a process methodology for planning and implementing incremental software re-engineering projects. Finally, gaps in the support technology are identified with suggestions for future tools from vendors. 1998 John Wiley & Sons, Ltd.", "title": "" } ]
scidocsrr
09cf479f99dc361449129fcdf6d174b7
Low-Power Low-Noise CTIA Readout Integrated Circuit Design for Thermal Imaging Applications
[ { "docid": "e5c4870acea1c7315cce0561f583626c", "text": "A discussion of CMOS readout technologies for infrared (IR) imaging systems is presented. First, the description of various types of IR detector materials and structures is given. The advances of detector fabrication technology and microelectronics process technology have led to the development of large format array of IR imaging detectors. For such large IR FPA’s which is the critical component of the advanced infrared imaging system, general requirement and specifications are described. To support a good interface between FPA and downstream signal processing stage, both conventional and recently developed CMOS readout techniques are presented and discussed. Finally, future development directions including the smart focal plane concept are also introduced.", "title": "" } ]
[ { "docid": "70fbeaa603b37230d37d593a9b87f56e", "text": "Umbilical venous catheterization is a common procedure performed in neonatal intensive care units. Hepatic collections due to inadvertent extravasation of parenteral nutrition into the liver have been described previously in literature. To recognize the clinicoradiologic features and treatment options of hepatic collections due to inadvertent extravasation of parenteral nutrition fluids caused by malpositioning of umbilical venous catheter (UVC) in the portal venous system. This is a case series describing five neonates during a 6-year period at a single tertiary care referral center, with extravasation of parenteral nutrition into the liver parenchyma causing hepatic collections. All five neonates receiving parenteral nutrition presented with abdominal distension in the second week of life. Two out of five (40%) had anemia requiring blood transfusion and 3/5 (60%) had hemodynamic instability at presentation. Ultrasound of the liver confirmed the diagnosis in all the cases. Three of the five (60%) cases underwent US-guided aspiration of the collections, one case underwent conservative management and one case required emergent laparotomy due to abdominal compartment syndrome. US used in follow-up of these cases revealed decrease in size of the lesions and/or development of calcifications. Early recognition of this complication, prompt diagnosis with US of liver and timely treatment can lead to better outcome in newborns with hepatic collections secondary to inadvertent parenteral nutrition infusion via malposition of UVC.", "title": "" }, { "docid": "70242cb6aee415682c03da6bfd033845", "text": "This paper presents a class of linear predictors for nonlinear controlled dynamical systems. The basic idea is to lift (or embed) the nonlinear dynamics into a higher dimensional space where its evolution is approximately linear. In an uncontrolled setting, this procedure amounts to numerical approximations of the Koopman operator associated to the nonlinear dynamics. In this work, we extend the Koopman operator to controlled dynamical systems and apply the Extended Dynamic Mode Decomposition (EDMD) to compute a finite-dimensional approximation of the operator in such a way that this approximation has the form of a linear controlled dynamical system. In numerical examples, the linear predictors obtained in this way exhibit a performance superior to existing linear predictors such as those based on local linearization or the so called Carleman linearization. Importantly, the procedure to construct these linear predictors is completely data-driven and extremely simple – it boils down to a nonlinear transformation of the data (the lifting) and a linear least squares problem in the lifted space that can be readily solved for large data sets. These linear predictors can be readily used to design controllers for the nonlinear dynamical system using linear controller design methodologies. We focus in particular on model predictive control (MPC) and show that MPC controllers designed in this way enjoy computational complexity of the underlying optimization problem comparable to that of MPC for a linear dynamical system with the same number of control inputs and the same dimension of the state-space. Importantly, linear inequality constraints on the state and control inputs as well as nonlinear constraints on the state can be imposed in a linear fashion in the proposed MPC scheme. Similarly, cost functions nonlinear in the state variable can be handled in a linear fashion. We treat both the full-state measurement case and the input-output case, as well as systems with disturbances / noise. Numerical examples (including a high-dimensional nonlinear PDE control) demonstrate the approach with the source code available online2.", "title": "" }, { "docid": "bf36c139b531fb738bff0cabf04ef006", "text": "A new capacitive type of MEMS microphone is presented. In contrast to existing technologies which are highly specialized for this particular type of application, our approach is based on a standard process and layer system which has been in use for more than a decade now for the manufacturing of inertial sensors. For signal conversion, a mixed-signal ASIC with digital sampling of the microphone capacitance is used. The MEMS microphone yields high signal-to-noise performance (58 dB) after mounting it in a standard LGA-type package. It is well-suited for a wide range of potential applications and demonstrates the universal scope of the used process technology.", "title": "" }, { "docid": "945f129f81e9b7a69a6ba9dc982ed7c6", "text": "Geographic location of a person is important contextual information that can be used in a variety of scenarios like disaster relief, directional assistance, context-based advertisements, etc. GPS provides accurate localization outdoors but is not useful inside buildings. We propose an coarse indoor localization approach that exploits the ubiquity of smart phones with embedded sensors. GPS is used to find the building in which the user is present. The Accelerometers are used to recognize the user’s dynamic activities (going up or down stairs or an elevator) to determine his/her location within the building. We demonstrate the ability to estimate the floor-level of a user. We compare two techniques for activity classification, one is naive Bayes classifier and the other is based on dynamic time warping. The design and implementation of a localization application on the HTC G1 platform running Google Android is also presented.", "title": "" }, { "docid": "aa4d12547a6b85a34ee818f1cc71d1da", "text": "OBJECTIVE\nDevelopment of a new framework for the National Institute on Aging (NIA) to assess progress and opportunities toward stimulating and supporting rigorous research to address health disparities.\n\n\nDESIGN\nPortfolio review of NIA's health disparities research portfolio to evaluate NIA's progress in addressing priority health disparities areas.\n\n\nRESULTS\nThe NIA Health Disparities Research Framework highlights important factors for health disparities research related to aging, provides an organizing structure for tracking progress, stimulates opportunities to better delineate causal pathways and broadens the scope for malleable targets for intervention, aiding in our efforts to address health disparities in the aging population.\n\n\nCONCLUSIONS\nThe promise of health disparities research depends largely on scientific rigor that builds on past findings and aggressively pursues new approaches. The NIA Health Disparities Framework provides a landscape for stimulating interdisciplinary approaches, evaluating research productivity and identifying opportunities for innovative health disparities research related to aging.", "title": "" }, { "docid": "a7607444b58f0e86000c7f2d09551fcc", "text": "Background modeling is a critical component for various vision-based applications. Most traditional methods tend to be inefficient when solving large-scale problems. In this paper, we introduce sparse representation into the task of large-scale stable-background modeling, and reduce the video size by exploring its discriminative frames. A cyclic iteration process is then proposed to extract the background from the discriminative frame set. The two parts combine to form our sparse outlier iterative removal (SOIR) algorithm. The algorithm operates in tensor space to obey the natural data structure of videos. Experimental results show that a few discriminative frames determine the performance of the background extraction. Furthermore, SOIR can achieve high accuracy and high speed simultaneously when dealing with real video sequences. Thus, SOIR has an advantage in solving large-scale tasks.", "title": "" }, { "docid": "677f5e0ca482bf7ea7bf929ae3adbf76", "text": "Multilevel modulation formats, such as PAM-4, have been introduced in recent years for next generation wireline communication systems for more efficient use of the available link bandwidth. High-speed ADCs with digital signal processing (DSP) can provide robust performance for such systems to compensate for the severe channel impairment as the data rate continues to increase.", "title": "" }, { "docid": "af22932b48a2ea64ecf3e5ba1482564d", "text": "Collaborative embedded systems (CES) heavily rely on information models to understand the contextual situations they are exposed to. These information models serve different purposes. First, during development time it is necessary to model the context for eliciting and documenting the requirements that a CES is supposed to achieve. Second, information models provide information to simulate different contextual situations and CES ́s behavior in these situations. Finally, CESs need information models about their context during runtime in order to react to different contextual situations and exchange context information with other CESs. Heavyweight ontologies, based on Ontology Web Language (OWL), have already proven suitable for representing knowledge about contextual situations during runtime. Furthermore, lightweight ontologies (e.g. class diagrams) have proven their practicality for creating domain specific languages for requirements documentation. However, building an ontology (lightor heavyweight) is a non-trivial task that needs to be integrated into development methods for CESs such that it serves the above stated purposes in a seamless way. This paper introduces the requirements for the building of ontologies and proposes a method that is integrated into the engineering of CESs.", "title": "" }, { "docid": "e8b2498c4a81c36f1e7816c84a5074da", "text": "Corresponding author: Magdalena Magnowska MD, PhD Department of Gynecology, Obstetrics and Gynecologic Oncology Division of Gynecologic Oncology Poznan University of Medical Sciences 33 Polna St 60-535 Poznan, Poland Phone: +48 618 419 330 Fax: +48 616 599 645 E-mail: magna5@op.pl 1 Department of Gynecology, Obstetrics and Gynecologic Oncology, Division of Gynecologic Oncology, Poznan University of Medical Sciences, Poznan, Poland 2 Department of Biochemistry and Pathomorphology, Chair of Gynecology, Obstetrics and Gynecologic Oncology, Poznan University of Medical Sciences, Poznan, Poland", "title": "" }, { "docid": "056c5033e71eecb8a683fded0dd149bb", "text": "There is a severe lack of knowledge regarding the brain regions involved in human sexual performance in general, and female orgasm in particular. We used [15O]-H2O positron emission tomography to measure regional cerebral blood flow (rCBF) in 12 healthy women during a nonsexual resting state, clitorally induced orgasm, sexual clitoral stimulation (sexual arousal control) and imitation of orgasm (motor output control). Extracerebral markers of sexual performance and orgasm were rectal pressure variability (RPstd) and perceived level of sexual arousal (PSA). Sexual stimulation of the clitoris (compared to rest) significantly increased rCBF in the left secondary and right dorsal primary somatosensory cortex, providing the first account of neocortical processing of sexual clitoral information. In contrast, orgasm was mainly associated with profound rCBF decreases in the neocortex when compared with the control conditions (clitoral stimulation and imitation of orgasm), particularly in the left lateral orbitofrontal cortex, inferior temporal gyrus and anterior temporal pole. Significant positive correlations were found between RPstd and rCBF in the left deep cerebellar nuclei, and between PSA and rCBF in the ventral midbrain and right caudate nucleus. We propose that decreased blood flow in the left lateral orbitofrontal cortex signifies behavioural disinhibition during orgasm in women, and that deactivation of the temporal lobe is directly related to high sexual arousal. In addition, the deep cerebellar nuclei may be involved in orgasm-specific muscle contractions while the involvement of the ventral midbrain and right caudate nucleus suggests a role for dopamine in female sexual arousal and orgasm.", "title": "" }, { "docid": "5f7c0161f910f0288c86349613a9b08b", "text": "The problem of joint feature selection across a group of related tasks has applications in many areas including biomedical informatics and computer vision. We consider the 2,1-norm regularized regression model for joint feature selection from multiple tasks, which can be derived in the probabilistic framework by assuming a suitable prior from the exponential family. One appealing feature of the 2,1-norm regularization is that it encourages multiple predictors to share similar sparsity patterns. However, the resulting optimization problem is challenging to solve due to the non-smoothness of the 2,1-norm regularization. In this paper, we propose to accelerate the computation by reformulating it as two equivalent smooth convex optimization problems which are then solved via the Nesterov’s method—an optimal first-order black-box method for smooth convex optimization. A key building block in solving the reformulations is the Euclidean projection. We show that the Euclidean projection for the first reformulation can be analytically computed, while the Euclidean projection for the second one can be computed in linear time. Empirical evaluations on several data sets verify the efficiency of the proposed algorithms.", "title": "" }, { "docid": "60245551fe055b67e94def9fcff15bca", "text": "Redundancy can, in general, improve the ability and performance of parallel manipulators by implementing the redundant degrees of freedom to optimize a secondary objective function. Almost all published researches in the area of parallel manipulators redundancy were focused on the design and analysis of redundant parallel manipulators with rigid (nonconfigurable) platforms and on grasping hands to be attached to the platforms. Conventional grippers usually are not appropriate to grasp irregular or large objects. Very few studies focused on the idea of using a configurable platform as a grasping device. This paper highlights the idea of using configurable platforms in both planar and spatial redundant parallel manipulators, and generalizes their analysis. The configurable platform is actually a closed kinematic chain of mobility equal to the degree of redundancy of the manipulator. The additional redundant degrees of freedom are used in reconfiguring the shape of the platform itself. Several designs of kinematically redundant planar and spatial parallel manipulators with configurable platform are presented. Such designs can be used as a grasping device especially for irregular or large objects or even as a micro-positioning device after grasping the object. Screw algebra is used to develop a general framework that can be adapted to analyze the kinematics of any general-geometry planar or spatial kinematically redundant parallel manipulator with configurable platform.", "title": "" }, { "docid": "b7b2f1c59dfc00ab6776c6178aff929c", "text": "Over the past four years, the Big Data and Exascale Computing (BDEC) project organized a series of five international workshops that aimed to explore the ways in which the new forms of data-centric discovery introduced by the ongoing revolution in high-end data analysis (HDA) might be integrated with the established, simulation-centric paradigm of the high-performance computing (HPC) community. Based on those meetings, we argue that the rapid proliferation of digital data generators, the unprecedented growth in the volume and diversity of the data they generate, and the intense evolution of the methods for analyzing and using that data are radically reshaping the landscape of scientific computing. The most critical problems involve the logistics of wide-area, multistage workflows that will move back and forth across the computing continuum, between the multitude of distributed sensors, instruments and other devices at the networks edge, and the centralized resources of commercial clouds and HPC centers. We suggest that the prospects for the future integration of technological infrastructures and research ecosystems need to be considered at three different levels. First, we discuss the convergence of research applications and workflows that establish a research paradigm that combines both HPC and HDA, where ongoing progress is already motivating efforts at the other two levels. Second, we offer an account of some of the problems involved with creating a converged infrastructure for peripheral environments, that is, a shared infrastructure that can be deployed throughout the network in a scalable manner to meet the highly diverse requirements for processing, communication, and buffering/storage of massive data workflows of many different scientific domains. Third, we focus on some opportunities for software ecosystem convergence in big, logically centralized facilities that execute large-scale simulations and models and/or perform large-scale data analytics. We close by offering some conclusions and recommendations for future investment and policy review.", "title": "" }, { "docid": "94a5e443ff4d6a6decdf1aeeb1460788", "text": "Teaching the computer to understand language is the major goal in the field of natural language processing. In this thesis we introduce computational methods that aim to extract language structure— e.g. grammar, semantics or syntax— from text, which provides the computer with information in order to understand language. During the last decades, scientific efforts and the increase of computational resources made it possible to come closer to the goal of understanding language. In order to extract language structure, many approaches train the computer on manually created resources. Most of these so-called supervised methods show high performance when applied to similar textual data. However, they perform inferior when operating on textual data, which are different to the one they are trained on. Whereas training the computer is essential to obtain reasonable structure from natural language, we want to avoid training the computer using manually created resources. In this thesis, we present so-called unsupervisedmethods, which are suited to learn patterns in order to extract structure from textual data directly. These patterns are learned with methods that extract the semantics (meanings) of words and phrases. In comparison to manually built knowledge bases, unsupervised methods are more flexible: they can extract structure from text of different languages or text domains (e.g. finance or medical texts), without requiring manually annotated structure. However, learning structure from text often faces sparsity issues. The reason for these phenomena is that in language many words occur only few times. If a word is seen only few times no precise information can be extracted from the text it occurs. Whereas sparsity issues cannot be solved completely, information about most words can be gained by using large amounts of data. In the first chapter, we briefly describe how computers can learn to understand language. Afterwards, we present the main contributions, list the publications this thesis is based on and give an overview of this thesis. Chapter 2 introduces the terminology used in this thesis and gives a background about natural language processing. Then, we characterize the linguistic theory on how humans understand language. Afterwards, we show how the underlying linguistic intuition can be", "title": "" }, { "docid": "f60bf27f4f557ba4705b1f75b743e932", "text": "Intelligent fashion outfit composition becomes more and more popular in these years. Some deep learning based approaches reveal competitive composition recently. However, the unexplainable characteristic makes such deep learning based approach cannot meet the the designer, businesses and consumers’ urge to comprehend the importance of different attributes in an outfit composition. To realize interpretable and customized fashion outfit compositions, we propose a partitioned embedding network to learn interpretable representations from clothing items. The overall network architecture consists of three components: an auto-encoder module, a supervised attributes module and a multi-independent module. The auto-encoder module serves to encode all useful information into the embedding. In the supervised attributes module, multiple attributes labels are adopted to ensure that different parts of the overall embedding correspond to different attributes. In the multi-independent module, adversarial operation are adopted to fulfill the mutually independent constraint. With the interpretable and partitioned embedding, we then construct an outfit composition graph and an attribute matching map. Given specified attributes description, our model can recommend a ranked list of outfit composition with interpretable matching scores. Extensive experiments demonstrate that 1) the partitioned embedding have unmingled parts which corresponding to different attributes and 2) outfits recommended by our model are more desirable in comparison with the existing methods.", "title": "" }, { "docid": "a0e7712da82a338fda01e1fd0bb4a44e", "text": "Compliance specifications concisely describe selected aspects of what a business operation should adhere to. To enable automated techniques for compliance checking, it is important that these requirements are specified correctly and precisely, describing exactly the behavior intended. Although there are rigorous mathematical formalisms for representing compliance rules, these are often perceived to be difficult to use for business users. Regardless of notation, however, there are often subtle but important details in compliance requirements that need to be considered. The main challenge in compliance checking is to bridge the gap between informal description and a precise specification of all requirements. In this paper, we present an approach which aims to facilitate creating and understanding formal compliance requirements by providing configurable templates that capture these details as options for commonly-required compliance requirements. These options are configured interactively with end-users, using question trees and natural language. The approach is implemented in the Process Mining Toolkit ProM.", "title": "" }, { "docid": "b4c5337997d33fce8553709a6d727d75", "text": "Helicopters are often used to transport supplies and equipment to hard-to-reach areas. When a load is carried via suspension cables below a helicopter, the load oscillates in response to helicopter motion and external disturbances, such as wind. This oscillation is dangerous and adversely affects control of the helicopter, especially when carrying heavy loads. To provide better control over the helicopter, one approach is to suppress the load swing dynamics using a command-filtering method called input shaping. This approach does not require real-time measurement or estimation of the load states. A simple model of a helicopter carrying a suspended load is developed and experimentally verified on a micro coaxial radio-controlled helicopter. In addition, the effectiveness of input shaping at eliminating suspended load oscillation is demonstrated on the helicopter. The proposed model may assist with the design of input-shaping controllers for a wide array of helicopters carrying suspended loads.", "title": "" }, { "docid": "c5e56d3ff1fbc7ebbdb691d1db66cdf9", "text": "Most data mining research is concerned with building high-quality classification models in isolation. In massive production systems, however, the ability to monitor and maintain performance over time while growing in size and scope is equally important. Many external factors may degrade classification performance including changes in data distribution, noise or bias in the source data, and the evolution of the system itself. A well-functioning system must gracefully handle all of these. This paper lays out a set of design principles for large-scale autonomous data mining systems and then demonstrates our application of these principles within the m6d automated ad targeting system. We demonstrate a comprehensive set of quality control processes that allow us monitor and maintain thousands of distinct classification models automatically, and to add new models, take on new data, and correct poorly-performing models without manual intervention or system disruption.", "title": "" }, { "docid": "83c184c457e35e80ce7ff8012b5dcd06", "text": "The goal of this paper is to enable a 3D “virtual-tour” of an apartment given a small set of monocular images of different rooms, as well as a 2D floor plan. We frame the problem as inference in a Markov Random Field which reasons about the layout of each room and its relative pose (3D rotation and translation) within the full apartment. This gives us accurate camera pose in the apartment for each image. What sets us apart from past work in layout estimation is the use of floor plans as a source of prior knowledge, as well as localization of each image within a bigger space (apartment). In particular, we exploit the floor plan to impose aspect ratio constraints across the layouts of different rooms, as well as to extract semantic information, e.g., the location of windows which are marked in floor plans. We show that this information can significantly help in resolving the challenging room-apartment alignment problem. We also derive an efficient exact inference algorithm which takes only a few ms per apartment. This is due to the fact that we exploit integral geometry as well as our new bounds on the aspect ratio of rooms which allow us to carve the space, significantly reducing the number of physically possible configurations. We demonstrate the effectiveness of our approach on a new dataset which contains over 200 apartments.", "title": "" }, { "docid": "6882f244253e0367b85c76bd4884ddaa", "text": "Publishers of news information are keen to amplify the reach of their content by making it as re-sharable as possible on social media. In this work we study the relationship between the concept of social deviance and the re-sharing of news headlines by network gatekeepers on Twitter. Do network gatekeepers have the same predilection for selecting socially deviant news items as professionals? Through a study of 8,000 news items across 8 major news outlets in the U.S. we predominately find that network gatekeepers re-share news items more often when they reference socially deviant events. At the same time we find and discuss exceptions for two outlets, suggesting a more complex picture where newsworthiness for networked gatekeepers may be moderated by other effects such as topicality or varying motivations and relationships with their audience.", "title": "" } ]
scidocsrr
83b1cbcb6c5298e0f34dda666999e4be
Text-Attentional Convolutional Neural Network for Scene Text Detection
[ { "docid": "a43e646ee162a23806c3b8f0a9d69b23", "text": "This paper describes the results of the ICDAR 2005 competition for locating text in camera captured scenes. For this we used the same data as the ICDAR 2003 competition, which has been kept private until now. This allows a direct comparison with the 2003 entries. The main result is that the leading 2005 entry has improved significantly on the leading 2003 entry, with an increase in average f-score from 0.5 to 0.62, where the f-score is the same adapted information retrieval measure used for the 2003 competition. The paper also discusses the Web-based deployment and evaluation of text locating systems, and one of the leading entries has now been deployed in this way. This mode of usage could lead to more complete and more immediate knowledge of the strengths and weaknesses of each newly developed system.", "title": "" }, { "docid": "ff4fb7dd98308b9b55f7f7907a116a52", "text": "The current paper presents a novel texture-based method for detecting texts in images. A support vector machine (SVM) is used to analyze the textural properties of texts. No external texture feature extraction module is used; rather, the intensities of the raw pixels that make up the textural pattern are fed directly to the SVM, which works well even in high-dimensional spaces. Next, text regions are identified by applying a continuously adaptive mean shift algorithm (CAMSHIFT) to the results of the texture analysis. The combination of CAMSHIFT and SVMs produces both robust and efficient text detection, as time-consuming texture analyses for less relevant pixels are restricted, leaving only a small part of the input image to be texture-analyzed.", "title": "" }, { "docid": "d2c8a3fd1049713d478fe27bd8f8598b", "text": "In this paper, higher-order correlation clustering (HOCC) is used for text line detection in natural images. We treat text line detection as a graph partitioning problem, where each vertex is represented by a Maximally Stable Extremal Region (MSER). First, weak hypothesises are proposed by coarsely grouping MSERs based on their spatial alignment and appearance consistency. Then, higher-order correlation clustering (HOCC) is used to partition the MSERs into text line candidates, using the hypotheses as soft constraints to enforce long range interactions. We further propose a regularization method to solve the Semidefinite Programming problem in the inference. Finally we use a simple texton-based texture classifier to filter out the non-text areas. This framework allows us to naturally handle multiple orientations, languages and fonts. Experiments show that our approach achieves competitive performance compared to the state of the art.", "title": "" } ]
[ { "docid": "b2a7c0a96f29a554ecdba2d56778b7c7", "text": "Existing video streaming algorithms use various estimation approaches to infer the inherently variable bandwidth in cellular networks, which often leads to reduced quality of experience (QoE). We ask the question: \"If accurate bandwidth prediction were possible in a cellular network, how much can we improve video QoE?\". Assuming we know the bandwidth for the entire video session, we show that existing streaming algorithms only achieve between 69%-86% of optimal quality. Since such knowledge may be impractical, we study algorithms that know the available bandwidth for a few seconds into the future. We observe that prediction alone is not sufficient and can in fact lead to degraded QoE. However, when combined with rate stabilization functions, prediction outperforms existing algorithms and reduces the gap with optimal to 4%. Our results lead us to believe that cellular operators and content providers can tremendously improve video QoE by predicting available bandwidth and sharing it through APIs.", "title": "" }, { "docid": "68093a9767aea52026a652813c3aa5fd", "text": "Conventional capacitively coupled neural recording amplifiers often present a large input load capacitance to the neural signal source and hence take up large circuit area. They suffer due to the unavoidable trade-off between the input capacitance and chip area versus the amplifier gain. In this work, this trade-off is relaxed by replacing the single feedback capacitor with a clamped T-capacitor network. With this simple modification, the proposed amplifier can achieve the same mid-band gain with less input capacitance, resulting in a higher input impedance and a smaller silicon area. Prototype neural recording amplifiers based on this proposal were fabricated in 0.35 μm CMOS, and their performance is reported. The amplifiers occupy smaller area and have lower input loading capacitance compared to conventional neural amplifiers. One of the proposed amplifiers occupies merely 0.056 mm2. It achieves 38.1-dB mid-band gain with 1.6 pF input capacitance, and hence has an effective feedback capacitance of 20 fF. Consuming 6 μW, it has an input referred noise of 13.3 μVrms over 8.5 kHz bandwidth and NEF of 7.87. In-vivo recordings from animal experiments are also demonstrated.", "title": "" }, { "docid": "21b6eabf98a24614375cd0192126ef12", "text": "Interior permanent magnet motors equipped with a squirrel-cage rotor are receiving lately an increased interest. Defined as line-start, line-fed or hybrid synchronous-induction motors, such machines combine the advantage of the brushless permanent magnet motors, i.e. high efficiency, constant torque for variable speed, with the high starting capability of the induction motors connected directly to the supply system. This paper proposes a unified analysis of these motors, with an emphasis on how any possible configuration may be described by using symmetrical components and two equivalent fictitious machines: positive and negative sequences. The analysis is validated on a single-phase unbalanced and on a three-phase balanced line-fed interior permanent magnet motors.", "title": "" }, { "docid": "69e2cd21ca9b5d14a09820b83f77c105", "text": "Stochastic Gradient Descent (SGD) is an important algorithm in machine learning. With constant learning rates, it is a stochastic process that, after an initial phase of convergence, generates samples from a stationary distribution. We show that SGD with constant rates can be effectively used as an approximate posterior inference algorithm for probabilistic modeling. Specifically, we show how to adjust the tuning parameters of SGD such as to match the resulting stationary distribution to the posterior. This analysis rests on interpreting SGD as a continuoustime stochastic process and then minimizing the Kullback-Leibler divergence between its stationary distribution and the target posterior. (This is in the spirit of variational inference.) In more detail, we model SGD as a multivariate Ornstein-Uhlenbeck process and then use properties of this process to derive the optimal parameters. This theoretical framework also connects SGD to modern scalable inference algorithms; we analyze the recently proposed stochastic gradient Fisher scoring under this perspective. We demonstrate that SGD with properly chosen constant rates gives a new way to optimize hyperparameters in probabilistic models.", "title": "" }, { "docid": "ecf9afa5fad02f476c2de011f3f79179", "text": "This paper presents the machine learning architecture of the Snips Voice Platform, a software solution to perform Spoken Language Understanding on microprocessors typical of IoT devices. The embedded inference is fast and accurate while enforcing privacy by design, as no personal user data is ever collected. Focusing on Automatic Speech Recognition and Natural Language Understanding, we detail our approach to training high-performance Machine Learning models that are small enough to run in real-time on small devices. Additionally, we describe a data generation procedure that provides sufficient, high-quality training data without compromising user privacy.", "title": "" }, { "docid": "bd4658aa8745aedf3aec0527ec7a2507", "text": "Recommending new items for suitable users is an important yet challenging problem due to the lack of preference history for the new items. Noncollaborative user modeling techniques that rely on the item features can be used to recommend new items. However, they only use the past preferences of each user to provide recommendations for that user. They do not utilize information from the past preferences of other users, which can potentially be ignoring useful information. More recent factor models transfer knowledge across users using their preference information in order to provide more accurate recommendations. These methods learn a low-rank approximation for the preference matrix, which can lead to loss of information. Moreover, they might not be able to learn useful patterns given very sparse datasets. In this work, we present <scp>UFSM</scp>, a method for top-<i>n</i> recommendation of new items given binary user preferences. <scp>UFSM</scp> learns <b>U</b>ser-specific <b>F</b>eature-based item-<b>S</b>imilarity <b>M</b>odels, and its strength lies in combining two points: (1) exploiting preference information across all users to learn multiple global item similarity functions and (2) learning user-specific weights that determine the contribution of each global similarity function in generating recommendations for each user. <scp>UFSM</scp> can be considered as a sparse high-dimensional factor model where the previous preferences of each user are incorporated within his or her latent representation. This way, <scp>UFSM</scp> combines the merits of item similarity models that capture local relations among items and factor models that learn global preference patterns. A comprehensive set of experiments was conduced to compare <scp>UFSM</scp> against state-of-the-art collaborative factor models and noncollaborative user modeling techniques. Results show that <scp>UFSM</scp> outperforms other techniques in terms of recommendation quality. <scp>UFSM</scp> manages to yield better recommendations even with very sparse datasets. Results also show that <scp>UFSM</scp> can efficiently handle high-dimensional as well as low-dimensional item feature spaces.", "title": "" }, { "docid": "52c07b30d95ab7dc74b5be8a2a60ea91", "text": "Although deep learning models are highly effective for various learning tasks, their high computational costs prohibit the deployment to scenarios where either memory or computational resources are limited. In this paper, we focus on compressing and accelerating deep models with network weights represented by very small numbers of bits, referred to as extremely low bit neural network. We model this problem as a discretely constrained optimization problem. Borrowing the idea from Alternating Direction Method of Multipliers (ADMM), we decouple the continuous parameters from the discrete constraints of network, and cast the original hard problem into several subproblems. We propose to solve these subproblems using extragradient and iterative quantization algorithms that lead to considerably faster convergency compared to conventional optimization methods. Extensive experiments on image recognition and object detection verify that the proposed algorithm is more effective than state-of-theart approaches when coming to extremely low bit neural network.", "title": "" }, { "docid": "5ca8d0ad48ff44e0659f916af41a7efc", "text": "Automatic retinal vessel segmentation is a fundamental step in the diagnosis of eye-related diseases, in which both thick vessels and thin vessels are important features for symptom detection. All existing deep learning models attempt to segment both types of vessels simultaneously by using a unified pixelwise loss which treats all vessel pixels with equal importance. Due to the highly imbalanced ratio between thick vessels and thin vessels (namely the majority of vessel pixels belong to thick vessels), the pixel-wise loss would be dominantly guided by thick vessels and relatively little influence comes from thin vessels, often leading to low segmentation accuracy for thin vessels. To address the imbalance problem, in this paper, we explore to segment thick vessels and thin vessels separately by proposing a three-stage deep learning model. The vessel segmentation task is divided into three stages, namely thick vessel segmentation, thin vessel segmentation and vessel fusion. As better discriminative features could be learned for separate segmentation of thick vessels and thin vessels, this process minimizes the negative influence caused by their highly imbalanced ratio. The final vessel fusion stage refines the results by further identifying non-vessel pixels and improving the overall vessel thickness consistency. The experiments on public datasets DRIVE, STARE and CHASE DB1 clearly demonstrate that the proposed threestage deep learning model outperforms the current state-of-theart vessel segmentation methods.", "title": "" }, { "docid": "ddd3d575bbe51459f38492e439dd2d67", "text": "A “botnet” consists of a network of compromised computers controlled by an attacker (“botmaster”). Recently, botnets have become the root cause of many Internet attacks. To be well prepared for future attacks, it is not enough to study how to detect and defend against the botnets that have appeared in the past. More importantly, we should study advanced botnet designs that could be developed by botmasters in the near future. In this paper, we present the design of an advanced hybrid peer-to-peer botnet. Compared with current botnets, the proposed botnet is harder to be shut down, monitored, and hijacked. It provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and recovery by its botmaster. In the end, we suggest and analyze several possible defenses against this advanced botnet.", "title": "" }, { "docid": "1b04911f677767284063133908ab4bb1", "text": "An increasing number of companies are beginning to deploy services/applications in the cloud computing environment. Enhancing the reliability of cloud service has become a critical and challenging research problem. In the cloud computing environment, all resources are commercialized. Therefore, a reliability enhancement approach should not consume too much resource. However, existing approaches cannot achieve the optimal effect because of checkpoint image-sharing neglect, and checkpoint image inaccessibility caused by node crashing. To address this problem, we propose a cloud service reliability enhancement approach for minimizing network and storage resource usage in a cloud data center. In our proposed approach, the identical parts of all virtual machines that provide the same service are checkpointed once as the service checkpoint image, which can be shared by those virtual machines to reduce the storage resource consumption. Then, the remaining checkpoint images only save the modified page. To persistently store the checkpoint image, the checkpoint image storage problem is modeled as an optimization problem. Finally, we present an efficient heuristic algorithm to solve the problem. The algorithm exploits the data center network architecture characteristics and the node failure predicator to minimize network resource usage. To verify the effectiveness of the proposed approach, we extend the renowned cloud simulator Cloudsim and conduct experiments on it. Experimental results based on the extended Cloudsim show that the proposed approach not only guarantees cloud service reliability, but also consumes fewer network and storage resources than other approaches.", "title": "" }, { "docid": "69cca12d008d18e8516460c211beca50", "text": "This paper discusses the effective coding of Rijndael algorithm, Advanced Encryption Standard (AES) in Hardware Description Language, Verilog. In this work we analyze the structure and design of new AES, following three criteria: a) resistance against all known attacks; b) speed and code compactness on a wide range of platforms; and c) design simplicity; as well as its similarities and dissimilarities with other symmetric ciphers. On the other side, the principal advantages of new AES with respect to DES, as well as its limitations, are investigated. Thus, for example, the fact that the new cipher and its inverse use different components, which practically eliminates the possibility for weak and semi-weak keys, as existing for DES, and the non-linearity of the key expansion, which practically eliminates the possibility of equivalent keys, are two of the principal advantages of new cipher. Finally, the implementation aspects of Rijndael cipher and its inverse are treated. Thus, although Rijndael is well suited to be implemented efficiently on a wide range of processors and in dedicated hardware, we have concentrated our study on 8-bit processors, typical for current Smart Cards and on 32-bit processors, typical for PCs.", "title": "" }, { "docid": "ed9a851d10d73d7944221ee73a68f685", "text": "Clustering is an important data mining task Data mining often concerns large and high dimensional data but unfortunately most of the clustering algorithms in the literature are sensitive to largeness or high dimensionality or both Di erent features a ect clusters di erently some are important for clusters while others may hinder the clustering task An e cient way of handling it is by selecting a subset of important features It helps in nding clusters e ciently understanding the data better and reducing data size for e cient storage collection and process ing The task of nding original important features for unsupervised data is largely untouched Traditional feature selection algorithms work only for supervised data where class information is available For unsuper vised data without class information often principal components PCs are used but PCs still require all features and they may be di cult to understand Our approach rst features are ranked according to their importance on clustering and then a subset of important features are selected For large data we use a scalable method using sampling Em pirical evaluation shows the e ectiveness and scalability of our approach for benchmark and synthetic data sets", "title": "" }, { "docid": "d950407cfcbc5457b299e05c8352107e", "text": "Pedicle screw instrumentation in AIS has advantages of rigid fixation, improved deformity correction and a shorter fusion, but needs an exacting technique. The author has been using the K-wire method with intraoperative single PA and lateral radiographs, because it is safe, accurate and fast. Pedicle screws are inserted in every segment on the correction side (thoracic concave) and every 2–3 on the supportive side (thoracic convex). After an over-bent rod is inserted on the corrective side, the rod is rotated 90° counterclockwise. This maneuver corrects the coronal and sagittal curves. Then the vertebra is derotated by direct vertebral rotation (DVR) correcting the rotational deformity. The direction of DVR should be opposite to that of the vertebral rotation. A rigid rod has to be used to prevent the rod from straightening out during the rod derotation and DVR. The ideal classification of AIS should address all curve patterns, predicts accurate fusion extent and have good inter/intraobserver reliability. The Suk classification matches the ideal classification is simple and memorable, and has only four structural curve patterns; single thoracic, double thoracic, double major and thoracolumbar/lumbar. Each curve has two types, A and B. When using pedicle screws in thoracic AIS, curves are usually fused from upper neutral to lower neutral vertebra. Identification of the end vertebra and the neutral vertebra is important in deciding the fusion levels and the direction of DVR. In lumbar AIS, fusion is performed from upper neutral vertebra to L3 or L4 depending on its curve types. Rod derotation and DVR using pedicle screw instrumentation give true three dimensional deformity correction in the treatment of AIS. Suk classification with these methods predicts exact fusion extent and is easy to understand and remember.", "title": "" }, { "docid": "2f26435b0c9d33f470e9d8fbe9176f5b", "text": "This paper presents an active dual-mode twisting actuation mechanism, which is an automatic transmission system based on twisted string actuation. This mechanism produces two different transmission ratios by adjusting the radius of a twisted string. Automatic mode switching between the two transmission ratios is implemented using an active control mechanism. Then, the effect of the proposed mechanism is derived via kinetic and kinematic analyses. Mathematical models of the twisted string are derived and a control algorithm for the mode transition is proposed. The performance of the proposed mechanism is experimentally verified using a prototype of the active dual-mode twisting actuator.", "title": "" }, { "docid": "f4b271c7ee8bfd9f8aa4d4cf84c4efd4", "text": "Today, and possibly for a long time to come, the full driving task is too complex an activity to be fully formalized as a sensing-acting robotics system that can be explicitly solved through model-based and learning-based approaches in order to achieve full unconstrained vehicle autonomy. Localization, mapping, scene perception, vehicle control, trajectory optimization, and higher-level planning decisions associated with autonomous vehicle development remain full of open challenges. This is especially true for unconstrained, real-world operation where the margin of allowable error is extremely small and the number of edge-cases is extremely large. Until these problems are solved, human beings will remain an integral part of the driving task, monitoring the AI system as it performs anywhere from just over 0% to just under 100% of the driving. The governing objectives of the MIT Autonomous Vehicle Technology (MIT-AVT) study are to (1) undertake large-scale real-world driving data collection that includes high-definition video to fuel the development of deep learning based internal and external perception systems, (2) gain a holistic understanding of how human beings interact with vehicle automation technology by integrating video data with vehicle state data, driver characteristics, mental models, and self-reported experiences with technology, and (3) identify how technology and other factors related to automation adoption and use can be improved in ways that save lives. In pursuing these objectives, we have instrumented 21 Tesla Model S and Model X vehicles, 2 Volvo S90 vehicles, 2 Range Rover Evoque, and 2 Cadillac CT6 vehicles for both long-term (over a year per driver) and medium term (one month per driver) naturalistic driving data collection. Furthermore, we are continually developing new methods for analysis of the massive-scale dataset collected from the instrumented vehicle fleet. The recorded data streams include IMU, GPS, CAN messages, and high-definition video streams of the driver face, the driver cabin, the forward roadway, and the instrument cluster (on select vehicles). The study is on-going and growing. To date, we have 99 participants, 11,846 days of participation, 405,807 miles, and 5.5 billion video frames. This paper presents the design of the study, the data collection hardware, the processing of the data, and the computer vision algorithms currently being used to extract actionable knowledge from the data. MIT Autonomous Vehicle", "title": "" }, { "docid": "e99eceb3072dc2798071fe9d65d30c3a", "text": "With the vast availability of traffic sensors from which traffic information can be derived, a lot of research effort has been devoted to developing traffic prediction techniques, which in turn improve route navigation, traffic regulation, urban area planning, etc. One key challenge in traffic prediction is how much to rely on prediction models that are constructed using historical data in real-time traffic situations, which may differ from that of the historical data and change over time. In this paper, we propose a novel online framework that could learn from the current traffic situation (or context) in real-time and predict the future traffic by matching the current situation to the most effective prediction model trained using historical data. As real-time traffic arrives, the traffic context space is adaptively partitioned in order to efficiently estimate the effectiveness of each base predictor in different situations. We obtain and prove both short-term and long-term performance guarantees (bounds) for our online algorithm. The proposed algorithm also works effectively in scenarios where the true labels (i.e., realized traffic) are missing or become available with delay. Using the proposed framework, the context dimension that is the most relevant to traffic prediction can also be revealed, which can further reduce the implementation complexity as well as inform traffic policy making. Our experiments with real-world data in real-life conditions show that the proposed approach significantly outperforms existing solutions.", "title": "" }, { "docid": "87dd019430e4345026b8de22f696c6e2", "text": "Although consumer research began focusing on emotional response to advertising during the 1980s (Goodstein, Edell, and Chapman Moore. 1990; Burke and Edell, 1989; Aaker, Stayman, and Vezina, 1988; Holbrook and Batra, 1988), perhaps one of the most practical measures of affective response has only recently emerged. Part of the difficulty in developing measures of emotional response stems from the complexity of emotion itself (Plummer and Leckenby, 1985). Researchers have explored several different measurement formats including: verbal self-reports (adjective checklists), physiological techniques, photodecks, and dial-turning instruments.", "title": "" }, { "docid": "d2268cd9a2ea751ea2080a4d86e32e17", "text": "Predicting panic is of critical importance in many areas of human and animal behavior, notably in the context of economics. The recent financial crisis is a case in point. Panic may be due to a specific external threat or self-generated nervousness. Here we show that the recent economic crisis and earlier large single-day panics were preceded by extended periods of high levels of market mimicry--direct evidence of uncertainty and nervousness, and of the comparatively weak influence of external news. High levels of mimicry can be a quite general indicator of the potential for self-organized crises.", "title": "" }, { "docid": "4bf2bf9480b4c40ae4ded35e26ccf585", "text": "Wireless Body Area Network (WBAN) is a modern technology having a wide-range of applications. Reliability is a key performance index for WBANs, especially for medical applications. An unreliable WBAN may severely affect the patient under observation. Main causes of unreliability are inefficient routing, low transmission range, body shadowing and environmental interference. We propose a Cross-Layer Opportunistic MAC/Routing (COMR) protocol that can improve the reliability by using a timer based approach for the relay selection mechanism. The value of this timer depends on Received Signal Strength Indicator (RSSI) and residual energy. The selected relay node will have the highest residual energy and will be closest to the sink as compared to other possible relay nodes. We evaluate the performance of the proposed mechanism in terms of network lifetime, Packet Delivery Ratio (PDR), End-To-End (ETE) delay, and energy used per bit. Results depict that COMR protocol shows improvement in terms of reliability, energy efficiency, ETE delay and network lifetime in a WBAN as compared to Simple Opportunistic Routing (SOR).", "title": "" }, { "docid": "4df436dcadb378a4ae72fe558267fddf", "text": "UNLABELLED\nPanic disorder refers to the frequent and recurring acute attacks of anxiety.\n\n\nOBJECTIVE\nThis study describes the routine use of mobiles phones (MPs) and investigates the appearance of possible emotional alterations or symptoms related to their use in patients with panic disorder (PD).\n\n\nBACKGROUND\nWe compared patients with PD and agoraphobia being treated at the Panic and Respiration Laboratory of The Institute of Psychiatry, Federal University of Rio de Janeiro, Brazil, to a control group of healthy volunteers.\n\n\nMETHODS\nAn MP-use questionnaire was administered to a consecutive sample of 50 patients and 70 controls.\n\n\nRESULTS\nPeople with PD showed significant increases in anxiety, tachycardia, respiratory alterations, trembling, perspiration, panic, fear and depression related to the lack of an MP compared to the control group.\n\n\nCONCLUSIONS\nBoth groups exhibited dependence on and were comforted by having an MP; however, people with PD and agoraphobia showed significantly more emotional alterations as well as intense physical and psychological symptoms when they were apart from or unable to use an MP compared to healthy volunteers.", "title": "" } ]
scidocsrr
e812b9932f6ea4a5009b9b03002da4e6
Linear Disentangled Representation Learning for Facial Actions
[ { "docid": "404a662b55baea9402d449fae6192424", "text": "Emotion is expressed in multiple modalities, yet most research has considered at most one or two. This stems in part from the lack of large, diverse, well-annotated, multimodal databases with which to develop and test algorithms. We present a well-annotated, multimodal, multidimensional spontaneous emotion corpus of 140 participants. Emotion inductions were highly varied. Data were acquired from a variety of sensors of the face that included high-resolution 3D dynamic imaging, high-resolution 2D video, and thermal (infrared) sensing, and contact physiological sensors that included electrical conductivity of the skin, respiration, blood pressure, and heart rate. Facial expression was annotated for both the occurrence and intensity of facial action units from 2D video by experts in the Facial Action Coding System (FACS). The corpus further includes derived features from 3D, 2D, and IR (infrared) sensors and baseline results for facial expression and action unit detection. The entire corpus will be made available to the research community.", "title": "" }, { "docid": "124a50c2e797ffe549e1591d5720acda", "text": "Temporal information has useful features for recognizing facial expressions. However, to manually design useful features requires a lot of effort. In this paper, to reduce this effort, a deep learning technique, which is regarded as a tool to automatically extract useful features from raw data, is adopted. Our deep network is based on two different models. The first deep network extracts temporal appearance features from image sequences, while the other deep network extracts temporal geometry features from temporal facial landmark points. These two models are combined using a new integration method in order to boost the performance of the facial expression recognition. Through several experiments, we show that the two models cooperate with each other. As a result, we achieve superior performance to other state-of-the-art methods in the CK+ and Oulu-CASIA databases. Furthermore, we show that our new integration method gives more accurate results than traditional methods, such as a weighted summation and a feature concatenation method.", "title": "" }, { "docid": "25b417a20e9ff8798d1ec74c8dec95ea", "text": "Many latent factors of variation interact to generate sensory data; for example, pose, morphology and expression in face images. In this work, we propose to learn manifold coordinates for the relevant factors of variation and to model their joint interaction. Many existing feature learning algorithms focus on a single task and extract features that are sensitive to the task-relevant factors and invariant to all others. However, models that just extract a single set of invariant features do not exploit the relationships among the latent factors. To address this, we propose a higher-order Boltzmann machine that incorporates multiplicative interactions among groups of hidden units that each learn to encode a distinct factor of variation. Furthermore, we propose correspondencebased training strategies that allow effective disentangling. Our model achieves state-of-the-art emotion recognition and face verification performance on the Toronto Face Database. We also demonstrate disentangled features learned on the CMU Multi-PIE dataset.", "title": "" } ]
[ { "docid": "c5b8c7fa8518595196aa48740578cb05", "text": "Control of complex systems involves both system identification and controller design. Deep neural networks have proven to be successful in many identification tasks, however, from model-based control perspective, these networks are difficult to work with because they are typically nonlinear and nonconvex. Therefore many systems are still identified and controlled based on simple linear models despite their poor representation capability. In this paper we bridge the gap between model accuracy and control tractability faced by neural networks, by explicitly constructing networks that are convex with respect to their inputs. We show that these input convex networks can be trained to obtain accurate models of complex physical systems. In particular, we design input convex recurrent neural networks to capture temporal behavior of dynamical systems. Then optimal controllers can be achieved via solving a convex model predictive control problem. Experiment results demonstrate the good potential of the proposed input convex neural network based approach in a variety of control applications. In particular we show that in the MuJoCo locomotion tasks, we could achieve over 10% higher performance using 5× less time compared with state-of-the-art model-based reinforcement learning method; and in the building HVAC control example, our method achieved up to 20% energy reduction compared with classic linear models.", "title": "" }, { "docid": "801a197f630189ab0a9b79d3cbfe904b", "text": "Historically, Vivaldi arrays are known to suffer from high cross-polarization when scanning in the nonprincipal planes—a fault without a universal solution. In this paper, a solution to this issue is proposed in the form of a new Vivaldi-type array with low cross-polarization termed the Sliced Notch Antenna (SNA) array. For the first proof-of-concept demonstration, simulations and measurements are comparatively presented for two single-polarized <inline-formula> <tex-math notation=\"LaTeX\">$19 \\times 19$ </tex-math></inline-formula> arrays—the proposed SNA and its Vivaldi counterpart—each operating over a 1.2–12 GHz (10:1) band. Both arrays are built using typical vertically integrated printed-circuit board cards, and are designed to exhibit VSWR < 2.5 within a 60° scan cone over most of the 10:1 band as infinite arrays. Measurement results compare very favorably with full-wave finite array simulations that include array truncation effects. The SNA array element demonstrates well-behaved polarization performance versus frequency, with more than 20 dB of D-plane <inline-formula> <tex-math notation=\"LaTeX\">$\\theta \\!=\\!45 {^{\\circ }}$ </tex-math></inline-formula> polarization purity improvement at the high frequency. Moreover, the SNA element also: 1) offers better suppression of classical Vivaldi E-plane scan blindnesses; 2) requires fewer plated through vias for stripline-based designs; and 3) allows relaxed adjacent element electrical contact requirements for dual-polarized arrangements.", "title": "" }, { "docid": "523fae58b0da2d96c2b3b126480d8302", "text": "Many online shopping malls in which explicit rating information is not available still have difficulty in providing recommendation services using collaborative filtering (CF) techniques for their users. Applying temporal purchase patterns derived from sequential pattern analysis (SPA) for recommendation services also often makes users unhappy with the inaccurate and biased results obtained by not considering individual preferences. The objective of this research is twofold. One is to derive implicit ratings so that CF can be applied to online transaction data even when no explicit rating information is available, and the other is to integrate CF and SPA for improving recommendation quality. Based on the results of several experiments that we conducted to compare the performance between ours and others, we contend that implicit rating can successfully replace explicit rating in CF and that the hybrid approach of CF and SPA is better than the individual ones. 2012 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "d94f4df63ac621d9a8dec1c22b720abb", "text": "Automatically selecting an appropriate set of materialized views and indexes for SQL databases is a non-trivial task. A judicious choice must be cost-driven and influenced by the workload experienced by the system. Although there has been work in materialized view selection in the context of multidimensional (OLAP) databases, no past work has looked at the problem of building an industry-strength tool for automated selection of materialized views and indexes for SQL workloads. In this paper, we present an end-to-end solution to the problem of selecting materialized views and indexes. We describe results of extensive experimental evaluation that demonstrate the effectiveness of our techniques. Our solution is implemented as part of a tuning wizard that ships with Microsoft SQL Server 2000.", "title": "" }, { "docid": "a61e2752a9a9d5d552fadf0eff73f9c6", "text": "The Canny edge detector is one of the most widely used edge detection algorithms due to its superior performance. Unfortunately, not only is it computationally more intensive as compared with other edge detection algorithms, but it also has a higher latency because it is based on frame-level statistics. In this paper, we propose a mechanism to implement the Canny algorithm at the block level without any loss in edge detection performance compared with the original frame-level Canny algorithm. Directly applying the original Canny algorithm at the block-level leads to excessive edges in smooth regions and to loss of significant edges in high-detailed regions since the original Canny computes the high and low thresholds based on the frame-level statistics. To solve this problem, we present a distributed Canny edge detection algorithm that adaptively computes the edge detection thresholds based on the block type and the local distribution of the gradients in the image block. In addition, the new algorithm uses a nonuniform gradient magnitude histogram to compute block-based hysteresis thresholds. The resulting block-based algorithm has a significantly reduced latency and can be easily integrated with other block-based image codecs. It is capable of supporting fast edge detection of images and videos with high resolutions, including full-HD since the latency is now a function of the block size instead of the frame size. In addition, quantitative conformance evaluations and subjective tests show that the edge detection performance of the proposed algorithm is better than the original frame-based algorithm, especially when noise is present in the images. Finally, this algorithm is implemented using a 32 computing engine architecture and is synthesized on the Xilinx Virtex-5 FPGA. The synthesized architecture takes only 0.721 ms (including the SRAM READ/WRITE time and the computation time) to detect edges of 512 × 512 images in the USC SIPI database when clocked at 100 MHz and is faster than existing FPGA and GPU implementations.", "title": "" }, { "docid": "8d6eeece3ef74afc5f33b984869d5a22", "text": "In order to mitigate air pollution problems caused mainly by the excessive emission of carbon dioxide, in 2012, the South Korean government decided to introduce a renewable portfolio standards (RPS) program that requires electricity providers to gradually increase their production of renewable energy. In order to meet the government’s target through this RPS program, electricity providers in Korea have looked to various types of new and renewable energy resources, such as biomass, wind, and solar. Recently, floating photovoltaic (PV) systems have attracted increased interest in Korea as a desirable renewable energy alternative. This paper provides a discussion of recent research into floating PV systems and the installation of floating PV power plants in Korea from 2009 to 2014. To date, thirteen floating PV power plants have been installed in Korea, and several plans are underway by many different organizations, including government-funded companies, to install more floating PV power plants with various generation capacities. These building trends are expected to continue due to the Korean government’s RPS program.", "title": "" }, { "docid": "a0c240efadc361ea36b441d34fc10a26", "text": "We describe a single-feed stacked patch antenna design that is capable of simultaneously receiving both right hand circularly polarized (RHCP) satellite signals within the GPS LI frequency band and left hand circularly polarized (LHCP) satellite signals within the SDARS frequency band. In addition, the design provides improved SDARS vertical linear polarization (VLP) gain for terrestrial repeater signal reception at low elevation angles as compared to a current state of the art SDARS patch antenna.", "title": "" }, { "docid": "6d21d5da7cd3bf0a52b57307831f08d2", "text": "This paper presents a broadband, dual-polarized base station antenna element by reasonably designing two orthogonal symmetrical dipole, four loading cylinders, balun, feed patches, specific shape reflector and plastic fasteners. Coupling feed is adopted to avoid the direct connection between the feed cables and the dipoles. The antenna element matches well in the frequency range of 1.7-2.7 GHz and the return loss (RL) S11<;-15 dB and the isolation S21<; -30 dB. Low cross-polarization, high front-back ratio (>25dB) and stable half-power beam width (HPBW) with 65±5° are also achieved. The proposed antenna element covers the whole long term evolution (LTE) band and is backward compatible with 3G and 2G bands.", "title": "" }, { "docid": "783cb476dd8d663f63dc079b7b943e0d", "text": "Temporal segmentation of human motion into actions is a crucial step for understanding and building computational models of human motion. Several issues contribute to the challenge of this task. These include the large variability in the temporal scale and periodicity of human actions, as well as the exponential nature of all possible movement combinations. We formulate the temporal segmentation problem as an extension of standard clustering algorithms. In particular, this paper proposes aligned cluster analysis (ACA), a robust method to temporally segment streams of motion capture data into actions. ACA extends standard kernel k-means clustering in two ways: (1) the cluster means contain a variable number of features, and (2) a dynamic time warping (DTW) kernel is used to achieve temporal invariance. Experimental results, reported on synthetic data and the Carnegie Mellon Motion Capture database, demonstrate its effectiveness.", "title": "" }, { "docid": "02c904c320db3a6e0fc9310f077f5d08", "text": "Rejuvenative procedures of the face are increasing in numbers, and a plethora of different therapeutic options are available today. Every procedure should aim for the patient's safety first and then for natural and long-lasting results. The face is one of the most complex regions in the human body and research continuously reveals new insights into the complex interplay of the different participating structures. Bone, ligaments, muscles, fat, and skin are the key players in the layered arrangement of the face.Aging occurs in all involved facial structures but the onset and the speed of age-related changes differ between each specific structure, between each individual, and between different ethnic groups. Therefore, knowledge of age-related anatomy is crucial for a physician's work when trying to restore a youthful face.This review focuses on the current understanding of the anatomy of the human face and tries to elucidate the morphological changes during aging of bone, ligaments, muscles, and fat, and their role in rejuvenative procedures.", "title": "" }, { "docid": "65471409c1e2580b657b5fc1fe92fc84", "text": "Bioinspiration in robotics deals with applying biological principles to the design of better performing devices. In this article, we propose a novel bioinspired framework using motor primitives for locomotion assistance through a wearable cooperative exoskeleton. In particular, the use of motor primitives for assisting different locomotion modes (i.e., ground-level walking at several cadences and ascending and descending stairs) is explored by means of two different strategies. In the first strategy, identified motor primitives are combined through weights to directly produce the desired assistive torque profiles. In the second strategy, identified motor primitives are combined to serve as neural stimulations to a virtual model of the musculoskeletal system, which, in turn, produces the desired assistive torque profiles.", "title": "" }, { "docid": "ea926e7245c74d1fde2661434262bf12", "text": "Article history: Received 16 November 2010 Received in revised form 2 June 2011 Accepted 23 July 2011 Available online 6 August 2011", "title": "" }, { "docid": "db65e9771d00293e21fe96c99a4896c5", "text": "Synthesizing SQL queries from natural language is a long-standing open problem and has been attracting considerable interest recently. Toward solving the problem, the de facto approach is to employ a sequence-to-sequence-style model. Such an approach will necessarily require the SQL queries to be serialized. Since the same SQL query may have multiple equivalent serializations, training a sequenceto-sequence-style model is sensitive to the choice from one of them. This phenomenon is documented as the “order-matters” problem. Existing state-of-the-art approaches rely on reinforcement learning to reward the decoder when it generates any of the equivalent serializations. However, we observe that the improvement from reinforcement learning is limited. In this paper, we propose a novel approach, i.e., SQLNet, to fundamentally solve this problem by avoiding the sequence-to-sequence structure when the order does not matter. In particular, we employ a sketch-based approach where the sketch contains a dependency graph so that one prediction can be done by taking into consideration only the previous predictions that it depends on. In addition, we propose a sequence-to-set model as well as the column attention mechanism to synthesize the query based on the sketch. By combining all these novel techniques, we show that SQLNet can outperform the prior art by 9% to 13% on the WikiSQL task.", "title": "" }, { "docid": "ac843bd6a18025bb2cac3002dfb6f811", "text": "For more efficient photoelectrochemical water splitting, there is a dilemma that a photoelectrode needs both light absorption and electrocatalytic faradaic reaction. One of the promising strategies is to deposit a pattern of electrocatalysts onto a semiconductor surface, leaving sufficient bare surface for light absorption while minimizing concentration overpotential as well as resistive loss at the ultramicroelectrodes for faradaic reaction. This scheme can be successfully realized by \"maskless\" direct photoelectrochemical patterning of electrocatalyst onto an SiOx/amorphous Si (a-Si) surface by the light-guided electrodeposition technique. Electrochemical impedance spectroscopy at various pHs tells us much about how it works. The surface states at the SiOx/a-Si interface can mediate the photogenerated electrons for hydrogen evolution, whereas electroactive species in the solution undergo outer-sphere electron transfer, taking electrons tunneling across the SiOx layer from the conduction band. In addition to previously reported long-distance lateral electron transport behavior at a patterned catalyst/SiOx/a-Si interface, the charging process of the surface states plays a crucial role in proton reduction, leading to deeper understanding of the operation mechanisms for photoelectrochemical water splitting.", "title": "" }, { "docid": "e37276916d5f8682b104448489efbfc6", "text": "With the spurt in usage of smart devices, large amounts of unstructured text is generated by numerous social media tools. This text is often filled with stylistic or linguistic variations making the text analytics using traditional machine learning tools to be less effective. One of the specific problem in Indian context is to deal with large number of languages used by social media users in their roman form. As part of FIRE-2015 shared task on mixed script information retrieval, we address the problem of word level language identification. Our approach consists of a two stage algorithm for language identification. First level classification is done using sentence level character n-grams and second level consists of word level character n-grams based classifier. This approach effectively captures the linguistic mode of author in social texting enviroment. The overall weighted F-Score for the run submitted to FIRE Shared task is 0.7692. The sentence level classification algorithm which is used in achiving this result has an accuracy of 0.6887. We could further improve the accuracy of sentence level classifier further by 1.6% using additional social media text crawled from other sources. Naive Bayes classifier showed largest improvement (5.5%) in accuracy level by the addition of supplementary tuples. We also observed that using semi-supervised learning algorithm such as Expectation Maximization with Naive Bayes, the accuracy could be improved to 0.7977.", "title": "" }, { "docid": "bc110bfad28a199a6fb9ad816e9660ea", "text": "This paper presents an improvement of a previously proposed pitch determination algorithm (PDA). Particularly aiming at handling alternate cycles in speech signal, the algorithm estimates pitch through spectrum shifting on logarithmic frequency scale and calculating the Subharmonic-to-Harmonic Ratio (SHR). The evaluation results on two databases show that this algorithm performs considerably better than other PDAs compared. Application of SHR to voice quality analysis task is also presented. The implementation and evaluation routines are available from &#60;http://mel.speech.nwu.edu/sunxj/pda.htm>.", "title": "" }, { "docid": "762a9c96acdadb1d133102cd014c3c95", "text": "In the domain of multiprocessor real-time systems, there has been a wealth of recent work on scheduling, but relatively little work on the equally-important topic of synchronization. When synchronizing accesses to shared resources, four basic options exist: lock-free execution, wait-free execution, spin- based locking, and suspension-based locking. To our knowledge, no empirical multiprocessor-based evaluation of these basic techniques that focuses on real-time systems has ever been conducted before. In this paper, we present such an evaluation and report on our efforts to incorporate synchronization support in the testbed used in this effort.", "title": "" }, { "docid": "836c51ed5c9ef5e432498684996f4eb5", "text": "This paper presents a system that compositionally maps outputs of a wide-coverage Japanese CCG parser onto semantic representations and performs automated inference in higher-order logic. The system is evaluated on a textual entailment dataset. It is shown that the system solves inference problems that focus on a variety of complex linguistic phenomena, including those that are difficult to represent in the standard first-order logic.", "title": "" }, { "docid": "afe0c431852191bc2316d1c5091f239b", "text": "Dynamic models of pneumatic artificial muscles (PAMs) are important for simulation of the movement dynamics of the PAM-based actuators and also for their control. The simple models of PAMs are geometric models, which can be relatively easy used under certain simplification for obtaining of the static and dynamic characteristics of the pneumatic artificial muscle. An advanced geometric muscle model is used in paper for describing the dynamic behavior of PAM based antagonistic actuator.", "title": "" }, { "docid": "b0bcd65de1841474dba09e9b1b5c2763", "text": "Modern web clickstream data consists of long, high-dimensional sequences of multivariate events, making it difficult to analyze. Following the overarching principle that the visual interface should provide information about the dataset at multiple levels of granularity and allow users to easily navigate across these levels, we identify four levels of granularity in clickstream analysis: patterns, segments, sequences and events. We present an analytic pipeline consisting of three stages: pattern mining, pattern pruning and coordinated exploration between patterns and sequences. Based on this approach, we discuss properties of maximal sequential patterns, propose methods to reduce the number of patterns and describe design considerations for visualizing the extracted sequential patterns and the corresponding raw sequences. We demonstrate the viability of our approach through an analysis scenario and discuss the strengths and limitations of the methods based on user feedback.", "title": "" } ]
scidocsrr
5d2571d1d08ae27e52fafebc7a084d10
Semantically Consistent Regularization for Zero-Shot Recognition
[ { "docid": "bcb756857adef42264eab0f1361f8be7", "text": "The problem of multi-class boosting is considered. A new fra mework, based on multi-dimensional codewords and predictors is introduced . The optimal set of codewords is derived, and a margin enforcing loss proposed. The resulting risk is minimized by gradient descent on a multidimensional functi onal space. Two algorithms are proposed: 1) CD-MCBoost, based on coordinate des cent, updates one predictor component at a time, 2) GD-MCBoost, based on gradi ent descent, updates all components jointly. The algorithms differ in the w ak learners that they support but are both shown to be 1) Bayes consistent, 2) margi n enforcing, and 3) convergent to the global minimum of the risk. They also red uce to AdaBoost when there are only two classes. Experiments show that both m et ods outperform previous multiclass boosting approaches on a number of data sets.", "title": "" }, { "docid": "a81b08428081cd15e7c705d5a6e79a6f", "text": "Attributes act as intermediate representations that enable parameter sharing between classes, a must when training data is scarce. We propose to view attribute-based image classification as a label-embedding problem: each class is embedded in the space of attribute vectors. We introduce a function that measures the compatibility between an image and a label embedding. The parameters of this function are learned on a training set of labeled samples to ensure that, given an image, the correct classes rank higher than the incorrect ones. Results on the Animals With Attributes and Caltech-UCSD-Birds datasets show that the proposed framework outperforms the standard Direct Attribute Prediction baseline in a zero-shot learning scenario. Label embedding enjoys a built-in ability to leverage alternative sources of information instead of or in addition to attributes, such as, e.g., class hierarchies or textual descriptions. Moreover, label embedding encompasses the whole range of learning settings from zero-shot learning to regular learning with a large number of labeled examples.", "title": "" }, { "docid": "285cd651dd4c32671df5a002c5011c49", "text": "Due to the dramatic expanse of data categories and the lack of labeled instances, zero-shot learning, which transfers knowledge from observed classes to recognize unseen classes, has started drawing a lot of attention from the research community. In this paper, we propose a semi-supervised max-margin learning framework that integrates the semisupervised classification problem over observed classes and the unsupervised clustering problem over unseen classes together to tackle zero-shot multi-class classification. By further integrating label embedding into this framework, we produce a dual formulation that permits convenient incorporation of auxiliary label semantic knowledge to improve zero-shot learning. We conduct extensive experiments on three standard image data sets to evaluate the proposed approach by comparing to two state-of-the-art methods. Our results demonstrate the efficacy of the proposed framework.", "title": "" }, { "docid": "9bb8a69b500d7d3ab5299262c8f17726", "text": "Collecting training images for all visual categories is not only expensive but also impractical. Zero-shot learning (ZSL), especially using attributes, offers a pragmatic solution to this problem. However, at test time most attribute-based methods require a full description of attribute associations for each unseen class. Providing these associations is time consuming and often requires domain specific knowledge. In this work, we aim to carry out attribute-based zero-shot classification in an unsupervised manner. We propose an approach to learn relations that couples class embeddings with their corresponding attributes. Given only the name of an unseen class, the learned relationship model is used to automatically predict the class-attribute associations. Furthermore, our model facilitates transferring attributes across data sets without additional effort. Integrating knowledge from multiple sources results in a significant additional improvement in performance. We evaluate on two public data sets: Animals with Attributes and aPascal/aYahoo. Our approach outperforms state-of the-art methods in both predicting class-attribute associations and unsupervised ZSL by a large margin.", "title": "" } ]
[ { "docid": "62bf93deeb73fab74004cb3ced106bac", "text": "Since the publication of the Design Patterns book, a large number of object-oriented design patterns have been identified and codified. As part of the pattern form, objectoriented design patterns must indicate their relationships with other patterns, but these relationships are typically described very briefly, and different collections of patterns describe different relationships in different ways. In this paper we describe and classify the common relationships between object oriented design patterns. Practitioners can use these relationships to help them identity those patterns which may be applicable to a particular problem, and pattern writers can use these relationships to help them integrate new patterns into the body of the patterns literature.", "title": "" }, { "docid": "a456e0d4a421fbae34cbbb3ca6217fa1", "text": "Software-Defined Networking (SDN) is an emerging network architecture, centralized in the SDN controller entity, that decouples the control plane from the data plane. This controller-based solution allows programmability, and dynamic network reconfigurations, providing decision taking with global knowledge of the network. Currently, there are more than thirty SDN controllers with different features, such as communication protocol version, programming language, and architecture. Beyond that, there are also many studies about controller performance with the goal to identify the best one. However, some conclusions have been unjust because benchmark tests did not follow the same methodology, or controllers were not in the same category. Therefore, a standard benchmark methodology is essential to compare controllers fairly. The standardization can clarify and help us to understand the real behavior and weaknesses of an SDN controller. The main goal of this work-in-progress is to show existing benchmark methodologies, bringing a discussion about the need SDN controller benchmark standardization.", "title": "" }, { "docid": "d6e565c0123049b9e11692b713674ccf", "text": "Now days many research is going on for text summari zation. Because of increasing information in the internet, these kind of research are gaining more a nd more attention among the researchers. Extractive text summarization generates a brief summary by extracti ng proper set of sentences from a document or multi ple documents by deep learning. The whole concept is to reduce or minimize the important information prese nt in the documents. The procedure is manipulated by Rest rict d Boltzmann Machine (RBM) algorithm for better efficiency by removing redundant sentences. The res tricted Boltzmann machine is a graphical model for binary random variables. It consist of three layers input, hidden and output layer. The input data uni formly distributed in the hidden layer for operation. The experimentation is carried out and the summary is g enerated for three different document set from different kno wledge domain. The f-measure value is the identifie r to the performance of the proposed text summarization meth od. The top responses of the three different knowle dge domain in accordance with the f-measure are 0.85, 1 .42 and 1.97 respectively for the three document se t.", "title": "" }, { "docid": "888e8f68486c08ffe538c46ba76de85c", "text": "Neural ranking models for information retrieval (IR) use shallow or deep neural networks to rank search results in response to a query. Traditional learning to rank models employ machine learning techniques over hand-crafted IR features. By contrast, neural models learn representations of language from raw text that can bridge the gap between query and document vocabulary. Unlike classical IR models, these new machine learning based approaches are data-hungry, requiring large scale training data before they can be deployed. This tutorial introduces basic concepts and intuitions behind neural IR models, and places them in the context of traditional retrieval models. We begin by introducing fundamental concepts of IR and different neural and non-neural approaches to learning vector representations of text. We then review shallow neural IR methods that employ pre-trained neural term embeddings without learning the IR task end-to-end. We introduce deep neural networks next, discussing popular deep architectures. Finally, we review the current DNN models for information retrieval. We conclude with a discussion on potential future directions for neural IR.", "title": "" }, { "docid": "01490975c291a64b40484f6d37ea1c94", "text": "Context-aware systems offer entirely new opportunities for application developers and for end users by gathering context data and adapting systems’ behavior accordingly. Especially in combination with mobile devices such mechanisms are of great value and claim to increase usability tremendously. In this paper, we present a layered architectural framework for context-aware systems. Based on our suggested framework for analysis, we introduce various existing context-aware systems focusing on context-aware middleware and frameworks, which ease the development of context-aware applications. We discuss various approaches and analyze important aspects in context-aware computing on the basis of the presented systems.", "title": "" }, { "docid": "7af90ba25ca20b64e02e2674d408d395", "text": "We present a search engine for mathematical formulae. The MathWebSearch system harvests the web for content representations (currently MathML and OpenMath) of formulae and indexes them with substitution tree indexing, a technique originally developed for accessing intermediate results in automated theorem provers. For querying, we present a generic language extension approach that allows constructing queries by minimally annotating existing representations. First experiments show that this architecture results in a scalable application.", "title": "" }, { "docid": "044de981e34f0180accfb799063a7ec1", "text": "This paper proposes a novel hybrid full-bridge three-level LLC resonant converter. It integrates the advantages of the hybrid full-bridge three-level converter and the LLC resonant converter. It can operate not only under three-level mode but also under two-level mode, so it is very suitable for wide input voltage range application, such as fuel cell power system. The input current ripple and output filter can also be reduced. Three-level leg switches just sustain only half of the input voltage. ZCS is achieved for the rectifier diodes, and the voltage stress across the rectifier diodes can be minimized to the output voltage. The main switches can realize ZVS from zero to full load. A 200-400 V input, 360 V/4 A output prototype converter is built in our lab to verify the operation principle of the proposed converter", "title": "" }, { "docid": "848d80584211c6a4f69ad20ffea21ecf", "text": "This study develops a MEMS-based low-cost sensing platform for sensing gas flow rate and flow direction comprising four silicon nitride cantilever beams arranged in a cross-form configuration, a circular hot-wire flow meter suspended on a silicon nitride membrane, and an integrated resistive temperature detector (RTD). In the proposed device, the flow rate is inversely derived from the change in the resistance signal of the flow meter when exposed to the sensed air stream. To compensate for the effects of the ambient temperature on the accuracy of the flow rate measurements, the output signal from the flow meter is compensated using the resistance signal generated by the RTD. As air travels over the surface of the cross-form cantilever structure, the upstream cantilevers are deflected in the downward direction, while the downstream cantilevers are deflected in the upward direction. The deflection of the cantilever beams causes a corresponding change in the resistive signals of the piezoresistors patterned on their upper surfaces. The amount by which each beam deflects depends on both the flow rate and the orientation of the beam relative to the direction of the gas flow. Thus, following an appropriate compensation by the temperature-corrected flow rate, the gas flow direction can be determined through a suitable manipulation of the output signals of the four piezoresistors. The experimental results have confirmed that the resulting variation in the output signals of the integrated sensors can be used to determine not only the ambient temperature and the velocity of the air flow, but also its direction relative to the sensor with an accuracy of ± 7.5° error.", "title": "" }, { "docid": "a6ea435c346d2d3051d1fc31db59ca35", "text": "As news reading on social media becomes more and more popular, fake news becomes a major issue concerning the public and government. The fake news can take advantage of multimedia content to mislead readers and get dissemination, which can cause negative effects or even manipulate the public events. One of the unique challenges for fake news detection on social media is how to identify fake news on newly emerged events. Unfortunately, most of the existing approaches can hardly handle this challenge, since they tend to learn event-specific features that can not be transferred to unseen events. In order to address this issue, we propose an end-to-end framework named Event Adversarial Neural Network (EANN), which can derive event-invariant features and thus benefit the detection of fake news on newly arrived events. It consists of three main components: the multi-modal feature extractor, the fake news detector, and the event discriminator. The multi-modal feature extractor is responsible for extracting the textual and visual features from posts. It cooperates with the fake news detector to learn the discriminable representation for the detection of fake news. The role of event discriminator is to remove the event-specific features and keep shared features among events. Extensive experiments are conducted on multimedia datasets collected from Weibo and Twitter. The experimental results show our proposed EANN model can outperform the state-of-the-art methods, and learn transferable feature representations.", "title": "" }, { "docid": "45db5ab7ceac7156da713d19d5576598", "text": "The development of user interface systems has languished with the stability of desktop computing. Future systems, however, that are off-the-desktop, nomadic or physical in nature will involve new devices and new software systems for creating interactive applications. Simple usability testing is not adequate for evaluating complex systems. The problems with evaluating systems work are explored and a set of criteria for evaluating new UI systems work is presented.", "title": "" }, { "docid": "7b79b0643dfb779bb0d3a8eb852bdd9e", "text": "Traditionally, the document summarisation task has been tackled either as a natural language processing problem, with an instantiated meaning template being rendered into coherent prose, or as a passage extraction problem, where certain fragments (typically sentences) of the source document are deemed to be highly representative of its content, and thus delivered as meaningful “approximations” of it. Balancing the conflicting requirements of depth and accuracy of a summary, on the one hand, and document and domain independence, on the other, has proven a very hard problem. This paper describes a novel approach to content characterisation of text documents. It is domainand genre-independent, by virtue of not requiring an in-depth analysis of the full meaning. At the same time, it remains closer to the core meaning by choosing a different granularity of its representations (phrasal expressions rather than sentences or paragraphs), by exploiting a notion of discourse contiguity and coherence for the purposes of uniform coverage and context maintenance, and by utilising a strong linguistic notion of salience, as a more appropriate and representative measure of a document’s “aboutness”.", "title": "" }, { "docid": "a214ed60c288762210189f14a8cf8256", "text": "We propose a CNN-based approach for 3D human body pose estimation from single RGB images that addresses the issue of limited generalizability of models trained solely on the starkly limited publicly available 3D pose data. Using only the existing 3D pose data and 2D pose data, we show state-of-the-art performance on established benchmarks through transfer of learned features, while also generalizing to in-the-wild scenes. We further introduce a new training set for human body pose estimation from monocular images of real humans that has the ground truth captured with a multi-camera marker-less motion capture system. It complements existing corpora with greater diversity in pose, human appearance, clothing, occlusion, and viewpoints, and enables an increased scope of augmentation. We also contribute a new benchmark that covers outdoor and indoor scenes, and demonstrate that our 3D pose dataset shows better in-the-wild performance than existing annotated data, which is further improved in conjunction with transfer learning from 2D pose data. All in all, we argue that the use of transfer learning of representations in tandem with algorithmic and data contributions is crucial for general 3D body pose estimation.", "title": "" }, { "docid": "fe77670a01f93c3192c6760e46bbab46", "text": "Group recommendation has attracted significant research efforts for its importance in benefiting a group of users. This paper investigates the Group Recommendation problem from a novel aspect, which tries to maximize the satisfaction of each group member while minimizing the unfairness between them. In this work, we present several semantics of the individual utility and propose two concepts of social welfare and fairness for modeling the overall utilities and the balance between group members. We formulate the problem as a multiple objective optimization problem and show that it is NP-Hard in different semantics. Given the multiple-objective nature of fairness-aware group recommendation problem, we provide an optimization framework for fairness-aware group recommendation from the perspective of Pareto Efficiency. We conduct extensive experiments on real-world datasets and evaluate our algorithm in terms of standard accuracy metrics. The results indicate that our algorithm achieves superior performances and considering fairness in group recommendation can enhance the recommendation accuracy.", "title": "" }, { "docid": "7eff2743d36414e3f008be72598bfd8e", "text": "BACKGROUND\nPsychiatry has been consistently shown to be a profession characterised by 'high-burnout'; however, no nationwide surveys on this topic have been conducted in Japan.\n\n\nAIMS\nThe objective of this study was to estimate the prevalence of burnout and to ascertain the relationship between work environment satisfaction, work-life balance satisfaction and burnout among psychiatrists working in medical schools in Japan.\n\n\nMETHOD\nWe mailed anonymous questionnaires to all 80 psychiatry departments in medical schools throughout Japan. Work-life satisfaction, work-environment satisfaction and social support assessments, as well as the Maslach Burnout Inventory (MBI), were used.\n\n\nRESULTS\nSixty psychiatric departments (75.0%) responded, and 704 psychiatrists provided answers to the assessments and MBI. Half of the respondents (n = 311, 46.0%) experienced difficulty with their work-life balance. Based on the responses to the MBI, 21.0% of the respondents had a high level of emotional exhaustion, 12.0% had a high level of depersonalisation, and 72.0% had a low level of personal accomplishment. Receiving little support, experiencing difficulty with work-life balance, and having less work-environment satisfaction were significantly associated with higher emotional exhaustion. A higher number of nights worked per month was significantly associated with higher depersonalisation.\n\n\nCONCLUSIONS\nA low level of personal accomplishment was quite prevalent among Japanese psychiatrists compared with the results of previous studies. Poor work-life balance was related to burnout, and social support was noted to mitigate the impact of burnout.", "title": "" }, { "docid": "f6e60500973da7e3078b9b975b5aa774", "text": "UNLABELLED\nIt has been argued that internal hemipelvectomy without reconstruction of the pelvic ring leads to poor ambulation and inferior patient acceptance. To determine the accuracy of this contention, we posed the following questions: First, how effectively does a typical patient ambulate following this procedure? Second, what is the typical functional capacity of a patient following internal hemipelvectomy? In the spring of 2006, we obtained video documentation of eight patients who had undergone resection arthroplasty of the hemipelvis seen in our clinic during routine clinical followup. The minimum followup in 2006 was 1.1 years (mean, 8.2 years; range, 1.1-22.7 years); at the time of last followup in 2008 the minimum followup was 2.9 years (mean, 9.8 years; range, 2.9-24.5 years). At last followup seven of the eight patients were without pain, and were able to walk without supports. The remaining patient used narcotic medication and a cane or crutch only occasionally. The mean MSTS score at the time of most recent followup was 73.3% of normal (range 53.3-80.0%; mean raw score was 22.0; range 16-24). All eight patients ultimately returned to gainful employment. These observations demonstrate independent painless ambulation and acceptable function is possible following resection arthroplasty of the hemipelvis.\n\n\nLEVEL OF EVIDENCE\nLevel IV, case series. See Guidelines for Authors for a complete description of levels of evidence.", "title": "" }, { "docid": "b1823c456360037d824614a6cf4eceeb", "text": "This paper provides an overview of the Industrial Internet with the emphasis on the architecture, enabling technologies, applications, and existing challenges. The Industrial Internet is enabled by recent rising sensing, communication, cloud computing, and big data analytic technologies, and has been receiving much attention in the industrial section due to its potential for smarter and more efficient industrial productions. With the merge of intelligent devices, intelligent systems, and intelligent decisioning with the latest information technologies, the Industrial Internet will enhance the productivity, reduce cost and wastes through the entire industrial economy. This paper starts by investigating the brief history of the Industrial Internet. We then present the 5C architecture that is widely adopted to characterize the Industrial Internet systems. Then, we investigate the enabling technologies of each layer that cover from industrial networking, industrial intelligent sensing, cloud computing, big data, smart control, and security management. This provides the foundations for those who are interested in understanding the essence and key enablers of the Industrial Internet. Moreover, we discuss the application domains that are gradually transformed by the Industrial Internet technologies, including energy, health care, manufacturing, public section, and transportation. Finally, we present the current technological challenges in developing Industrial Internet systems to illustrate open research questions that need to be addressed to fully realize the potential of future Industrial Internet systems.", "title": "" }, { "docid": "872f224c2dbf06a335eee267bac4ec79", "text": "Shallow supervised 1-hidden layer neural networks have a number of favorable properties that make them easier to interpret, analyze, and optimize than their deep counterparts, but lack their representational power. Here we use 1-hidden layer learning problems to sequentially build deep networks layer by layer, which can inherit properties from shallow networks. Contrary to previous approaches using shallow networks, we focus on problems where deep learning is reported as critical for success. We thus study CNNs on two large-scale image recognition tasks: ImageNet and CIFAR-10. Using a simple set of ideas for architecture and training we find that solving sequential 1-hidden-layer auxiliary problems leads to a CNN that exceeds AlexNet performance on ImageNet. Extending our training methodology to construct individual layers by solving 2-and-3-hidden layer auxiliary problems, we obtain an 11-layer network that exceeds VGG-11 on ImageNet obtaining 89.8% top-5 single crop.To our knowledge, this is the first competitive alternative to end-to-end training of CNNs that can scale to ImageNet. We conduct a wide range of experiments to study the properties this induces on the intermediate layers.", "title": "" }, { "docid": "7a202dfa59cb8c50a6999fe8a50895a9", "text": "The process for transferring knowledge of multiple reinforcement learning policies into a single multi-task policy via distillation technique is known as policy distillation. When policy distillation is under a deep reinforcement learning setting, due to the giant parameter size and the huge state space for each task domain, it requires extensive computational efforts to train the multi-task policy network. In this paper, we propose a new policy distillation architecture for deep reinforcement learning, where we assume that each task uses its taskspecific high-level convolutional features as the inputs to the multi-task policy network. Furthermore, we propose a new sampling framework termed hierarchical prioritized experience replay to selectively choose experiences from the replay memories of each task domain to perform learning on the network. With the above two attempts, we aim to accelerate the learning of the multi-task policy network while guaranteeing a good performance. We use Atari 2600 games as testing environment to demonstrate the efficiency and effectiveness of our proposed solution for policy distillation.", "title": "" }, { "docid": "de668bf99b307f96580e294f7e58afcf", "text": "Sliding window is one direct way to extend a successful recognition system to handle the more challenging detection problem. While action recognition decides only whether or not an action is present in a pre-segmented video sequence, action detection identifies the time interval where the action occurred in an unsegmented video stream. Sliding window approaches for action detection can however be slow as they maximize a classifier score over all possible sub-intervals. Even though new schemes utilize dynamic programming to speed up the search for the optimal sub-interval, they require offline processing on the whole video sequence. In this paper, we propose a novel approach for online action detection based on 3D skeleton sequences extracted from depth data. It identifies the sub-interval with the maximum classifier score in linear time. Furthermore, it is invariant to temporal scale variations and is suitable for real-time applications with low latency.", "title": "" }, { "docid": "255f4d19d89e9ff7acb6cca900fe9ed6", "text": "Objectives: Burnout syndrome (B.S.) affects millions of workers around the world, having a significant impact on their quality of life and the services they provide. It’s a psycho-social phenomenon, which can be handled through emotional management and psychological help. Emotional Intelligence (E.I) is very important to emotional management. This paper aims to investigate the relationship between Burnout syndrome and Emotional Intelligence in health professionals occupied in the sector of rehabilitation. Methods: The data were collected from a sample of 148 healthcare professionals, workers in the field of rehabilitation, who completed Maslach Burnout Inventory questionnaire, Trait Emotional Intelligence Que-Short Form questionnaire and a questionnaire collecting demographic data as well as personal and professional information. Simple linear regression and multiple regression analyses were conducted to analyze the data. Results: The results indicated that there is a positive relationship between Emotional Intelligence and Burnout syndrome as Emotional Intelligence acts protectively against Burnout syndrome and even reduces it. In particular, it was found that the higher the Emotional Intelligence, the lower the Burnout syndrome. Also, among all factors of Emotional Intelligence, “Emotionality”, seems to influence Burnout syndrome the most, as, the higher the rate of Emotionality, the lower the rate of Burnout. At the same time, evidence was found on the variability of Burnout syndrome through various models of explanation and correlation between Burnout syndrome and Emotional Intelligence and also, Burnout syndrome and Emotional Intelligence factors. Conclusion: Employers could focus on building emotional relationships with their employees, especially in the health care field. Furthermore, they could also promote some experimental seminars, sponsored by public or private institutions, in order to enhance Emotional Intelligence and to improve the workers’ quality of life and the quality of services they provide.", "title": "" } ]
scidocsrr
72421606941910464582042677d9730c
Role of Dopamine Receptors in ADHD: A Systematic Meta-analysis
[ { "docid": "39a25e2a4b3e4d56345d0e268d4a1cb1", "text": "OBJECTIVE\nAttention deficit hyperactivity disorder is a heterogeneous disorder of unknown etiology. Little is known about the comorbidity of this disorder with disorders other than conduct. Therefore, the authors made a systematic search of the psychiatric and psychological literature for empirical studies dealing with the comorbidity of attention deficit hyperactivity disorder with other disorders.\n\n\nDATA COLLECTION\nThe search terms included hyperactivity, hyperkinesis, attention deficit disorder, and attention deficit hyperactivity disorder, cross-referenced with antisocial disorder (aggression, conduct disorder, antisocial disorder), depression (depression, mania, depressive disorder, bipolar), anxiety (anxiety disorder, anxiety), learning problems (learning, learning disability, academic achievement), substance abuse (alcoholism, drug abuse), mental retardation, and Tourette's disorder.\n\n\nFINDINGS\nThe literature supports considerable comorbidity of attention deficit hyperactivity disorder with conduct disorder, oppositional defiant disorder, mood disorders, anxiety disorders, learning disabilities, and other disorders, such as mental retardation, Tourette's syndrome, and borderline personality disorder.\n\n\nCONCLUSIONS\nSubgroups of children with attention deficit hyperactivity disorder might be delineated on the basis of the disorder's comorbidity with other disorders. These subgroups may have differing risk factors, clinical courses, and pharmacological responses. Thus, their proper identification may lead to refinements in preventive and treatment strategies. Investigation of these issues should help to clarify the etiology, course, and outcome of attention deficit hyperactivity disorder.", "title": "" } ]
[ { "docid": "b59a2c49364f3e95a2c030d800d5f9ce", "text": "An algorithm with linear filters and morphological operations has been proposed for automatic fabric defect detection. The algorithm is applied off-line and real-time to denim fabric samples for five types of defects. All defect types have been detected successfully and the defective regions are labeled. The defective fabric samples are then classified by using feed forward neural network method. Both defect detection and classification application performances are evaluated statistically. Defect detection performance of real time and off-line applications are obtained as 88% and 83% respectively. The defective images are classified with an average accuracy rate of 96.3%.", "title": "" }, { "docid": "7dc0be689a4c58f4bc6ee0624605df81", "text": "Oil spills represent a major threat to ocean ecosystems and their health. Illicit pollution requires continuous monitoring and satellite remote sensing technology represents an attractive option for operational oil spill detection. Previous studies have shown that active microwave satellite sensors, particularly Synthetic Aperture Radar (SAR) can be effectively used for the detection and classification of oil spills. Oil spills appear as dark spots in SAR images. However, similar dark spots may arise from a range of unrelated meteorological and oceanographic phenomena, resulting in misidentification. A major focus of research in this area is the development of algorithms to distinguish oil spills from `look-alikes'. This paper describes the development of a new approach to SAR oil spill detection employing two different Artificial Neural Networks (ANN), used in sequence. The first ANN segments a SAR image to identify pixels belonging to candidate oil spill features. A set of statistical feature parameters are then extracted and used to drive a second ANN which classifies objects into oil spills or look-alikes. The proposed algorithm was trained using 97 ERS-2 SAR and ENVSAT ASAR images of individual verified oil spills or/and look-alikes. The algorithm was validated using a large dataset comprising full-swath images and correctly identified 91.6% of reported oil spills and 98.3% of look-alike phenomena. The segmentation stage of the new technique outperformed the established edge detection and adaptive thresholding approaches. An analysis of feature descriptors highlighted the importance of image gradient information in the classification stage.", "title": "" }, { "docid": "0ae8f9626a6621949c9d6c5fa7c2a098", "text": "In this paper, numerical observability analysis is restudied. Algorithms to determine observable islands and to decide a minimal set of pseudo-measurements to make the unobservable system observable are presented. The algorithms make direct use of the measurement Jacobian matrix. Gaussian elimination, which makes the whole process of observability analysis simple and effective, is the only computation required by the algorithms. Numerical examples are used to illustrate the proposed algorithms. Comparison of computation expense on the Texas system among the proposed algorithm and the existing algorithms is performed.", "title": "" }, { "docid": "b1a440cb894c1a76373bdbf7ff84318d", "text": "We present a language-theoretic approach to symbolic model checking of PCTL over discrete-time Markov chains. The probability with which a path formula is satisfied is represented by a regular expression. A recursive evaluation of the regular expression yields an exact rational value when transition probabilities are rational, and rational functions when some probabilities are left unspecified as parameters of the system. This allows for parametric model checking by evaluating the regular expression for different parameter values, for instance, to study the influence of a lossy channel in the overall reliability of a randomized protocol.", "title": "" }, { "docid": "fd0defe3aaabd2e27c7f9d3af47dd635", "text": "A fast test for triangle-triangle intersection by computing signed vertex-plane distances (sufficient if one triangle is wholly to one side of the other) and signed line-line distances of selected edges (otherwise) is presented. This algorithm is faster than previously published algorithms and the code is available online.", "title": "" }, { "docid": "c21e39d4cf8d3346671ae518357c8edb", "text": "The success of deep learning depends on finding an architecture to fit the task. As deep learning has scaled up to more challenging tasks, the architectures have become difficult to design by hand. This paper proposes an automated method, CoDeepNEAT, for optimizing deep learning architectures through evolution. By extending existing neuroevolution methods to topology, components, and hyperparameters, this method achieves results comparable to best human designs in standard benchmarks in object recognition and language modeling. It also supports building a real-world application of automated image captioning on a magazine website. Given the anticipated increases in available computing power, evolution of deep networks is promising approach to constructing deep learning applications in the future.", "title": "" }, { "docid": "8e4eb520c80dfa8d39c69b1273ea89c8", "text": "This paper examines the potential impact of automatic meter reading (AMR) on short-term load forecasting for a residential customer. Real-time measurement data from customers' smart meters provided by a utility company is modeled as the sum of a deterministic component and a Gaussian noise signal. The shaping filter for the Gaussian noise is calculated using spectral analysis. Kalman filtering is then used for load prediction. The accuracy of the proposed method is evaluated for different sampling periods and planning horizons. The results show that the availability of more real-time measurement data improves the accuracy of the load forecast significantly. However, the improved prediction accuracy can come at a high computational cost. Our results qualitatively demonstrate that achieving the desired prediction accuracy while avoiding a high computational load requires limiting the volume of data used for prediction. Consequently, the measurement sampling rate must be carefully selected as a compromise between these two conflicting requirements.", "title": "" }, { "docid": "a55eed627afaf39ee308cc9e0e10a698", "text": "Perspective-taking is a complex cognitive process involved in social cognition. This positron emission tomography (PET) study investigated by means of a factorial design the interaction between the emotional and the perspective factors. Participants were asked to adopt either their own (first person) perspective or the (third person) perspective of their mothers in response to situations involving social emotions or to neutral situations. The main effect of third-person versus first-person perspective resulted in hemodynamic increase in the medial part of the superior frontal gyrus, the left superior temporal sulcus, the left temporal pole, the posterior cingulate gyrus, and the right inferior parietal lobe. A cluster in the postcentral gyrus was detected in the reverse comparison. The amygdala was selectively activated when subjects were processing social emotions, both related to self and other. Interaction effects were identified in the left temporal pole and in the right postcentral gyrus. These results support our prediction that the frontopolar, the somatosensory cortex, and the right inferior parietal lobe are crucial in the process of self/ other distinction. In addition, this study provides important building blocks in our understanding of social emotion processing and human empathy.", "title": "" }, { "docid": "afde8e4d9ed4b2a95d780522e7905047", "text": "Compared to offline shopping, the online shopping experience may be viewed as lacking human warmth and sociability as it is more impersonal, anonymous, automated and generally devoid of face-to-face interactions. Thus, understanding how to create customer loyalty in online environments (e-Loyalty) is a complex process. In this paper a model for e-Loyalty is proposed and used to examine how varied conditions of social presence in a B2C e-Services context influence e-Loyalty and its antecedents of perceived usefulness, trust and enjoyment. This model is examined through an empirical study involving 185 subjects using structural equation modeling techniques. Further analysis is conducted to reveal gender differences concerning hedonic elements in the model on e-Loyalty. 2006 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "cfc4dc24378c5b7b83586db56fad2cac", "text": "This study investigated the effects of proximal and distal constructs on adolescent's academic achievement through self-efficacy. Participants included 482 ninth- and tenth- grade Norwegian students who completed a questionnaire designed to assess school-goal orientations, organizational citizenship behavior, academic self-efficacy, and academic achievement. The results of a bootstrapping technique used to analyze relationships between the constructs indicated that school-goal orientations and organizational citizenship predicted academic self-efficacy. Furthermore, school-goal orientation, organizational citizenship, and academic self-efficacy explained 46% of the variance in academic achievement. Mediation analyses revealed that academic self-efficacy mediated the effects of perceived task goal structure, perceived ability structure, civic virtue, and sportsmanship on adolescents' academic achievements. The results are discussed in reference to current scholarship, including theories underlying our hypothesis. Practical implications and directions for future research are suggested.", "title": "" }, { "docid": "33d98005d696cc5cee6a23f5c1e7c538", "text": "Design activity has recently attempted to embrace designing the user experience. Designers need to demystify how we design for user experience and how the products we design achieve specific user experience goals. This paper proposes an initial framework for understanding experience as it relates to user-product interactions. We propose a system for talking about experience, and look at what influences experience and qualities of experience. The framework is presented as a tool to understand what kinds of experiences products evoke.", "title": "" }, { "docid": "e98e902e22d9b8acb6e9e9dcd241471c", "text": "We introduce a novel iterative approach for event coreference resolution that gradually builds event clusters by exploiting inter-dependencies among event mentions within the same chain as well as across event chains. Among event mentions in the same chain, we distinguish withinand cross-document event coreference links by using two distinct pairwise classifiers, trained separately to capture differences in feature distributions of withinand crossdocument event clusters. Our event coreference approach alternates between WD and CD clustering and combines arguments from both event clusters after every merge, continuing till no more merge can be made. And then it performs further merging between event chains that are both closely related to a set of other chains of events. Experiments on the ECB+ corpus show that our model outperforms state-of-the-art methods in joint task of WD and CD event coreference resolution.", "title": "" }, { "docid": "fbcdb57ae0d42e9665bc95dbbca0d57b", "text": "Data classification and tag recommendation are both important and challenging tasks in social media. These two tasks are often considered independently and most efforts have been made to tackle them separately. However, labels in data classification and tags in tag recommendation are inherently related. For example, a Youtube video annotated with NCAA, stadium, pac12 is likely to be labeled as football, while a video/image with the class label of coast is likely to be tagged with beach, sea, water and sand. The existence of relations between labels and tags motivates us to jointly perform classification and tag recommendation for social media data in this paper. In particular, we provide a principled way to capture the relations between labels and tags, and propose a novel framework CLARE, which fuses data CLAssification and tag REcommendation into a coherent model. With experiments on three social media datasets, we demonstrate that the proposed framework CLARE achieves superior performance on both tasks compared to the state-of-the-art methods.", "title": "" }, { "docid": "1de10e40580ba019045baaa485f8e729", "text": "Automated labeling of anatomical structures in medical images is very important in many neuroscience studies. Recently, patch-based labeling has been widely investigated to alleviate the possible mis-alignment when registering atlases to the target image. However, the weights used for label fusion from the registered atlases are generally computed independently and thus lack the capability of preventing the ambiguous atlas patches from contributing to the label fusion. More critically, these weights are often calculated based only on the simple patch similarity, thus not necessarily providing optimal solution for label fusion. To address these limitations, we propose a generative probability model to describe the procedure of label fusion in a multi-atlas scenario, for the goal of labeling each point in the target image by the best representative atlas patches that also have the largest labeling unanimity in labeling the underlying point correctly. Specifically, sparsity constraint is imposed upon label fusion weights, in order to select a small number of atlas patches that best represent the underlying target patch, thus reducing the risks of including the misleading atlas patches. The labeling unanimity among atlas patches is achieved by exploring their dependencies, where we model these dependencies as the joint probability of each pair of atlas patches in correctly predicting the labels, by analyzing the correlation of their morphological error patterns and also the labeling consensus among atlases. The patch dependencies will be further recursively updated based on the latest labeling results to correct the possible labeling errors, which falls to the Expectation Maximization (EM) framework. To demonstrate the labeling performance, we have comprehensively evaluated our patch-based labeling method on the whole brain parcellation and hippocampus segmentation. Promising labeling results have been achieved with comparison to the conventional patch-based labeling method, indicating the potential application of the proposed method in the future clinical studies.", "title": "" }, { "docid": "0d7c29b40f92b5997791f1bbe192269c", "text": "We present a general approach to video understanding, inspired by semantic transfer techniques that have been successfully used for 2D image analysis. Our method considers a video to be a 1D sequence of clips, each one associated with its own semantics. The nature of these semantics – natural language captions or other labels – depends on the task at hand. A test video is processed by forming correspondences between its clips and the clips of reference videos with known semantics, following which, reference semantics can be transferred to the test video. We describe two matching methods, both designed to ensure that (a) reference clips appear similar to test clips and (b), taken together, the semantics of the selected reference clips is consistent and maintains temporal coherence. We use our method for video captioning on the LSMDC’16 benchmark, video summarization on the SumMe and TV-Sum benchmarks, Temporal Action Detection on the Thumos2014 benchmark, and sound prediction on the Greatest Hits benchmark. Our method not only surpasses the state of the art, in four out of five benchmarks, but importantly, it is the only single method we know of that was successfully applied to such a diverse range of tasks.", "title": "" }, { "docid": "28bb93f193b62cc1829cf082ffcea7f9", "text": "Analyzing a user's first impression of a Web site is essential for interface designers, as it is tightly related to their overall opinion of a site. In fact, this early evaluation affects user navigation behavior. Perceived usability and user interest (e.g., revisiting and recommending the site) are parameters influenced by first opinions. Thus, predicting the latter when creating a Web site is vital to ensure users’ acceptance. In this regard, Web aesthetics is one of the most influential factors in this early perception. We propose the use of low-level image parameters for modeling Web aesthetics in an objective manner, which is an innovative research field. Our model, obtained by applying a stepwise multiple regression algorithm, infers a user's first impression by analyzing three different visual characteristics of Web site screenshots—texture, luminance, and color—which are directly derived from MPEG-7 descriptors. The results obtained over three wide Web site datasets (composed by 415, 42, and 6 Web sites, respectively) reveal a high correlation between low-level parameters and the users’ evaluation, thus allowing a more precise and objective prediction of users’ opinion than previous models that are based on other image characteristics with fewer predictors. Therefore, our model is meant to support a rapid assessment of Web sites in early stages of the design process to maximize the likelihood of the users’ final approval.", "title": "" }, { "docid": "25c41bdba8c710b663cb9ad634b7ae5d", "text": "Massive data streams are now fundamental to many data processing applications. For example, Internet routers produce large scale diagnostic data streams. Such streams are rarely stored in traditional databases, and instead must be processed “on the fly” as they are produced. Similarly, sensor networks produce multiple data streams of observations from their sensors. There is growing focus on manipulating data streams, and hence, there is a need to identify basic operations of interest in managing data streams, and to support them efficiently. We propose computation of the Hamming norm as a basic operation of interest. The Hamming norm formalises ideas that are used throughout data processing. When applied to a single stream, the Hamming norm gives the number of distinct items that are present in that data stream, which is a statistic of great interest in databases. When applied to a pair of streams, the Hamming norm gives an important measure of (dis)similarity: the number of unequal item counts in the two streams. Hamming norms have many uses in comparing data streams. We present a novel approximation technique for estimating the Hamming norm for massive data streams; this relies on what we call the “ l0 sketch” and we prove its accuracy. We test our approximation method on a large quantity of synthetic and real stream data, and show that the estimation is accurate to within a few percentage points. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the VLDB copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Very Large Data Base Endowment. To copy otherwise, or to republish, requires a fee and/or special permission from the Endowment. Proceedings of the 28th VLDB Conference, Hong Kong, China, 2002", "title": "" }, { "docid": "288dc197e9be9b5289615b10eddbb987", "text": "As biometric applications are fielded to serve large population groups, issues of performance differences between individual sub-groups are becoming increasingly important. In this paper we examine cases where we believe race is one such factor. We look in particular at two forms of problem; facial classification and image synthesis. We take the novel approach of considering race as a boundary for transfer learning in both the task (facial classification) and the domain (synthesis over distinct datasets). We demonstrate a series of techniques to improve transfer learning of facial classification; outperforming similar models trained in the target's own domain. We conduct a study to evaluate the performance drop of Generative Adversarial Networks trained to conduct image synthesis, in this process, we produce a new annotation for the Celeb-A dataset by race. These networks are trained solely on one race and tested on another - demonstrating the subsets of the CelebA to be distinct domains for this task.", "title": "" }, { "docid": "8e74a27a3edea7cf0e88317851bc15eb", "text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://dv1litvip.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.", "title": "" }, { "docid": "0daa16a3f40612946187d6c66ccd96f4", "text": "A 60 GHz frequency band planar diplexer based on Substrate Integrated Waveguide (SIW) technology is presented in this research. The 5th order millimeter wave SIW filter is investigated first, and then the 60 GHz SIW diplexer is designed and been simulated. SIW-microstrip transitions are also included in the final design. The relative bandwidths of up and down channels are 1.67% and 1.6% at 59.8 GHz and 62.2 GHz respectively. Simulation shows good channel isolation, small return losses and moderate insertion losses in pass bands. The diplexer can be easily integrated in millimeter wave integrated circuits.", "title": "" } ]
scidocsrr
b47182603234ee25013714685b771603
Why should my students use AR? A comparative review of the educational impacts of augmented-reality
[ { "docid": "77b84c86b80d3e1c54b2ce4458a0cc52", "text": "We summarize three evaluations of an educational augmented reality application for geometry education, which have been conducted in 2000, 2003 and 2005 respectively. Repeated formative evaluations with more than 100 students guided the redesign of the application and its user interface throughout the years. We present and discuss the results regarding usability and simulator sickness providing guidelines on how to design augmented reality applications utilizing head-mounted displays.", "title": "" } ]
[ { "docid": "f93194ad79bc896692b402fb4ab7a3ef", "text": "A growing body of literature in social science has been devoted to extracting new information from social media to assist authorities in manage crowd projects. In this paper geolocation (or spatial) based information provided in social media is investigated to utilize intelligent transportation services. Further, the general trend of travel activities during weekdays is studied. For this purpose, a dataset consisting of more than 40,000 tweets in south and west part of the Sydney metropolitan area is utilized. After a data processing effort, the tweets are clustered into seven main categories using text mining techniques, where each category represents a type of activity including shopping, recreation, and work. Unlike the previous studies in this area, the focus of this work is on the content of the tweets rather than only using geotagged data or sentiment analysis. Beside activity type, temporal and spatial distributions of activities are used in the classification exercise. Categories are mapped to the identified regions within the city of Sydney across four time slots (two peak periods and two off-peak periods). Each time slot is used to construct a network with nodes representing people, activities and locations and edges reflecting the association between the nodes. The constructed networks are used to study the trend of activities/locations in a typical working day.", "title": "" }, { "docid": "169af7f4732197ef8b80a6c032ff37c5", "text": "Assisting impaired individuals with robotic devices is an emerging and potentially transformative technology. This paper describes the design of an assistive robotic grasping system that allows impaired individuals to interact with the system in a human-in-the-loop manner, including the use of a novel cranio-facial electromyography input device. The system uses an augmented reality interface that allows users to plan grasps online that match their task-oriented intents. The system uses grasp quality measurements that generate more robust grasps by considering the local geometry of the object and the effect of uncertainty during grasp acquisition. This interface is validated by testing with real users, both healthy and impaired. This work forms the foundation for a flexible, fully featured human-in-the-loop system that allows users to grasp known and unknown objects in cluttered spaces using novel, practical human–robot interaction paradigms that have the potential to bring human-in-the-loop assistive devices out of the research environment and into the lives of those that need them.", "title": "" }, { "docid": "7c23d7948b7e98027d3ecd048ae2c4eb", "text": "In aging societies, there is a strong demand for robotics to tackle problems caused by the aging population. Patient transfer, such as lifting and moving a bedridden patient from a bed to a wheelchair and back, is one of the most physically challenging tasks in nursing care, the burden of which should be reduced by the introduction of robot technologies. We have developed a new prototype robot named RIBA with human-type arms that is designed to perform heavy physical tasks requiring human contact, and we succeeded in transferring a human from a bed to a wheelchair and back. To use RIBA in changeable and realistic environments, cooperation between the caregiver and the robot is required. The caregiver takes responsibility for monitoring the environment and determining suitable actions, while the robot undertakes hard physical tasks. The instructions can be intuitively given by the caregiver to RIBA through tactile sensors using a newly proposed method named tactile guidance. In the present paper, we describe RIBA's design concept, its basic specifications, and the tactile guidance method. Experiments including the transfer of humans are also reported.", "title": "" }, { "docid": "f9badb85299b85cf281603a75538851e", "text": "The Research of detection malware using machine learning method attracts much attention recent years. However, most of research focused on code analysis which is signature-based or analysis of system call sequence in Linux environment. Obviously, all methods have their strengths and weaknesses. In this paper, we concentrate on detection Trojan horse by operation system information in Windows environment using data mining technology. Our main content and contribution contains as follows: First, we collect Trojan horse samples in true network environment and classify them by scanner. Secondly, we collect operation system behavior features under infected and clean circumstances separately by WMI manager tools. And then, several classic classification algorithms are applied and a performance comparison is given. Feature selection methods are applied to those features and we get a feature order list which reflects the relevance order of Trojan horse activities and the system feature. We believe the instructive meaning of the list is significant. Finally, a feature combination method is applied and features belongs different groups are combined according their characteristic for high classification performance. Results of experiments demonstrate the feasibility of our assumption that detecting Trojan horses by system behavior information is feasible and affective.", "title": "" }, { "docid": "73e27f751c8027bac694f2e876d4d910", "text": "The numerous and diverse applications of the Internet of Things (IoT) have the potential to change all areas of daily life of individuals, businesses, and society as a whole. The vision of a pervasive IoT spans a wide range of application domains and addresses the enabling technologies needed to meet the performance requirements of various IoT applications. In order to accomplish this vision, this paper aims to provide an analysis of literature in order to propose a new classification of IoT applications, specify and prioritize performance requirements of such IoT application classes, and give an insight into state-of-the-art technologies used to meet these requirements, all from telco’s perspective. A deep and comprehensive understanding of the scope and classification of IoT applications is an essential precondition for determining their performance requirements with the overall goal of defining the enabling technologies towards fifth generation (5G) networks, while avoiding over-specification and high costs. Given the fact that this paper presents an overview of current research for the given topic, it also targets the research community and other stakeholders interested in this contemporary and attractive field for the purpose of recognizing research gaps and recommending new research directions.", "title": "" }, { "docid": "2494840a6f833bd5b20b9b1fadcfc2f8", "text": "Tracing neurons in large-scale microscopy data is crucial to establishing a wiring diagram of the brain, which is needed to understand how neural circuits in the brain process information and generate behavior. Automatic techniques often fail for large and complex datasets, and connectomics researchers may spend weeks or months manually tracing neurons using 2D image stacks. We present a design study of a new virtual reality (VR) system, developed in collaboration with trained neuroanatomists, to trace neurons in microscope scans of the visual cortex of primates. We hypothesize that using consumer-grade VR technology to interact with neurons directly in 3D will help neuroscientists better resolve complex cases and enable them to trace neurons faster and with less physical and mental strain. We discuss both the design process and technical challenges in developing an interactive system to navigate and manipulate terabyte-sized image volumes in VR. Using a number of different datasets, we demonstrate that, compared to widely used commercial software, consumer-grade VR presents a promising alternative for scientists.", "title": "" }, { "docid": "f399078adf16395a7f014b26e38150f7", "text": "We describe a new structural learning approach to semantic analysis of utterances from conversational dialogs of low-resource domains. Typically an utterance is represented with a multi-layered semantic tag schema: a higher level global context (tag) defines the user’s intent, and associated arguments or slot tags define the local context. To deal with the low resource domains, the existing models encode prior information on either the global or the local context, but not on both. Because these components are highly correlated given the domain, we argue that paired priors on both components is more beneficial for semantic analysis of utterances. We introduce a new multi-layer structural learning approach, which integrates paired prior information about the global and local components of the utterances. Specifically we encode inter-correlations between the multilayered components into the joint learner by way of lexicons of paired tags provided by domain experts. Secondly, we introduce systematic ways to extend the paired tag lexicons for low-resource domains from Web-scale data. Across real dialogs from different domains, our approach results in an average improvement of 12%on intent classification and 3% on slot tagging over the baselines.", "title": "" }, { "docid": "9609d87c2e75b452495e7fb779a94027", "text": "Cyclophosphamide (CYC) has been the backbone immunosuppressive drug to achieve sustained remission in lupus nephritis (LN). The aim was to evaluate the efficacy and compare adverse effects of low and high dose intravenous CYC therapy in Indian patients with proliferative lupus nephritis. An open-label, parallel group, randomized controlled trial involving 75 patients with class III/IV LN was conducted after obtaining informed consent. The low dose group (n = 38) received 6 × 500 mg CYC fortnightly and high dose group (n = 37) received 6 × 750 mg/m2 CYC four-weekly followed by azathioprine. The primary outcome was complete/partial/no response at 52 weeks. The secondary outcomes were renal and non-renal flares and adverse events. Intention-to-treat analyses were performed. At 52 weeks, 27 (73%) in high dose group achieved complete/partial response (CR/PR) vs 19 (50%) in low dose (p = 0.04). CR was higher in the high dose vs low dose [24 (65%) vs 17 (44%)], although not statistically significant. Non-responders (NR) in the high dose group were also significantly lower 10 (27%) vs low dose 19 (50%) (p = 0.04). The change in the SLEDAI (Median, IQR) was also higher in the high dose 16 (7–20) in contrast to the low dose 10 (5.5–14) (p = 0.04). There was significant alopecia and CYC-induced leucopenia in high dose group. Renal relapses were significantly higher in the low dose group vs high dose [9 (24%) vs 1(3%), (p = 0.01)]. At 52 weeks, high dose CYC was more effective in inducing remission with decreased renal relapses in our population. Trial Registration: The study was registered at http://www.clintrials.gov. NCT02645565.", "title": "" }, { "docid": "6e0a19a9bc744aa05a64bd7450cc4c1b", "text": "The success of deep neural networks hinges on our ability to accurately and efficiently optimize high-dimensional, non-convex functions. In this paper, we empirically investigate the loss functions of state-of-the-art networks, and how commonlyused stochastic gradient descent variants optimize these loss functions. To do this, we visualize the loss function by projecting them down to low-dimensional spaces chosen based on the convergence points of different optimization algorithms. Our observations suggest that optimization algorithms encounter and choose different descent directions at many saddle points to find different final weights. Based on consistency we observe across re-runs of the same stochastic optimization algorithm, we hypothesize that each optimization algorithm makes characteristic choices at these saddle points.", "title": "" }, { "docid": "75642d6a79f6b9bb8b02f6d8ded6a370", "text": "Spectral indices as a selection tool in plant breeding could improve genetic gains for different important traits. The objectives of this study were to assess the potential of using spectral reflectance indices (SRI) to estimate genetic variation for in-season biomass production, leaf chlorophyll, and canopy temperature (CT) in wheat (Triticum aestivum L.) under irrigated conditions. Three field experiments, GHIST (15 CIMMYT globally adapted historic genotypes), RILs1 (25 recombinant inbred lines [RILs]), and RILs2 (36 RILs) were conducted under irrigated conditions at the CIMMYT research station in northwest Mexico in three different years. Five SRI were evaluated to differentiate genotypes for biomass production. In general, genotypic variation for all the indices was significant. Near infrared radiation (NIR)–based indices gave the highest levels of associationwith biomass production and the higher associations were observed at heading and grainfilling, rather than at booting. Overall, NIR-based indices were more consistent and differentiated biomass more effectively compared to the other indices. Indices based on ratio of reflection spectra correlatedwith SPADchlorophyll values, and the associationwas stronger at the generative growth stages. These SRI also successfully differentiated the SPAD values at the genotypic level. The NIR-based indices showed a strong and significant association with CT at the heading and grainfilling stages. These results demonstrate the potential of using SRI as a breeding tool to select for increased genetic gains in biomass and chlorophyll content, plus for cooler canopies. SIGNIFICANT PROGRESS in grain yield of spring wheat under irrigated conditions has been made through the classical breeding approach (Slafer et al., 1994), even though the genetic basis of yield improvement in wheat is not well established (Reynolds et al., 1999). Several authors have reported that progress in grain yield is mainly attributed to better partitioning of photosynthetic products (Waddington et al., 1986; Calderini et al., 1995; Sayre et al., 1997). The systematic increase in the partitioning of assimilates (harvest index) has a theoretical upper limit of approximately 60% (Austin et al., 1980). Further yield increases in wheat through improvement in harvest index will be limited without a further increase in total crop biomass (Austin et al., 1980; Slafer and Andrade, 1991; Reynolds et al., 1999). Though until relatively recently biomass was not commonly associated with yield gains, increases in biomass of spring wheat have been reported (Waddington et al., 1986; Sayre et al., 1997) and more recently in association with yield increases (Singh et al., 1998; Reynolds et al., 2005; Shearman et al., 2005). Thus, a breeding approach is needed that will select genotypes with higher biomass capacity, while maintaining the high partitioning rate of photosynthetic products. Direct estimation of biomass is a timeand laborintensive undertaking. Moreover, destructive in-season sampling involves large sampling errors (Whan et al., 1991) and reduces the final area for estimation of grain yield and final biomass. Regan et al. (1992) demonstrated a method to select superior genotypes of spring wheat for early vigor under rainfed conditions using a destructive sampling technique, but such sampling is impossible for breeding programs where a large number of genotypes are being screened for various desirable traits. Spectral reflectance indices are a potentially rapid technique that could assess biomass at the genotypic level without destructive sampling (Elliott and Regan, 1993; Smith et al., 1993; Bellairs et al., 1996; Peñuelas et al., 1997). Canopy light reflectance properties based mainly on the absorption of light at a specific wavelength are associated with specific plant characteristics. The spectral reflectance in the visible (VIS) wavelengths (400–700 nm) depends on the absorption of light by leaf chlorophyll and associated pigments such as carotenoid and anthocyanins. The reflectance of the VIS wavelengths is relatively low because of the high absorption of light energy by these pigments. In contrast, the reflectance of theNIR wavelengths (700–1300 nm) is high, since it is not absorbed by plant pigments and is scattered by plant tissue at different levels in the canopy, such that much of it is reflected back rather than being absorbed by the soil (Knipling, 1970). Spectral reflectance indices were developed on the basis of simple mathematical formula, such as ratios or differences between the reflectance at given wavelengths (Araus et al., 2001). Simple ratio (SR 5 NIR/VIS) and the normalized difference vegetation M.A. Babar, A.R. Klatt, and W.R. Raun, Department of Plant and Soil Sciences, 368 Ag. Hall, Oklahoma State University, Stillwater, OK 74078, USA; M.P. Reynolds, International Maize and Wheat Improvement Center (CIMMYT), Km. 45, Carretera Mexico, El Batan, Texcoco, Mexico; M. van Ginkel, Department of Primary Industries (DPI), Private Bag 260, Horsham, Victoria, Postcode: 3401, DX Number: 216515, Australia; M.L. Stone, Department of Biosystems and Agricultural Engineering, Oklahoma State University, Stillwater, OK 74078, USA. This research was partially funded by the Oklahoma Wheat Research Foundation (OWRF), Oklahoma Wheat Commission, and CIMMYT (International Maize and Wheat Improvement Center), Mexico. Received 11 Mar. 2005. *Corresponding author (mreynolds@cgiar.org). Published in Crop Sci. 46:1046–1057 (2006). Crop Breeding & Genetics doi:10.2135/cropsci2005.0211 a Crop Science Society of America 677 S. Segoe Rd., Madison, WI 53711 USA Abbreviations: CT, canopy temperature; CTD, canopy temperature depression; GHIST, global historic; NDVI, normalized difference vegetation index; NIR, near infrared radiation; NWI-1, normalized water index-1; NWI-2, normalized water index-2; PSSRa, pigment specific simple ratio-chlorophyll a; RARSa, ratio analysis of reflectance spectra-chlorophyll a; RARSb, ratio analysis of reflectance spectra-chlorophyll b; RARSc, ratio analysis of reflectance spectracarotenoids; RILs, recombinant inbred lines; SR, simple ratio; SRI, spectral reflectance indices; WI, water index. R e p ro d u c e d fr o m C ro p S c ie n c e . P u b lis h e d b y C ro p S c ie n c e S o c ie ty o f A m e ri c a . A ll c o p y ri g h ts re s e rv e d . 1046 Published online March 27, 2006", "title": "" }, { "docid": "107436d5f38f3046ef28495a14cc5caf", "text": "There is a universal standard for facial beauty regardless of race, age, sex and other variables. Beautiful faces have ideal facial proportion. Ideal proportion is directly related to divine proportion, and that proportion is 1 to 1.618. All living organisms, including humans, are genetically encoded to develop to this proportion because there are extreme esthetic and physiologic benefits. The vast majority of us are not perfectly proportioned because of environmental factors. Establishment of a universal standard for facial beauty will significantly simplify the diagnosis and treatment of facial disharmonies and abnormalities. More important, treating to this standard will maximize facial esthetics, TMJ health, psychologic and physiologic health, fertility, and quality of life.", "title": "" }, { "docid": "69f2773d7901ac9d477604a85fb6a591", "text": "We propose an expert-augmented actor-critic algorithm, which we evaluate on two environments with sparse rewards: Montezuma’s Revenge and a demanding maze from the ViZDoom suite. In the case of Montezuma’s Revenge, an agent trained with our method achieves very good results consistently scoring above 27,000 points (in many experiments beating the first world). With an appropriate choice of hyperparameters, our algorithm surpasses the performance of the expert data. In a number of experiments, we have observed an unreported bug in Montezuma’s Revenge which allowed the agent to score more than 800, 000 points.", "title": "" }, { "docid": "405acd07ad0d1b3b82ada19e85e23ce6", "text": "Self-driving technology is advancing rapidly — albeit with significant challenges and limitations. This progress is largely due to recent developments in deep learning algorithms. To date, however, there has been no systematic comparison of how different deep learning architectures perform at such tasks, or an attempt to determine a correlation between classification performance and performance in an actual vehicle, a potentially critical factor in developing self-driving systems. Here, we introduce the first controlled comparison of multiple deep-learning architectures in an end-to-end autonomous driving task across multiple testing conditions. We used a simple and affordable platform consisting of an off-the-shelf, remotely operated vehicle, a GPU-equipped computer, and an indoor foamrubber racetrack. We compared performance, under identical driving conditions, across seven architectures including a fully-connected network, a simple 2 layer CNN, AlexNet, VGG-16, Inception-V3, ResNet, and an LSTM by assessing the number of laps each model was able to successfully complete without crashing while traversing an indoor racetrack. We compared performance across models when the conditions exactly matched those in training as well as when the local environment and track were configured differently and objects that were not included in the training dataset were placed on the track in various positions. In addition, we considered performance using several different data types for training and testing including single grayscale and color frames, and multiple grayscale frames stacked together in sequence. With the exception of a fully-connected network, all models performed reasonably well (around or above 80%) and most very well (∼95%) on at least one input type but with considerable variation across models and inputs. Overall, AlexNet, operating on single color frames as input, achieved the best level of performance (100% success rate in phase one and 55% in phase two) while VGG-16 performed well most consistently across image types. Performance with obstacles on the track and conditions that were different than those in training was much more variable than without objects and under conditions similar to those in the training set. Analysis of the model’s driving paths found greater consistency within vs. between models. Path similarity between models did not correlate strongly with success similarity. Our novel pixelflipping method allowed us to create a heatmap for each given image to observe what features of the image were weighted most heavily by the network when making its decision. Finally, we found that the variability across models in the driving task was not fully predicted by validation performance, indicating the presence of a ‘deployment gap’ between model training and performance in a simple, real-world task. Overall, these results demonstrate the need for increased field research in self-driving. 1Center for Complex Systems and Brain Sciences, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431, USA 2College of Computer and Information Science, Northeastern University, 360 Huntington Ave, Boston, MA 02115, USA 3Department of Ocean and Mechanical Engineering, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431, USA † mteti@fau.edu", "title": "" }, { "docid": "d151881de9a0e1699e95db7bbebc032b", "text": "Despite the noticeable progress in perceptual tasks like detection, instance segmentation and human parsing, computers still perform unsatisfactorily on visually understanding humans in crowded scenes, such as group behavior analysis, person re-identification and autonomous driving, etc. To this end, models need to comprehensively perceive the semantic information and the differences between instances in a multi-human image, which is recently defined as the multi-human parsing task. In this paper, we present a new large-scale database “Multi-Human Parsing (MHP)” for algorithm development and evaluation, and advances the state-of-the-art in understanding humans in crowded scenes. MHP contains 25,403 elaborately annotated images with 58 fine-grained semantic category labels, involving 2-26 persons per image and captured in real-world scenes from various viewpoints, poses, occlusion, interactions and background. We further propose a novel deep Nested Adversarial Network (NAN) model for multi-human parsing. NAN consists of three Generative Adversarial Network (GAN)-like sub-nets, respectively performing semantic saliency prediction, instance-agnostic parsing and instance-aware clustering. These sub-nets form a nested structure and are carefully designed to learn jointly in an end-to-end way. NAN consistently outperforms existing state-of-the-art solutions on our MHP and several other datasets, and serves as a strong baseline to drive the future research for multi-human parsing.", "title": "" }, { "docid": "15c216b32691998f1bbf65d28ffd1a75", "text": "Sharing healthcare data has become a vital requirement in healthcare system management; however, inappropriate sharing and usage of healthcare data could threaten patients' privacy. In this paper, we study the privacy concerns of the blood transfusion information-sharing system between the Hong Kong Red Cross Blood Transfusion Service (BTS) and public hospitals, and identify the major challenges that make traditional data anonymization methods not applicable. Furthermore, we propose a new privacy model called LKC-privacy, together with an anonymization algorithm, to meet the privacy and information requirements in this BTS case. Experiments on the real-life data demonstrate that our anonymization algorithm can effectively retain the essential information in anonymous data for data analysis and is scalable for anonymizing large datasets.", "title": "" }, { "docid": "066eef8e511fac1f842c699f8efccd6b", "text": "In this paper, we propose a new model that is capable of recognizing overlapping mentions. We introduce a novel notion of mention separators that can be effectively used to capture how mentions overlap with one another. On top of a novel multigraph representation that we introduce, we show that efficient and exact inference can still be performed. We present some theoretical analysis on the differences between our model and a recently proposed model for recognizing overlapping mentions, and discuss the possible implications of the differences. Through extensive empirical analysis on standard datasets, we demonstrate the effectiveness of our approach.", "title": "" }, { "docid": "0d4f589fedbef123703a271e983ac0f6", "text": "This paper presents the results from a Human-Robot Interaction study that investigates the issues of participants’ preferences in terms of the robot approach direction (directionRAD), robot base approach interaction distance (distanceRBAID), robot handing over hand distance (distanceRHOHD), robot handing over arm gesture (gestureRHOAG), and the coordination of both the robot approaching and gestureRHOAG in the context of a robot handing over an object to a seated person. The results from this study aim at informing the development of a Human Aware Manipulation Planner. Twelve participants with some previous human-robot interaction experience were recruited for the trial. The results show that a majority of the participants prefer the robot to approach from the front and hand them a can of soft drink in the front sector of their personal zone. The robot handing over hand position had the most influence on determining from where the robot should approach (i.e distanceRAD). Legibility and perception of risk seem to be the deciding factor on how participants choose their preferred robot arm-base approach coordination for handing over a can. Detailed discussions of the results conclude the paper.", "title": "" }, { "docid": "bcbc4ad2f0f6aec97a4711f305c90102", "text": "OBJECTIVES\nTo determine the epidemiology of Candida bloodstream infections, variables influencing mortality, and antifungal resistance rates in ICUs in Spain.\n\n\nDESIGN\nProspective, observational, multicenter population-based study.\n\n\nSETTING\nMedical and surgical ICUs in 29 hospitals distributed throughout five metropolitan areas of Spain.\n\n\nPATIENTS\nAdult patients (≥ 18 yr) with an episode of Candida bloodstream infection during admission to any surveillance area ICU from May 2010 to April 2011.\n\n\nINTERVENTIONS\nCandida isolates were sent to a reference laboratory for species identification by DNA sequencing and susceptibility testing using the methods and breakpoint criteria promulgated by the European Committee on Antimicrobial Susceptibility Testing. Prognostic factors associated with early (0-7 d) and late (8-30 d) mortality were analyzed using logistic regression modeling.\n\n\nMEASUREMENTS AND MAIN RESULTS\nWe detected 773 cases of candidemia, 752 of which were included in the overall cohort. Among these, 168 (22.3%) occurred in adult ICU patients. The rank order of Candida isolates was as follows: Candida albicans (52%), Candida parapsilosis (23.7%), Candida glabrata (12.7%), Candida tropicalis (5.8%), Candida krusei (4%), and others (1.8%). Overall susceptibility to fluconazole was 79.2%. Cumulative mortality at 7 and 30 days after the first episode of candidemia was 16.5% and 47%, respectively. Multivariate analysis showed that early appropriate antifungal treatment and catheter removal (odds ratio, 0.27; 95% CI, 0.08-0.91), Acute Physiology and Chronic Health Evaluation II score (odds ratio, 1.11; 95% CI, 1.04-1.19), and abdominal source (odds ratio, 8.15; 95% CI, 1.75-37.93) were independently associated with early mortality. Determinants of late mortality were age (odds ratio, 1.04; 95% CI, 1.01-1.07), intubation (odds ratio, 7.24; 95% CI, 2.24-23.40), renal replacement therapy (odds ratio, 6.12; 95% CI, 2.24-16.73), and primary source (odds ratio, 2.51; 95% CI, 1.06-5.95).\n\n\nCONCLUSIONS\nCandidemia in ICU patients is caused by non-albicans species in 48% of cases, C. parapsilosis being the most common among these. Overall mortality remains high and mainly related with host factors. Prompt adequate antifungal treatment and catheter removal could be critical to decrease early mortality.", "title": "" }, { "docid": "50c493ce0ac1f60889fb2a4b490fc939", "text": "Future cellular networks will be of high capacity and heterogeneity. The structure and architecture will require high efficiency and scalability in network operation and management. In this paper, we address main requirements and challenges of future cellular networks and introduce network function virtualisation (NFV) with software defined networking (SDN) to realize the self-organizing (SO) scheme. NFV integrates the hardware appliances together in industry standard servers. And SDN performs as core controller of the network. The proposed SO scheme is based on soft fractional frequency reuse (SFFR) framework. The scheme takes different traffic demands into consideration and allocates the power adaptively. Finally the system is proved to be more scalable, energy-saving, and intelligent.", "title": "" }, { "docid": "692d57348ed0d23b8398303864219691", "text": "This paper considers the problem of subspace clustering under noise. Specifically, we study the behavior of Sparse Subspace Clustering (SSC) when either adversarial or random noise is added to the unlabelled input data points, which are assumed to lie in a union of low-dimensional subspaces. We show that a modified version of SSC is provably effective in correctly identifying the underlying subspaces, even with noisy data. This extends theoretical guarantee of this algorithm to the practical setting and provides justification to the success of SSC in a class of real applications.", "title": "" } ]
scidocsrr
08e280ff6065a62942692d51219d42de
A new modeling methodology for continuous cuffless blood pressure measurement
[ { "docid": "587f7821fc7ecfe5b0bbbd3b08b9afe2", "text": "The most commonly used method for cuffless blood pressure (BP) measurement is using pulse transit time (PTT), which is based on Moens-Korteweg (M-K) equation underlying the assumption that arterial geometries such as the arterial diameter keep unchanged. However, the arterial diameter is dynamic which varies over the cardiac cycle, and it is regulated through the contraction or relaxation of the vascular smooth muscle innervated primarily by the sympathetic nervous system. This may be one of the main reasons that impair the BP estimation accuracy. In this paper, we propose a novel indicator, the photoplethysmogram (PPG) intensity ratio (PIR), to evaluate the arterial diameter change. The deep breathing (DB) maneuver and Valsalva maneuver (VM) were performed on five healthy subjects for assessing parasympathetic and sympathetic nervous activities, respectively. Heart rate (HR), PTT, PIR and BP were measured from the simultaneously recorded electrocardiogram (ECG), PPG, and continuous BP. It was found that PIR increased significantly from inspiration to expiration during DB, whilst BP dipped correspondingly. Nevertheless, PIR changed positively with BP during VM. In addition, the spectral analysis revealed that the dominant frequency component of PIR, HR and SBP, shifted significantly from high frequency (HF) to low frequency (LF), but not obvious in that of PTT. These results demonstrated that PIR can be potentially used to evaluate the smooth muscle tone which modulates arterial BP in the LF range. The PTT-based BP measurement that take into account the PIR could therefore improve its estimation accuracy.", "title": "" } ]
[ { "docid": "77da685bf71a77a6ddca71d1cbff6501", "text": "Interpersonal forgiving was conceptualized in the context of a 2-factor motivational system that governs people's responses to interpersonal offenses. Four studies were conducted to examine the extent to which forgiving could be predicted with relationship-level variables such as satisfaction, commitment, and closeness; offense-level variables such as apology and impact of the offense; and social-cognitive variables such as offender-focused empathy and rumination about the offense. Also described is the development of the transgression-related interpersonal motivations inventory--a self-report measure designed to assess the 2-component motivational system (Avoidance and Revenge) posited to underlie forgiving. The measure demonstrated a variety of desirable psychometric properties, commending its use for future research. As predicted, empathy, apology, rumination, and several indexes of relationship closeness were associated with self-reported forgiving.", "title": "" }, { "docid": "536e7bfef009c07075bb6b7c8a626c89", "text": "This paper proposes a method which combines Sobel edge detection operator and soft-threshold wavelet de-noising to do edge detection on images which include White Gaussian noises. In recent years, a lot of edge detection methods are proposed. The commonly used methods which combine mean de-noising and Sobel operator or median filtering and Sobel operator can not remove salt and pepper noise very well. In this paper, we firstly use soft-threshold wavelet to remove noise, then use Sobel edge detection operator to do edge detection on the image. This method is mainly used on the images which includes White Gaussian noises. Through the pictures obtained by the experiment, we can see very clearly that, compared to the traditional edge detection methods, the method proposed in this paper has a more obvious effect on edge detection.", "title": "" }, { "docid": "d299f1ff3249a68b582494713e02a6bd", "text": "We consider the Vehicle Routing Problem, in which a fixed fleet of delivery vehicles of uniform capacity must service known customer demands for a single commodity from a common depot at minimum transit cost. This difficult combinatorial problem contains both the Bin Packing Problem and the Traveling Salesman Problem (TSP) as special cases and conceptually lies at the intersection of these two well-studied problems. The capacity constraints of the integer programming formulation of this routing model provide the link between the underlying routing and packing structures. We describe a decomposition-based separation methodology for the capacity constraints that takes advantage of our ability to solve small instances of the TSP efficiently. Specifically, when standard procedures fail to separate a candidate point, we attempt to decompose it into a convex combination of TSP tours; if successful, the tours present in this decomposition are examined for violated capacity constraints; if not, the Farkas Theorem provides a hyperplane separating the point from the TSP polytope. We present some extensions of this basic concept and a general framework within which it can be applied to other combinatorial models. Computational results are given for an implementation within the parallel branch, cut, and price framework SYMPHONY.", "title": "" }, { "docid": "81cf3581955988c71b58e7a097ea00bd", "text": "Graph coloring has been employed since the 1980s to efficiently compute sparse Jacobian and Hessian matrices using either finite differences or automatic differentiation. Several coloring problems occur in this context, depending on whether the matrix is a Jacobian or a Hessian, and on the specifics of the computational techniques employed. We consider eight variant vertex coloring problems here. This article begins with a gentle introduction to the problem of computing a sparse Jacobian, followed by an overview of the historical development of the research area. Then we present a unifying framework for the graph models of the variant matrix estimation problems. The framework is based upon the viewpoint that a partition of a matrix into structurally orthogonal groups of columns corresponds to distance-2 coloring an appropriate graph representation. The unified framework helps integrate earlier work and leads to fresh insights; enables the design of more efficient algorithms for many problems; leads to new algorithms for others; and eases the task of building graph models for new problems. We report computational results on two of the coloring problems to support our claims. Most of the methods for these problems treat a column or a row of a matrix as an atomic entity, and partition the columns or rows (or both). A brief review of methods that do not fit these criteria is provided. We also discuss results in discrete mathematics and theoretical computer science that intersect with the topics considered here.", "title": "" }, { "docid": "c253083ab44c842819059ad64781d51d", "text": "RGB-D data is getting ever more interest from the research community as both cheap cameras appear in the market and the applications of this type of data become more common. A current trend in processing image data is the use of convolutional neural networks (CNNs) that have consistently beat competition in most benchmark data sets. In this paper we investigate the possibility of transferring knowledge between CNNs when processing RGB-D data with the goal of both improving accuracy and reducing training time. We present experiments that show that our proposed approach can achieve both these goals.", "title": "" }, { "docid": "61f9b5b698c847bfb6316fdb5481d529", "text": "We present a feature vector formation technique for documents Sparse Composite Document Vector (SCDV) which overcomes several shortcomings of the current distributional paragraph vector representations that are widely used for text representation. In SCDV, word embeddings are clustered to capture multiple semantic contexts in which words occur. They are then chained together to form document topic-vectors that can express complex, multi-topic documents. Through extensive experiments on multi-class and multi-label classification tasks, we outperform the previous state-of-the-art method, NTSG (Liu et al., 2015a). We also show that SCDV embeddings perform well on heterogeneous tasks like Topic Coherence, context-sensitive Learning and Information Retrieval. Moreover, we achieve significant reduction in training and prediction times compared to other representation methods. SCDV achieves best of both worlds better performance with lower time and space complexity.", "title": "" }, { "docid": "c097c63ed1b33fd0e1a2432ec5ac82cb", "text": "In our previous research we developed a SmartShoe-a shoe based physical activity monitor that can reliably differentiate between major postures and activities, accurately estimate energy expenditure of individuals, measure temporal gait parameters, and estimate body weights. In this paper we present the development of the next stage of the SmartShoe evolution-SmartStep, a physical activity monitor that is fully integrated into an insole, maximizing convenience and social acceptance of the monitor. Encapsulating the sensors, Bluetooth Low Energy wireless interface and the energy source within an assembly repeatedly loaded with high forces created during ambulation presented new design challenges. In this preliminary study we tested the ability of the SmartStep to measure the pressure differences between static weight-bearing and non-weight-bearing activities (such as no load vs. sitting vs. standing) as well as capture pressure variations during walking. We also measured long-term stability of the sensors and insole assembly under cyclic loading in a mechanical testing system.", "title": "" }, { "docid": "bdde191440caa21c1f162ffa70f8075f", "text": "There is a strong trend in using permanent magnet synchronous machines for very high speed, high power applications due to their high efficiencies, versatility and compact nature. To increase power output for a given speed, rotor design becomes critical in order to maximize rotor volume and hence torque output for a given electrical loading and cooling capability. The two main constraints on rotor volume are mechanical, characterized by stresses in the rotor and resonant speeds of the rotor assembly. The level of mechanical stresses sustained in rotors increases with their radius and speed and, as this is pushed higher, previously minor effects become important in rotor design. This paper describes an observed shear stress concentration in sleeved permanent magnet rotors, caused by the Poisson effect, which can lead to magnet cracking and rotor failure. A simple analytical prediction of the peak shear stress is presented and methods for mitigating it are recommended.", "title": "" }, { "docid": "ad4b5ceb71c2df532744b141bc5c4d91", "text": "Twitter is an efficient conduit of information for millions of users around the world. Its ability to quickly spread information to a large number of people makes it an efficient way to shape information and, hence, shape public opinion. We study the tweeting behavior of Twitter propagandists, users who consistently express the same opinion or ideology, focusing on two online communities: the 2010 Nevada senate race and the 2011 debt-ceiling debate. We identify several extreme tweeting patterns that could characterize users who spread propaganda: (1) sending high volumes of tweets over short periods of time, (2) retweeting while publishing little original content, (3) quickly retweeting, and (4) colluding with other, seemingly unrelated, users to send duplicate or near-duplicate messages on the same topic simultaneously. These four features appear to distinguish tweeters who spread propaganda from other more neutral users and could serve as starting point for developing behavioral-based propaganda detection techniques for Twitter.", "title": "" }, { "docid": "023d0d2f03f6f6019dacd1bc7bd23297", "text": "Temporal logic comes in two varieties: linear-time temporal logic assumes implicit universal quantification over all paths that are generated by system moves; branching-time temporal logic allows explicit existential and universal quantification over all paths. We introduce a third, more general variety of temporal logic: alternating-time temporal logic offers selective quantification over those paths that are possible outcomes of games, such as the game in which the system and the environment alternate moves. While linear-time and branching-time logics are natural specification languages for closed systems, alternative-time logics are natural specification languages for open systems. For example, by preceding the temporal operator \"eventually\" with a selective path quantifier, we can specify that in the game between the system and the environment, the system has a strategy to reach a certain state. Also, the problems of receptiveness, realizability, and controllability can be formulated as model-checking problems for alternating-time formulas. Depending on whether we admit arbitrary nesting of selective path quantifiers and temporal operators, we obtain the two alternating-time temporal logics ATL and ATL*. We interpret the formulas of ATL and ATL* over alternating transition systems. While in ordinary transitory systems, each transition corresponds to a possible step of the system, in alternating transition systems, each transition corresponds to a possible move in the game between the system and the environment. Fair alternating transition systems can capture both synchronous and asynchronous compositions f open systems. For synchronous systems, the expressive power of ATL beyond CTL comes at no cost: the model-checking complexity of synchronous ATL is linear in the size of the system and the length of the formula. The symbolic model-checking algorithm for CTL extends with few modifications to synchronous ATL, and with some work, also to asynchronous to ATL, whose model-checking complexity is quadratic. This makes ATL an obvious candidate for the automatic verification of open systems. In the case of ATL*, the model-checking problem is closely related to the synthesis problem for linear-time formulas, and requires doubly exponential time for both synchronous and asynchronous", "title": "" }, { "docid": "d47c5f2b5fea54e0f650869d0d45ac25", "text": "Time-varying, smooth trajectory estimation is of great interest to the vision community for accurate and well behaving 3D systems. In this paper, we propose a novel principal component local regression filter acting directly on the Riemannian manifold of unit dual quaternions DH1. We use a numerically stable Lie algebra of the dual quaternions together with exp and log operators to locally linearize the 6D pose space. Unlike state of the art path smoothing methods which either operate on SO (3) of rotation matrices or the hypersphere H1 of quaternions, we treat the orientation and translation jointly on the dual quaternion quadric in the 7-dimensional real projective space RP7. We provide an outlier-robust IRLS algorithm for generic pose filtering exploiting this manifold structure. Besides our theoretical analysis, our experiments on synthetic and real data show the practical advantages of the manifold aware filtering on pose tracking and smoothing.", "title": "" }, { "docid": "17a336217e717dfedd7fa9f96a28da80", "text": "Context: Competitions for self-driving cars facilitated the development and research in the domain of autonomous vehicles towards potential solutions for the future mobility. Objective: Miniature vehicles can bridge the gap between simulation-based evaluations of algorithms relying on simplified models, and those time-consuming vehicle tests on real-scale proving grounds. Method: This article combines findings from a systematic literature review, an in-depth analysis of results and technical concepts from contestants in a competition for self-driving miniature cars, and experiences of participating in the 2013 competition for self-driving cars. Results: A simulation-based development platform for real-scale vehicles has been adapted to support the development of a self-driving miniature car. Furthermore, a standardized platform was designed and realized to enable research and experiments in the context of future mobility solutions. Conclusion: A clear separation between algorithm conceptualization and validation in a model-based simulation environment enabled efficient and riskless experiments and validation. The design of a reusable, low-cost, and energy-efficient hardware architecture utilizing a standardized software/hardware interface enables experiments, which would otherwise require resources like a large real-scale", "title": "" }, { "docid": "540939a50153fb3c36eadf4d70c9cf5e", "text": "Internal dual-band planar inverted-F antenna (PIFA) diversity system for portable devices, operating in the 2.4-GHz band (2400-2484MHz) and 5.2-GHz band (5150-5350MHz), is presented. To reduce the mutual coupling and get the high isolation between the two internal dual-band antennas, we proposed the band-notched lambda/4 slots on the ground plane. The optimized band-notched slots for high isolation, high radiation efficiency and high effective diversity gain are analyzed. The band-notched slots can be used to the small MIMO terminals which require high isolation between antennas", "title": "" }, { "docid": "0d91d17b5b4e8d71777ec28fb5781d64", "text": "Before we apply nonlinear techniques, e.g. those inspired by chaos theory, to dynamical phenomena occurring in nature, it is necessary to first ask if the use of such advanced techniques is justified by the data. While many processes in nature seem very unlikely a priori to be linear, the possible nonlinear nature might not be evident in specific aspects of their dynamics. The method of surrogate data has become a very popular tool to address such a question. However, while it was meant to provide a statistically rigorous, foolproof framework, some limitations and caveats have shown up in its practical use. In this paper, recent efforts to understand the caveats, avoid the pitfalls, and to overcome some of the limitations, are reviewed and augmented by new material. In particular, we will discuss specific as well as more general approaches to constrained randomisation, providing a full range of examples. New algorithms will be introduced for unevenly sampled and multivariate data and for surrogate spike trains. The main limitation, which lies in the interpretability of the test results, will be illustrated through instructive case studies. We will also discuss some implementational aspects of the realisation of these methods in the TISEAN software package. © 2000 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "9a1d6be6fbce508e887ee4e06a932cd2", "text": "For ranked search in encrypted cloud data, order preserving encryption (OPE) is an efficient tool to encrypt relevance scores of the inverted index. When using deterministic OPE, the ciphertexts will reveal the distribution of relevance scores. Therefore, Wang et al. proposed a probabilistic OPE, called one-to-many OPE, for applications of searchable encryption, which can flatten the distribution of the plaintexts. In this paper, we proposed a differential attack on one-to-many OPE by exploiting the differences of the ordered ciphertexts. The experimental results show that the cloud server can get a good estimate of the distribution of relevance scores by a differential attack. Furthermore, when having some background information on the outsourced documents, the cloud server can accurately infer the encrypted keywords using the estimated distributions.", "title": "" }, { "docid": "9c8583dd46ef6ca49d7a9298377b755a", "text": "Traditional radio planning tools present a steep learning curve. We present BotRf, a Telegram Bot that facilitates the process by guiding non-experts in assessing the feasibility of radio links. Built on open source tools, BotRf can run on any smartphone or PC running Telegram. Using it on a smartphone has the added value that the Bot can leverage the internal GPS to enter coordinates. BotRf can be used in environments with low bandwidth as the generated data traffic is quite limited. We present examples of its use in Venezuela.", "title": "" }, { "docid": "dd00403e14f6ce3ecb881bffc36b6b80", "text": "This study aims to investigate the level of usage of this social networking application (WhatsApp messenger) and identify the impact of WhatsApp messenger on the quality of education through improving the interaction of instructor-student communication, and student-student communication in which they can create, share and/or exchange information and ideas in an e-learning environment. The researchers conducted this pilot study focusing on exploring the following scopes : The effectiveness of WhatsApp on academic performance among students in UAE, Exploring the common activities that the students undertake when using WhatsApp messenger, The extent to which students use WhatsApp in academic environments, whether this technological platform has affected the social behavior and interactions of students inside the classroom and the overall impact of WhatsApp on educational levels and quality compared to the common educational standards. Applied.data is collected through a questionnaire administered on a random sample of 100 UAE university students. Respondents were students enrolled in the Canadian University and Al Dar University during the academic year 2015-2016 and studying an array of specializations. Results show strong positive indicators that there are distinct differences between the face to face formal teaching method and the e-learning method applied via WhatsApp. Indicators show that the learning environment being influenced by multiple variables, therefore there is a growing need for more innovative teaching methods that make the experience more engaging.", "title": "" }, { "docid": "e7d5fcf04bdab007a1778c665aeba50a", "text": "There is a growing emphasis on the relationship between the microorganisms inhabiting the gut (gastrointestinal microbiota) and human health. The emergence of a microbiota-gut-brain axis to describe the complex networks and relationship between the gastrointestinal microbiota and host reflects the major influence this environment may have in brain health and disorders of the central nervous system (CNS). Bidirectional communication between the microbiota and the CNS occurs through autonomic, neuroendocrine, enteric, and immune system pathways. Potential neurobiological mechanisms through which disruptions in this network may impact health and disease include hypothalamic-pituitary-adrenal (HPA)-axis activation, and altered activity of neurotransmitter and immune systems. Perturbations of the gut microbial community have already been implicated in multiple host diseases such as obesity, diabetes, and inflammation, while recent evidence suggests a potential role of the microbiota-gut-brain axis in neuropsychiatric disorders, such as depression and anxiety. Here, we review the current literature related to the influence of the gut microbial community on central nervous system function, with a specific focus on anxiety and depressive symptoms. The role of stress and stress-mediated changes in autonomic, neuroendocrine, immune, and neurotransmitter systems are examined, followed by a discussion of the role of the microbiota in novel gastrointestinal-based treatment options for the prevention and treatment of brain-based disorders such as anxiety and depression.", "title": "" } ]
scidocsrr
e5c2105d8766b5c9ed70a2963beb54fa
Power Approaches for Implantable Medical Devices
[ { "docid": "108058f1814d7520003b44f1ffc99cb5", "text": "The process of acquiring the energy surrounding a system and converting it into usable electrical energy is termed power harvesting. In the last few years, there has been a surge of research in the area of power harvesting. This increase in research has been brought on by the modern advances in wireless technology and low-power electronics such as microelectromechanical systems. The advances have allowed numerous doors to open for power harvesting systems in practical real-world applications. The use of piezoelectric materials to capitalize on the ambient vibrations surrounding a system is one method that has seen a dramatic rise in use for power harvesting. Piezoelectric materials have a crystalline structure that provides them with the ability to transform mechanical strain energy into electrical charge and, vice versa, to convert an applied electrical potential into mechanical strain. This property provides these materials with the ability to absorb mechanical energy from their surroundings, usually ambient vibration, and transform it into electrical energy that can be used to power other devices. While piezoelectric materials are the major method of harvesting energy, other methods do exist; for example, one of the conventional methods is the use of electromagnetic devices. In this paper we discuss the research that has been performed in the area of power harvesting and the future goals that must be achieved for power harvesting systems to find their way into everyday use.", "title": "" } ]
[ { "docid": "f4401e483c519e1f2d33ee18ea23b8d7", "text": "Cultivation of mindfulness, the nonjudgmental awareness of experiences in the present moment, produces beneficial effects on well-being and ameliorates psychiatric and stress-related symptoms. Mindfulness meditation has therefore increasingly been incorporated into psychotherapeutic interventions. Although the number of publications in the field has sharply increased over the last two decades, there is a paucity of theoretical reviews that integrate the existing literature into a comprehensive theoretical framework. In this article, we explore several components through which mindfulness meditation exerts its effects: (a) attention regulation, (b) body awareness, (c) emotion regulation (including reappraisal and exposure, extinction, and reconsolidation), and (d) change in perspective on the self. Recent empirical research, including practitioners' self-reports and experimental data, provides evidence supporting these mechanisms. Functional and structural neuroimaging studies have begun to explore the neuroscientific processes underlying these components. Evidence suggests that mindfulness practice is associated with neuroplastic changes in the anterior cingulate cortex, insula, temporo-parietal junction, fronto-limbic network, and default mode network structures. The authors suggest that the mechanisms described here work synergistically, establishing a process of enhanced self-regulation. Differentiating between these components seems useful to guide future basic research and to specifically target areas of development in the treatment of psychological disorders.", "title": "" }, { "docid": "d5696c9118437b81dc1818ecd8f18741", "text": "The contribution of this paper is to propose and experimentally validate an optimizing control strategy for power kites flying crosswind. The algorithm ensures the kite follows a reference path (control) and also periodically optimizes the reference path (efficiency optimization). The path-following part of the controller is capable of consistently following a reference path, despite significant time delays and wind variations, using position measurements only. The path-optimization part adjusts the reference path in order to maximize line tension. It uses a real-time optimization algorithm that combines off-line modeling knowledge and on-line measurements. The algorithm has been tested comprehensively on a small-scale prototype, and this paper focuses on experimental results.", "title": "" }, { "docid": "e38aa8466226257ca85e3fe0e709edc9", "text": "Recently, recurrent neural networks (RNNs) as powerful sequence models have re-emerged as a potential acoustic model for statistical parametric speech synthesis (SPSS). The long short-term memory (LSTM) architecture is particularly attractive because it addresses the vanishing gradient problem in standard RNNs, making them easier to train. Although recent studies have demonstrated that LSTMs can achieve significantly better performance on SPSS than deep feedforward neural networks, little is known about why. Here we attempt to answer two questions: a) why do LSTMs work well as a sequence model for SPSS; b) which component (e.g., input gate, output gate, forget gate) is most important. We present a visual analysis alongside a series of experiments, resulting in a proposal for a simplified architecture. The simplified architecture has significantly fewer parameters than an LSTM, thus reducing generation complexity considerably without degrading quality.", "title": "" }, { "docid": "44665a3d2979031aca85010b9ad1ec90", "text": "Studies in humans and non-human primates have provided evidence for storage of working memory contents in multiple regions ranging from sensory to parietal and prefrontal cortex. We discuss potential explanations for these distributed representations: (i) features in sensory regions versus prefrontal cortex differ in the level of abstractness and generalizability; and (ii) features in prefrontal cortex reflect representations that are transformed for guidance of upcoming behavioral actions. We propose that the propensity to produce persistent activity is a general feature of cortical networks. Future studies may have to shift focus from asking where working memory can be observed in the brain to how a range of specialized brain areas together transform sensory information into a delayed behavioral response.", "title": "" }, { "docid": "c613138270b05f909904519d195fcecf", "text": "This study deals with artificial neural network (ANN) modeling a diesel engine using waste cooking biodiesel fuel to predict the brake power, torque, specific fuel consumption and exhaust emissions of engine. To acquire data for training and testing the proposed ANN, two cylinders, four-stroke diesel engine was fuelled with waste vegetable cooking biodiesel and diesel fuel blends and operated at different engine speeds. The properties of biodiesel produced from waste vegetable oil was measured based on ASTM standards. The experimental results reveal that blends of waste vegetable oil methyl ester with diesel fuel provide better engine performance and improved emission characteristics. Using some of the experimental data for training, an ANN model based on standard Back-Propagation algorithm for the engine was developed. Multi layer perception network (MLP) was used for nonlinear mapping between the input and the output parameters. Different activation functions and several rules were used to assess the percentage error between the desired and the predicted values. It was observed that the ANN model can predict the engine performance and exhaust emissions quite well with correlation coefficient (R) were 0.9487, 0.999, 0.929 and 0.999 for the engine torque, SFC, CO and HC emissions, respectively. The prediction MSE (Mean Square Error) error was between the desired outputs as measured values and the simulated values by the model was obtained as 0.0004.", "title": "" }, { "docid": "2e99e535f2605e88571407142e4927ee", "text": "Stability is a common tool to verify the validity of sample based algorithms. In clustering it is widely used to tune the parameters of the algorithm, such as the number k of clusters. In spite of the popularity of stability in practical applications, there has been very little theoretical analysis of this notion. In this paper we provide a formal definition of stability and analyze some of its basic properties. Quite surprisingly, the conclusion of our analysis is that for large sample size, stability is fully determined by the behavior of the objective function which the clustering algorithm is aiming to minimize. If the objective function has a unique global minimizer, the algorithm is stable, otherwise it is unstable. In particular we conclude that stability is not a well-suited tool to determine the number of clusters it is determined by the symmetries of the data which may be unrelated to clustering parameters. We prove our results for center-based clusterings and for spectral clustering, and support our conclusions by many examples in which the behavior of stability is counter-intuitive.", "title": "" }, { "docid": "cbe58b6e45c8716411f7854b0cf03d49", "text": "Before a person suffering from a traumatic brain injury reaches a medical facility, measuring their pupillary light reflex (PLR) is one of the few quantitative measures a clinician can use to predict their outcome. We propose PupilScreen, a smartphone app and accompanying 3D-printed box that combines the repeatability, accuracy, and precision of a clinical device with the ubiquity and convenience of the penlight test that clinicians regularly use in emergency situations. The PupilScreen app stimulates the patient's eyes using the smartphone's flash and records the response using the camera. The PupilScreen box, akin to a head-mounted virtual reality display, controls the eyes' exposure to light. The recorded video is processed using convolutional neural networks that track the pupil diameter over time, allowing for the derivation of clinically relevant measures. We tested two different network architectures and found that a fully convolutional neural network was able to track pupil diameter with a median error of 0.30 mm. We also conducted a pilot clinical evaluation with six patients who had suffered a TBI and found that clinicians were almost perfect when separating unhealthy pupillary light reflexes from healthy ones using PupilScreen alone.", "title": "" }, { "docid": "3dcf5f63798458ed697a23664675f2fe", "text": "Volatility plays crucial roles in financial markets, such as in derivative pricing, portfolio risk management, and hedging strategies. Therefore, accurate prediction of volatility is critical. We propose a new hybrid long short-term memory (LSTM) model to forecast stock price volatility that combines the LSTM model with various generalized autoregressive conditional heteroscedasticity (GARCH)-type models. We use KOSPI 200 index data to discover proposed hybrid models that combine an LSTM with one to three GARCH-type models. In addition, we compare their performance with existing methodologies by analyzing single models, such as the GARCH, exponential GARCH, exponentially weighted moving average, a deep feedforward neural network (DFN), and the LSTM, as well as the hybrid DFN models combining a DFN with one GARCH-type model. Their performance is compared with that of the proposed hybrid LSTM models. We discover that GEW-LSTM, a proposed hybrid model combining the LSTM model with three GARCH-type models, has the lowest prediction errors in terms of mean absolute error (MAE), mean squared error (MSE), heteroscedasticity adjusted MAE (HMAE), and heteroscedasticity adjusted MSE (HMSE). The MAE of GEW-LSTM is 0.0107, which is 37.2% less than that of the E-DFN (0.017), the model combining EGARCH and DFN and the best model among those existing. In addition, the GEWLSTM has 57.3%, 24.7%, and 48% smaller MSE, HMAE, and HMSE, respectively. The first contribution of this study is its hybrid LSTM model that combines excellent sequential pattern learning with improved prediction performance in stock market volatility. Second, our proposed model markedly enhances prediction performance of the existing literature by combining a neural network model with multiple econometric models rather than only a single econometric model. Finally, the proposed methodology can be extended to various fields as an integrated model combining time-series and neural network models as well as forecasting stock market volatility.", "title": "" }, { "docid": "9b85018faaa87dc6bf197ea1eee426e2", "text": "Currently, a large number of industrial data, usually referred to big data, are collected from Internet of Things (IoT). Big data are typically heterogeneous, i.e., each object in big datasets is multimodal, posing a challenging issue on the convolutional neural network (CNN) that is one of the most representative deep learning models. In this paper, a deep convolutional computation model (DCCM) is proposed to learn hierarchical features of big data by using the tensor representation model to extend the CNN from the vector space to the tensor space. To make full use of the local features and topologies contained in the big data, a tensor convolution operation is defined to prevent overfitting and improve the training efficiency. Furthermore, a high-order backpropagation algorithm is proposed to train the parameters of the deep convolutional computational model in the high-order space. Finally, experiments on three datasets, i.e., CUAVE, SNAE2, and STL-10 are carried out to verify the performance of the DCCM. Experimental results show that the deep convolutional computation model can give higher classification accuracy than the deep computation model or the multimodal model for big data in IoT.", "title": "" }, { "docid": "32598fba1f5e7507113d89ad1978e867", "text": "Good motion data is costly to create. Such an expense often makes the reuse of motion data through transformation and retargetting a more attractive option than creating new motion from scratch. Reuse requires the ability to search automatically and efficiently a growing corpus of motion data, which remains a difficult open problem. We present a method for quickly searching long, unsegmented motion clips for subregions that most closely match a short query clip. Our search algorithm is based on a weighted PCA-based pose representation that allows for flexible and efficient pose-to-pose distance calculations. We present our pose representation and the details of the search algorithm. We evaluate the performance of a prototype search application using both synthetic and captured motion data. Using these results, we propose ways to improve the application's performance. The results inform a discussion of the algorithm's good scalability characteristics.", "title": "" }, { "docid": "b5c8d34b75dbbfdeb666fd76ef524be7", "text": "Systematic Literature Reviews (SLR) may not provide insight into the \"state of the practice\" in SE, as they do not typically include the \"grey\" (non-published) literature. A Multivocal Literature Review (MLR) is a form of a SLR which includes grey literature in addition to the published (formal) literature. Only a few MLRs have been published in SE so far. We aim at raising the awareness for MLRs in SE by addressing two research questions (RQs): (1) What types of knowledge are missed when a SLR does not include the multivocal literature in a SE field? and (2) What do we, as a community, gain when we include the multivocal literature and conduct MLRs? To answer these RQs, we sample a few example SLRs and MLRs and identify the missing and the gained knowledge due to excluding or including the grey literature. We find that (1) grey literature can give substantial benefits in certain areas of SE, and that (2) the inclusion of grey literature brings forward certain challenges as evidence in them is often experience and opinion based. Given these conflicting viewpoints, the authors are planning to prepare systematic guidelines for performing MLRs in SE.", "title": "" }, { "docid": "72041ae7e06d3c35701726a6c878c081", "text": "This paper presents a compression algorithm for color filter array (CFA) images in a wireless capsule endoscopy system. The proposed algorithm consists of a new color space transformation (known as YLMN), a raster-order prediction model, and a single context adaptive Golomb–Rice encoder to encode the residual signal with variable length coding. An optimum reversible color transformation derivation model is presented first, which incorporates a prediction model to find the optimum color transformation. After the color transformation, each color component has been independently encoded with a low complexity raster-order prediction model and Golomb–Rice encoder. The algorithm is implemented using a TSMC 65-nm CMOS process, which shows a reduction in gate count by 38.9% and memory requirement by 71.2% compared with existing methods. Performance assessment using CFA database shows the proposed design can outperform existing lossless and near-lossless compression algorithms by a large margin, which makes it suitable for capsule endoscopy application.", "title": "" }, { "docid": "d199e473a8a22618c9040fd345254b10", "text": "One of the first questions a researcher or designer of wearable technology has to answer in the design process is where on the body the device should be worn. It has been almost 20 years since Gemperle et al. wrote \"Design for Wearability\" [17], and although much of her initial guidelines on humans factors surrounding wearability still stand, devices and use cases have changed over time. This paper is a collection of literature and updated guidelines and reasons for on-body location depending on the use of the wearable technology and the affordances provided by different locations on the body.", "title": "" }, { "docid": "047676c0e4ebf98a66136897b3e7658d", "text": "Ever increasing numbers of users are surfing the net via an LTE access network. It has been predicted that three quarters (75%) of the world's mobile data traffic will be video-based by 2020. As the video space grows, media companies have been using adaptive bitrate technology for many years. The MPEG-DASH is the widely used HTTP-based adaptive streaming solution based on TCP. To address the bandwidth utilization issue, in this paper we investigate the ETSI Mobile Edge Computing (MEC) Intelligent Video Acceleration Service mechanism to improve video transmission over 4G LTE. Specifically, with the radio information provided by the MEC server, the video server can adaptively transmit just one copy of suitable bitrate data based on the throughput. We use OpenAirInterface (OAI), a 4G compliance emulator, as our testbed to implement and verify our proposed MEC-based adaptive video transmission mechanism. We design and implement a “filter” module in the Medium Access Control (MAC) layer over the OAI platform, which can reference Channel Quality Indicator (CQI) as a parameter to decide which bitrate type of data should be passed to the MAC Packet Scheduler for real resource allocation. By using constant-bitrate as our control groups, the testbed indicates that, consistent with our expectations, our mechanism can significantly benefit from lower latency with a reasonable throughput.", "title": "" }, { "docid": "7aa5bf782622f2f0247dce09dcb23077", "text": "In the wake of the digital revolution we will see a dramatic transformation of our economy and societal institutions. While the benefits of this transformation can be massive, there are also tremendous risks. The fundaments of autonomous decision-making, human dignity, and democracy are shaking. After the automation of production processes and vehicle operation, the automation of society is next. This is moving us to a crossroads: we must decide between a society in which the actions are determined in a top-down way and then implemented by coercion or manipulative technologies or a society, in which decisions are taken in a free and participatory way. Modern information and communication systems enable both, but the latter has economic and strategic benefits.", "title": "" }, { "docid": "d8f21e77a60852ea83f4ebf74da3bcd0", "text": "In recent years different lines of evidence have led to the idea that motor actions and movements in both vertebrates and invertebrates are composed of elementary building blocks. The entire motor repertoire can be spanned by applying a well-defined set of operations and transformations to these primitives and by combining them in many different ways according to well-defined syntactic rules. Motor and movement primitives and modules might exist at the neural, dynamic and kinematic levels with complicated mapping among the elementary building blocks subserving these different levels of representation. Hence, while considerable progress has been made in recent years in unravelling the nature of these primitives, new experimental, computational and conceptual approaches are needed to further advance our understanding of motor compositionality.", "title": "" }, { "docid": "13cb793ca9cdf926da86bb6fc630800a", "text": "In this paper, we present the first formal study of how mothers of young children (aged three and under) use social networking sites, particularly Facebook and Twitter, including mothers' perceptions of which SNSes are appropriate for sharing information about their children, changes in post style and frequency after birth, and the volume and nature of child-related content shared in these venues. Our findings have implications for improving the utility and usability of SNS tools for mothers of young children, as well as for creating and improving sociotechnical systems related to maternal and child health.", "title": "" }, { "docid": "6dc6d3be0cbfd280efc81adef6182d0d", "text": "This paper aims to trace the development of management accounting systems (MAS) in a Portuguese bank, where an activity based costing system (ABC) is being trialled for implementation, as a means to improving the economy, efficiency and effectiveness of employee activity. The culture of banking in Portugal has changed significantly over the last 25 years, but at the same time there are older traditions which remain powerful. It will therefore be significant to study how an imported MAS like ABC is developed and disseminated within a Portuguese banking context. The research can be classified as a longitudinal study of organisational change using a single case study. It draws on Morgan and Sturdy’s (2000) critical framework for exploring change through three lenses – changing structures, changing discourses and the effect of both these processes on power and inequality. The study provides new insights into how management accounting practices, along with other organisational systems, play an important role questioning, visualising, analysing, and measuring implemented strategies. These practices have an important influence on strategic decision-making, and help legitimate action. As the language and practice of management have shifted towards strategy and marketing discourses, patterns of work, organisation and career are being restructured.", "title": "" }, { "docid": "781ef0722d8a03024924a556aa1dc61e", "text": "Digital 3D mosaics generation is a current trend of NPR (Non Photorealistic Rendering) field; in this demo we present an interactive system realized in JAVA where the user can simulate ancient mosaic in a 3D environment starting for any input image. Different simulation engines able to render the so-called \"Opus Musivum\"and \"Opus Vermiculatum\" are employed. Different parameters can be dynamically adjusted to obtain very impressive results.", "title": "" } ]
scidocsrr
19cdc20d809867c77bb0f325b220d1d2
LMPP: A Large Margin Point Process Combining Reinforcement and Competition for Modeling Hashtag Popularity
[ { "docid": "dafd0e92a6f06bf488c2a52a3e439ffb", "text": "Twitter (and similar microblogging services) has become a central nexus for discussion of the topics of the day. Twitter data contains rich content and structured information on users’ topics of interest and behavior patterns. Correctly analyzing and modeling Twitter data enables the prediction of the user behavior and preference in a variety of practical applications, such as tweet recommendation and followee recommendation. Although a number of models have been developed on Twitter data in prior work, most of these only model the tweets from users, while neglecting their valuable retweet information in the data. Models would enhance their predictive power by incorporating users’ retweet content as well as their retweet behavior. In this paper, we propose two novel Bayesian nonparametric models, URM and UCM, on retweet data. Both of them are able to integrate the analysis of tweet text and users’ retweet behavior in the same probabilistic framework. Moreover, they both jointly model users’ interest in tweet and retweet. As nonparametric models, URM and UCM can automatically determine the parameters of the models based on input data, avoiding arbitrary parameter settings. Extensive experiments on real-world Twitter data show that both URM and UCM are superior to all the baselines, while UCM further outperforms URM, confirming the appropriateness of our models in retweet modeling.", "title": "" } ]
[ { "docid": "1e82d6acef7e5b5f0c2446d62cf03415", "text": "The purpose of this research is to characterize and model the self-heating effect of multi-finger n-channel MOSFETs. Self-heating effect (SHE) does not need to be analyzed for single-finger bulk CMOS devices. However, it should be considered for multi-finger n-channel MOSFETs that are mainly used for RF-CMOS applications. The SHE mechanism was analyzed based on a two-dimensional device simulator. A compact model, which is a BSIM6 model with additional equations, was developed and implemented in a SPICE simulator with Verilog-A language. Using the proposed model and extracted parameters excellent agreements have been obtained between measurements and simulations in DC and S-parameter domain whereas the original BSIM6 shows inconsistency between static DC and small signal AC simulations due to the lack of SHE. Unlike the generally-used sub-circuits based SHE models including in BSIMSOI models, the proposed SHE model can converge in large scale circuits.", "title": "" }, { "docid": "8e88621c949e0df5a7eda810bfac113d", "text": "About one fourth of patients with bipolar disorders (BD) have depressive episodes with a seasonal pattern (SP) coupled to a more severe disease. However, the underlying genetic influence on a SP in BD remains to be identified. We studied 269 BD Caucasian patients, with and without SP, recruited from university-affiliated psychiatric departments in France and performed a genetic single-marker analysis followed by a gene-based analysis on 349 single nucleotide polymorphisms (SNPs) spanning 21 circadian genes and 3 melatonin pathway genes. A SP in BD was nominally associated with 14 SNPs identified in 6 circadian genes: NPAS2, CRY2, ARNTL, ARNTL2, RORA and RORB. After correcting for multiple testing, using a false discovery rate approach, the associations remained significant for 5 SNPs in NPAS2 (chromosome 2:100793045-100989719): rs6738097 (pc = 0.006), rs12622050 (pc = 0.006), rs2305159 (pc = 0.01), rs1542179 (pc = 0.01), and rs1562313 (pc = 0.02). The gene-based analysis of the 349 SNPs showed that rs6738097 (NPAS2) and rs1554338 (CRY2) were significantly associated with the SP phenotype (respective Empirical p-values of 0.0003 and 0.005). The associations remained significant for rs6738097 (NPAS2) after Bonferroni correction. The epistasis analysis between rs6738097 (NPAS2) and rs1554338 (CRY2) suggested an additive effect. Genetic variations in NPAS2 might be a biomarker for a seasonal pattern in BD.", "title": "" }, { "docid": "4f21bb08f086250ea1850f0c3a05d444", "text": "Today, creating value for customers and satisfaction and loyalty is an important problem for organization to be winner or loser in market. Strengthening the relationship between patient and hospital customer satisfaction grows and it also increases the value of the relationships between the parties. This is what will be leading to higher loyalty and then increasing in customers behavioral intentions, positive attitude, trust and commitment. The objective of the study was to investigate the effect of customer value and satisfaction on customer loyalty and the moderating role of ethical reputation, a sample size of 427 cases was selected using random sampling. Data were collected with questionnaire instrument from the study of Jay and Jaramillo (2011) and Athanassopoulos (2001). Model was developed and tested with structural equation model used PLS software. The results show that customer value has a positive effect on customer satisfaction and customer loyalty and customer satisfaction has a positive effect on customer loyalty and eventually ethical reputation positively moderates the relationship between customer value and customer satisfaction.", "title": "" }, { "docid": "4da582a6d04d75b93a30df473369cb6f", "text": "This text describes a simple and effective object oriented software design process template having UML as the modeling language and extensively using inspections to support the construction and maintenance of software products. This software design process uses a sequential organization, based on the waterfall approach, for two reasons: to simplify the explanation of design activities in the context of All rights of reproduction in any form reserved. {Jobs}0774ap/makeup/774ch2.3d this text and to make available a standard process that can be continuously improved by developers. The component phases of this design process are described in a way that gives developers the freedom to reorganize the overall process based on their own needs and environment. In addition, a survey is provided of specific literature regarding important aspects of UML and the object oriented paradigm.", "title": "" }, { "docid": "d3c9785f2981670430e58ebabb25f564", "text": "A model of category effects on reports from memory is presented. The model holds that stimuli are represented at 2 levels of detail: a fine-grain value and a category. When memory is inexact but people must report an exact value, they use estimation processes that combine the remembered stimulus value with category information. The proposed estimation processes include truncation at category boundaries and weighting with a central (prototypic) category value. These processes introduce bias in reporting even when memory is unbiased, but nevertheless may improve overall accuracy (by decreasing the variability of reports). Four experiments are presented in which people report the location of a dot in a circle. Subjects spontaneously impose horizontal and vertical boundaries that divide the circle into quadrants. They misplace dots toward a central (prototypic) location in each quadrant, as predicted by the model. The proposed model has broad implications; notably, it has the potential to explain biases of the sort described in psychophysics (contraction bias and the bias captured by Weber's law) as well as symmetries in similarity judgments, without positing distorted representations of physical scales.", "title": "" }, { "docid": "0f78628c309cc863680d60dd641cb7f0", "text": "A systematic review was conducted to evaluate whether chocolate or its constituents were capable of influencing cognitive function and/or mood. Studies investigating potentially psychoactive fractions of chocolate were also included. Eight studies (in six articles) met the inclusion criteria for assessment of chocolate or its components on mood, of which five showed either an improvement in mood state or an attenuation of negative mood. Regarding cognitive function, eight studies (in six articles) met the criteria for inclusion, of which three revealed clear evidence of cognitive enhancement (following cocoa flavanols and methylxanthine). Two studies failed to demonstrate behavioral benefits but did identify significant alterations in brain activation patterns. It is unclear whether the effects of chocolate on mood are due to the orosensory characteristics of chocolate or to the pharmacological actions of chocolate constituents. Two studies have reported acute cognitive effects of supplementation with cocoa polyphenols. Further exploration of the effect of chocolate on cognitive facilitation is recommended, along with substantiation of functional brain changes associated with the components of cocoa.", "title": "" }, { "docid": "30a57dc7d69b302219e05918b874d2b2", "text": "In recent years, flight delay problem blocks the development of the civil aviation industry all over the world. And delay propagation always is a main factor that impacts the flight's delay. All kinds of delays often happen in nearly-saturated or overloaded airports. This paper we take one busy hub-airport as the main research object to estimate the arrival delay in this airport, and to discuss the influence of propagation within and from this airport. First, a delay propagation model is described qualitatively in mathematics after sorting and analyzing the relationships between all flights, especially focused on the frequently type, named aircraft correlation. Second, an arrival delay model is established based on Bayesian network. By training the model, the arrival delay in this airport can be estimated. Third, after clarifying the arrival status of one airport, the impact from propagation of arrival delays within and from this busy airport is discussed, especially between the flights belonging to one same air company. All the data used in our experiments is come from real records, for the industry secret, the name of the airport and the air company is hidden.", "title": "" }, { "docid": "7164e5a7e70bbea0af24d4f1aad5fbcc", "text": "In the framework of the DIHANA project, we present the acquisition process of a spontaneous speech dialogue corpus in Spanish. The selected application consists of information retrieval by telephone for nationwide trains. A total of 900 dialogues from 225 users were acquired using theWizard of Oztechnique. In this work, we present the design and planning of the dialogue scenes and the wizard strategy used for the acquisition of the corpus. Then, we also present the acquisition tools and a description of the acquisition process.", "title": "" }, { "docid": "389741d025793862520824cad4484165", "text": "Learning to make choices that yield rewarding outcomes requires the computation of three distinct signals: stimulus values that are used to guide choices at the time of decision making, experienced utility signals that are used to evaluate the outcomes of those decisions and prediction errors that are used to update the values assigned to stimuli during reward learning. Here we investigated whether monetary and social rewards involve overlapping neural substrates during these computations. Subjects engaged in two probabilistic reward learning tasks that were identical except that rewards were either social (pictures of smiling or angry people) or monetary (gaining or losing money). We found substantial overlap between the two types of rewards for all components of the learning process: a common area of ventromedial prefrontal cortex (vmPFC) correlated with stimulus value at the time of choice and another common area of vmPFC correlated with reward magnitude and common areas in the striatum correlated with prediction errors. Taken together, the findings support the hypothesis that shared anatomical substrates are involved in the computation of both monetary and social rewards.", "title": "" }, { "docid": "55b2952df6e903b908fd0fc16381b174", "text": "The individual and combined (binary mixtures) (anti)androgenic effect of butylparaben (BuPB), butylated hydroxyanisole (BHA), butylated hydroxytoluene (BHT) and propyl gallate (PG) was evaluated using the MDA-kb2 cell line. Exposing these cells to AR agonists results in the expression of the reporter gene (encoding for luciferase) and luminescence can be measured in order to monitor the activity of the reporter protein. In case of the evaluation of the anti-androgenic effect, the individual test compounds or binary mixtures were tested in the presence of a fixed concentration of a strong AR agonist (1000 pM 5-alpha-dihydrotestosterone; DHT). Cell viability was assessed using a resazurin based assay. For PG, this is the first report in the literature concerning its (anti)androgenic activity. In case of both individual and mixture testing none of the compounds or binary combinations showed androgenic activity. When tested in the presence of DHT, BuPB, BHA and BHT proved to be weak anti-androgens and this was confirmed during the evaluation of binary mixtures (BuPB+BHA, BuPB+BHT and BHA+BHT). Besides performing the in vitro testing of the binary combinations, two mathematical models (dose addition and response addition) were evaluated in terms of accuracy of prediction of the anti-androgenic effect of the selected binary mixtures. The dose addition model guaranteed a good correlation between the experimental and predicted data. However, no estimation was possible in case of mixtures containing PG, due to the lack of effect of the compound in case of the individual testing.", "title": "" }, { "docid": "0a3bb33d5cff66346a967092202737ab", "text": "An Li-ion battery charger based on a charge-control buck regulator operating at 2.2 MHz is implemented in 180 nm CMOS technology. The novelty of the proposed charge-control converter consists of regulating the average output current by only sensing a portion of the inductor current and using an adaptive reference voltage. By adopting this approach, the charger average output current is set to a constant value of 900 mA regardless of the battery voltage variation. In constant-voltage (CV) mode, a feedback loop is established in addition to the preexisting current control loop, preserving the smoothness of the output voltage at the transition from constant-current (CC) to CV mode. A small-signal model has been developed to analyze the system stability and subharmonic oscillations at low current levels. Transistor-level simulations of the proposed switching charger are presented. The output voltage ranges from 2.1 to 4.2 V, and the power efficiency at 900 mA has been measured to be 86% for an input voltage of 10 V. The accuracy of the output current using the proposed sensing technique is 9.4% at 10 V.", "title": "" }, { "docid": "914c985dc02edd09f0ee27b75ecee6a4", "text": "Whether the development of face recognition abilities truly reflects changes in how faces, specifically, are perceived, or rather can be attributed to more general perceptual or cognitive development, is debated. Event-related potential (ERP) recordings on the scalp offer promise for this issue because they allow brain responses to complex visual stimuli to be relatively well isolated from other sensory, cognitive and motor processes. ERP studies in 5- to 16-year-old children report large age-related changes in amplitude, latency (decreases) and topographical distribution of the early visual components, the P1 and the occipito-temporal N170. To test the face specificity of these effects, we recorded high-density ERPs to pictures of faces, cars, and their phase-scrambled versions from 72 children between the ages of 4 and 17, and a group of adults. We found that none of the previously reported age-dependent changes in amplitude, latency or topography of the P1 or N170 were specific to faces. Most importantly, when we controlled for age-related variations of the P1, the N170 appeared remarkably similar in amplitude and topography across development, with much smaller age-related decreases in latencies than previously reported. At all ages the N170 showed equivalent face-sensitivity: it had the same topography and right hemisphere dominance, it was absent for meaningless (scrambled) stimuli, and larger and earlier for faces than cars. The data also illustrate the large amount of inter-individual and inter-trial variance in young children's data, which causes the N170 to merge with a later component, the N250, in grand-averaged data. Based on our observations, we suggest that the previously reported \"bi-fid\" N170 of young children is in fact the N250. Overall, our data indicate that the electrophysiological markers of face-sensitive perceptual processes are present from 4 years of age and do not appear to change throughout development.", "title": "" }, { "docid": "922c8b001face44afa9abdcc1cb6c8bf", "text": "Resilience is becoming an important topic in people with schizophrenia since there is evidence that it increases the probability for long-term recovery. The current study investigated transcultural differences in resilience across schizophrenia patients from two different geographical regions, Austria and Japan. Another objective was to examine transcultural differences in internalized stigma, self-esteem, and hopelessness, which can be expected to be relevant in this context, as well as the interrelations between these subjective elements of recovery and symptom severity. To this end, patients from outpatient mental health services in Innsbruck, Austria (N=52) and Tokyo, Japan (N=60) as well as 137 healthy comparison subjects from both countries were included into this cross-sectional study. Notably, we detected a significant country effect with markedly lower resilience (F=74.4, p<0.001) and self-esteem scores (F=226.0, p<0.001) as well as higher hopelessness scores (F=37.4, p<0.001) among Japanese subjects in general. In addition, both Austrian and Japanese patients indicated significantly lower degrees of resilience (F=57.5, p<0.001), self-esteem (F=51.8, p<0.001), and hope (F=29.5, p<0.001) compared to healthy control subjects. The inter-correlations between subjective elements of recovery were comparable in size in the two patient samples, but the inter-correlations between these issues and residual symptoms of schizophrenia as objective domains of recovery were markedly higher in Austrian subjects. This suggests that schizophrenia patients from Western European and Japanese cultures may have different needs to achieve recovery. In conclusion, it will be critical to develop culture-specific psychosocial programs and to examine their feasibility and effectiveness among these patients.", "title": "" }, { "docid": "b4586447ef1536f23793651fcd9d71b8", "text": "State monitoring is widely used for detecting critical events and abnormalities of distributed systems. As the scale of such systems grows and the degree of workload consolidation increases in Cloud data centers, node failures and performance interferences, especially transient ones, become the norm rather than the exception. Hence, distributed state monitoring tasks are often exposed to impaired communication caused by such dynamics on different nodes. Unfortunately, existing distributed state monitoring approaches are often designed under the assumption of always-online distributed monitoring nodes and reliable inter-node communication. As a result, these approaches often produce misleading results which in turn introduce various problems to Cloud users who rely on state monitoring results to perform automatic management tasks such as auto-scaling. This paper introduces a new state monitoring approach that tackles this challenge by exposing and handling communication dynamics such as message delay and loss in Cloud monitoring environments. Our approach delivers two distinct features. First, it quantitatively estimates the accuracy of monitoring results to capture uncertainties introduced by messaging dynamics. This feature helps users to distinguish trustworthy monitoring results from ones heavily deviated from the truth, yet significantly improves monitoring utility compared with simple techniques that invalidate all monitoring results generated with the presence of messaging dynamics. Second, our approach also adapts to non-transient messaging issues by reconfiguring distributed monitoring algorithms to minimize monitoring errors. Our experimental results show that, even under severe message loss and delay, our approach consistently improves monitoring accuracy, and when applied to Cloud application auto-scaling, outperforms existing state monitoring techniques in terms of the ability to correctly trigger dynamic provisioning.", "title": "" }, { "docid": "b00311730b7b9b4f79cdd7bde5aa84f6", "text": "While neural networks demonstrate stronger capabilities in pattern recognition nowadays, they are also becoming larger and deeper. As a result, the effort needed to train a network also increases dramatically. In many cases, it is more practical to use a neural network intellectual property (IP) that an IP vendor has already trained. As we do not know about the training process, there can be security threats in the neural IP: the IP vendor (attacker) may embed hidden malicious functionality, i.e neural Trojans, into the neural IP. We show that this is an effective attack and provide three mitigation techniques: input anomaly detection, re-training, and input preprocessing. All the techniques are proven effective. The input anomaly detection approach is able to detect 99.8% of Trojan triggers although with 12.2% false positive. The re-training approach is able to prevent 94.1% of Trojan triggers from triggering the Trojan although it requires that the neural IP be reconfigurable. In the input preprocessing approach, 90.2% of Trojan triggers are rendered ineffective and no assumption about the neural IP is needed.", "title": "" }, { "docid": "2793f528a9b29345b1ee8ce1202933e3", "text": "Neural Networks are prevalent in todays NLP research. Despite their success for different tasks, training time is relatively long. We use Hogwild! to counteract this phenomenon and show that it is a suitable method to speed up training Neural Networks of different architectures and complexity. For POS tagging and translation we report considerable speedups of training, especially for the latter. We show that Hogwild! can be an important tool for training complex NLP architectures.", "title": "" }, { "docid": "90dc36628f9262157ea8722d82830852", "text": "Inexpensive fixed wing UAV are increasingly useful in remote sensing operations. They are a cheaper alternative to manned vehicles, and are ideally suited for dangerous or monotonous missions that would be inadvisable for a human pilot. Groups of UAV are of special interest for their abilities to coordinate simultaneous coverage of large areas, or cooperate to achieve goals such as mapping. Cooperation and coordination in UAV groups also allows increasingly large numbers of aircraft to be operated by a single user. Specific applications under consideration for groups of cooperating UAV are border patrol, search and rescue, surveillance, communications relaying, and mapping of hostile territory. The capabilities of small UAV continue to grow with advances in wireless communications and computing power. Accordingly, research topics in cooperative UAV control include efficient computer vision for real-time navigation and networked computing and communication strategies for distributed control, as well as traditional aircraft-related topics such as collision avoidance and formation flight. Emerging results in cooperative UAV control are presented via discussion of these topics, including particular requirements, challenges, and some promising strategies relating to each area. Case studies from a variety of programs highlight specific solutions and recent results, ranging from pure simulation to control of multiple UAV. This wide range of case studies serves as an overview of current problems of Interest, and does not present every relevant result.", "title": "" }, { "docid": "6fa191434ae343d4d645587b5a240b1f", "text": "An integrated framework for density-based cluster analysis, outlier detection, and data visualization is introduced in this article. The main module consists of an algorithm to compute hierarchical estimates of the level sets of a density, following Hartigan’s classic model of density-contour clusters and trees. Such an algorithm generalizes and improves existing density-based clustering techniques with respect to different aspects. It provides as a result a complete clustering hierarchy composed of all possible density-based clusters following the nonparametric model adopted, for an infinite range of density thresholds. The resulting hierarchy can be easily processed so as to provide multiple ways for data visualization and exploration. It can also be further postprocessed so that: (i) a normalized score of “outlierness” can be assigned to each data object, which unifies both the global and local perspectives of outliers into a single definition; and (ii) a “flat” (i.e., nonhierarchical) clustering solution composed of clusters extracted from local cuts through the cluster tree (possibly corresponding to different density thresholds) can be obtained, either in an unsupervised or in a semisupervised way. In the unsupervised scenario, the algorithm corresponding to this postprocessing module provides a global, optimal solution to the formal problem of maximizing the overall stability of the extracted clusters. If partially labeled objects or instance-level constraints are provided by the user, the algorithm can solve the problem by considering both constraints violations/satisfactions and cluster stability criteria. An asymptotic complexity analysis, both in terms of running time and memory space, is described. Experiments are reported that involve a variety of synthetic and real datasets, including comparisons with state-of-the-art, density-based clustering and (global and local) outlier detection methods.", "title": "" }, { "docid": "8a1ba6ce6500f96afdb2c2294bf28a44", "text": "This paper identifies the relative importance of key enabling factors for implementing industry 4.0 from a technological readiness perspective. The research involves the identification of enabling factors, their categorization into technological readiness dimensions, followed by the determination of the relative importance of both technological readiness dimensions and key objective measures. The results show a strong relationship between technological readiness and design principles of Industry 4.0. The findings suggest that process-related objectives are more important than economic-related and environmental-related objectives when implementing industry 4.0. The results also show that “the knowledge of humans in technology and how to leverage it” and “improving the ability of machines and devices in connecting to the internet” are the most important factors for achieving all objective measures. Practitioners can use the apparent relationship between process related objectives and key technological dimensions for setting appropriate strategies and policies when moving towards Industry 4.0.", "title": "" }, { "docid": "44dfc8c3c5c1f414197ad7cd8dedfb2e", "text": "In this paper, we propose a framework for formation stabilization of multiple autonomous vehicles in a distributed fashion. Each vehicle is assumed to have simple dynamics, i.e. a double-integrator, with a directed (or an undirected) information flow over the formation graph of the vehicles. Our goal is to find a distributed control law (with an efficient computational cost) for each vehicle that makes use of limited information regarding the state of other vehicles. Here, the key idea in formation stabilization is the use of natural potential functions obtained from structural constraints of a desired formation in a way that leads to a collision-free, distributed, and bounded state feedback law for each vehicle.", "title": "" } ]
scidocsrr
d84bcdd10ae61b79f184815ec43b4f63
Higher LSB Layer Based Audio Steganography Technique
[ { "docid": "173fad08a1115cd95160590038be97c1", "text": "We consider the problem of embedding one signal (e.g., a digital watermark), within another “host” signal to form a third, “composite” signal. The embedding is designed to achieve efficient trade-offs among the three conflicting goals of maximizing information-embedding rate, minimizing distortion between the host signal and composite signal, and maximizing the robustness of the embedding. We introduce new classes of embedding methods, termed quantization index modulation (QIM) and distortion-compensated QIM (DC-QIM), and develop convenient realizations in the form of what we refer to as dither modulation. Using deterministic models to evaluate digital watermarking methods, we show that QIM is “provably good” against arbitrary bounded and fully-informed attacks, which arise in several copyright applications, and in particular it achieves provably better rate-distortion-robustness trade-offs than currently popular spread-spectrum and low-bit(s) modulation methods. Furthermore, we show that for some important classes of probabilistic models, DC-QIM is optimal (capacity-achieving) and regular QIM is near-optimal. These include both additive white Gaussian noise channels, which may be good models for hybrid transmission applications such as digital audio broadcasting, and mean-square-error constrained attack channels that model private-key watermarking applications.", "title": "" } ]
[ { "docid": "b152e2a688321659c7c18cd1a7304854", "text": "Mobile Ad Hoc Networking (MANET) is a key technology enabler in the tactical communication domain for the Network Centric Warfare.[1] A self-forming, self-healing, infrastructure-less network consisting of mobile nodes is very attractive for beyond line of sight (BLOS) voice and data range extension as well as tactical networking applications in general. Current research and development mostly focus on implementing MANET over new wideband data waveforms. However, a large number of currently fielded tactical radios and the next generation software defined radios (SDR) support various legacy tactical radio waveforms. A mobile ad hoc network over such legacy tactical radio links not only provides war fighters mission critical networking applications such as Situational Awareness and short payload messaging, the MANET nodes can also support voice and legacy data interoperation with the existing fielded legacy radios. Furthermore, the small spectrum footprint of current narrowband tactical radio waveforms can be complementary to the new wideband data waveforms for providing networking access in a spectrum constrained environment. This paper first describes the networking usage requirements for MANET over legacy narrowband tactical waveforms. Next, the common characteristics of legacy tactical radio waveforms and the implications of such characteristics for the MANET implementation are discussed. Then an actual MANET implementation over a legacy tactical radio waveform on a SDR is presented with the results of actual field tests. Finally, several improvements to this implementation are proposed.", "title": "" }, { "docid": "6217379b5126f6fff00ef0f61d5c9444", "text": "We present Ketchum, a tool that was developed to improve the productivity of simulation-based functional verification by providing two capabilities: (1) automatic test generation and (2) unreachability analysis. Given a set of \"interesting\" signals in the design under test (DUT), automatic test generation creates input stimuli that drive the DUT through as many different combinations (called coverage states) of these signals as possible to thoroughly exercise the DUT. Unreachability analysis identifies as many unreachable coverage states as possible.Ketchum differs from the previous published results for several reasons. First, Ketchum provides 10x higher capacity than previous published results. The higher capacity is achieved by carefully orchestrating simulation and multiple formal methods including symbolic simulation, SAT-based BMC, symbolic fixpoint computation and automatic abstraction. Second, Ketchum performs not only automatic test generation but also unreachability analysis, which enables the test generation effort to be focused on coverage states that are not unreachable. Third, the backbone of Ketchum is an off-the-shelf commercial simulator. It enables Ketchum to reach deep states of the design quickly and supports simulation monitors through the standard API of the simulator during test generation.We applied Ketchum to several industrial designs, including the picoJava microprocessor from SUN and the DW8051 microcontroller from Synopsys and obtained very promising results. The experiments show that Ketchum can (1) handle design blocks containing more than 4500 latches and 170K gates, (2) reach up to 6x more coverage states than random simulation and (3) identify a majority of the unreachable coverage states.", "title": "" }, { "docid": "201f6b0491ecab7bc89f7f18a4d11f25", "text": "Gesture and speech combine to form a rich basis for human conversational interaction. To exploit these modalities in HCI, we need to understand the interplay between them and the way in which they support communication. We propose a framework for the gesture research done to date, and present our work on the cross-modal cues for discourse segmentation in free-form gesticulation accompanying speech in natural conversation as a new paradigm for such multimodal interaction. The basis for this integration is the psycholinguistic concept of the coequal generation of gesture and speech from the same semantic intent. We present a detailed case study of a gesture and speech elicitation experiment in which a subject describes her living space to an interlocutor. We perform two independent sets of analyses on the video and audio data: video and audio analysis to extract segmentation cues, and expert transcription of the speech and gesture data by microanalyzing the videotape using a frame-accurate videoplayer to correlate the speech with the gestural entities. We compare the results of both analyses to identify the cues accessible in the gestural and audio data that correlate well with the expert psycholinguistic analysis. We show that \"handedness\" and the kind of symmetry in two-handed gestures provide effective supersegmental discourse cues.", "title": "" }, { "docid": "f2ff1b82da6daf58bb303310bc18555b", "text": "We propose a low-cost and reconfigurable plasma frequency selective surface (PFSS) with fluorescent lamps for Global Navigation Satellite System (GNSS) applications. Although many antenna topologies exist for broadband operation, antennas with plasma frequency selective surfaces are limited and offer certain advantages. Especially for GNSS applications, antenna performance can be demanding given the limited space for the antenna. In almost all GNSS antennas, a perfect electric conductor (PEC) ground is utilized. In this study, we compare PEC and PFSS reflectors over entire GNSS bandwidth. We believe PFSS structure can not only provide the benefits of PEC ground but also lower antenna profile.", "title": "" }, { "docid": "76f60b9e5e894d8bd150a90f6db660a0", "text": "There has been significant progress in recognition of outdoor scenes but indoor scene recognition is still an challenge. This is due to the high appearance fluctuation of indoor situations. With the recent developments in indoor and mobile robotics, identifying the indoor scenes has gained importance. Many approaches have been proposed to detect scenes using object detection and geotags. In contrast, the proposal of this paper uses the convolutional neural network which has gained importance with advancement in machine learning methodologies. Our method has higher efficiency than the existing models as we try to classify the environment as a whole rather than using object identification for the same. We test this approach on our dataset which consists of RGB and also depth images of common locations present in academic environments such as class rooms, labs etc. The proposed approach performs better than previous ones with accuracy up to 98%.", "title": "" }, { "docid": "5c690df3977b078243b9cb61e5e712a6", "text": "Computing indirect illumination is a challenging and complex problem for real-time rendering in 3D applications. We present a global illumination approach that computes indirect lighting in real time using a simplified version of the outgoing radiance and the scene stored in voxels. This approach comprehends two-bounce indirect lighting for diffuse, specular and emissive materials. Our voxel structure is based on a directional hierarchical structure stored in 3D textures with mipmapping, the structure is updated in real time utilizing the GPU which enables us to approximate indirect lighting for dynamic scenes. Our algorithm employs a voxel-light pass which calculates voxel direct and global illumination for the simplified outgoing radiance. We perform voxel cone tracing within this voxel structure to approximate different lighting phenomena such as ambient occlusion, soft shadows and indirect lighting. We demonstrate with different tests that our developed approach is capable to compute global illumination of complex scenes on interactive times.", "title": "" }, { "docid": "ceb02e24964c29ef1bf03f2fe1ef8e3e", "text": "In this paper we present initial research to develop a conceptual model for describing data quality effects in the context of Big Data. Despite the importance of data quality for modern businesses, current research on Big Data Quality is limited. It is particularly unknown how to apply previous data quality models to Big Data. Therefore in this paper we review data quality research from several perspectives and apply the data quality model developed by Helfert & Heinrich with its elements of quality of conformance and quality of design to the context of Big Data. We extend this model by analyzing the effect of three Big Data characteristics (Volume, Velocity and Variety) and discuss its application to the context of Smart Cities, as one interesting example in which Big Data is increasingly important. Although this paper provides only propositions and a first conceptual discussion, we believe that the paper can build a foundation for further empirical research to understand Big Data Quality and its implications in practice.", "title": "" }, { "docid": "ef21435ba48421b5bf26eeadc92c1cc5", "text": "The goal of semantic role labeling (SRL) is to discover the predicate-argument structure of a sentence, which plays a critical role in deep processing of natural language. This paper introduces simple yet effective auxiliary tags for dependency-based SRL to enhance a syntaxagnostic model with multi-hop self-attention. Our syntax-agnostic model achieves competitive performance with state-of-the-art models on the CoNLL-2009 benchmarks both for English and Chinese.", "title": "" }, { "docid": "dfb16d97d293776e255397f1dc49bbbf", "text": "Self-service automatic teller machines (ATMs) have dramatically altered the ways in which customers interact with banks. ATMs provide the convenience of completing some banking transactions remotely and at any time. AT&T Global Information Solutions (GIS) is the world's leading provider of ATMs. These machines support such familiar services as cash withdrawals and balance inquiries. Further technological development has extended the utility and convenience of ATMs produced by GIS by facilitating check cashing and depositing, as well as direct bill payment, using an on-line system. These enhanced services, discussed in this paper, are made possible primarily through sophisticated optical character recognition (OCR) technology. Developed by an AT&T team that included GIS, AT&T Bell Laboratories Quality, Engineering, Software, and Technologies (QUEST), and AT&T Bell Laboratories Research, OCR technology was crucial to the development of these advanced ATMs.", "title": "" }, { "docid": "912662943bd9d74550773594b2ac1299", "text": "PACON 2005 Harmonization of Port and Industry ABSTRACTS TABLE OF CONTENTSS TABLE OF CONTENTS", "title": "" }, { "docid": "31f3f5a2787dc071fcce3115005e96d9", "text": "Searching an organization's document repositories for experts provides a cost effective solution for the task of expert finding. We present two general strategies to expert searching given a document collection which are formalized using generative probabilistic models. The first of these directly models an expert's knowledge based on the documents that they are associated with, whilst the second locates documents on topic, and then finds the associated expert. Forming reliable associations is crucial to the performance of expert finding systems. Consequently, in our evaluation we compare the different approaches, exploring a variety of associations along with other operational parameters (such as topicality). Using the TREC Enterprise corpora, we show that the second strategy consistently outperforms the first. A comparison against other unsupervised techniques, reveals that our second model delivers excellent performance.", "title": "" }, { "docid": "64893e53ba11f5b56e327f45119aec8f", "text": "People with schizophrenia demonstrate impairments in selective attention, working memory, and executive function. Given the overlap in these constructs, it is unclear if these represent distinct impairments or different manifestations of one higher-order impairment. To examine this question, we administered tasks from the basic cognitive neuroscience literature to measure visual selective attention, working memory capacity, and executive function in 126 people with schizophrenia and 122 healthy volunteers. Patients demonstrated deficits on all tasks with the exception of selective attention guided by strong bottom-up inputs. Although the measures of top-down control of selective attention, working memory, and executive function were all intercorrelated, several sources of evidence indicate that working memory and executive function are separate sources of variance. Specifically, both working memory and executive function independently contributed to the discrimination of group status and independently accounted for variance in overall general cognitive ability as assessed by the MATRICS battery. These two cognitive functions appear to be separable features of the cognitive impairments observed in schizophrenia.", "title": "" }, { "docid": "d37dd9382e7fd8e4c7e7099728a09d59", "text": "OBJECTIVE\nTo assess immediate and near-term effects of 2 exercise training programs for persons with idiopathic Parkinson's disease (IPD).\n\n\nDESIGN\nRandomized control trial.\n\n\nSETTING\nPublic health facility and medical center.\n\n\nPARTICIPANTS\nFifteen persons with IPD.\n\n\nINTERVENTION\nCombined group (balance and resistance training) and balance group (balance training only) underwent 10 weeks of high-intensity resistance training (knee extensors and flexors, ankle plantarflexion) and/or balance training under altered visual and somatosensory sensory conditions, 3 times a week on nonconsecutive days. Groups were assessed before, immediately after training, and 4 weeks later.\n\n\nMAIN OUTCOME MEASURES\nBalance was assessed by computerized dynamic posturography, which determined the subject's response to reduced or altered visual and somatosensory orientation cues (Sensory Orientation Test [SOT]). Muscle strength was assessed by measuring the amount of weight a participant could lift, by using a standardized weight-and-pulley system, during a 4-repetition-maximum test of knee extension, knee flexion, and ankle plantarflexion.\n\n\nRESULTS\nBoth types of training improved SOT performance. This effect was larger in the combined group. Both groups could balance longer before falling, and this effect persisted for at least 4 weeks. Muscle strength increased marginally in the balance group and substantially in the combined group, and this effect persisted for at least 4 weeks.\n\n\nCONCLUSION\nMuscle strength and balance can be improved in persons with IPD by high-intensity resistance training and balance training.", "title": "" }, { "docid": "8e62b4f9389bfb94e327cea0639bfc01", "text": "A graphene patch reflectarray is proposed for the first time to generate THz wave with orbital angular momentum (OAM). It is shown that by properly assigning the graphene patches with specific reflection coefficients, an OAM-carrying beam can be generated. The graphene reflectarray, which consists of 8 regions and each region contains about 170 patches with uniform chemical potential and size, has successfully produced the OAM-carrying beam of either 1 or -1 mode.", "title": "" }, { "docid": "97b9d8dd21dfbb68cf72ad2f03b1a98a", "text": "The explosive increase and ubiquitous accessibility of visual data on the Web have led to the prosperity of research activity in image search or retrieval. With the ignorance of visual content as a ranking clue, methods with text search techniques for visual retrieval may suffer inconsistency between the text words and visual content. Content-based image retrieval (CBIR), which makes use of the representation of visual content to identify relevant images, has attracted sustained attention in recent two decades. Such a problem is challenging due to the intention gap and the semantic gap problems. Numerous techniques have been developed for content-based image retrieval in the last decade. The purpose of this paper is to categorize and evaluate those algorithms proposed during the period of 2003 to 2016. We conclude with several promising directions for future research.", "title": "" }, { "docid": "86f25f09b801d28ce32f1257a39ddd44", "text": "Modern mobile devices have access to a wealth of data suitable for learning models, which in turn can greatly improve the user experience on the device. For example, language models can improve speech recognition and text entry, and image models can automatically select good photos. However, this rich data is often privacy sensitive, large in quantity, or both, which may preclude logging to the data-center and training there using conventional approaches. We advocate an alternative that leaves the training data distributed on the mobile devices, and learns a shared model by aggregating locally-computed updates. We term this decentralized approach Federated Learning. We present a practical method for the federated learning of deep networks that proves robust to the unbalanced and non-IID data distributions that naturally arise. This method allows high-quality models to be trained in relatively few rounds of communication, the principal constraint for federated learning. The key insight is that despite the non-convex loss functions we optimize, parameter averaging over updates from multiple clients produces surprisingly good results, for example decreasing the communication needed to train an LSTM language model by two orders of magnitude.", "title": "" }, { "docid": "1180bfc5d6181697ae2ef586490e38e5", "text": "A novel soft-switching hybrid converter combining the phase-shift full-bridge (FB) and half-bridge (HB) LLC resonant converters' configuration with shared zero-voltage switching (ZVS) lagging leg is proposed to ensure the switches in the lagging leg operating at fully ZVS condition. The dual outputs of the proposed hybrid FB-HB converter are connected in series and the whole dc-output voltage can be regulated by the PWM phase-shift control within the desired voltage range. A resonant circuit is used in the secondary side of the FB converter to reset the primary current during the freewheeling period, as well as to transfer more input energy and clamp secondary rectifier voltage. The proposed converter is attractive for hybrid electric vehicle/electric vehicle on-board charger applications. The principle of operation, the validity, and performance are illustrated and verified on a 3.7-kW experimental circuit. Experimental results show that the proposed converter can get good efficiency curves at different operation points, and the maximum efficiency is 98.30%.", "title": "" }, { "docid": "61ecbc652cf9f57136e8c1cd6fed2fb0", "text": "Recent advancements in digital technology have attracted the interest of educators and researchers to develop technology-assisted inquiry-based learning environments in the domain of school science education. Traditionally, school science education has followed deductive and inductive forms of inquiry investigation, while the abductive form of inquiry has previously been sparsely explored in the literature related to computers and education. We have therefore designed a mobile learning application ‘ThinknLearn’, which assists high school students in generating hypotheses during abductive inquiry investigations. The M3 evaluation framework was used to investigate the effectiveness of using ‘ThinknLearn’ to facilitate student learning. The results indicated in this paper showed improvements in the experimental group’s learning performance as compared to a control group in pre-post tests. In addition, the experimental group also maintained this advantage during retention tests as well as developing positive attitudes toward mobile learning. 2012 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "1a7a66f5d4f2ea918a9267ee24c57586", "text": "Elements associated with total suspended particulate matter (TSP) in Jeddah city were determined. Using high-volume samplers, TSP samples were simultaneously collected over a one-year period from seven sampling sites. Samples were analyzed for Al, Ba, Ca, Cu, Mg, Fe, Mn, Zn, Ti, V, Cr, Co, Ni, As, and Sr. Results revealed great dependence of element contents on spatial and temporal variations. Two sites characterized by busy roads, workshops, heavy population, and heavy trucking have high levels of all measured elements. Concentrations of most elements at the two sites exhibit strong spatial gradients and concentrations of elements at these sites are higher than other locations. The highest concentrations of elements were observed during June-August because of dust storms, significant increase in energy consumption, and active surface winds. Enrichment factors of elements at the high-level sites have values in the range >10~60 while for Cu and Zn the enrichment factors are much higher (~0->700) indicating that greater percentage of TSP composition for these three elements in air comes from anthropogenic activities.", "title": "" }, { "docid": "32133661ef76390e42e4126ba72bac71", "text": "A novel broadband artificial magnetic conductor (AMC) surface is proposed for lowering the height of planar antennas. By replacing the conventional perfect electric conductor (PEC) ground plane with the AMC surface, the height of planar antenna can be significantly reduced. Three planar antennas for LTE700/GSM900 base stations are investigated. The antenna height is lowered from 0.263λ0.83GHz to 0.083λ0.83GHz, (where λ0.83GHz is the wavelength in free space at the frequency 0.83 GHz). The height-lowered planar antennas maintain a wide bandwidth of, e.g., 38% for a linearly polarized antenna, 35% for a dual-polarized antenna, and 46% for a circularly polarized antenna. All these planar antennas above the AMC surface have a gain of higher than 7 dBi.", "title": "" } ]
scidocsrr
47313458d13ec528ecdbfbfe51fccc9b
Embedding security practices in contemporary information systems development approaches
[ { "docid": "6193c692cdbf4e333e31ca327b9cfed2", "text": "The security of information systems is a serious issue because computer abuse is increasing. It is important, therefore, that systems analysts and designers develop expertise in methods for specifying information systems security. The characteristics found in three generations of general information system design methods provide a framework for comparing and understanding current security design methods. These methods include approaches that use checklists of controls, divide functional requirements into engineering partitions, and create abstract models of both the problem and the solution. Comparisons and contrasts reveal that advances in security methods lag behind advances in general systems development methods. This analysis also reveals that more general methods fail to consider security specifications rigorously.", "title": "" } ]
[ { "docid": "160fefce1158a9a70a61869d54c4c39a", "text": "We present a new approach for efficient approximate nearest neighbor (ANN) search in high dimensional spaces, extending the idea of Product Quantization. We propose a two level product and vector quantization tree that reduces the number of vector comparisons required during tree traversal. Our approach also includes a novel highly parallelizable re-ranking method for candidate vectors by efficiently reusing already computed intermediate values. Due to its small memory footprint during traversal the method lends itself to an efficient, parallel GPU implementation. This Product Quantization Tree (PQT) approach significantly outperforms recent state of the art methods for high dimensional nearest neighbor queries on standard reference datasets. Ours is the first work that demonstrates GPU performance superior to CPU performance on high dimensional, large scale ANN problems in time-critical real-world applications, like loop-closing in videos.", "title": "" }, { "docid": "80fc5a0c795deb1ec7a687c7f7b6c863", "text": "Long non-coding RNAs (lncRNAs) have emerged as critical regulators of genes at epigenetic, transcriptional and post-transcriptional levels, yet what genes are regulated by a specific lncRNA remains to be characterized. To assess the effects of the lncRNA on gene expression, an increasing number of researchers profiled the genome-wide or individual gene expression level change after knocking down or overexpressing the lncRNA. Herein, we describe a curated database named LncRNA2Target, which stores lncRNA-to-target genes and is publicly accessible at http://www.lncrna2target.org. A gene was considered as a target of a lncRNA if it is differentially expressed after the lncRNA knockdown or overexpression. LncRNA2Target provides a web interface through which its users can search for the targets of a particular lncRNA or for the lncRNAs that target a particular gene. Both search types are performed either by browsing a provided catalog of lncRNA names or by inserting lncRNA/target gene IDs/names in a search box.", "title": "" }, { "docid": "0f02a733a66e38e46663a27f5d42d2a2", "text": "In this paper, an effective collaborative filtering algorithm for top-N item recommendation with implicit feedback is proposed. The task of top-N item recommendation is to predict a ranking of items (movies, books, songs, or products in general) that can be of interest for a user based on earlier preferences of the user. We focus on implicit feedback where preferences are given in the form of binary events/ratings. Differently from state-of-the-art methods, the method proposed is designed to optimize the AUC directly within a margin maximization paradigm. Specifically, this turns out in a simple constrained quadratic optimization problem, one for each user. Experiments performed on several benchmarks show that our method significantly outperforms state-of-the-art matrix factorization methods in terms of AUC of the obtained predictions.", "title": "" }, { "docid": "538f3c049ee33c7e8f1895a97dc7a808", "text": "For companies and their employees, social media allows new ways to communicate with customers and colleagues. Vast amounts of information are being exchanged in social media. Information is a highly valuable asset, and therefore questions concerning information security become more and more important. Companies are becoming increasingly worried about information security in social media, but so far, this issue has not been studied. The present research closes this gap by studying the information security challenges social media represents for organizations. The research was conducted as a qualitative multiple case study for which information security managers from eleven public and private companies in one European country were interviewed. The study has three main findings. First, challenges arising from employees’ actions or unawareness in social media (especially reputation damage) seem to represent bigger threats to information security than threats caused by outside attacks. Second, the confusion of private and professional roles in social media represents an information security risk, and distinguishing between these roles becomes more difficult the higher an employee’s position in the company. Third, communication with employees and colleagues represents an information security challenge especially when communication is not steered by the company. Implications for research and practice are discussed.", "title": "" }, { "docid": "6b953e7b796d2290f4f70b66be6609b2", "text": "BACKGROUND\nPatients suffering from symptomatic macromastia are usually underserved, as they have to put up with very long waiting lists and are usually selected under restrictive criteria. The Oncoplastic Breast Surgery subspeciality requires a cross-specialty training, which is difficult, in particular, for trainees who have a background in general surgery, and not easily available. The introduction of reduction mammaplasty into a Breast Cancer Unit as treatment for symptomatic macromastia could have a synergic effect, making the scarce therapeutic offer at present available to these patients, who are usually treated in Plastic Departments, somewhat larger, and accelerating the uptake of oncoplastic training as a whole and, specifically, the oncoplastic breast conserving procedures based on the reduction mammaplasty techniques such as displacement conservative techniques and onco-therapeutic mammaplasty. This is a retrospective study analyzing the outcome of reduction mammaplasty for symptomatic macromastia in our Breast Cancer Unit.\n\n\nMETHODS\nA cohort study of 56 patients who underwent bilateral reduction mammaplasty at our Breast Unit between 2005 and 2009 were evaluated; morbidity and patient satisfaction were considered as end points. Data were collected by reviewing medical records and interviewing patients.\n\n\nRESULTS\nEight patients (14.28%) presented complications in the early postoperative period, two of them being reoperated on. The physical symptoms disappeared or significantly improved in 88% of patients and the degree of satisfaction with the care process and with the overall outcome were really high.\n\n\nCONCLUSION\nOur experience of the introduction of reduction mammaplasty in our Breast Cancer Unit has given good results, enabling us to learn the use of different reduction mammaplasty techniques using several pedicles which made it possible to perform oncoplastic breast conserving surgery. In our opinion, this management policy could bring clear advantages both to patients (large-breasted and those with a breast cancer) and surgeons.", "title": "" }, { "docid": "6d21d5da7cd3bf0a52b57307831f08d2", "text": "This paper presents a broadband, dual-polarized base station antenna element by reasonably designing two orthogonal symmetrical dipole, four loading cylinders, balun, feed patches, specific shape reflector and plastic fasteners. Coupling feed is adopted to avoid the direct connection between the feed cables and the dipoles. The antenna element matches well in the frequency range of 1.7-2.7 GHz and the return loss (RL) S11<;-15 dB and the isolation S21<; -30 dB. Low cross-polarization, high front-back ratio (>25dB) and stable half-power beam width (HPBW) with 65±5° are also achieved. The proposed antenna element covers the whole long term evolution (LTE) band and is backward compatible with 3G and 2G bands.", "title": "" }, { "docid": "2710a25b3cf3caf5ebd5fb9f08c9e5e3", "text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.", "title": "" }, { "docid": "ff4a3a0c5288c69023c0d97a32ee5d6a", "text": "1 We present a software tool for simulations of flow and multi‐component solute transport in 2 two and three‐dimensional domains in combination with comprehensive intra‐phase and 3 inter‐phase geochemistry. The software uses IPhreeqc as a reaction engine to the multi‐ 4 purpose, multidimensional finite element solver COMSOL Multiphysics® for flow and 5 transport simulations. Here we used COMSOL to solve Richards' equation for aqueous phase 6 flow in variably saturated porous media. The coupling procedure presented is in principle 7 applicable to any simulation of aqueous phase flow and solute transport in COMSOL. The 8 coupling with IPhreeqc gives major advantages over COMSOL's built‐in reaction capabilities, 9 i.e., the soil solution is speciated from its element composition according to thermodynamic 10 mass action equations with ion activity corrections. State‐of‐the‐art adsorption models such 11 as surface complexation with diffuse double layer calculations are accessible. In addition, 12 IPhreeqc provides a framework to integrate user‐defined kinetic reactions with possible 13 dependencies on solution speciation (i.e., pH, saturation indices, and ion activities), allowing 14 for modelling of microbially mediated reactions. Extensive compilations of geochemical 15 reactions and their parameterization are accessible through associated databases. Research highlights 20  Coupling of COMSOL and PHREEQC facilitates simulation of variably saturated flow 21 with comprehensive geochemical reactions. 22  The use of finite elements allows for the simulation of flow and solute transport in 23 complex 2 and 3D domains. 24  Geochemical reactions are coupled via sequential non‐iterative operator splitting. 25  The software tool provides novel capabilities for investigations of contaminant 26 behaviour in variably saturated porous media and agricultural management. 27 3 Software requirements 28 COMSOL Multiphysics® including Earth Science Module (tested version: 3.5a; due to a 29 memory leak in versions 4.0 and 4.0a, these are not suitable for the presented coupling) 30 Price for single user academic license including Earth Science Module ca. 2000 € 31 Matlab® (tested versions: 7.9, 7.10) 32 Price for single user academic license including Parallel Computing Toolbox ca. 650 € 33 IPhreeqc (COM‐version, available free of charge at 34 The coupling files together with animations of the presented simulations are available at 36", "title": "" }, { "docid": "5cc6e4ad1b9f7989cd8d6c0bb8231b56", "text": "This article presents an inchworm climbing robot that is designed with switchable magnets and a single DOF arm. The InchwormClimber works on ferromagnetic structures and consumes little energy when climbing and can descend safely with almost zero energy consumption. Furthermore, considering the critical role of the adhesion unit in the overall functionality of the robot (weight, climbing speed and the payload), we optimized the switchable magnet unit for a higher adhesion force per mass unit.", "title": "" }, { "docid": "d5238992b0433383023df48fd99fd656", "text": "We compute upper and lower bounds on the VC dimension and pseudodimension of feedforward neural networks composed of piecewise polynomial activation functions. We show that if the number of layers is fixed, then the VC dimension and pseudo-dimension grow as W log W, where W is the number of parameters in the network. This result stands in opposition to the case where the number of layers is unbounded, in which case the VC dimension and pseudo-dimension grow as W2. We combine our results with recently established approximation error rates and determine error bounds for the problem of regression estimation by piecewise polynomial networks with unbounded weights.", "title": "" }, { "docid": "7b79b0643dfb779bb0d3a8eb852bdd9e", "text": "Traditionally, the document summarisation task has been tackled either as a natural language processing problem, with an instantiated meaning template being rendered into coherent prose, or as a passage extraction problem, where certain fragments (typically sentences) of the source document are deemed to be highly representative of its content, and thus delivered as meaningful “approximations” of it. Balancing the conflicting requirements of depth and accuracy of a summary, on the one hand, and document and domain independence, on the other, has proven a very hard problem. This paper describes a novel approach to content characterisation of text documents. It is domainand genre-independent, by virtue of not requiring an in-depth analysis of the full meaning. At the same time, it remains closer to the core meaning by choosing a different granularity of its representations (phrasal expressions rather than sentences or paragraphs), by exploiting a notion of discourse contiguity and coherence for the purposes of uniform coverage and context maintenance, and by utilising a strong linguistic notion of salience, as a more appropriate and representative measure of a document’s “aboutness”.", "title": "" }, { "docid": "c661109d7dfd4d7c9d65a610091c24da", "text": "Most existing person re-identification algorithms either extract robust visual features or learn discriminative metrics for person images. However, the underlying manifold which those images reside on is rarely investigated. That arises a problem that the learned metric is not smooth with respect to the local geometry structure of the data manifold. In this paper, we study person re-identification with manifold-based affinity learning, which did not receive enough attention from this area. An unconventional manifold-preserving algorithm is proposed, which can 1) make best use of supervision from training data, whose label information is given as pairwise constraints, 2) scale up to large repositories with low on-line time complexity, and 3) be plunged into most existing algorithms, serving as a generic postprocessing procedure to further boost the identification accuracies. Extensive experimental results on five popular person re-identification benchmarks consistently demonstrate the effectiveness of our method. Especially, on the largest CUHK03 and Market-1501, our method outperforms the state-of-the-art alternatives by a large margin with high efficiency, which is more appropriate for practical applications.", "title": "" }, { "docid": "704bd445fd9ff34a2d71e8e5b196760c", "text": "Convolutional neural nets (CNNs) have demonstrated remarkable performance in recent history. Such approaches tend to work in a “unidirectional” bottom-up feed-forward fashion. However, biological evidence suggests that feedback plays a crucial role, particularly for detailed spatial understanding tasks. This work introduces “bidirectional” architectures that also reason with top-down feedback: neural units are influenced by both lower and higher-level units. We do so by treating units as latent variables in a global energy function. We call our models convolutional latentvariable models (CLVMs). From a theoretical perspective, CLVMs unify several approaches for recognition, including CNNs, generative deep models (e.g., Boltzmann machines), and discriminative latent-variable models (e.g., DPMs). From a practical perspective, CLVMs are particularly well-suited for multi-task learning. We describe a single architecture that simultaneously achieves state-of-the-art accuracy for tasks spanning both high-level recognition (part detection/localization) and low-level grouping (pixel segmentation). Bidirectional reasoning is particularly helpful for detailed low-level tasks, since they can take advantage of top-down feedback. Our architectures are quite efficient, capable of processing an image in milliseconds. We present results on benchmark datasets with both part/keypoint labels and segmentation masks (such as PASCAL and LFW) that demonstrate a significant improvement over prior art, in both speed and accuracy.", "title": "" }, { "docid": "7d890cc9a8b93fcc0664c6edeaeb0320", "text": "Despite preceding related publications, works dealing with the resolution of software engineering problems by search techniques has especially risen since 2001. By its first decade, the Search Based Software Engineering (SBSE) approach has been successfully employed in several software engineering contexts, using various optimization techniques. Aside the relevance of such applications, knowledge regarding the publication patterns on the field plays an important role to its understanding and identity. Such information may also shed light into SBSE trends and future. This paper presents the first bibliometric analysis to SBSE publications. The study covered 677 publications of the SBSE community from 2001 through 2010. The performed bibliometric analysis concerned mainly in four categories: Publication, Sources, Authorship, and Collaboration. Additionally, estimates for the next years of several publication metrics are given. The study also analyzed the applicability of bibliometric laws in SBSE, such as Bradfords and Lotka.", "title": "" }, { "docid": "7a57900ccb13301fb835ab3f2a6836c8", "text": "Golden Retriever Image Retrieval Engine (GRire) is an open source light weight Java library developed for Content Based Image Retrieval (CBIR) tasks, employing the Bag of Visual Words (BOVW) model. It provides a complete framework for creating CBIR system including image analysis tools, classifiers, weighting schemes etc., for efficient indexing and retrieval procedures. Its eminent feature is its extensibility, achieved through the open source nature of the library as well as a user-friendly embedded plug-in system. GRire is available on-line along with install and development documentation on http://www.grire.net and on its Google Code page http://code.google.com/p/grire. It is distributed either as a Java library or as a standalone Java application, both GPL licensed.", "title": "" }, { "docid": "d5fcc6e6046ca293fc9b5afcc236325f", "text": "Purpose – The purpose of this study is to conduct a meta-analysis of prior scientometric research of the knowledge management (KM) field. Design/methodology/approach – A total of 108 scientometric studies of the KM discipline were subjected to meta-analysis techniques. Findings – The overall volume of scientometric KM works has been growing, reaching up to ten publications per year by 2012, but their key findings are somewhat inconsistent. Most scientometric KM research is published in non-KM-centric journals. The KM discipline has deep historical roots. It suffers from a high degree of over-differentiation and is represented by dissimilar research streams. The top six most productive countries for KM research are the USA, the UK, Canada, Germany, Australia, and Spain. KM exhibits attributes of a healthy academic domain with no apparent anomalies and is progressing towards academic maturity. Practical implications – Scientometric KM researchers should use advanced empirical methods, become aware of prior scientometric research, rely on multiple databases, develop a KM keyword classification scheme, publish their research in KM-centric outlets, focus on rigorous research of the forums for KM publications, improve their cooperation, conduct a comprehensive study of individual and institutional productivity, and investigate interdisciplinary collaboration. KM-centric journals should encourage authors to employ under-represented empirical methods and conduct meta-analysis studies and should discourage conceptual publications, especially the development of new frameworks. To improve the impact of KM research on the state of practice, knowledge dissemination channels should be developed. Originality/value – This is the first documented attempt to conduct a meta-analysis of scientometric research of the KM discipline.", "title": "" }, { "docid": "077479a268be00930533f4ce8fce2845", "text": "Our research goals are to understand and model the factors that affect trust in intelligent systems across a variety of application domains. In this chapter, we present two methods that can be used to build models of trust for such systems. The first method is the use of surveys, in which large numbers of people are asked to identify and rank factors that would influence their trust of a particular intelligent system. Results from multiple surveys exploring multiple application domains can be used to build a core model of trust and to identify domain specific factors that are needed to modify the core model to improve its accuracy and usefulness. The second method involves conducting experiments where human subjects use the intelligent system, where a variety of factors can be controlled in the studies to explore different factors. Based upon the results of these human subjects experiments, a trust model can be built. These trust models can be used to create design guidelines, to predict initial trust levels before the start of a system’s use, and to measure the evolution of trust over the use of a system. With increased understanding of how to model trust, we can build systems that will be more accepted and used appropriately by target populations.", "title": "" }, { "docid": "1919bad34819f8f1d92b53c04b6a3c85", "text": "Reviews keep playing an increasingly important role in the decision process of buying products and booking hotels. However, the large amount of available information can be confusing to users. A more succinct interface, gathering only the most helpful reviews, can reduce information processing time and save effort. To create such an interface in real time, we need reliable prediction algorithms to classify and predict new reviews which have not been voted but are potentially helpful. So far such helpfulness prediction algorithms have benefited from structural aspects, such as the length and readability score. Since emotional words are at the heart of our written communication and are powerful to trigger listeners’ attention, we believe that emotional words can serve as important parameters for predicting helpfulness of review text. Using GALC, a general lexicon of emotional words associated with a model representing 20 different categories, we extracted the emotionality from the review text and applied supervised classification method to derive the emotion-based helpful review prediction. As the second contribution, we propose an evaluation framework comparing three different real-world datasets extracted from the most well-known product review websites. This framework shows that emotion-based methods are outperforming the structure-based approach, by up to 9%.", "title": "" }, { "docid": "3ad37bab25fb9edaae29c0c8062656bb", "text": "A wafer-scale graphene circuit was demonstrated in which all circuit components, including graphene field-effect transistor and inductors, were monolithically integrated on a single silicon carbide wafer. The integrated circuit operates as a broadband radio-frequency mixer at frequencies up to 10 gigahertz. These graphene circuits exhibit outstanding thermal stability with little reduction in performance (less than 1 decibel) between 300 and 400 kelvin. These results open up possibilities of achieving practical graphene technology with more complex functionality and performance.", "title": "" }, { "docid": "e14420212ec11882cc71a57fd68cbb08", "text": "Organizational ambidexterity refers to the ability of an organization to both explore and exploit—to compete in mature technologies and markets where efficiency, control, and incremental improvement are prized and to also compete in new technologies and markets where flexibility, autonomy, and experimentation are needed. In the past 15 years there has been an explosion of interest and research on this topic. We briefly review the current state of the research, highlighting what we know and don’t know about the topic. We close with a point of view on promising areas for ongoing research.", "title": "" } ]
scidocsrr
9872ddfeba279a4e1e9cbc9027f812b7
Named Entity Recognition With Parallel Recurrent Neural Networks
[ { "docid": "cd8c1c24d4996217c8927be18c48488f", "text": "Recurrent neural networks (RNNs), such as long short-term memory networks (LSTMs), serve as a fundamental building block for many sequence learning tasks, including machine translation, language modeling, and question answering. In this paper, we consider the specific problem of word-level language modeling and investigate strategies for regularizing and optimizing LSTMbased models. We propose the weight-dropped LSTM which uses DropConnect on hidden-tohidden weights as a form of recurrent regularization. Further, we introduce NT-ASGD, a variant of the averaged stochastic gradient method, wherein the averaging trigger is determined using a non-monotonic condition as opposed to being tuned by the user. Using these and other regularization strategies, we achieve state-of-the-art word level perplexities on two data sets: 57.3 on Penn Treebank and 65.8 on WikiText-2. In exploring the effectiveness of a neural cache in conjunction with our proposed model, we achieve an even lower state-of-the-art perplexity of 52.8 on Penn Treebank and 52.0 on WikiText-2.", "title": "" }, { "docid": "65a8c1faa262cd428045854ffcae3fae", "text": "Extracting named entities in text and linking extracted names to a given knowledge base are fundamental tasks in applications for text understanding. Existing systems typically run a named entity recognition (NER) model to extract entity names first, then run an entity linking model to link extracted names to a knowledge base. NER and linking models are usually trained separately, and the mutual dependency between the two tasks is ignored. We propose JERL, Joint Entity Recognition and Linking, to jointly model NER and linking tasks and capture the mutual dependency between them. It allows the information from each task to improve the performance of the other. To the best of our knowledge, JERL is the first model to jointly optimize NER and linking tasks together completely. In experiments on the CoNLL’03/AIDA data set, JERL outperforms state-of-art NER and linking systems, and we find improvements of 0.4% absolute F1 for NER on CoNLL’03, and 0.36% absolute precision@1 for linking on AIDA.", "title": "" }, { "docid": "48560dec9177dd68e6a2827395370a4e", "text": "We present Segment-level Neural CRF, which combines neural networks with a linear chain CRF for segment-level sequence modeling tasks such as named entity recognition (NER) and syntactic chunking. Our segment-level CRF can consider higher-order label dependencies compared with conventional word-level CRF. Since it is difficult to consider all possible variable length segments, our method uses segment lattice constructed from the word-level tagging model to reduce the search space. Performing experiments on NER and chunking, we demonstrate that our method outperforms conventional word-level CRF with neural networks.", "title": "" } ]
[ { "docid": "4fd05210fc14df530581b63b1497ca30", "text": "Tumor is a pre-stage of cancer which has become a serious problem in this era. Researchers are trying to develop methods and treatments to round it. Brain tumor is an exceptional cell enhancement in brain tissue and may not always be seen in imaging tricks. Magnetic Resonance Imaging (MRI) is a technique which is applied to display the detailed image of the attacked brain location. The medical imaging trick plays a significant behavior in identification of the disease. In this paper, the brain MRI image is chosen to investigate and a method is targeted for more clear view of the location attacked by tumor. An MRI abnormal brain images as input in the introduced method, Anisotropic filtering for noise removal, SVM classifier for segmentation and morphological operations for separating the affected area from normal one are the key stages if the presented method. Attaining clear MRI images of the brain are the base of this method. The classification of the intensities of the pixels on the filtered image identifies the tumor. Experimental result showed that the SVM has obtained 83% accuracy in segmentation. Finally, the segmented region of the tumor is put on the original image for a distinct identification.", "title": "" }, { "docid": "e74298e5bfd1cde8aaed2465cfb6ed33", "text": "We introduce a new low-distortion embedding of l<sub>2</sub><sup>d</sup> into l<sub>p</sub><sup>O(log n)</sup> (p=1,2), called the <i>Fast-Johnson-Linden-strauss-Transform</i>. The FJLT is faster than standard random projections and just as easy to implement. It is based upon the preconditioning of a sparse projection matrix with a randomized Fourier transform. Sparse random projections are unsuitable for low-distortion embeddings. We overcome this handicap by exploiting the \"Heisenberg principle\" of the Fourier transform, ie, its local-global duality. The FJLT can be used to speed up search algorithms based on low-distortion embeddings in l<sub>1</sub> and l<sub>2</sub>. We consider the case of approximate nearest neighbors in l<sub>2</sub><sup>d</sup>. We provide a faster algorithm using classical projections, which we then further speed up by plugging in the FJLT. We also give a faster algorithm for searching over the hypercube.", "title": "" }, { "docid": "fb0309bfdd5112cf319947e4e7d0a6da", "text": "By definition, autism spectrum disorder (ASD) is a neurodevelopmental disorder that emerges during early childhood. It is during this time that infants and toddlers transition from appearing typical across multiple domains to exhibiting the behavioral phenotype of ASD. Neuroimaging studies focused on this period of development have provided crucial knowledge pertaining to this process, including possible mechanisms underlying pathogenesis of the disorder and offering the possibility of prodromal or presymptomatic prediction of risk. In this paper, we review findings from structural and functional brain imaging studies of ASD focused on the first years of life and discuss implications for next steps in research and clinical applications.", "title": "" }, { "docid": "eed515cb3a2a990e67bf76c176c16d29", "text": "This paper describes the question generation system developed at UPenn for QGSTEC, 2010. The system uses predicate argument structures of sentences along with semantic roles for the question generation task from paragraphs. The semantic role labels are used to identify relevant parts of text before forming questions over them. The generated questions are then ranked to pick final six best questions.", "title": "" }, { "docid": "0a263c6abbfc97faa169b95d415c9896", "text": "We introduce ChronoStream, a distributed system specifically designed for elastic stateful stream computation in the cloud. ChronoStream treats internal state as a first-class citizen and aims at providing flexible elastic support in both vertical and horizontal dimensions to cope with workload fluctuation and dynamic resource reclamation. With a clear separation between application-level computation parallelism and OS-level execution concurrency, ChronoStream enables transparent dynamic scaling and failure recovery by eliminating any network I/O and state-synchronization overhead. Our evaluation on dozens of computing nodes shows that ChronoStream can scale linearly and achieve transparent elasticity and high availability without sacrificing system performance or affecting collocated tenants.", "title": "" }, { "docid": "304ed74effb7207228641d807a9c9820", "text": "In this paper we discuss the use of system dynamics as a methodology with which to address dynamically complex problems in water resources management. Problems in regional planning and river basin management, urban water management, flooding and irrigation exhibit important short-term and long-term effects, and are often contentious issues with high potential for conflict. We argue that system dynamics combined with stakeholder involvement provides an appropriate methodology to address these issues effectively. We trace the theoretical and practical evolution of system dynamics in these areas over the past 40 years. From this review of the literature we identify and discuss a number of best practices and common pitfalls in applications of system dynamics.", "title": "" }, { "docid": "3c29a0579a2f7d4f010b9b2f2df16e2c", "text": "In recent years research on human activity recognition using wearable sensors has enabled to achieve impressive results on real-world data. However, the most successful activity recognition algorithms require substantial amounts of labeled training data. The generation of this data is not only tedious and error prone but also limits the applicability and scalability of today's approaches. This paper explores and systematically analyzes two different techniques to significantly reduce the required amount of labeled training data. The first technique is based on semi-supervised learning and uses self-training and co-training. The second technique is inspired by active learning. In this approach the system actively asks which data the user should label. With both techniques, the required amount of training data can be reduced significantly while obtaining similar and sometimes even better performance than standard supervised techniques. The experiments are conducted using one of the largest and richest currently available datasets.", "title": "" }, { "docid": "dea3bce3f636c87fad95f255aceec858", "text": "In recent work, conditional Markov chain models (CMM) have been used to extract information from semi-structured text (one example is the Conditional Random Field [10]). Applications range from finding the author and title in research papers to finding the phone number and street address in a web page. The CMM framework combines a priori knowledge encoded as features with a set of labeled training data to learn an efficient extraction process. We will show that similar problems can be solved more effectively by learning a discriminative context free grammar from training data. The grammar has several distinct advantages: long range, even global, constraints can be used to disambiguate entity labels; training data is used more efficiently; and a set of new more powerful features can be introduced. The grammar based approach also results in semantic information (encoded in the form of a parse tree) which could be used for IR applications like question answering. The specific problem we consider is of extracting personal contact, or address, information from unstructured sources such as documents and emails. While linear-chain CMMs perform reasonably well on this task, we show that a statistical parsing approach results in a 50% reduction in error rate. This system also has the advantage of being interactive, similar to the system described in [9]. In cases where there are multiple errors, a single user correction can be propagated to correct multiple errors automatically. Using a discriminatively trained grammar, 93.71% of all tokens are labeled correctly (compared to 88.43% for a CMM) and 72.87% of records have all tokens labeled correctly (compared to 45.29% for the CMM).", "title": "" }, { "docid": "29d02d7219cb4911ab59681e0c70a903", "text": "As the explosive growth of smart devices and the advent of many new applications, traffic volume has been growing exponentially. The traditional centralized network architecture cannot accommodate such user demands due to heavy burden on the backhaul links and long latency. Therefore, new architectures, which bring network functions and contents to the network edge, are proposed, i.e., mobile edge computing and caching. Mobile edge networks provide cloud computing and caching capabilities at the edge of cellular networks. In this survey, we make an exhaustive review on the state-of-the-art research efforts on mobile edge networks. We first give an overview of mobile edge networks, including definition, architecture, and advantages. Next, a comprehensive survey of issues on computing, caching, and communication techniques at the network edge is presented. The applications and use cases of mobile edge networks are discussed. Subsequently, the key enablers of mobile edge networks, such as cloud technology, SDN/NFV, and smart devices are discussed. Finally, open research challenges and future directions are presented as well.", "title": "" }, { "docid": "eb647d25cdd2903ed17eb7626d148bfa", "text": "OBJECTIVE\nThe study investigated the influence Mozart's music has on brain activity in the process of learning. A second objective was to test priming explanation of the Mozart effect.\n\n\nMETHODS\nIn Experiment 1 individuals were first trained in how to solve spatial rotation tasks, and then solved similar tasks. Fifty-six students were divided into 4 groups: a control one--CG who prior to and after training relaxed, and three experimental groups: MM--who prior to and after training listened to music; MS--who prior to training listened to music and subsequently relaxed; and SM--who prior to training relaxed and afterward listened to music. The music used was the first movement of Mozart's sonata (K. 448). In Experiment 2, thirty-six respondents were divided into three groups: CG, MM (same procedure as in Experiment 1), and BM--who prior to and after training listened to Brahms' Hungarian dance No. 5. In both experiments the EEG data collected during problem solving were analyzed using the methods of event-related desynchronization/synchronization (ERD/ERS) and approximated entropy (ApEn).\n\n\nRESULTS\nIn the first experiment the respondents of the MM, MS, and SM groups showed a better task-performance than did the respondents of the CG group. Individuals of the MM group displayed less complex EEG patterns and more alpha band synchronization than did respondents of the other three groups. In Experiment 2 individuals who listened to Mozart showed a better task performance than did the respondents of the CG and BM groups. They displayed less complex EEG patterns and more lower-1 alpha and gamma band synchronization than did the respondents of the BM group.\n\n\nCONCLUSIONS\nMozart's music, by activating task-relevant brain areas, enhances the learning of spatio-temporal rotation tasks.\n\n\nSIGNIFICANCE\nThe results support priming explanation of the Mozart effect.", "title": "" }, { "docid": "90dececdeb4747ccfd87f75da6d53692", "text": "Much of the work on perception and understanding of music by computers has focused on low-level perceptual features such as pitch and tempo. Our work demonstrates that machine learning can be used to build e ective style classi ers for interactive performance systems. We also present an analysis explaining why these techniques work so well when hand-coded approaches have consistently failed. We also describe a reliable real-time performance style classi er.", "title": "" }, { "docid": "32e2c444bfbe7c85ea600c2b91bf2370", "text": "The consumption of caffeine (an adenosine receptor antagonist) correlates inversely with depression and memory deterioration, and adenosine A2A receptor (A2AR) antagonists emerge as candidate therapeutic targets because they control aberrant synaptic plasticity and afford neuroprotection. Therefore we tested the ability of A2AR to control the behavioral, electrophysiological, and neurochemical modifications caused by chronic unpredictable stress (CUS), which alters hippocampal circuits, dampens mood and memory performance, and enhances susceptibility to depression. CUS for 3 wk in adult mice induced anxiogenic and helpless-like behavior and decreased memory performance. These behavioral changes were accompanied by synaptic alterations, typified by a decrease in synaptic plasticity and a reduced density of synaptic proteins (synaptosomal-associated protein 25, syntaxin, and vesicular glutamate transporter type 1), together with an increased density of A2AR in glutamatergic terminals in the hippocampus. Except for anxiety, for which results were mixed, CUS-induced behavioral and synaptic alterations were prevented by (i) caffeine (1 g/L in the drinking water, starting 3 wk before and continued throughout CUS); (ii) the selective A2AR antagonist KW6002 (3 mg/kg, p.o.); (iii) global A2AR deletion; and (iv) selective A2AR deletion in forebrain neurons. Notably, A2AR blockade was not only prophylactic but also therapeutically efficacious, because a 3-wk treatment with the A2AR antagonist SCH58261 (0.1 mg/kg, i.p.) reversed the mood and synaptic dysfunction caused by CUS. These results herald a key role for synaptic A2AR in the control of chronic stress-induced modifications and suggest A2AR as candidate targets to alleviate the consequences of chronic stress on brain function.", "title": "" }, { "docid": "81aa60b514bb11efb9e137b8d13b92e8", "text": "Linguistic creativity is a marriage of form and content in which each works together to convey our meanings with concision, resonance and wit. Though form clearly influences and shapes our content, the most deft formal trickery cannot compensate for a lack of real insight. Before computers can be truly creative with language, we must first imbue them with the ability to formulate meanings that are worthy of creative expression. This is especially true of computer-generated poetry. If readers are to recognize a poetic turn-of-phrase as more than a superficial manipulation of words, they must perceive and connect with the meanings and the intent behind the words. So it is not enough for a computer to merely generate poem-shaped texts; poems must be driven by conceits that build an affective worldview. This paper describes a conceit-driven approach to computational poetry, in which metaphors and blends are generated for a given topic and affective slant. Subtle inferences drawn from these metaphors and blends can then drive the process of poetry generation. In the same vein, we consider the problem of generating witty insights from the banal truisms of common-sense knowledge bases. Ode to a Keatsian Turn Poetic licence is much more than a licence to frill. Indeed, it is not so much a licence as a contract, one that allows a speaker to subvert the norms of both language and nature in exchange for communicating real insights about some relevant state of affairs. Of course, poetry has norms and conventions of its own, and these lend poems a range of recognizably “poetic” formal characteristics. When used effectively, formal devices such as alliteration, rhyme and cadence can mold our meanings into resonant and incisive forms. However, even the most poetic devices are just empty frills when used only to disguise the absence of real insight. Computer models of poem generation must model more than the frills of poetry, and must instead make these formal devices serve the larger goal of meaning creation. Nonetheless, is often said that we “eat with our eyes”, so that the stylish presentation of food can subtly influence our sense of taste. So it is with poetry: a pleasing form can do more than enhance our recall and comprehension of a meaning – it can also suggest a lasting and profound truth. Experiments by McGlone & Tofighbakhsh (1999, 2000) lend empirical support to this so-called Keats heuristic, the intuitive belief – named for Keats’ memorable line “Beauty is truth, truth beauty” – that a meaning which is rendered in an aesthetically-pleasing form is much more likely to be perceived as truthful than if it is rendered in a less poetic form. McGlone & Tofighbakhsh demonstrated this effect by searching a book of proverbs for uncommon aphorisms with internal rhyme – such as “woes unite foes” – and by using synonym substitution to generate non-rhyming (and thus less poetic) variants such as “troubles unite enemies”. While no significant differences were observed in subjects’ ease of comprehension for rhyming/non-rhyming forms, subjects did show a marked tendency to view the rhyming variants as more truthful expressions of the human condition than the corresponding non-rhyming forms. So a well-polished poetic form can lend even a modestly interesting observation the lustre of a profound insight. An automated approach to poetry generation can exploit this symbiosis of form and content in a number of useful ways. It might harvest interesting perspectives on a given topic from a text corpus, or it might search its stores of commonsense knowledge for modest insights to render in immodest poetic forms. We describe here a system that combines both of these approaches for meaningful poetry generation. As shown in the sections to follow, this system – named Stereotrope – uses corpus analysis to generate affective metaphors for a topic on which it is asked to wax poetic. Stereotrope can be asked to view a topic from a particular affective stance (e.g., view love negatively) or to elaborate on a familiar metaphor (e.g. love is a prison). In doing so, Stereotrope takes account of the feelings that different metaphors are likely to engender in an audience. These metaphors are further integrated to yield tight conceptual blends, which may in turn highlight emergent nuances of a viewpoint that are worthy of poetic expression (see Lakoff and Turner, 1989). Stereotrope uses a knowledge-base of conceptual norms to anchor its understanding of these metaphors and blends. While these norms are the stuff of banal clichés and stereotypes, such as that dogs chase cats and cops eat donuts. we also show how Stereotrope finds and exploits corpus evidence to recast these banalities as witty, incisive and poetic insights. Mutual Knowledge: Norms and Stereotypes Samuel Johnson opined that “Knowledge is of two kinds. We know a subject ourselves, or we know where we can find information upon it.” Traditional approaches to the modelling of metaphor and other figurative devices have typically sought to imbue computers with the former (Fass, 1997). More recently, however, the latter kind has gained traction, with the use of the Web and text corpora to source large amounts of shallow knowledge as it is needed (e.g., Veale & Hao 2007a,b; Shutova 2010; Veale & Li, 2011). But the kind of knowledge demanded by knowledgehungry phenomena such as metaphor and blending is very different to the specialist “book” knowledge so beloved of Johnson. These demand knowledge of the quotidian world that we all tacitly share but rarely articulate in words, not even in the thoughtful definitions of Johnson’s dictionary. Similes open a rare window onto our shared expectations of the world. Thus, the as-as-similes “as hot as an oven”, “as dry as sand” and “as tough as leather” illuminate the expected properties of these objects, while the like-similes “crying like a baby”, “singing like an angel” and “swearing like a sailor” reflect intuitons of how these familiar entities are tacitly expected to behave. Veale & Hao (2007a,b) thus harvest large numbers of as-as-similes from the Web to build a rich stereotypical model of familiar ideas and their salient properties, while Özbal & Stock (2012) apply a similar approach on a smaller scale using Google’s query completion service. Fishelov (1992) argues convincingly that poetic and non-poetic similes are crafted from the same words and ideas. Poetic conceits use familiar ideas in non-obvious combinations, often with the aim of creating semantic tension. The simile-based model used here thus harvests almost 10,000 familiar stereotypes (drawing on a range of ~8,000 features) from both as-as and like-similes. Poems construct affective conceits, but as shown in Veale (2012b), the features of a stereotype can be affectively partitioned as needed into distinct pleasant and unpleasant perspectives. We are thus confident that a stereotype-based model of common-sense knowledge is equal to the task of generating and elaborating affective conceits for a poem. A stereotype-based model of common-sense knowledge requires both features and relations, with the latter showing how stereotypes relate to each other. It is not enough then to know that cops are tough and gritty, or that donuts are sweet and soft; our stereotypes of each should include the cliché that cops eat donuts, just as dogs chew bones and cats cough up furballs. Following Veale & Li (2011), we acquire inter-stereotype relationships from the Web, not by mining similes but by mining questions. As in Özbal & Stock (2012), we target query completions from a popular search service (Google), which offers a smaller, public proxy for a larger, zealously-guarded search query log. We harvest questions of the form “Why do Xs <relation> Ys”, and assume that since each relationship is presupposed by the question (so “why do bikers wear leathers” presupposes that everyone knows that bikers wear leathers), the triple of subject/relation/object captures a widely-held norm. In this way we harvest over 40,000 such norms from the Web. Generating Metaphors, N-Gram Style! The Google n-grams (Brants & Franz, 2006) is a rich source of popular metaphors of the form Target is Source, such as “politicians are crooks”, “Apple is a cult”, “racism is a disease” and “Steve Jobs is a god”. Let src(T) denote the set of stereotypes that are commonly used to describe a topic T, where commonality is defined as the presence of the corresponding metaphor in the Google n-grams. To find metaphors for proper-named entities, we also analyse n-grams of the form stereotype First [Middle] Last, such as “tyrant Adolf Hitler” and “boss Bill Gates”. Thus, e.g.: src(racism) = {problem, disease, joke, sin, poison, crime, ideology, weapon} src(Hitler) = {monster, criminal, tyrant, idiot, madman, vegetarian, racist, ...} Let typical(T) denote the set of properties and behaviors harvested for T from Web similes (see previous section), and let srcTypical(T) denote the aggregate set of properties and behaviors ascribable to T via the metaphors in src(T): (1) srcTypical (T) = M∈src(T) typical(M) We can generate conceits for a topic T by considering not just obvious metaphors for T, but metaphors of metaphors: (2) conceits(T) = src(T) ∪ M∈src(T) src(M) The features evoked by the conceit T as M are given by: (3) salient (T,M) = [srcTypical(T) ∪ typical(T)]", "title": "" }, { "docid": "758bc9b5e633d59afb155650239591a9", "text": "A growing body of works address automated mining of biochemical knowledge from digital repositories of scientific literature, such as MEDLINE. Some of these works use abstracts as the unit of text from which to extract facts. Others use sentences for this purpose, while still others use phrases. Here we compare abstracts, sentences, and phrases in MEDLINE using the standard information retrieval performance measures of recall, precision, and effectiveness, for the task of mining interactions among biochemical terms based on term co-occurrence. Results show statistically significant differences that can impact the choice of text unit.", "title": "" }, { "docid": "2eff0a817a48a2fd62e6f834d0389105", "text": "In this paper, we demonstrate that image reconstruction can be expressed in terms of neural networks. We show that filtered backprojection can be mapped identically onto a deep neural network architecture. As for the case of iterative reconstruction, the straight forward realization as matrix multiplication is not feasible. Thus, we propose to compute the back-projection layer efficiently as fixed function and its gradient as projection operation. This allows a data-driven approach for joint optimization of correction steps in projection domain and image domain. As a proof of concept, we demonstrate that we are able to learn weightings and additional filter layers that consistently reduce the reconstruction error of a limited angle reconstruction by a factor of two while keeping the same computational complexity as filtered back-projection. We believe that this kind of learning approach can be extended to any common CT artifact compensation heuristic and will outperform hand-crafted artifact correction methods in the future.", "title": "" }, { "docid": "2f7e58974d4fff932edb82b57ca9464d", "text": "Binary neural networks (BNN) have been studied extensively since they run dramatically faster at lower memory and power consumption than floating-point networks, thanks to the efficiency of bit operations. However, contemporary BNNs whose weights and activations are both single bits suffer from severe accuracy degradation. To understand why, we investigate the representation ability, speed and bias/variance of BNNs through extensive experiments. We conclude that the error of BNNs are predominantly caused by the intrinsic instability (training time) and non-robustness (train & test time). Inspired by this investigation, we propose the Binary Ensemble Neural Network (BENN) which leverages ensemble methods to improve the performance of BNNs with limited efficiency cost. While ensemble techniques have been broadly believed to be only marginally helpful for strong classifiers such as deep neural networks, our analysis and experiments show that they are naturally a perfect fit to boost BNNs. We find that our BENN, which is faster and more robust than state-of-the-art binary networks, can even surpass the accuracy of the full-precision floating number network with the same architecture.", "title": "" }, { "docid": "5fde7006ec6f7cf4f945b234157e5791", "text": "In this work, we investigate the value of uncertainty modelling in 3D super-resolution with convolutional neural networks (CNNs). Deep learning has shown success in a plethora of medical image transformation problems, such as super-resolution (SR) and image synthesis. However, the highly ill-posed nature of such problems results in inevitable ambiguity in the learning of networks. We propose to account for intrinsic uncertainty through a per-patch heteroscedastic noise model and for parameter uncertainty through approximate Bayesian inference in the form of variational dropout. We show that the combined benefits of both lead to the state-of-the-art performance SR of diffusion MR brain images in terms of errors compared to ground truth. We further show that the reduced error scores produce tangible benefits in downstream tractography. In addition, the probabilistic nature of the methods naturally confers a mechanism to quantify uncertainty over the super-resolved output. We demonstrate through experiments on both healthy and pathological brains the potential utility of such an uncertainty measure in the risk assessment of the super-resolved images for subsequent clinical use.", "title": "" }, { "docid": "0aa7a61ae2d73b017b5acdd885d7c0ef", "text": "3GPP Long Term Evolution-Advanced (LTE-A) aims at enhancement of LTE performance in many respects including the system capacity and network coverage. This enhancement can be accomplished by heterogeneous networks (HetNets) where additional micro-nodes that require lower transmission power are efficiently deployed. More careful management of mobility and handover (HO) might be required in HetNets compared to homogeneous networks where all nodes require the same transmission power. In this article, we provide a technical overview of mobility and HO management for HetNets in LTEA. Moreover, we investigate the A3-event which requires a certain criterion to be met for HO. The criterion involves the reference symbol received power/quality of user equipment (UE), hysteresis margin, and a number of offset parameters based on proper HO timing, i.e., time-to-trigger (TTT). Optimum setting of these parameters are not trivial task, and has to be determined depending on UE speed, propagation environment, system load, deployed HetNets configuration, etc. Therefore, adaptive TTT values with given hysteresis margin for the lowest ping pong rate within 2 % of radio link failure rate depending on UE speed and deployed HetNets configuration are investigated in this article.", "title": "" }, { "docid": "408696a41684af20733b25833e741259", "text": "We propose a method for accurate 3D shape reconstruction using uncalibrated multiview photometric stereo. A coarse mesh reconstructed using multiview stereo is first parameterized using a planar mesh parameterization technique. Subsequently, multiview photometric stereo is performed in the 2D parameter domain of the mesh, where all geometric and photometric cues from multiple images can be treated uniformly. Unlike traditional methods, there is no need for merging view-dependent surface normal maps. Our key contribution is a new photometric stereo based mesh refinement technique that can efficiently reconstruct meshes with extremely fine geometric details by directly estimating a displacement texture map in the 2D parameter domain. We demonstrate that intricate surface geometry can be reconstructed using several challenging datasets containing surfaces with specular reflections, multiple albedos and complex topologies.", "title": "" }, { "docid": "a7c330c9be1d7673bfff43b0544db4ea", "text": "The state of the art in visual object retrieval from large databases is achieved by systems that are inspired by text retrieval. A key component of these approaches is that local regions of images are characterized using high-dimensional descriptors which are then mapped to ldquovisual wordsrdquo selected from a discrete vocabulary.This paper explores techniques to map each visual region to a weighted set of words, allowing the inclusion of features which were lost in the quantization stage of previous systems. The set of visual words is obtained by selecting words based on proximity in descriptor space. We describe how this representation may be incorporated into a standard tf-idf architecture, and how spatial verification is modified in the case of this soft-assignment. We evaluate our method on the standard Oxford Buildings dataset, and introduce a new dataset for evaluation. Our results exceed the current state of the art retrieval performance on these datasets, particularly on queries with poor initial recall where techniques like query expansion suffer. Overall we show that soft-assignment is always beneficial for retrieval with large vocabularies, at a cost of increased storage requirements for the index.", "title": "" } ]
scidocsrr
d13720fe665e0eb6cf95764384e43e02
Auxiliary Multimodal LSTM for Audio-visual Speech Recognition and Lipreading
[ { "docid": "80c44d61e019f6858326fb9c5753c700", "text": "This paper develops an Audio-Visual Speech Recognition (AVSR) method, by (1) exploring high-performance visual features, (2) applying audio and visual deep bottleneck features to improve AVSR performance, and (3) investigating effectiveness of voice activity detection in a visual modality. In our approach, many kinds of visual features are incorporated, subsequently converted into bottleneck features by deep learning technology. By using proposed features, we successfully achieved 73.66% lipreading accuracy in speaker-independent open condition, and about 90% AVSR accuracy on average in noisy environments. In addition, we extracted speech segments from visual features, resulting 77.80% lipreading accuracy. It is found VAD is useful in both audio and visual modalities, for better lipreading and AVSR.", "title": "" } ]
[ { "docid": "160aef1e152fcf761a813dcabc33f1d4", "text": "Three different samples (total N = 485) participated in the development and refinement ofthe Leadership Scale for Sports (LSS). A five-factor solution with 40 items describing the most salient dimensions of coaching behavior was selected as the most meaningful. These factors were named Training and Instruction, Democratic Behavior, Autocratic Behavior, Social Support, and Positive Feedback. Internal consistency estimates ranged from .45 to .93 and the test-retest reliability coefficients ranged from .71 to .82. The relative stability of the factor structure across the different samples confirmed the factorial validity ofthe scale. The interpretation ofthe factors established the content validity of the scale. Finally, possible uses of the LSS were pointed out.", "title": "" }, { "docid": "0f45452e8c9ca8aaf501e7e89685746b", "text": "Chatbots are programs that mimic human conversation using Artificial Intelligence (AI). It is designed to be the ultimate virtual assistant, entertainment purpose, helping one to complete tasks ranging from answering questions, getting driving directions, turning up the thermostat in smart home, to playing one's favorite tunes etc. Chatbot has become more popular in business groups right now as they can reduce customer service cost and handles multiple users at a time. But yet to accomplish many tasks there is need to make chatbots as efficient as possible. To address this problem, in this paper we provide the design of a chatbot, which provides an efficient and accurate answer for any query based on the dataset of FAQs using Artificial Intelligence Markup Language (AIML) and Latent Semantic Analysis (LSA). Template based and general questions like welcome/ greetings and general questions will be responded using AIML and other service based questions uses LSA to provide responses at any time that will serve user satisfaction. This chatbot can be used by any University to answer FAQs to curious students in an interactive fashion.", "title": "" }, { "docid": "c8f8df96501d0786262ebb7630c73594", "text": "In this paper, a grouping genetic algorithm based approach is proposed for dividing stocks into groups and mining a set of stock portfolios, namely group stock portfolio. Each chromosome consists of three parts. Grouping and stock parts are used to indicate how to divide stocks into groups. Stock portfolio part is used to represent the purchased stocks and their purchased units. The fitness of each chromosome is evaluated by the group balance and the portfolio satisfaction. The group balance is utilized to make the groups represented by the chromosome have as similar number of stocks as possible. The portfolio satisfaction is used to evaluate the goodness of profits and satisfaction of investor's requests of all possible portfolio combinations that can generate from a chromosome. Experiments on a real data were also made to show the effectiveness of the proposed approach.", "title": "" }, { "docid": "7681a78f2d240afc6b2e48affa0612c1", "text": "Web usage mining applies data mining procedures to analyze user access of Web sites. As with any KDD (knowledge discovery and data mining) process, WUM contains three main steps: preprocessing, knowledge extraction, and results analysis. We focus on data preprocessing, a fastidious, complex process. Analysts aim to determine the exact list of users who accessed the Web site and to reconstitute user sessions-the sequence of actions each user performed on the Web site. Intersites WUM deals with Web server logs from several Web sites, generally belonging to the same organization. Thus, analysts must reassemble the users' path through all the different Web servers that they visited. Our solution is to join all the log files and reconstitute the visit. Classical data preprocessing involves three steps: data fusion, data cleaning, and data structuration. Our solution for WUM adds what we call advanced data preprocessing. This consists of a data summarization step, which will allow the analyst to select only the information of interest. We've successfully tested our solution in an experiment with log files from INRIA Web sites.", "title": "" }, { "docid": "9ebaed9fa1ceb1038924055b768f23d2", "text": "We provide information on the Survivable Network Design Library (SNDlib), a data library for fixed telecommunication network design that can be accessed at http://sndlib.zib.de. In version 1.0, the library contains data related to 22 networks which, combined with a set of selected planning parameters, leads to 830 network planning problem instances. In this paper, we provide a mathematical model for each planning problem considered in the library and describe the data concepts of the SNDlib. Furthermore, we provide statistical information and details about the origin of the data sets.", "title": "" }, { "docid": "4e411bc18c6dfa74ffc6ab28228bdebf", "text": "If a single deontic reasoning system handles deontic social contracts and deontic precautions, then performance on both should be impaired by neural damage to that system. But if they are handled by two distinct neurocognitive systems, as predicted by SCT and HMT, then neural trauma could cause a dissociation. Buller’s hypothesis fails again: focal brain damage can selectively impair social contract reasoning while leaving precautionary reasoning intact [5]. This dissociation within the domain of deontic rules has recently been replicated using neuroimaging [6]. Interpretations of social contract rules track SCT’s domain-specialized inference procedures: in [8], we refuted Buller-style logic explanations of social contract results for perspective change, switched rules, and ‘wants’ problems – facts he fails to mention, let alone discuss. Buller’s systematic inattention to large bodies of findings that conflict with his assertions is not due to lack of space in TICS – the pretence that these findings do not exist pervades his book, and its treatment of many areas of evolutionary psychology. (For further analysis, see www. psych.ucsb.edu/research/cep/buller.htm)", "title": "" }, { "docid": "66d6f514c6bce09110780a1130b64dfe", "text": "Today, with more competiveness of industries, markets, and working atmosphere in productive and service organizations what is very important for maintaining clients present, for attracting new clients and as a result increasing growth of success in organizations is having a suitable relation with clients. Bank is among organizations which are not an exception. Especially, at the moment according to increasing rate of banks` privatization, it can be argued that significance of attracting clients for banks is more than every time. The article tries to investigate effect of CRM on marketing performance in banking industry. The research method is applied and survey and descriptive. Statistical community of the research is 5 branches from Mellat Banks across Khoramabad Province and their clients. There are 45 personnel in this branch and according to Morgan Table the sample size was 40 people. Clients example was considered according to collected information, one questionnaire was designed for bank organization and another one was prepared for banks` clients in which reliability and validity are approved. The research result indicates that CRM is ineffective on marketing performance.", "title": "" }, { "docid": "91e38df08894f59e134f83ae532b09e7", "text": "Many functional network properties of the human brain have been identified during rest and task states, yet it remains unclear how the two relate. We identified a whole-brain network architecture present across dozens of task states that was highly similar to the resting-state network architecture. The most frequent functional connectivity strengths across tasks closely matched the strengths observed at rest, suggesting this is an \"intrinsic,\" standard architecture of functional brain organization. Furthermore, a set of small but consistent changes common across tasks suggests the existence of a task-general network architecture distinguishing task states from rest. These results indicate the brain's functional network architecture during task performance is shaped primarily by an intrinsic network architecture that is also present during rest, and secondarily by evoked task-general and task-specific network changes. This establishes a strong relationship between resting-state functional connectivity and task-evoked functional connectivity-areas of neuroscientific inquiry typically considered separately.", "title": "" }, { "docid": "11707c7f7c5b028392b25d1dffa9daeb", "text": "High reliability and large rangeability are required of pumps in existing and new plants which must be capable of reliable on-off cycling operations and specially low load duties. The reliability and rangeability target is a new task for the pump designer/researcher and is made very challenging by the cavitation and/or suction recirculation effects, first of all the pump damage. The present knowledge about the: a) design critical parameters and their optimization, b) field problems diagnosis and troubleshooting has much advanced, in the very latest years. The objective of the pump manufacturer is to develop design solutions and troubleshooting approaches which improve the impeller life as related to cavitation erosion and enlarge the reliable operating range by minimizing the effects of the suction recirculation. This paper gives a short description of several field cases characterized by different damage patterns and other symptoms related with cavitation and/or suction recirculation. The troubleshooting methodology is described in detail, also focusing on the role of both the pump designer and the pump user.", "title": "" }, { "docid": "83797d5698f6962141744f591d946fa5", "text": "In this paper, an S-band internally harmonic matched GaN FET is presented, which is designed so that up to third harmonic impedance is tuned to high efficiency condition. Harmonic load pull measurements were done for a small transistor cell at first. It was found that power added efficiency (PAE) of 78% together with 6W output power can be obtained by tuning impedances up to 3rd harmonic for both input and output sides. Then matching circuit was designed for large gate periphery multi-cell transistor. To make the circuit size small, harmonic matching was done in a hermetically sealed package. With total gate width of 64mm, 330W output power and 62% PAE was successfully obtained.", "title": "" }, { "docid": "e5ce1ddd50a728fab41043324938a554", "text": "B-trees are used by many file systems to represent files and directories. They provide guaranteed logarithmic time key-search, insert, and remove. File systems like WAFL and ZFS use shadowing, or copy-on-write, to implement snapshots, crash recovery, write-batching, and RAID. Serious difficulties arise when trying to use b-trees and shadowing in a single system.\n This article is about a set of b-tree algorithms that respects shadowing, achieves good concurrency, and implements cloning (writeable snapshots). Our cloning algorithm is efficient and allows the creation of a large number of clones.\n We believe that using our b-trees would allow shadowing file systems to better scale their on-disk data structures.", "title": "" }, { "docid": "23def38b89358bc1090412e127c7ec2b", "text": "We describe the design of four ornithopters ranging in wing span from 10 cm to 40 cm, and in weight from 5 g to 45 g. The controllability and power supply are two major considerations, so we compare the efficiency and characteristics between different types of subsystems such as gearbox and tail shape. Our current ornithopter is radio-controlled with inbuilt visual sensing and capable of takeoff and landing. We also concentrate on its wing efficiency based on design inspired by a real insect wing and consider that aspects of insect flight such as delayed stall and wake capture are essential at such small size. Most importantly, the advance ratio, controlled either by enlarging the wing beat amplitude or raising the wing beat frequency, is the most significant factor in an ornithopter which mimics an insect.", "title": "" }, { "docid": "42bb77e398f19f3be69c3852a597aa33", "text": "The recently released Rodinia benchmark suite enables users to evaluate heterogeneous systems including both accelerators, such as GPUs, and multicore CPUs. As Rodinia sees higher levels of acceptance, it becomes important that researchers understand this new set of benchmarks, especially in how they differ from previous work. In this paper, we present recent extensions to Rodinia and conduct a detailed characterization of the Rodinia benchmarks (including performance results on an NVIDIA GeForce GTX480, the first product released based on the Fermi architecture). We also compare and contrast Rodinia with Parsec to gain insights into the similarities and differences of the two benchmark collections; we apply principal component analysis to analyze the application space coverage of the two suites. Our analysis shows that many of the workloads in Rodinia and Parsec are complementary, capturing different aspects of certain performance metrics.", "title": "" }, { "docid": "b367b94f7ad3142677a27de9756f340b", "text": "Previous investigations of strength have only focused on biomechanical or psychological determinants, while ignoring the potential interplay and relative contributions of these variables. The purpose of this study was to investigate the relative contributions of biomechanical, anthropometric, and psychological variables to the prediction of maximum parallel barbell back squat strength. Twenty-one college-aged participants (male = 14; female = 7; age = 23 ± 3 years) reported to the laboratory for two visits. The first visit consisted of anthropometric, psychometric, and parallel barbell back squat one-repetition maximum (1RM) testing. On the second visit, participants performed isometric dynamometry testing for the knee, hip, and spinal extensors in a sticking point position-specific manner. Multiple linear regression and correlations were used to investigate the combined and individual relationships between biomechanical, anthropometric, and psychological variables and squat 1RM. Multiple regression revealed only one statistically predictive determinant: fat free mass normalized to height (standardized estimate ± SE = 0.6 ± 0.3; t(16) = 2.28; p = 0.037). Correlation coefficients for individual variables and squat 1RM ranged from r = -0.79-0.83, with biomechanical, anthropometric, experiential, and sex predictors showing the strongest relationships, and psychological variables displaying the weakest relationships. These data suggest that back squat strength in a heterogeneous population is multifactorial and more related to physical rather than psychological variables.", "title": "" }, { "docid": "b79b3497ae4987e00129eab9745e1398", "text": "The automata-theoretic approach to linear temporal logic uses the theory of automata as a unifying paradigm for program specification, verification, and synthesis. Both programs and specifications are in essence descriptions of computations. These computations can be viewed as words over some alphabet. Thus,programs and specificationscan be viewed as descriptions of languagesover some alphabet. The automata-theoretic perspective considers the relationships between programs and their specifications as relationships between languages.By translating programs and specifications to automata, questions about programs and their specifications can be reduced to questions about automata. More specifically, questions such as satisfiability of specifications and correctness of programs with respect to their specifications can be reduced to questions such as nonemptiness and containment of automata. Unlike classical automata theory, which focused on automata on finite words, the applications to program specification, verification, and synthesis, use automata on infinite words, since the computations in which we are interested are typically infinite. This paper provides an introduction to the theory of automata on infinite words and demonstrates its applications to program specification, verification, and synthesis.", "title": "" }, { "docid": "1831e2a5a75fc85299588323d68947b2", "text": "The Transaction Processing Performance Council (TPC) is completing development of TPC-DS, a new generation industry standard decision support benchmark. The TPC-DS benchmark, first introduced in the “The Making of TPC-DS” [9] paper at the 32 International Conference on Very Large Data Bases (VLDB), has now entered the TPC’s “Formal Review” phase for new benchmarks; companies and researchers alike can now download the draft benchmark specification and tools for evaluation. The first paper [9] gave an overview of the TPC-DS data model, workload model, and execution rules. This paper details the characteristics of different phases of the workload, namely: database load, query workload and data maintenance; and also their impact to the benchmark’s performance metric. As with prior TPC benchmarks, this workload will be widely used by vendors to demonstrate their capabilities to support complex decision support systems, by customers as a key factor in purchasing servers and software, and by the database community for research and development of optimization techniques.", "title": "" }, { "docid": "0c025ec05a1f98d71c9db5bfded0a607", "text": "Many organizations, such as banks, airlines, telecommunications companies, and police departments, routinely use queueing models to help determine capacity levels needed to respond to experienced demands in a timely fashion. Though queueing analysis has been used in hospitals and other healthcare settings, its use in this sector is not widespread. Yet, given the pervasiveness of delays in healthcare and the fact that many healthcare facilities are trying to meet increasing demands with tightly constrained resources, queueing models can be very useful in developing more effective policies for bed allocation and staffing, and in identifying other opportunities for improving service. Queueing analysis is also a key tool in estimating capacity requirements for possible future scenarios, including demand surges due to new diseases or acts of terrorism. This chapter describes basic queueing models as well as some simple modifications and extensions that are particularly useful in the healthcare setting, and give examples of their use. The critical issue of data requirements is also be discussed as well as model choice, modelbuilding and the interpretation and use of results.", "title": "" }, { "docid": "92993ce699e720568d2e1b12a605bc3e", "text": "Techniques for violent scene detection and affective impact prediction in videos can be deployed in many applications. In MediaEval 2015, we explore deep learning methods to tackle this challenging problem. Our system consists of several deep learning features. First, we train a Convolutional Neural Network (CNN) model with a subset of ImageNet classes selected particularly for violence detection. Second, we adopt a specially designed two-stream CNN framework [1] to extract features on both static frames and motion optical flows. Third, Long Short Term Memory (LSTM) models are applied on top of the two-stream CNN features, which can capture the longer-term temporal dynamics. In addition, several conventional motion and audio features are also extracted as complementary information to the deep learning features. By fusing all the advanced features, we achieve a mean average precision of 0.296 in the violence detection subtask, and an accuracy of 0.418 and 0.488 for arousal and valence respectively in the induced affect detection subtask. 1. SYSTEM DESCRIPTION Figure 1 gives an overview of our system. In this short paper, we briefly describe each of the key components. For more information about the task definitions, interested readers may refer to [2].", "title": "" }, { "docid": "ec0928debb2a2b8a2f1f3ef56b6ff4ea", "text": "The fifth generation (5G) of mobile broadband shall be a far more complex system compared to earlier generations due to advancements in radio and network technology, increased densification and heterogeneity of network and user equipment, larger number of operating bands, as well as more stringent performance requirement. To cope with the increased complexity of the Radio Resources Management (RRM) of 5G systems, this manuscript advocates the need for a clean slate design of the 5G RRM architecture. We propose to capitalize the large amount of data readily available in the network from measurements and system observations in combination with the most recent advances in the field of machine learning. The result is an RRM architecture based on general-purpose learning framework capable of deriving specific RRM control policies directly from data gathered in the network. The potential of this approach is verified in three case studies and future directions on application of machine learning to RRM are discussed.", "title": "" } ]
scidocsrr
ed14cb435d8b344a6ede92e8cc07c96d
Automated Tongue Feature Extraction for ZHENG Classification in Traditional Chinese Medicine
[ { "docid": "9d3fde77e0a47d11c7cf9b408abe6cc9", "text": "Traditional Chinese Medicine (TCM) has a long history and has been recognized as a popular alternative medicine in western countries. Tongue diagnosis is a significant procedure in computer-aided TCM, where tongue image analysis plays a dominant role. In this paper, we proposed a fully automatic tongue detection and tongue segmentation framework, which is an essential step in computer-aided tongue image analysis. Comparing with other existing methods, our method is fully automatic without any need of adjusting parameters for different images and do not need any initialization.", "title": "" }, { "docid": "c90b05657b7673257db617b62d0ed80c", "text": "Automated tongue image segmentation, in Chinese medicine, is difficult due to two special factors: 1) there are many pathological details on the surface of the tongue, which have a large influence on edge extraction; 2) the shapes of the tongue bodies captured from various persons (with different diseases) are quite different, so they are impossible to describe properly using a predefined deformable template. To address these problems, in this paper, we propose an original technique that is based on a combination of a bi-elliptical deformable template (BEDT) and an active contour model, namely the bi-elliptical deformable contour (BEDC). The BEDT captures gross shape features by using the steepest decent method on its energy function in the parameter space. The BEDC is derived from the BEDT by substituting template forces for classical internal forces, and can deform to fit local details. Our algorithm features fully automatic interpretation of tongue images and a consistent combination of global and local controls via the template force. We apply the BEDC to a large set of clinical tongue images and present experimental results.", "title": "" } ]
[ { "docid": "55f356248f8ebf2174636cbedeaceaf3", "text": "In in this paper, we propose a new model regarding foreground and shadow detection in video sequences. The model works without detailed a priori object-shape information, and it is also appropriate for low and unstable frame rate video sources. Contribution is presented in three key issues: 1) we propose a novel adaptive shadow model, and show the improvements versus previous approaches in scenes with difficult lighting and coloring effects; 2) we give a novel description for the foreground based on spatial statistics of the neighboring pixel values, which enhances the detection of background or shadow-colored object parts; 3) we show how microstructure analysis can be used in the proposed framework as additional feature components improving the results. Finally, a Markov random field model is used to enhance the accuracy of the separation. We validate our method on outdoor and indoor sequences including real surveillance videos and well-known benchmark test sets.", "title": "" }, { "docid": "4ee078123815eff49cc5d43550021261", "text": "Generalized anxiety and major depression have become increasingly common in the United States, affecting 18.6 percent of the adult population. Mood disorders can be debilitating, and are often correlated with poor general health, life dissatisfaction, and the need for disability benefits due to inability to work. Recent evidence suggests that some mood disorders have a circadian component, and disruptions in circadian rhythms may even trigger the development of these disorders. However, the molecular mechanisms of this interaction are not well understood. Polymorphisms in a circadian clock-related gene, PER3, are associated with behavioral phenotypes (extreme diurnal preference in arousal and activity) and sleep/mood disorders, including seasonal affective disorder (SAD). Here we show that two PER3 mutations, a variable number tandem repeat (VNTR) allele and a single-nucleotide polymorphism (SNP), are associated with diurnal preference and higher Trait-Anxiety scores, supporting a role for PER3 in mood modulation. In addition, we explore a potential mechanism for how PER3 influences mood by utilizing a comprehensive circadian clock model that accurately predicts the changes in circadian period evident in knock-out phenotypes and individuals with PER3-related clock disorders.", "title": "" }, { "docid": "65385d7aee49806476dc913f6768fc43", "text": "Software developers spend a significant portion of their resources handling user-submitted bug reports. For software that is widely deployed, the number of bug reports typically outstrips the resources available to triage them. As a result, some reports may be dealt with too slowly or not at all. \n We present a descriptive model of bug report quality based on a statistical analysis of surface features of over 27,000 publicly available bug reports for the Mozilla Firefox project. The model predicts whether a bug report is triaged within a given amount of time. Our analysis of this model has implications for bug reporting systems and suggests features that should be emphasized when composing bug reports. \n We evaluate our model empirically based on its hypothetical performance as an automatic filter of incoming bug reports. Our results show that our model performs significantly better than chance in terms of precision and recall. In addition, we show that our modelcan reduce the overall cost of software maintenance in a setting where the average cost of addressing a bug report is more than 2% of the cost of ignoring an important bug report.", "title": "" }, { "docid": "099f8791628965844b96602aebed90f8", "text": "Termites have colonized many habitats and are among the most abundant animals in tropical ecosystems, which they modify considerably through their actions. The timing of their rise in abundance and of the dispersal events that gave rise to modern termite lineages is not well understood. To shed light on termite origins and diversification, we sequenced the mitochondrial genome of 48 termite species and combined them with 18 previously sequenced termite mitochondrial genomes for phylogenetic and molecular clock analyses using multiple fossil calibrations. The 66 genomes represent most major clades of termites. Unlike previous phylogenetic studies based on fewer molecular data, our phylogenetic tree is fully resolved for the lower termites. The phylogenetic positions of Macrotermitinae and Apicotermitinae are also resolved as the basal groups in the higher termites, but in the crown termitid groups, including Termitinae + Syntermitinae + Nasutitermitinae + Cubitermitinae, the position of some nodes remains uncertain. Our molecular clock tree indicates that the lineages leading to termites and Cryptocercus roaches diverged 170 Ma (153-196 Ma 95% confidence interval [CI]), that modern Termitidae arose 54 Ma (46-66 Ma 95% CI), and that the crown termitid group arose 40 Ma (35-49 Ma 95% CI). This indicates that the distribution of basal termite clades was influenced by the final stages of the breakup of Pangaea. Our inference of ancestral geographic ranges shows that the Termitidae, which includes more than 75% of extant termite species, most likely originated in Africa or Asia, and acquired their pantropical distribution after a series of dispersal and subsequent diversification events.", "title": "" }, { "docid": "20a484c01402cdc464cf0b46e577686e", "text": "Healthcare costs have increased dramatically and the demand for highquality care will only grow in our aging society. At the same time,more event data are being collected about care processes. Healthcare Information Systems (HIS) have hundreds of tables with patient-related event data. Therefore, it is quite natural to exploit these data to improve care processes while reducing costs. Data science techniqueswill play a crucial role in this endeavor. Processmining can be used to improve compliance and performance while reducing costs. The chapter sets the scene for process mining in healthcare, thus serving as an introduction to this SpringerBrief.", "title": "" }, { "docid": "3aadfd9d063eeddc09fbd86c82f2bfe4", "text": "We study the probabilistic generative models parameterized by feedfor-ward neural networks. An attractor dynamics for probabilistic inference in these models is derived from a mean field approximation for large, layered sigmoidal networks. Fixed points of the dynamics correspond to solutions of the mean field equations, which relate the statistics of each unittothoseofits Markovblanket. We establish global convergence of the dynamics by providing a Lyapunov function and show that the dynamics generate the signals required for unsupervised learning. Our results for feedforward networks provide a counterpart to those of Cohen-Grossberg and Hopfield for symmetric networks.", "title": "" }, { "docid": "0c6403b9486b5f44a735192edd807deb", "text": "Prior to the start of cross-sex hormone therapy (CSH), androgenic progestins are often used to induce amenorrhea in female to male (FtM) pubertal adolescents with gender dysphoria (GD). The aim of this single-center study is to report changes in anthropometry, side effects, safety parameters, and hormone levels in a relatively large cohort of FtM adolescents with a diagnosis of GD at Tanner stage B4 or further, who were treated with lynestrenol (Orgametril®) monotherapy and in combination with testosterone esters (Sustanon®). A retrospective analysis of clinical and biochemical data obtained during at least 6 months of hormonal treatment in FtM adolescents followed at our adolescent gender clinic since 2010 (n = 45) was conducted. McNemar’s test to analyze reported side effects over time was performed. A paired Student’s t test or a Wilcoxon signed-ranks test was performed, as appropriate, on anthropometric and biochemical data. For biochemical analyses, all statistical tests were done in comparison with baseline parameters. Patients who were using oral contraceptives (OC) at intake were excluded if a Mann-Whitney U test indicated influence of OC. Metrorrhagia and acne were most pronounced during the first months of monotherapy and combination therapy respectively and decreased thereafter. Headaches, hot flushes, and fatigue were the most reported side effects. Over the course of treatment, an increase in musculature, hemoglobin, hematocrit, creatinine, and liver enzymes was seen, progressively sliding into male reference ranges. Lipid metabolism shifted to an unfavorable high-density lipoprotein (HDL)/low-density lipoprotein (LDL) ratio; glucose metabolism was not affected. Sex hormone-binding globulin (SHBG), total testosterone, and estradiol levels decreased, and free testosterone slightly increased during monotherapy; total and free testosterone increased significantly during combination therapy. Gonadotropins were only fully suppressed during combination therapy. Anti-Müllerian hormone (AMH) remained stable throughout the treatment. Changes occurred in the first 6 months of treatment and remained mostly stable thereafter. Treatment of FtM gender dysphoric adolescents with lynestrenol monotherapy and in combination with testosterone esters is effective, safe, and inexpensive; however, suppression of gonadotropins is incomplete. Regular blood controls allow screening for unphysiological changes in safety parameters or hormonal levels and for medication abuse.", "title": "" }, { "docid": "d09d9d9f74079981f8f09e829e2af255", "text": "Determination of sensitive and specific markers of very early AD progression is intended to aid researchers and clinicians to develop new treatments and monitor their effectiveness, as well as to lessen the time and cost of clinical trials. Magnetic Resonance (MR)-related biomarkers have been recently identified by the use of machine learning methods for the in vivo differential diagnosis of AD. However, the vast majority of neuroimaging papers investigating this topic are focused on the difference between AD and patients with mild cognitive impairment (MCI), not considering the impact of MCI patients who will (MCIc) or not convert (MCInc) to AD. Morphological T1-weighted MRIs of 137 AD, 76 MCIc, 134 MCInc, and 162 healthy controls (CN) selected from the Alzheimer's disease neuroimaging initiative (ADNI) cohort, were used by an optimized machine learning algorithm. Voxels influencing the classification between these AD-related pre-clinical phases involved hippocampus, entorhinal cortex, basal ganglia, gyrus rectus, precuneus, and cerebellum, all critical regions known to be strongly involved in the pathophysiological mechanisms of AD. Classification accuracy was 76% AD vs. CN, 72% MCIc vs. CN, 66% MCIc vs. MCInc (nested 20-fold cross validation). Our data encourage the application of computer-based diagnosis in clinical practice of AD opening new prospective in the early management of AD patients.", "title": "" }, { "docid": "af4700eadf29386c5623097508ab523d", "text": "Starting from the premise that working memory is a system for providing access to representations for complex cognition, six requirements for a working memory system are delineated: (1) maintaining structural representations by dynamic bindings, (2) manipulating structural representations, (3) flexible reconfiguration, (4) partial decoupling from long-term memory, (5) controlled retrieval from long-term memory, and (6) encoding of new structures into longterm memory. The chapter proposes an architecture for a system that meets these requirements. The working memory system consists of a declarative and a procedural part, each of which has three embedded components: the activated part of long-term memory, a component for creating new structural representations by dynamic bindings (the ‘‘region of direct access’’ for declarative working memory, and the ‘‘bridge’’ for procedural working memory), and a mechanism for selecting a single element (‘‘focus of attention’’ for declarative working memory, and ‘‘response focus’’ for procedural working memory). The architecture affords two modes of information processing, an analytical and an associative mode. This distinction provides a theoretically founded formulation of a dual-process theory of reasoning. DOI: https://doi.org/10.1016/S0079-7421(09)51002-X Posted at the Zurich Open Repository and Archive, University of Zurich ZORA URL: https://doi.org/10.5167/uzh-28472 Originally published at: Oberauer, Klaus (2009). Design for a Working Memory. Psychology of Learning and Motivation, 51:45100. DOI: https://doi.org/10.1016/S0079-7421(09)51002-X", "title": "" }, { "docid": "4f4817fd70f62b15c0b52311fa677a64", "text": "Active plasmonics is a burgeoning and challenging subfield of plasmonics. It exploits the active control of surface plasmon resonance. In this review, a first-ever in-depth description of the theoretical relationship between surface plasmon resonance and its affecting factors, which forms the basis for active plasmon control, will be presented. Three categories of active plasmonic structures, consisting of plasmonic structures in tunable dielectric surroundings, plasmonic structures with tunable gap distances, and self-tunable plasmonic structures, will be proposed in terms of the modulation mechanism. The recent advances and current challenges for these three categories of active plasmonic structures will be discussed in detail. The flourishing development of active plasmonic structures opens access to new application fields. A significant part of this review will be devoted to the applications of active plasmonic structures in plasmonic sensing, tunable surface-enhanced Raman scattering, active plasmonic components, and electrochromic smart windows. This review will be concluded with a section on the future challenges and prospects for active plasmonics.", "title": "" }, { "docid": "4e7122172cb7c37416381c251b510948", "text": "Anatomic and physiologic data are used to analyze the energy expenditure on different components of excitatory signaling in the grey matter of rodent brain. Action potentials and postsynaptic effects of glutamate are predicted to consume much of the energy (47% and 34%, respectively), with the resting potential consuming a smaller amount (13%), and glutamate recycling using only 3%. Energy usage depends strongly on action potential rate--an increase in activity of 1 action potential/cortical neuron/s will raise oxygen consumption by 145 mL/100 g grey matter/h. The energy expended on signaling is a large fraction of the total energy used by the brain; this favors the use of energy efficient neural codes and wiring patterns. Our estimates of energy usage predict the use of distributed codes, with <or=15% of neurons simultaneously active, to reduce energy consumption and allow greater computing power from a fixed number of neurons. Functional magnetic resonance imaging signals are likely to be dominated by changes in energy usage associated with synaptic currents and action potential propagation.", "title": "" }, { "docid": "f6e73a3c09d7eac1ddd60843b82df7b0", "text": "This paper presents text and data mining in tandem to detect the phishing email. The study employs Multilayer Perceptron (MLP), Decision Trees (DT), Support Vector Machine (SVM), Group Method of Data Handling (GMDH), Probabilistic Neural Net (PNN), Genetic Programming (GP) and Logistic Regression (LR) for classification. A dataset of 2500 phishing and non phishing emails is analyzed after extracting 23 keywords from the email bodies using text mining from the original dataset. Further, we selected 12 most important features using t-statistic based feature selection. Here, we did not find statistically significant difference in sensitivity as indicated by t-test at 1% level of significance, both with and without feature selection across all techniques except PNN. Since, the GP and DT are not statistically significantly different either with or without feature selection at 1% level of significance, DT should be preferred because it yields ‘if-then’ rules, thereby increasing the comprehensibility of the system.", "title": "" }, { "docid": "4592c8f5758ccf20430dbec02644c931", "text": "Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.", "title": "" }, { "docid": "7d8826c228fa8a3bb8837754d26b8979", "text": "This paper summarizes the latest, final version of ISO standard 24617-2 “Semantic annotation framework, Part 2: Dialogue acts”. Compared to the preliminary version ISO DIS 24617-2:2010, described in Bunt et al. (2010), the final version additionally includes concepts for annotating rhetorical relations between dialogue units, defines a full-blown compositional semantics for the Dialogue Act Markup Language DiAML (resulting, as a side-effect, in a different treatment of functional dependence relations among dialogue acts and feedback dependence relations); and specifies an optimally transparent XML-based reference format for the representation of DiAML annotations, based on the systematic application of the notion of ‘ideal concrete syntax’. We describe these differences and briefly discuss the design and implementation of an incremental method for dialogue act recognition, which proves the usability of the ISO standard for automatic dialogue annotation.", "title": "" }, { "docid": "129759aca269b13c80270d2ba7311648", "text": "Although the Capsule Network (CapsNet) has a better proven performance for the recognition of overlapping digits than Convolutional Neural Networks (CNNs), a large number of matrix-vector multiplications between lower-level and higher-level capsules impede efficient implementation of the CapsNet on conventional hardware platforms. Since three-dimensional (3-D) memristor crossbars provide a compact and parallel hardware implementation of neural networks, this paper provides an architecture design to accelerate convolutional and matrix operations of the CapsNet. By using 3-D memristor crossbars, the PrimaryCaps, DigitCaps, and convolutional layers of a CapsNet perform the matrix-vector multiplications in a highly parallel way. Simulations are conducted to recognize digits from the USPS database and to analyse the work efficiency of the proposed circuits. The proposed design provides a new approach to implement the CapsNet on memristor-based circuits.", "title": "" }, { "docid": "8db7b12cb22d60a698c2aaae31bfbe6a", "text": "The present article describes the basic therapeutic techniques used in the cognitive-behavioral therapy (CBT) of generalized anxiety disorders and reviews the methodological characteristics and outcomes of 13 controlled clinical trials. The studies in general display rigorous methodology, and their outcomes are quite consistent. CBT has been shown to yield clinical improvements in both anxiety and depression that are superior to no treatment and nonspecific control conditions (and at times to either cognitive therapy alone or behavioral therapy alone) at both posttherapy and follow-up. CBT is also associated with low dropout rates, maintained long-term improvements, and the largest within-group and between-group effect sizes relative to all other comparison conditions.", "title": "" }, { "docid": "3bc9a6686bc9d55a71b036b821ac50e1", "text": "This paper shows that using SRIOV for InfiniBand can enable virtualized HPC, but only if the NIC tunable parameters are set appropriately. In particular, contrary to common belief, our results show that the default policy of aggressive use of interrupt moderation can have a negative impact on the performance of InfiniBand platforms virtualized using SR-IOV. Careful tuning of interrupt moderation benefits both Native and VM platforms and helps to bridge the gap between native and virtualized performance. For some workloads, the performance gap is reduced by 15-30%.", "title": "" }, { "docid": "850a7daa56011e6c53b5f2f3e33d4c49", "text": "Multi-objective evolutionary algorithms (MOEAs) have achieved great progress in recent decades, but most of them are designed to solve unconstrained multi-objective optimization problems. In fact, many real-world multi-objective problems usually contain a number of constraints. To promote the research of constrained multi-objective optimization, we first propose three primary types of difficulty, which reflect the challenges in the real-world optimization problems, to characterize the constraint functions in CMOPs, including feasibility-hardness, convergencehardness and diversity-hardness. We then develop a general toolkit to construct difficulty adjustable and scalable constrained multi-objective optimization problems (CMOPs) with three types of parameterized constraint functions according to the proposed three primary types of difficulty. In fact, combination of the three primary constraint functions with different parameters can lead to construct a large variety of CMOPs, whose difficulty can be uniquely defined by a triplet with each of its parameter specifying the level of each primary difficulty type respectively. Furthermore, the number of objectives in this toolkit are able to scale to more than two. Based on this toolkit, we suggest nine difficulty adjustable and scalable CMOPs named DAS-CMOP1-9. To evaluate the proposed test problems, two popular CMOEAs MOEA/D-CDP and NSGA-II-CDP are adopted to test their performances on DAS-CMOP1-9 with different difficulty triplets. The experiment results demonstrate that none of them can solve these problems efficiently, which stimulate us to develop new constrained MOEAs to solve the suggested DAS-CMOPs.", "title": "" }, { "docid": "055cb9aca6b16308793944154dc7866a", "text": "Learning systems depend on three interrelated components: topologies, cost/performance functions, and learning algorithms. Topologies provide the constraints for the mapping, and the learning algorithms offer the means to find an optimal solution; but the solution is optimal with respect to what? Optimality is characterized by the criterion and in neural network literature, this is the least addressed component, yet it has a decisive influence in generalization performance. Certainly, the assumptions behind the selection of a criterion should be better understood and investigated. Traditionally, least squares has been the benchmark criterion for regression problems; considering classification as a regression problem towards estimating class posterior probabilities, least squares has been employed to train neural network and other classifier topologies to approximate correct labels. The main motivation to utilize least squares in regression simply comes from the intellectual comfort this criterion provides due to its success in traditional linear least squares regression applications – which can be reduced to solving a system of linear equations. For nonlinear regression, the assumption of Gaussianity for the measurement error combined with the maximum likelihood principle could be emphasized to promote this criterion. In nonparametric regression, least squares principle leads to the conditional expectation solution, which is intuitively appealing. Although these are good reasons to use the mean squared error as the cost, it is inherently linked to the assumptions and habits stated above. Consequently, there is information in the error signal that is not captured during the training of nonlinear adaptive systems under non-Gaussian distribution conditions when one insists on second-order statistical criteria. This argument extends to other linear-second-order techniques such as principal component analysis (PCA), linear discriminant analysis (LDA), and canonical correlation analysis (CCA). Recent work tries to generalize these techniques to nonlinear scenarios by utilizing kernel techniques or other heuristics. This begs the question: what other alternative cost functions could be used to train adaptive systems and how could we establish rigorous techniques for extending useful concepts from linear and second-order statistical techniques to nonlinear and higher-order statistical learning methodologies?", "title": "" } ]
scidocsrr
e932277aa130906fb7fb49d45ccbf07c
A Head-Wearable Short-Baseline Stereo System for the Simultaneous Estimation of Structure and Motion
[ { "docid": "4680bed6fb799e6e181cc1c2a4d56947", "text": "We address the problem of vision-based multi-person tracking in busy pedestrian zones using a stereo rig mounted on a mobile platform. Specifically, we are interested in the application of such a system for supporting path planning algorithms in the avoidance of dynamic obstacles. The complexity of the problem calls for an integrated solution, which extracts as much visual information as possible and combines it through cognitive feedback. We propose such an approach, which jointly estimates camera position, stereo depth, object detections, and trajectories based only on visual information. The interplay between these components is represented in a graphical model. For each frame, we first estimate the ground surface together with a set of object detections. Based on these results, we then address object interactions and estimate trajectories. Finally, we employ the tracking results to predict future motion for dynamic objects and fuse this information with a static occupancy map estimated from dense stereo. The approach is experimentally evaluated on several long and challenging video sequences from busy inner-city locations recorded with different mobile setups. The results show that the proposed integration makes stable tracking and motion prediction possible, and thereby enables path planning in complex and highly dynamic scenes.", "title": "" } ]
[ { "docid": "8e45716a80300fa86189e99feb26f113", "text": "BACKGROUND\nWhat is the best way to schedule follow-up appointments? The most popular model requires the patient to negotiate a follow-up appointment time on leaving the office. This process accounts for the majority of follow-up patient scheduling. There are circumstances when this immediate appointment arrangement is not possible, however. The two common processes used to contact patients for follow-up appointments after they have left the office are the postcard reminder method and the prescheduled appointment method.\n\n\nMETHODS\nIn 2001 the two methods used to contact patients for follow-up appointments after they had left the clinic were used for all 2,116 reappointment patients at an ophthalmology practice at Dartmouth-Hitchcock Medical Center. The number of completed successful appointments, the no-show rate, and patient satisfaction for each method were calculated.\n\n\nRESULTS\nA larger number of patient reappointments were completed using the prescheduled appointment procedure than the postcard reminder system (74% vs 54%). The difference between completed and pending appointments (minus no-shows) of the two methods equaled 163 patients per quarter, or 652 patients per year. Additional revenues associated with use of the prescheduled appointment letter method were estimated at $594,600 for 3 years.\n\n\nSUMMARY\nUsing the prescheduled appointment method with a patient notification letter is advised when patients do not schedule their appointments on the way out of the office.", "title": "" }, { "docid": "75cab773845f95a60fa7fbe942144c1d", "text": "This paper proposes a modular converter system to achieve high power density, high system bandwidth and scalability for isolated bidirectional DC/AC and AC/DC three-phase power conversion. The approach is based on high frequency isolated series resonant converter (SRC) modules with series output connection and a low frequency three-phase unfolder. The performance objectives are realized through elimination of traditional low frequency passive filters used in PWM inverters and instead require high control bandwidth in the SRC modules to achieve high quality AC waveforms. The system operation and performance are verified with simulation and experimental results for a 1 kW prototype.", "title": "" }, { "docid": "5ee610b61deefffc1b054d908587b406", "text": "Self-shaping of curved structures, especially those involving flexible thin layers, is attracting increasing attention because of their broad potential applications in, e.g., nanoelectromechanical andmicroelectromechanical systems, sensors, artificial skins, stretchable electronics, robotics, and drug delivery. Here, we provide an overview of recent experimental, theoretical, and computational studies on the mechanical selfassembly of strain-engineered thin layers, with an emphasis on systems in which the competition between bending and stretching energy gives rise to a variety of deformations, such as wrinkling, rolling, and twisting. We address the principle of mechanical instabilities, which is often manifested in wrinkling or multistability of strain-engineered thin layers. The principles of shape selection and transition in helical ribbons are also systematically examined. We hope that a more comprehensive understanding of the mechanical principles underlying these rich phenomena can foster the development of techniques for manufacturing functional three-dimensional structures on demand for a broad spectrum of engineering applications.", "title": "" }, { "docid": "1bfc1972a32222a1b5816bb040040374", "text": "BACKGROUND\nSkeletal muscle is key to motor development and represents a major metabolic end organ that aids glycaemic regulation.\n\n\nOBJECTIVES\nTo create gender-specific reference curves for fat-free mass (FFM) and appendicular (limb) skeletal muscle mass (SMMa) in children and adolescents. To examine the muscle-to-fat ratio in relation to body mass index (BMI) for age and gender.\n\n\nMETHODS\nBody composition was measured by segmental bioelectrical impedance (BIA, Tanita BC418) in 1985 Caucasian children aged 5-18.8 years. Skeletal muscle mass data from the four limbs were used to derive smoothed centile curves and the muscle-to-fat ratio.\n\n\nRESULTS\nThe centile curves illustrate the developmental patterns of %FFM and SMMa. While the %FFM curves differ markedly between boys and girls, the SMMa (kg), %SMMa and %SMMa/FFM show some similarities in shape and variance, together with some gender-specific characteristics. Existing BMI curves do not reveal these gender differences. Muscle-to-fat ratio showed a very wide range with means differing between boys and girls and across fifths of BMI z-score.\n\n\nCONCLUSIONS\nBIA assessment of %FFM and SMMa represents a significant advance in nutritional assessment since these body composition components are associated with metabolic health. Muscle-to-fat ratio has the potential to provide a better index of future metabolic health.", "title": "" }, { "docid": "bb5c91095f48c6ac9b66a8d223b6aab8", "text": "This paper analyses the influence of current harmonics on protections devices connected to the power system which can cause serious problems. This paper outlines work that has been conducted to test of overcurrent relay and to identify the impacts of harmonics on distribution utility protection and control systems. The overcurrent relay REJ 525 is based on a microprocessor environment. A self-supervision system continuously monitors the operation of the relay.", "title": "" }, { "docid": "4b1c1194a9292adf76452eda03f7f67f", "text": "Fin-type field-effect transistors (FinFETs) are promising substitutes for bulk CMOS at the nanoscale. FinFETs are double-gate devices. The two gates of a FinFET can either be shorted for higher perfomance or independently controlled for lower leakage or reduced transistor count. This gives rise to a rich design space. This chapter provides an introduction to various interesting FinFET logic design styles, novel circuit designs, and layout considerations.", "title": "" }, { "docid": "03a02b03e0ff4364ee8aec81d1fca20b", "text": "GOALS\nThe aim of this study was to analyze the performance of Fuji Intelligent Color Enhancement (FICE) using the classification of Kudo in the differentiation of neoplastic and non-neoplastic raised lesions in ulcerative colitis (UC).\n\n\nBACKGROUND\nThe Kudo classification of mucosal pit patterns is an aid for the differential diagnosis of colorectal polyps in the general population, but no systematic studies are available for all forms of raised lesions in UC.\n\n\nSTUDY\nAll raised, polypoid and nonpolypoid, lesions found during consecutive surveillance colonoscopies with FICE for long-standing UC were included. In the primary prospective analysis, the Kudo classification was used to predict the histology by FICE. In a post hoc analysis, further endoscopic markers were also explored.\n\n\nRESULTS\nTwo hundred and five lesions (mean size, 8 mm; range, 2 to 30 mm) from 59 patients (mean age, 56 y; range, 21 to 79 y) were analyzed. Twenty-three neoplastic (11%), 18 hyperplastic (9%), and 164 inflammatory (80%) lesions were found. Thirty-one lesions (15%), none of which were neoplastic, were unclassifiable according to Kudo. After logistic regression, a strong negative association resulted between endoscopic activity and neoplasia, whereas the presence of a fibrin cap was significantly associated with endoscopic activity. Using FICE, the sensitivity, specificity, and positive and negative likelihood ratios of the Kudo classification were 91%, 76%, 3.8, and 0.12, respectively. The corresponding values by adding the fibrin cap as a marker of inflammation were 91%, 93%, 13, and 0.10, respectively.\n\n\nCONCLUSIONS\nFICE can help to predict the histology of raised lesions in UC. A new classification of pit patterns, based on inflammatory markers, should be developed in the setting of UC to improve the diagnostic performance.", "title": "" }, { "docid": "d5870092a3e8401654b5b9948c77cb0a", "text": "Recent research shows that there has been increased interest in investigating the role of mood and emotions in the HCI domain. Our moods, however, are complex. They are affected by many dynamic factors and can change multiple times throughout each day. Furthermore, our mood can have significant implications in terms of our experiences, our actions and most importantly on our interactions with other people. We have developed MobiMood, a proof-of-concept social mobile application that enables groups of friends to share their moods with each other. In this paper, we present the results of an exploratory field study of MobiMood, focusing on explicit mood sharing in-situ. Our results highlight that certain contextual factors had an effect on mood and the interpretation of moods. Furthermore, mood sharing and mood awareness appear to be good springboards for conversations and increased communication among users. These and other findings lead to a number of key implications in the design of mobile social awareness applications.", "title": "" }, { "docid": "dd302eec2a7ff7bf0fb9310437f7291e", "text": "Traditional electric-powered wheelchairs are normally controlled by users via joysticks, which cannot satisfy the needs of elderly and disabled users who have restricted limb movements caused by some diseases such as parkingson’s disease and quadriplegics. This paper presents a novel hands-free control system for intelligent wheelchairs based on visual recognition of head gestures. The traditional Adaboost face detection algorithm and Camshift object tracking algorithm are combined in our system to achieve accurate face detection, tracking and gesture recognition in real time. It is intended to be used as the human-friendly interface for elderly and disabled people to operate our intelligent wheelchair using their head gestures rahter than their hands. Experimental results are given to demonstrate the feasibility and performance of the proposed head gesture based control strategy.", "title": "" }, { "docid": "d2af69233bf30376afb81b204b063c81", "text": "Exploiting the security vulnerabilities in web browsers, web applications and firewalls is a fundamental trait of cross-site scripting (XSS) attacks. Majority of web population with basic web awareness are vulnerable and even expert web users may not notice the attack to be able to respond in time to neutralize the ill effects of attack. Due to their subtle nature, a victimized server, a compromised browser, an impersonated email or a hacked web application tends to keep this form of attacks alive even in the present times. XSS attacks severely offset the benefits offered by Internet based services thereby impacting the global internet community. This paper focuses on defense, detection and prevention mechanisms to be adopted at various network doorways to neutralize XSS attacks using open source tools.", "title": "" }, { "docid": "201d9105d956bc8cb8d692490d185487", "text": "BACKGROUND\nDespite its evident clinical benefits, single-incision laparoscopic surgery (SILS) imposes inherent limitations of collision between external arms and inadequate triangulation because multiple instruments are inserted through a single port at the same time.\n\n\nMETHODS\nA robot platform appropriate for SILS was developed wherein an elbowed instrument can be equipped to easily create surgical triangulation without the interference of robot arms. A novel joint mechanism for a surgical instrument actuated by a rigid link was designed for high torque transmission capability.\n\n\nRESULTS\nThe feasibility and effectiveness of the robot was checked through three kinds of preliminary tests: payload, block transfer, and ex vivo test. Measurements showed that the proposed robot has a payload capability >15 N with 7 mm diameter.\n\n\nCONCLUSIONS\nThe proposed robot is effective and appropriate for SILS, overcoming inadequate triangulation and improving workspace and traction force capability.", "title": "" }, { "docid": "34d16a5eb254846f431e2c716309e20a", "text": "AIM\nWe investigated the uptake and pharmacokinetics of l-ergothioneine (ET), a dietary thione with free radical scavenging and cytoprotective capabilities, after oral administration to humans, and its effect on biomarkers of oxidative damage and inflammation.\n\n\nRESULTS\nAfter oral administration, ET is avidly absorbed and retained by the body with significant elevations in plasma and whole blood concentrations, and relatively low urinary excretion (<4% of administered ET). ET levels in whole blood were highly correlated to levels of hercynine and S-methyl-ergothioneine, suggesting that they may be metabolites. After ET administration, some decreasing trends were seen in biomarkers of oxidative damage and inflammation, including allantoin (urate oxidation), 8-hydroxy-2'-deoxyguanosine (DNA damage), 8-iso-PGF2α (lipid peroxidation), protein carbonylation, and C-reactive protein. However, most of the changes were non-significant.\n\n\nINNOVATION\nThis is the first study investigating the administration of pure ET to healthy human volunteers and monitoring its uptake and pharmacokinetics. This compound is rapidly gaining attention due to its unique properties, and this study lays the foundation for future human studies.\n\n\nCONCLUSION\nThe uptake and retention of ET by the body suggests an important physiological function. The decreasing trend of oxidative damage biomarkers is consistent with animal studies suggesting that ET may function as a major antioxidant but perhaps only under conditions of oxidative stress. Antioxid. Redox Signal. 26, 193-206.", "title": "" }, { "docid": "030eb906555eeae5b9e1073c0346618a", "text": "In many real applications, RDF (Resource Description Framework) has been widely used as a W3C standard to describe data in the Semantic Web. In practice, RDF data may often suffer from the unreliability of their data sources, and exhibit errors or inconsistencies. In this paper, we model such unreliable RDF data by probabilistic RDF graphs, and study an important problem, keyword search query over probabilistic RDF graphs (namely, the pg-KWS query). To retrieve meaningful keyword search answers, we design the score rankings for subgraph answers specific for RDF data. Furthermore, we propose effective pruning methods (via offline pre-computed score bounds and probabilistic threshold) to quickly filter out false alarms. We construct an index over the pre-computed data for RDF, and present an efficient query answering approach through the index. Extensive experiments have been conducted to verify the effectiveness and efficiency of our proposed approaches.", "title": "" }, { "docid": "6dca32a1e4ba096300c435fd0dce7858", "text": "No wonder you activities are, reading will be always needed. It is not only to fulfil the duties that you need to finish in deadline time. Reading will encourage your mind and thoughts. Of course, reading will greatly develop your experiences about everything. Reading inverse problem theory and methods for model parameter estimation is also a way as one of the collective books that gives many advantages. The advantages are not only for you, but for the other peoples with those meaningful benefits.", "title": "" }, { "docid": "a4d6e4926ba7eb63b4d587ec4e983363", "text": "Modern research has broadened scientific knowledge and revealed the interdisciplinary nature of the sciences. For today's students, this advance translates to learning a more diverse range of concepts, usually in less time, and without supporting resources. Students can benefit from technology-enhanced learning supplements that unify concepts and are delivered on-demand over the Internet. Such supplements, like imaging informatics databases, serve as innovative references for biomedical information, but could improve their interaction interfaces to support learning. With information from these digital datasets, multimedia learning tools can be designed to transform learning into an active process where students can visualize relationships over time, interact with dynamic content, and immediately test their knowledge. This approach bridges knowledge gaps, fosters conceptual understanding, and builds problem-solving and critical thinking skills-all essential components to informatics training for science and medicine. Additional benefits include cost-free access and ease of dissemination over the Internet or CD-ROM. However, current methods for the design of multimedia learning modules are not standardized and lack strong instructional design. Pressure from administrators at the top and students from the bottom are pushing faculty to use modern technology to address the learning needs and expectations of contemporary students. Yet, faculty lack adequate support and training to adopt this new approach. So how can faculty learn to create educational multimedia materials for their students? This paper provides guidelines on best practices in educational multimedia design, derived from the Virtual Labs Project at Stanford University. The development of a multimedia module consists of five phases: (1) understand the learning problem and the users needs; (2) design the content to harness the enabling technologies; (3) build multimedia materials with web style standards and human factors principles; (4) user testing; (5) evaluate and improve design.", "title": "" }, { "docid": "33aca3fca17c8a9c786b35b4da4de47c", "text": "This paper is concerned with the design of the power control system for a single-phase voltage source inverter feeding a parallel resonant induction heating load. The control of the inverter output current, meaning the active component of the current through the induction coil when the control frequency is equal or slightly exceeds the resonant frequency, is achieved by a Proportional-IntegralDerivative controller tuned in accordance with the Modulus Optimum criterion in Kessler variant. The response of the current loop for different work pipes and set currents has been tested by simulation under the Matlab-Simulink environment and illustrates a very good behavior of the control system.", "title": "" }, { "docid": "c6fdea5b2f3d33c2b12d9c4ae797cafb", "text": "When is the best time to purchase a flight? Flight prices fluctuate constantly, so purchasing at different times could mean large differences in price. This project uses machine learning classification in order to predict at a given time, considering properties of a flight, whether one should book the flight or wait for a better price.", "title": "" }, { "docid": "44ef466e59603fc90a30217e7fab00cf", "text": "We address the problem of content-aware, foresighted resource reciprocation for media streaming over peer-to-peer (P2P) networks. The envisioned P2P network consists of autonomous and self-interested peers trying to maximize their individual utilities. The resource reciprocation among such peers is modeled as a stochastic game and peers determine the optimal strategies for resource reciprocation using a Markov Decision Process (MDP) framework. Unlike existing solutions, this framework takes the content and the characteristics of the video signal into account by introducing an artificial currency in order to maximize the video quality in the entire network.", "title": "" }, { "docid": "58b2ee3d0a4f61d4db883bc0a896f8f4", "text": "While applications for mobile devices have become extremely important in the last few years, little public information exists on mobile application usage behavior. We describe a large-scale deployment-based research study that logged detailed application usage information from over 4,100 users of Android-powered mobile devices. We present two types of results from analyzing this data: basic descriptive statistics and contextual descriptive statistics. In the case of the former, we find that the average session with an application lasts less than a minute, even though users spend almost an hour a day using their phones. Our contextual findings include those related to time of day and location. For instance, we show that news applications are most popular in the morning and games are at night, but communication applications dominate through most of the day. We also find that despite the variety of apps available, communication applications are almost always the first used upon a device's waking from sleep. In addition, we discuss the notion of a virtual application sensor, which we used to collect the data.", "title": "" } ]
scidocsrr
b232c57a1c19eb66d550604a612f93a3
A Real-Time Sliding Mode Control for a Wind Energy System Based on a Doubly Fed Induction Generator
[ { "docid": "8066246656f6a9a3060e42efae3b197f", "text": "The paper describes the engineering and design of a doubly fed induction generator (DFIG), using back-to-back PWM voltage-source converters in the rotor circuit. A vector-control scheme for the supply-side PWM converter results in independent control of active and reactive power drawn from the supply, while ensuring sinusoidal supply currents. Vector control of the rotor-connected converter provides for wide speed-range operation; the vector scheme is embedded in control loops which enable optimal speed tracking for maximum energy capture from the wind. An experimental rig, which represents a 1.5 kW variable speed wind-energy generation system is described, and experimental results are given that illustrate the excellent performance characteristics of the system. The paper considers a grid-connected system; a further paper will describe a stand-alone system.", "title": "" }, { "docid": "6bb9ef32c03da450de3d363a0e7bc30b", "text": "Advanced fault detection and accommodation schemes are required for ensuring efficient and reliable operation of modern wind turbines. This paper presents a novel approach in designing a fault detection and diagnosis (FDD) and fault-tolerant control (FTC) scheme for a wind turbine using fuzzy modeling, identification and control techniques. First, an improved gain-scheduled proportional-integral (PI) control system based on fuzzy gain scheduling (FGS) technique for multi-input and multi-output wind turbine system is designed. Then, to accommodate sensor faults and based on a signal correction algorithm, an active fault-tolerant control system (AFTCS) is developed as an extension of the gain-scheduled PI control system. The AFTCS exploits the fault information from a model-based FDD scheme developed using fuzzy modeling and identification method. The proposed schemes are evaluated by a series of simulations on a well-known large off-shore wind turbine benchmark in the presence of wind turbulences, measurement noises, and different realistic fault scenarios. All results indicate high effectiveness and robustness of the designed control systems in both fault-free and faulty operations of the wind turbine. & 2013 The Franklin Institute. Published by Elsevier Ltd. All rights reserved.", "title": "" } ]
[ { "docid": "b91efd08c1eafc8297a5abb2fc0c41b5", "text": "Boltzmann machines (BMs) are appealing candidates for powerful priors in variational autoencoders (VAEs), as they are capable of capturing nontrivial and multimodal distributions over discrete variables. However, non-differentiability of the discrete units prohibits using the reparameterization trick, essential for low-noise back propagation. The Gumbel trick resolves this problem in a consistent way by relaxing the variables and distributions, but it is incompatible with BM priors. Here, we propose the GumBolt, a model that extends the Gumbel trick to BM priors in VAEs. GumBolt is significantly simpler than the recently proposed methods with BM prior and outperforms them by a considerable margin. It achieves state-of-theart performance on permutation invariant MNIST and OMNIGLOT datasets in the scope of models with only discrete latent variables. Moreover, the performance can be further improved by allowing multi-sampled (importance-weighted) estimation of log-likelihood in training, which was not possible with previous models.", "title": "" }, { "docid": "6ee55ac672b1d87d4f4947655d321fb8", "text": "Federated identity providers, e.g., Facebook and PayPal, offer a convenient means for authenticating users to third-party applications. Unfortunately such cross-site authentications carry privacy and tracking risks. For example, federated identity providers can learn what applications users are accessing; meanwhile, the applications can know the users' identities in reality.\n This paper presents Crypto-Book, an anonymizing layer enabling federated identity authentications while preventing these risks. Crypto-Book uses a set of independently managed servers that employ a (t,n)-threshold cryptosystem to collectively assign credentials to each federated identity (in the form of either a public/private keypair or blinded signed messages). With the credentials in hand, clients can then leverage anonymous authentication techniques such as linkable ring signatures or partially blind signatures to log into third-party applications in an anonymous yet accountable way.\n We have implemented a prototype of Crypto-Book and demonstrated its use with three applications: a Wiki system, an anonymous group communication system, and a whistleblower submission system. Crypto-Book is practical and has low overhead: in a deployment within our research group, Crypto-Book group authentication took 1.607s end-to-end, an overhead of 1.2s compared to traditional non-privacy-preserving federated authentication.", "title": "" }, { "docid": "3dc800707ecbbf0fed60e445cfe02fcc", "text": "We extend the method introduced by Cinzano et al. (2000a) to map the artificial sky brightness in large territories from DMSP satellite data, in order to map the naked eye star visibility and telescopic limiting magnitudes. For these purposes we take into account the altitude of each land area from GTOPO30 world elevation data, the natural sky brightness in the chosen sky direction, based on Garstang modelling, the eye capability with naked eye or a telescope, based on the Schaefer (1990) and Garstang (2000b) approach, and the stellar extinction in the visual photometric band. For near zenith sky directions we also take into account screening by terrain elevation. Maps of naked eye star visibility and telescopic limiting magnitudes are useful to quantify the capability of the population to perceive our Universe, to evaluate the future evolution, to make cross correlations with statistical parameters and to recognize areas where astronomical observations or popularisation can still acceptably be made. We present, as an application, maps of naked eye star visibility and total sky brightness in V band in Europe at the zenith with a resolution of approximately 1 km.", "title": "" }, { "docid": "d72cc46845f546e6b4d7ef42a14a0ea3", "text": "It is well known that parsing accuracies drop significantly on out-of-domain data. What is less known is that some parsers suffer more from domain shifts than others. We show that dependency parsers have more difficulty parsing questions than constituency parsers. In particular, deterministic shift-reduce dependency parsers, which are of highest interest for practical applications because of their linear running time, drop to 60% labeled accuracy on a question test set. We propose an uptraining procedure in which a deterministic parser is trained on the output of a more accurate, but slower, latent variable constituency parser (converted to dependencies). Uptraining with 100K unlabeled questions achieves results comparable to having 2K labeled questions for training. With 100K unlabeled and 2K labeled questions, uptraining is able to improve parsing accuracy to 84%, closing the gap between in-domain and out-of-domain performance.", "title": "" }, { "docid": "7b86a06f36fbadc611c350bf19f0ad90", "text": "T he puzzle Sudoku has become the passion of many people the world over in the past few years. The interesting fact about Sudoku is that it is a trivial puzzle to solve. The reason it is trivial to solve is that an algorithm exists for Sudoku solutions. The algorithm is a tree-based search algorithm based on backtracking in a tree until a solution is found. If all a person needs to do is sit down at their personal computer, punch in the numbers given in the puzzle, and then watch a computer program compute the solution, we can reasonably ask why a person would bother to struggle to solve Sudoku puzzles. The reason is that people enjoy struggling with pencil and paper to work out Sudoku solutions. Herzberg and Murty (2007, p. 716) give two reasons for the enjoyment of this struggle: First, it is sufficiently difficult to pose a serious mental challenge for anyone attempting to do the puzzle. Secondly, simply by scanning rows and columns, it is easy to enter the “missing colors”, and this gives the solver some encouragement to persist. This paper develops an algorithm for solving any Sudoku puzzle by pencil and paper, especially the ones classified as diabolical.", "title": "" }, { "docid": "34b86ea3920e8d7d1fff69c2e2d2ea23", "text": "OBJECTIVES\nTo review studies that have reported on the prevalence of memory complaints and the relationship between memory complaints and impairment or decline (dementia) in elderly individuals.\n\n\nDATA SOURCES AND STUDY SELECTION\nAll publications in the English language relating to memory complaints, memory impairment, cognitive disorder and dementia in MEDLINE, PSYCHLIT and EMBASE computerized databases, together with a search of relevant citations.\n\n\nDATA SYNTHESIS\nThe prevalence of memory complaints, defined as everyday memory problems, shows a large variation of approximately 25 - 50%. A high age, female gender and a low level of education are generally associated with a high prevalence of memory complaints. In community-based samples of elderly subjects an association has been found between memory complaints and memory impairment, after adjustment for depressive symptomatology. Memory complaints predict dementia after a follow-up of at least 2 years, in particular in those with mild cognitive impairment, defined as Mini Mental State Examination (MMSE) > 23. Memory complaints in highly educated elderly subjects may be predictive of dementia even when there is no indication of cognitive impairment on short cognitive screen tests. The shift in methodology which is noticeable in the recently published major studies is discussed as a possible explanation for the established association between memory complaints and decline in memory (or dementia) in elderly subjects. Three methodological factors, in particular, are responsible for the results: community-based sampling, longitudinal design and the treatment of variables such as depression, cognitive impairment and level of education.\n\n\nCONCLUSION\nMemory complaints in elderly people should no longer be considered merely as an innocent age-related phenomenon or a symptom of depression. Instead, these complaints deserve to be taken seriously, at least as a possible early sign of dementia.", "title": "" }, { "docid": "984b3718b890008e0ee2be5351c36e5e", "text": "In this paper, we report results on an original way to excite surface waves on a single-wire transmission line. Although these waves were proposed many decades ago by Goubau, the novelty of our structures is to achieve a broadband planar excitement. This configuration is very well suited for the terahertz frequency range and allows the investigation of biological entities with high spatial resolution with the use of novel biomicroelectromechanical systems, which include microfluidic functions. From experimental results, we compare different types of transitions from coplanar waveguides, and different substrates are also used. We show that the excitation is highly efficient and broadband for structures on a quartz substrate", "title": "" }, { "docid": "3f40c24a8098fd0a06ef772f2d7d9e2f", "text": "Knowing how hands move and what object is being manipulated are two key sub-tasks for analyzing first-person (egocentric) action. However, lack of fully annotated hand data as well as imprecise foreground segmentation make either sub-task challenging. This work aims to explicitly ad dress these two issues via introducing a cascaded interactional targeting (i.e., infer both hand and active object regions) deep neural network. Firstly, a novel EM-like learning framework is proposed to train the pixel-level deep convolutional neural network (DCNN) by seamlessly integrating weakly supervised data (i.e., massive bounding box annotations) with a small set of strongly supervised data (i.e., fully annotated hand segmentation maps) to achieve state-of-the-art hand segmentation performance. Secondly, the resulting high-quality hand segmentation maps are further paired with the corresponding motion maps and object feature maps, in order to explore the contextual information among object, motion and hand to generate interactional foreground regions (operated objects). The resulting interactional target maps (hand + active object) from our cascaded DCNN are further utilized to form discriminative action representation. Experiments show that our framework has achieved the state-of-the-art egocentric action recognition performance on the benchmark dataset Activities of Daily Living (ADL).", "title": "" }, { "docid": "94a64f143c19f2815f101eb0c4dc304f", "text": "Information technology can improve the quality, efficiency, and cost of healthcare. In this survey, we examine the privacy requirements of mobile computing technologies that have the potential to transform healthcare. Such mHealth technology enables physicians to remotely monitor patients' health and enables individuals to manage their own health more easily. Despite these advantages, privacy is essential for any personal monitoring technology. Through an extensive survey of the literature, we develop a conceptual privacy framework for mHealth, itemize the privacy properties needed in mHealth systems, and discuss the technologies that could support privacy-sensitive mHealth systems. We end with a list of open research questions.", "title": "" }, { "docid": "ee99824c45841124d83c41c2d4468e71", "text": "Long short-tem memory (LSTM) recurrent neural networks have been shown to give state-of-the-art performance on many speech recognition tasks. To achieve a further performance improvement, in this paper, maxout units are proposed to be integrated with the LSTM cells, considering those units have brought significant improvements to deep feed-forward neural networks. A novel architecture was constructed by replacing the input activation units (generally tanh) in the LSTM networks with maxout units. We implemented the LSTM network training on multi-GPU devices with truncated BPTT, and empirically evaluated the proposed designs on a large vocabulary Mandarin conversational telephone speech recognition task. The experimental results support our claim that the performance of LSTM based acoustic models can be further improved using the maxout units.", "title": "" }, { "docid": "10d90e9e1ef3b2759cd26e90997879bb", "text": "Levels of genetic differentiation between populations can be highly variable across the genome, with divergent selection contributing to such heterogeneous genomic divergence. For example, loci under divergent selection and those tightly physically linked to them may exhibit stronger differentiation than neutral regions with weak or no linkage to such loci. Divergent selection can also increase genome-wide neutral differentiation by reducing gene flow (e.g. by causing ecological speciation), thus promoting divergence via the stochastic effects of genetic drift. These consequences of divergent selection are being reported in recently accumulating studies that identify: (i) 'outlier loci' with higher levels of divergence than expected under neutrality, and (ii) a positive association between the degree of adaptive phenotypic divergence and levels of molecular genetic differentiation across population pairs ['isolation by adaptation' (IBA)]. The latter pattern arises because as adaptive divergence increases, gene flow is reduced (thereby promoting drift) and genetic hitchhiking increased. Here, we review and integrate these previously disconnected concepts and literatures. We find that studies generally report 5-10% of loci to be outliers. These selected regions were often dispersed across the genome, commonly exhibited replicated divergence across different population pairs, and could sometimes be associated with specific ecological variables. IBA was not infrequently observed, even at neutral loci putatively unlinked to those under divergent selection. Overall, we conclude that divergent selection makes diverse contributions to heterogeneous genomic divergence. Nonetheless, the number, size, and distribution of genomic regions affected by selection varied substantially among studies, leading us to discuss the potential role of divergent selection in the growth of regions of differentiation (i.e. genomic islands of divergence), a topic in need of future investigation.", "title": "" }, { "docid": "e170be2a81d853ee3d81a9dd45528a20", "text": "Hardware improvement of cybernetic human HRP-4C for entertainment is presented in this paper. We coined the word “Cybernetic Human” to explain a humanoid robot with a realistic head and a realistic figure of a human being. HRP-4C stands for Humanoid Robotics Platform-4 (Cybernetic human). Its joints and dimensions conform to average values of young Japanese females and HRP-4C looks very human-like. We have made HRP-4C present in several events to search for a possibility of use in the entertainment industry. Based on feedback from our experience, we improved its hardware. The new hand, the new foot with active toe joint, and the new eye with camera are introduced.", "title": "" }, { "docid": "f3db1251df92011ec0e8e309dd119e43", "text": "Sentiment expression in microblog posts can be affected by user’s personal character, opinion bias, political stance and so on. Most of existing personalized microblog sentiment classification methods suffer from the insufficiency of discriminative tweets for personalization learning. We observed that microblog users have consistent individuality and opinion bias in different languages. Based on this observation, in this paper we propose a novel user-attention-based Convolutional Neural Network (CNN) model with adversarial cross-lingual learning framework. The user attention mechanism is leveraged in CNN model to capture user’s languagespecific individuality from the posts. Then the attention-based CNN model is incorporated into a novel adversarial cross-lingual learning framework, in which with the help of user properties as bridge between languages, we can extract the language-specific features and language-independent features to enrich the user post representation so as to alleviate the data insufficiency problem. Results on English and Chinese microblog datasets confirm that our method outperforms state-of-the-art baseline algorithms with large margins.", "title": "" }, { "docid": "4c4d314948ebdfa225cff697f62ec5f4", "text": "Apart from religious values, virginity is important in different communities because of its prominent role in reducing sexually transmitted diseases and teen pregnancies. Even though virginity testing has been proclaimed an example of violence against women by the World Health Organization, it is still conducted in many countries, including Iran. 16 in-depth, semi-structured interviews were conducted with participants aged 32 to 60 years to elucidate the perceptions and experiences of Iranian examiners of virginity testing.The perception and experience of examiners were reflected in five main themes. The result of this study indicated that virginity testing is more than a medical examination, considering the cultural factors involved and its overt and covert consequences. In Iran, testing is performed for both formal and informal reasons, and examiners view such testing with ambiguity about the accuracy and certainty of the diagnosis and uncertainty about ethics and reproductive rights. Examiners are affected by the overt and covert consequences of virginity testing, beliefs and cultural values underlying virginity testing, and informal and formal reasons for virginity testing.", "title": "" }, { "docid": "3bd2bfd1c7652f8655d009c085d6ed5c", "text": "The past decade has witnessed the boom of human-machine interactions, particularly via dialog systems. In this paper, we study the task of response generation in open-domain multi-turn dialog systems. Many research efforts have been dedicated to building intelligent dialog systems, yet few shed light on deepening or widening the chatting topics in a conversational session, which would attract users to talk more. To this end, this paper presents a novel deep scheme consisting of three channels, namely global, wide, and deep ones. The global channel encodes the complete historical information within the given context, the wide one employs an attention-based recurrent neural network model to predict the keywords that may not appear in the historical context, and the deep one trains a Multi-layer Perceptron model to select some keywords for an in-depth discussion. Thereafter, our scheme integrates the outputs of these three channels to generate desired responses. To justify our model, we conducted extensive experiments to compare our model with several state-of-the-art baselines on two datasets: one is constructed by ourselves and the other is a public benchmark dataset. Experimental results demonstrate that our model yields promising performance by widening or deepening the topics of interest.", "title": "" }, { "docid": "4ba2cd2184787a7445ca909f9c89de60", "text": "A sulfated galactans (SG) supplemented diet was evaluated for the potential to stimulate immune activity in shrimp Penaeus vannamei (P. vannamei). Shrimp given the SG supplemented diet (0.5, 1 and 2% w/w) for 7 days showed enhanced expression of the downstream signaling mediator of lipopolysaccharide and β-1,3-glucan binding protein (LGBP) and immune related genes including p-NF-κB, IMD, IKKβ and IKKε, antimicrobial peptide PEN-4, proPO-I and II. Following immersion with Vibrio parahaemolyticus (V. parahaemolyticus) for 14 days, the shrimp given the SG supplemented diet (1 and 2% w/w) showed a decrease in bacterial colonies and bacterial toxin gene expression, compared to shrimp given a normal diet, and they reached 50% mortality at day 14. However, shrimp given the normal diet and challenged with the bacteria reached 100% mortality at day 6. SG-fed shrimp increased expression of immune genes related to LGBP signaling at day 1 after the bacterial immersion compared to control (no immersion), which later decreased to control levels. Shrimp on the normal diet also increased expression of immune related genes at day 1 after immersion which however decreased below control levels by day 3. Taken together, the results indicate the efficacy of the SG supplemented diet to enhance the immune activity in shrimp which could offer protection from V. parahaemolyticus infection.", "title": "" }, { "docid": "e07d7e3b37431937627d118497116442", "text": "Wearable devices, such as smartwatches, are furnished with state-of-the-art sensors that enable a range of context-aware applications. However, malicious applications can misuse these sensors, if access is left unaudited. In this paper, we demonstrate how applications that have access to motion or inertial sensor data on a modern smartwatch can recover text typed on an external QWERTY keyboard. Due to the distinct nature of the perceptible motion sensor data, earlier research efforts on emanation based keystroke inference attacks are not readily applicable in this scenario. The proposed novel attack framework characterizes wrist movements (captured by the inertial sensors of the smartwatch worn on the wrist) observed during typing, based on the relative physical position of keys and the direction of transition between pairs of keys. Eavesdropped keystroke characteristics are then matched to candidate words in a dictionary. Multiple evaluations show that our keystroke inference framework has an alarmingly high classification accuracy and word recovery rate. With the information recovered from the wrist movements perceptible by a smartwatch, we exemplify the risks associated with unaudited access to seemingly innocuous sensors (e.g., accelerometers and gyroscopes) of wearable devices. As part of our efforts towards preventing such side-channel attacks, we also develop and evaluate a novel context-aware protection framework which can be used to automatically disable (or downgrade) access to motion sensors, whenever typing activity is detected.", "title": "" }, { "docid": "b3b5dc8ff12b948f325c6bc2e97ac33e", "text": "Socioecological psychology investigates humans' cognitive, emotional, and behavioral adaption to physical, interpersonal, economic, and political environments. This article summarizes three types of socioecological psychology research: (a) association studies that link an aspect of social ecology (e.g., population density) with psychology (e.g., prosocial behavior), (b) process studies that clarify why there is an association between social ecology and psychology (e.g., residential mobility → anxiety → familiarity seeking), and (c) niche construction studies that illuminate how psychological states give rise to the creation and maintenance of a social ecology (e.g., familiarity seeking → dominance of national chain stores). Socioecological psychology attempts to bring the objectivist perspective to psychological science, investigating how objective social and physical environments, not just perception and construal of the environments, affect one's thinking, feeling, and behaviors, as well as how people's thinking, feeling, and behaviors give rise to social and built environments.", "title": "" }, { "docid": "b3be9d730d982c66657eceacb9d4e526", "text": "Ontology Matching aims to find the semantic correspondences between ontologies that belong to a single domain but that have been developed separately. However, there are still some problem areas to be solved, because experts are still needed to supervise the matching processes and an efficient way to reuse the alignments has not yet been found. We propose a novel technique named Reverse Ontology Matching, which aims to find the matching functions that were used in the original process. The use of these functions is very useful for aspects such as modeling behavior from experts, performing matching-by-example, reverse engineering existing ontology matching tools or compressing ontology alignment repositories. Moreover, the results obtained from a widely used benchmark dataset provide evidence of the effectiveness of this approach.", "title": "" }, { "docid": "cbce30ed2bbdcd25fb708394dff1b7b6", "text": "Current syntactic accounts of English resultatives are based on the assumption that result XPs are predicated of underlying direct objects. This assumption has helped to explain the presence of reflexive pronouns with some intransitive verbs but not others and the apparent lack of result XPs predicated of subjects of transitive verbs. We present problems for and counterexamples to some of the basic assumptions of the syntactic approach, which undermine its explanatory power. We develop an alternative account that appeals to principles governing the well-formedness of event structure and the event structure-to-syntax mapping. This account covers the data on intransitive verbs and predicts the distribution of subject-predicated result XPs with transitive verbs.*", "title": "" } ]
scidocsrr
f3df414e8847f51c0983a81c0f40664c
Charagram: Embedding Words and Sentences via Character n-grams
[ { "docid": "cb929b640f8ee7b550512dd4d0dc8e17", "text": "The existing machine translation systems, whether phrase-based or neural, have relied almost exclusively on word-level modelling with explicit segmentation. In this paper, we ask a fundamental question: can neural machine translation generate a character sequence without any explicit segmentation? To answer this question, we evaluate an attention-based encoder– decoder with a subword-level encoder and a character-level decoder on four language pairs–En-Cs, En-De, En-Ru and En-Fi– using the parallel corpora from WMT’15. Our experiments show that the models with a character-level decoder outperform the ones with a subword-level decoder on all of the four language pairs. Furthermore, the ensembles of neural models with a character-level decoder outperform the state-of-the-art non-neural machine translation systems on En-Cs, En-De and En-Fi and perform comparably on En-Ru.", "title": "" }, { "docid": "ccbb7e753b974951bb658b63e91431bb", "text": "In Semantic Textual Similarity (STS), systems rate the degree of semantic equivalence, on a graded scale from 0 to 5, with 5 being the most similar. This year we set up two tasks: (i) a core task (CORE), and (ii) a typed-similarity task (TYPED). CORE is similar in set up to SemEval STS 2012 task with pairs of sentences from sources related to those of 2012, yet different in genre from the 2012 set, namely, this year we included newswire headlines, machine translation evaluation datasets and multiple lexical resource glossed sets. TYPED, on the other hand, is novel and tries to characterize why two items are deemed similar, using cultural heritage items which are described with metadata such as title, author or description. Several types of similarity have been defined, including similar author, similar time period or similar location. The annotation for both tasks leverages crowdsourcing, with relative high interannotator correlation, ranging from 62% to 87%. The CORE task attracted 34 participants with 89 runs, and the TYPED task attracted 6 teams with 14 runs.", "title": "" } ]
[ { "docid": "ff2d26414f670001892f6bdc371156d0", "text": "The increase of voice-based interaction has changed the way people seek information, making search more conversational. Development of effective conversational approaches to search requires better understanding of how people express information needs in dialogue. This paper describes the creation and examination of over 32K spoken utterances collected during 34 hours of collaborative search tasks. The contribution of this work is three-fold. First, we propose a model of conversational information needs (CINs) based on a synthesis of relevant theories in Information Seeking and Retrieval. Second, we show several behavioural patterns of CINs based on the proposed model. Third, we identify effective feature groups that may be useful for detecting CINs categories from conversations. This paper concludes with a discussion of how these findings can facilitate advance of conversational search applications.", "title": "" }, { "docid": "4a164ec21fb69e7db5c90467c6f6af17", "text": "Recent technologies have made it cost-effective to collect diverse types of genome-wide data. Computational methods are needed to combine these data to create a comprehensive view of a given disease or a biological process. Similarity network fusion (SNF) solves this problem by constructing networks of samples (e.g., patients) for each available data type and then efficiently fusing these into one network that represents the full spectrum of underlying data. For example, to create a comprehensive view of a disease given a cohort of patients, SNF computes and fuses patient similarity networks obtained from each of their data types separately, taking advantage of the complementarity in the data. We used SNF to combine mRNA expression, DNA methylation and microRNA (miRNA) expression data for five cancer data sets. SNF substantially outperforms single data type analysis and established integrative approaches when identifying cancer subtypes and is effective for predicting survival.", "title": "" }, { "docid": "24c6f0454bad7506a600483434914be0", "text": "Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust the results from on-line queries. Authentic publication allows untrusted publishers to answer securely queries from clients on behalf of trusted off-line data owners. Publishers validate answers using hard-to-forge verification objects VOs), which clients can check efficiently. This approach provides greater scalability, by making it easy to add more publishers, and better security, since on-line publishers do not need to be trusted. To make authentic publication attractive, it is important for the VOs to be small, efficient to compute, and efficient to verify. This has lead researchers to develop independently several different schemes for efficient VO computation based on specific data structures. Our goal is to develop a unifying framework for these disparate results, leading to a generalized security result. In this paper we characterize a broad class of data structures which we call Search DAGs, and we develop a generalized algorithm for the construction of VOs for Search DAGs. We prove that the VOs thus constructed are secure, and that they are efficient to compute and verify. We demonstrate how this approach easily captures existing work on simple structures such as binary trees, multi-dimensional range trees, tries, and skip lists. Once these are shown to be Search DAGs, the requisite security and efficiency results immediately follow from our general theorems. Going further, we also use Search DAGs to produce and prove the security of authenticated versions of two complex data models for efficient multi-dimensional range searches. This allows efficient VOs to be computed (size O(log N + T)) for typical one- and two-dimensional range queries, where the query answer is of size T and the database is of size N. We also show I/O-efficient schemes to construct the VOs. For a system with disk blocks of size B, we answer one-dimensional and three-sided range queries and compute the VOs with O(logB N + T/B) I/O operations using linear size data structures.", "title": "" }, { "docid": "0591acdb82c352362de74d6daef10539", "text": "In this paper we report on our ongoing studies around the application of Augmented Reality methods to support the order picking process of logistics applications. Order picking is the gathering of goods out of a prepared range of items following some customer orders. We named the visual support of this order picking process using Head-mounted Displays “Pick-by-Vision”. This work presents the case study of bringing our previously developed Pickby-Vision system from the lab to an experimental factory hall to evaluate it under more realistic conditions. This includes the execution of two user studies. In the first one we compared our Pickby-Vision system with and without tracking to picking using a paper list to check picking performance and quality in general. In a second test we had subjects using the Pick-by-Vision system continuously for two hours to gain in-depth insight into the longer use of our system, checking user strain besides the general performance. Furthermore, we report on the general obstacles of trying to use HMD-based AR in an industrial setup and discuss our observations of user behaviour.", "title": "" }, { "docid": "e9d89210c52b382c88423debb0b537d4", "text": "Generalizing a decision problem for bipartite perfect matching, J. Edmonds introduced in [14] the problem (now known as the Edmonds Problem) of deciding if a given linear subspace of M(N) contains a nonsingular matrix, where M(N) stands for the linear space of complex NxN matrices. This problem led to many fundamental developments in matroid theory etc.Classical matching theory can be defined in terms of matrices with nonnegative entries. The notion of Positive operator, central in Quantum Theory, is a natural generalization of matrices with nonnegative entries. (Here operator refers to maps from matrices to matrices.) First, we reformulate the Edmonds Problem in terms of of completely positive operators, or equivalently, in terms of bipartite density matrices. It turns out that one of the most important cases when Edmonds' problem can be solved in polynomial deterministic time, i.e. an intersection of two geometric matroids, corresponds to unentangled (aka separable) bipartite density matrices. We introduce a very general class (or promise) of linear subspaces of M(N) on which there exists a polynomial deterministic time algorithm to solve Edmonds' problem. The algorithm is a thoroughgoing generalization of algorithms in [23], [26], and its analysis benefits from an operator analog of permanents, so called Quantum Permanents. Finally, we prove that the weak membership problem for the convex set of separable normalized bipartite density matrices is NP-HARD.", "title": "" }, { "docid": "d5d96493b34cfbdf135776e930ec5979", "text": "We propose an approach for the static analysis of probabilistic programs that sense, manipulate, and control based on uncertain data. Examples include programs used in risk analysis, medical decision making and cyber-physical systems. Correctness properties of such programs take the form of queries that seek the probabilities of assertions over program variables. We present a static analysis approach that provides guaranteed interval bounds on the values (assertion probabilities) of such queries. First, we observe that for probabilistic programs, it is possible to conclude facts about the behavior of the entire program by choosing a finite, adequate set of its paths. We provide strategies for choosing such a set of paths and verifying its adequacy. The queries are evaluated over each path by a combination of symbolic execution and probabilistic volume-bound computations. Each path yields interval bounds that can be summed up with a \"coverage\" bound to yield an interval that encloses the probability of assertion for the program as a whole. We demonstrate promising results on a suite of benchmarks from many different sources including robotic manipulators and medical decision making programs.", "title": "" }, { "docid": "5d5ecd3594f52353653d5e90b7edaa19", "text": "In this paper we consider the global localization problem for an industrial AGV moving in a known environment. The problem consists of determining the pose of the vehicle without any prior information about its location. The vehicle is supposed to be equipped with a laser scanner that allows to measure the range and bearing of the vehicle with respect to a set of anonymous landmarks. A map with the positions of all landmarks in the environment is available to the localization system. We propose a novel algorithm for AGV self-localization based on landmarks identification that can take into account also false detections, very common in industrial environments. The pose is computed with a single scan (2D), without any sensor fusion. The performance of the proposed strategy is shown both by simulations and experiments on real industrial plants.", "title": "" }, { "docid": "e263a93a9d936a90f4e513ac65317541", "text": "Neuronal power attenuation or enhancement in specific frequency bands over the sensorimotor cortex, called Event-Related Desynchronization (ERD) or Event-Related Synchronization (ERS), respectively, is a major phenomenon in brain activities involved in imaginary movement of body parts. However, it is known that the nature of motor imagery-related electroencephalogram (EEG) signals is non-stationary and highly timeand frequency-dependent spatial filter, which we call ‘non-homogeneous filter.’ We adaptively select bases of spatial filters over time and frequency. By taking both temporal and spectral features of EEGs in finding a spatial filter into account it is beneficial to be able to consider non-stationarity of EEG signals. In order to consider changes of ERD/ERS patterns over the time–frequency domain, we devise a spectrally and temporally weighted classification method via statistical analysis. Our experimental results on the BCI Competition IV dataset II-a and BCI Competition II dataset IV clearly presented the effectiveness of the proposed method outperforming other competing methods in the literature. & 2012 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "c2aed51127b8753e4b71da3b331527cd", "text": "In this paper, we present the theory and design of interval type-2 fuzzy logic systems (FLSs). We propose an efficient and simplified method to compute the input and antecedent operations for interval type-2 FLSs; one that is based on a general inference formula for them. We introduce the concept of upper and lower membership functions (MFs) and illustrate our efficient inference method for the case of Gaussian primary MFs. We also propose a method for designing an interval type-2 FLS in which we tune its parameters. Finally, we design type-2 FLSs to perform time-series forecasting when a nonstationary time-series is corrupted by additive noise where SNR is uncertain and demonstrate improved performance over type-1 FLSs.", "title": "" }, { "docid": "1cdd599b49d9122077a480a75391aae8", "text": "Two aspects of children's early gender development-the spontaneous production of gender labels and gender-typed play-were examined longitudinally in a sample of 82 children. Survival analysis, a statistical technique well suited to questions involving developmental transitions, was used to investigate the timing of the onset of children's gender labeling as based on mothers' biweekly telephone interviews regarding their children's language from 9 through 21 months. Videotapes of children's play both alone and with mother during home visits at 17 and 21 months were independently analyzed for play with gender-stereotyped and gender-neutral toys. Finally, the relation between gender labeling and gender-typed play was examined. Children transitioned to using gender labels at approximately 19 months, on average. Although girls and boys showed similar patterns in the development of gender labeling, girls began labeling significantly earlier than boys. Modest sex differences in play were present at 17 months and increased at 21 months. Gender labeling predicted increases in gender-typed play, suggesting that knowledge of gender categories might influence gender typing before the age of 2.", "title": "" }, { "docid": "b40f3ffdfbcc6c7f2f36c0e8992e1b16", "text": "BACKGROUND\nExcessive weight gain during pregnancy and subsequent postpartum weight retention may contribute to the epidemic of obesity among women of childbearing age. Preventing excessive gestational weight gain (GWG) to optimize maternal, fetal and infant wellbeing is therefore of great importance. A number of dietary interventions in this area has been conducted with inconsistent results, which has made it difficult to identify effective strategies to prevent excessive weight gain during pregnancy among normal weight, overweight and obese women. The primary objective of this review was to evaluate the effect of dietary interventions for reducing GWG. The secondary objective was to examine the impact of these interventions on different child and maternal health outcomes.\n\n\nMETHOD\nThe PUBMED, the Cochrane Central Register of Controlled Trials (CENTRAL) and the LILACS databases were searched for relevant articles. All published randomized controlled trials (RCT) and quasi-randomized controlled trials (QCT), with concurrent controls, on dietary interventions during pregnancy were considered. Results were presented using relative risk (RR) for categorical data and weighted mean difference (WMD) for continuous data. Data were primarily analyzed with a fixed-effect model and a random-effects model was used in the presence of heterogeneity. No date and language restrictions were applied.\n\n\nRESULTS\nIn total, 13 studies were included in this review and 10 trials contributed data on total GWG. Dietary intervention significantly reduced total GWG (n = 1434; WMD = -1.92 kg; 95% CI = -3.65/-0.19; p = 0.03), weight retention at six months postpartum (n = 443; WMD = -1.90 kg; 95% CI = -2.69/-1.12; p < 0.0001) and incidence of cesarean section (n = 609; RR = 0.75; 95% CI = 0.60/0.94; p = 0.013). However, dietary intervention had no significant effect on weight retention at six weeks postpartum, birth weight, preeclampsia, gestational diabetes and preterm birth.\n\n\nCONCLUSION\nDietary advice during pregnancy appears effective in decreasing total GWG and long-term postpartum weight retention, but so far there is limited evidence for further benefits on infant and maternal health.", "title": "" }, { "docid": "1b940a91d5f9f8575cbc3d1bb4be5f4c", "text": "Malware is any kind of program explicitly designed to harm, such as viruses, trojan horses or worms. Since the amount of malware is growing exponentially, it already poses a serious security threat. Therefore, every incoming code must be analysed in order to classify it as malware or benign software. These tests commonly combine static and dynamic analysis techniques in order to extract the major amount of information from distrustful files. Moreover, the increment of the number of attacks hinders manually testing the thousands of suspicious archives that every day reach antivirus laboratories. Against this background, we address here an automatised system for malware behaviour analysis based on emulation and simulation techniques. Hence, creating a secure and reliable sandbox environment allows us to test the suspicious code retrieved without risk. In this way, we can also generate evidences and classify the samples with several machine-learning algorithms. We have developed the proposed solution, testing it with real malware. Finally, we have evaluated it in terms of reliability and time performance, two of the main aspects for such a system to work.", "title": "" }, { "docid": "0f20cfce49eaa9f447fc45b1d4c04be0", "text": "Face recognition is a widely used technology with numerous large-scale applications, such as surveillance, social media and law enforcement. There has been tremendous progress in face recognition accuracy over the past few decades, much of which can be attributed to deep learning based approaches during the last five years. Indeed, automated face recognition systems are now believed to surpass human performance in some scenarios. Despite this progress, a crucial question still remains unanswered: given a face representation, how many identities can it resolve? In other words, what is the capacity of the face representation? A scientific basis for estimating the capacity of a given face representation will not only benefit the evaluation and comparison of different face representation methods, but will also establish an upper bound on the scalability of an automatic face recognition system. We cast the face capacity estimation problem under the information theoretic framework of capacity of a Gaussian noise channel. By explicitly accounting for two sources of representational noise: epistemic (model) uncertainty and aleatoric (data) variability, our approach is able to estimate the capacity of any given face representation. To demonstrate the efficacy of our approach, we estimate the capacity of a 128-dimensional deep neural network based face representation, FaceNet [1], and that of the classical Eigenfaces [2] representation of the same dimensionality. Our numerical experiments on unconstrained faces indicate that, (a) our capacity estimation model yields a capacity upper bound of 5.8×108 for FaceNet and 1×100 for Eigenface representation at a false acceptance rate (FAR) of 1%, (b) the capacity of the face representation reduces drastically as you lower the desired FAR (for FaceNet representation; the capacity at FAR of 0.1% and 0.001% is 2.4×106 and 7.0×102, respectively), and (c) the empirical performance of the FaceNet representation is significantly below the theoretical limit.", "title": "" }, { "docid": "f96eb97ea9300632cfae02084455946e", "text": "A planar folded dipole antenna that exhibits wideband characteristics is proposed. The antenna has simple planar construction without a ground plane and is easy to be assembled. Parameter values are adjusted in order to obtain wideband properties and compactness by using an electromagnetic simulator based on the method of moments. An experimental result centered at 1.7 GHz for 50 impedance matching shows that the antenna has bandwidth over 55% . The gains of the antenna are almost constant (2 dBi) in this frequency band and the radiation patterns are very similar to those of a normal dipole antenna. It is also shown that the antenna has a self-balanced impedance property in this frequency band.", "title": "" }, { "docid": "bb5384cfa3a62877865c7ea69c071845", "text": "Because of the increase flow of network traffic and its significance to the provision of ubiquitous services, cyberattacks attempt to compromise the security principles of confidentiality, integrity and availability. A Network Intrusion Detection System (NIDS) monitors and detects cyber-attack patterns over networking environments. Network packets consist of a wide variety of features which negatively affects detection of anomalies. These features include some irrelevant or redundant features which reduce the efficiency of detecting attacks, and increase False Alarm Rate (FAR). In this paper, the feature characteristics of the UNSW-NB15 and KDD99 datasets are examined, and the features of the UNSW-NB15 are replicated to the KDD99 data set to measure their effeciency. We apply An Association Rule Mining algorithm as feature selection to generate the strongest features from the two data sets. Some existing classifiers are utilised to evaluate the complexity in terms of accuracy and FAR. The experimental results show that, the original KDD99 attributes are less efficient than the replicated UNSW-NB15 attributes of the KDD99 data set. However, comparing the two data sets, the accuracy of the KDD99 dataset is better than the UNSW-NB 15 dataset, and the FAR of the KDD99 dataset is lower the UNSWNB 15 dataset.", "title": "" }, { "docid": "25098f36d4a782911f523ce1ae20cf31", "text": "The problem of stress-management has been receiving an increasing attention in related research communities due to a wider recognition of potential problems caused by chronic stress and due to the recent developments of technologies providing non-intrusive ways of collecting continuously objective measurements to monitor person's stress level. Experimental studies have shown already that stress level can be judged based on the analysis of Galvanic Skin Response (GSR) and speech signals. In this paper we investigate how classification techniques can be used to automatically determine periods of acute stress relying on information contained in GSR and/or speech of a person.", "title": "" }, { "docid": "36bf7c66b222006e1c286450595be824", "text": "Recent terrorist attacks carried out on behalf of ISIS on American and European soil by lone wolf attackers or sleeper cells remind us of the importance of understanding the dynamics of radicalization mediated by social media communication channels. In this paper, we shed light on the social media activity of a group of twenty-five thousand users whose association with ISIS online radical propaganda has been manually verified. By using a computational tool known as dynamic activity-connectivity maps, based on network and temporal activity patterns, we investigate the dynamics of social influence within ISIS supporters. We finally quantify the effectiveness of ISIS propaganda by determining the adoption of extremist content in the general population and draw a parallel between radical propaganda and epidemics spreading, highlighting that information broadcasters and influential ISIS supporters generate highly-infectious cascades of information contagion. Our findings will help generate effective countermeasures to combat the group and other forms of online extremism.", "title": "" }, { "docid": "a007b0d7b1325d17711ea89a1ac1e926", "text": "In this paper, we study the design of the transmitter in the downlink of a multiuser and multiantenna wireless communications system, considering the realistic scenario where only an imperfect estimate of the actual channel is available at both communication ends. Precisely, the actual channel is assumed to be inside an uncertainty region around the channel estimate, which models the imperfections of the channel knowledge that may arise from, e.g., estimation Gaussian errors, quantization effects, or combinations of both sources of errors. In this context, our objective is to design a robust power allocation among the information symbols that are to be sent to the users such that the total transmitted power is minimized, while maintaining the necessary quality of service to obtain reliable communication links between the base station and the users for any possible realization of the actual channel inside the uncertainty region. This robust power allocation is obtained as the solution to a convex optimization problem, which, in general, can be numerically solved in a very efficient way, and even for a particular case of the uncertainty region, a quasi-closed form solution can be found. Finally, the goodness of the robust proposed transmission scheme is presented through numerical results. Robust designs, imperfect CSI, multiantenna systems, broadcast channel, convex optimization.", "title": "" }, { "docid": "19792ab5db07cd1e6cdde79854ba8cb7", "text": "Empathy allows us to simulate others' affective and cognitive mental states internally, and it has been proposed that the mirroring or motor representation systems play a key role in such simulation. As emotions are related to important adaptive events linked with benefit or danger, simulating others' emotional states might constitute of a special case of empathy. In this functional magnetic resonance imaging (fMRI) study we tested if emotional versus cognitive empathy would facilitate the recruitment of brain networks involved in motor representation and imitation in healthy volunteers. Participants were presented with photographs depicting people in neutral everyday situations (cognitive empathy blocks), or suffering serious threat or harm (emotional empathy blocks). Participants were instructed to empathize with specified persons depicted in the scenes. Emotional versus cognitive empathy resulted in increased activity in limbic areas involved in emotion processing (thalamus), and also in cortical areas involved in face (fusiform gyrus) and body perception, as well as in networks associated with mirroring of others' actions (inferior parietal lobule). When brain activation resulting from viewing the scenes was controlled, emotional empathy still engaged the mirror neuron system (premotor cortex) more than cognitive empathy. Further, thalamus and primary somatosensory and motor cortices showed increased functional coupling during emotional versus cognitive empathy. The results suggest that emotional empathy is special. Emotional empathy facilitates somatic, sensory, and motor representation of other peoples' mental states, and results in more vigorous mirroring of the observed mental and bodily states than cognitive empathy.", "title": "" }, { "docid": "dd219eb6a3c05b65716427dca52836cf", "text": "The objective of this review article is to explain the use of cyclodextrin in the different routes of drug administration. The article gives the chemistry of cyclodextrins and addresses the issue of the mechanism of drug release from cyclodextrin complexes. Dilution, competitive displacement, protein binding, change in ionic strength and temperature and drug uptake by tissues are the different release mechanisms of the drug from the drug-cyclodextrin complex discussed here. Use and its limitations in the different drug delivery systems like nasal, ophthalmic, transdermal and rectal drug delivery are explained. The application of the cyclodextrins in the oral drug delivery is detailed in this review. Many studies have shown that cyclodextrins are useful additives in the different routes of drug administration because of increased aqueous solubility, stability, bioavailability and reduced drug irritation.", "title": "" } ]
scidocsrr
dba1831a4689d4d5928b7a5541ec6ce5
Physics-based fast single image fog removal
[ { "docid": "9323c74e39a677c28d1c082b12e1f587", "text": "Atmospheric conditions induced by suspended particles, such as fog and haze, severely degrade image quality. Restoring the true scene colors (clear day image) from a single image of a weather-degraded scene remains a challenging task due to the inherent ambiguity between scene albedo and depth. In this paper, we introduce a novel probabilistic method that fully leverages natural statistics of both the albedo and depth of the scene to resolve this ambiguity. Our key idea is to model the image with a factorial Markov random field in which the. scene albedo and depth are. two statistically independent latent layers. We. show that we may exploit natural image and depth statistics as priors on these hidden layers and factorize a single foggy image via a canonical Expectation Maximization algorithm with alternating minimization. Experimental results show that the proposed method achieves more accurate restoration compared to state-of-the-art methods that focus on only recovering scene albedo or depth individually.", "title": "" }, { "docid": "c5427ac777eaa3ecf25cb96a124eddfe", "text": "One source of difficulties when processing outdoor images is the presence of haze, fog or smoke which fades the colors and reduces the contrast of the observed objects. We introduce a novel algorithm and variants for visibility restoration from a single image. The main advantage of the proposed algorithm compared with other is its speed: its complexity is a linear function of the number of image pixels only. This speed allows visibility restoration to be applied for the first time within real-time processing applications such as sign, lane-marking and obstacle detection from an in-vehicle camera. Another advantage is the possibility to handle both color images or gray level images since the ambiguity between the presence of fog and the objects with low color saturation is solved by assuming only small objects can have colors with low saturation. The algorithm is controlled only by a few parameters and consists in: atmospheric veil inference, image restoration and smoothing, tone mapping. A comparative study and quantitative evaluation is proposed with a few other state of the art algorithms which demonstrates that similar or better quality results are obtained. Finally, an application is presented to lane-marking extraction in gray level images, illustrating the interest of the approach.", "title": "" } ]
[ { "docid": "e7d3fae34553c61827b78e50c2e205ee", "text": "Speaker Identification (SI) is the process of identifying the speaker from a given utterance by comparing the voice biometrics of the utterance with those utterance models stored beforehand. SI technologies are taken a new direction due to the advances in artificial intelligence and have been used widely in various domains. Feature extraction is one of the most important aspects of SI, which significantly influences the SI process and performance. This systematic review is conducted to identify, compare, and analyze various feature extraction approaches, methods, and algorithms of SI to provide a reference on feature extraction approaches for SI applications and future studies. The review was conducted according to Kitchenham systematic review methodology and guidelines, and provides an in-depth analysis on proposals and implementations of SI feature extraction methods discussed in the literature between year 2011 and 2106. Three research questions were determined and an initial set of 535 publications were identified to answer the questions. After applying exclusion criteria 160 related publications were shortlisted and reviewed in this paper; these papers were considered to answer the research questions. Results indicate that pure Mel-Frequency Cepstral Coefficients (MFCCs) based feature extraction approaches have been used more than any other approach. Furthermore, other MFCC variations, such as MFCC fusion and cleansing approaches, are proven to be very popular as well. This study identified that the current SI research trend is to develop a robust universal SI framework to address the important problems of SI such as adaptability, complexity, multi-lingual recognition, and noise robustness. The results presented in this research are based on past publications, citations, and number of implementations with citations being most relevant. This paper also presents the general process of SI. © 2017 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "8aa6e81b8dd30fb562e5a31356e61a03", "text": "In this paper, we propose a honeypot architecture for detecting and analyzing unknown network attacks. The main focus of our approach lies in improving the “significance” of recorded events and network traffic that need to be analyzed by a human network security operator in order to identify a new attacking pattern. Our architecture aims to achieve this goal by combining three main components: 1. a packet filter that suppresses all known attacking packets, 2. a proxy host that performs session-individual logging of network traffic, and 3. a honeypot host that executes actual network services to be potentially attacked from the Internet in a carefully supervised environment and that reports back to the proxy host upon the detection of suspicious behavior. Experiences with our first prototype of this concept show that it is relatively easy to specify suspicious behavior and that traffic belonging to an attack can be successfully identified and marked.", "title": "" }, { "docid": "133dc8b0eb097da0d0a815821732d288", "text": "In this paper, we revisit fully homomorphic encryption (FHE) based on GSW and its ring variants. We notice that the internal product of GSW can be replaced by a simpler external product between a GSW and an LWE ciphertext. We show that the bootstrapping scheme FHEW of Ducas and Micciancio [14] can be expressed only in terms of this external product. As a result, we obtain a speed up from less than 1 second to less than 0.1 seconds. We also reduce the 1GB bootstrapping key size to 24MB, preserving the same security levels, and we improve the noise propagation overhead by replacing exact decomposition algorithms with approximate ones. Moreover, our external product allows to explain the unique asymmetry in the noise propagation of GSW samples and makes it possible to evaluate deterministic automata homomorphically as in [16] in an efficient way with a noise overhead only linear in the length of the tested word. Finally, we provide an alternative practical analysis of LWE based scheme, which directly relates the security parameter to the error rate of LWE and the entropy of the LWE secret key.", "title": "" }, { "docid": "197c9e1b89bf4d28ab8fc4be2d617370", "text": "OBJECTIVE\nParkinson's disease (PD) is a progressive neurological disorder characterised by a large number of motor and non-motor features that can impact on function to a variable degree. This review describes the clinical characteristics of PD with emphasis on those features that differentiate the disease from other parkinsonian disorders.\n\n\nMETHODS\nA MedLine search was performed to identify studies that assess the clinical characteristics of PD. Search terms included \"Parkinson's disease\", \"diagnosis\" and \"signs and symptoms\".\n\n\nRESULTS\nBecause there is no definitive test for the diagnosis of PD, the disease must be diagnosed based on clinical criteria. Rest tremor, bradykinesia, rigidity and loss of postural reflexes are generally considered the cardinal signs of PD. The presence and specific presentation of these features are used to differentiate PD from related parkinsonian disorders. Other clinical features include secondary motor symptoms (eg, hypomimia, dysarthria, dysphagia, sialorrhoea, micrographia, shuffling gait, festination, freezing, dystonia, glabellar reflexes), non-motor symptoms (eg, autonomic dysfunction, cognitive/neurobehavioral abnormalities, sleep disorders and sensory abnormalities such as anosmia, paresthesias and pain). Absence of rest tremor, early occurrence of gait difficulty, postural instability, dementia, hallucinations, and the presence of dysautonomia, ophthalmoparesis, ataxia and other atypical features, coupled with poor or no response to levodopa, suggest diagnoses other than PD.\n\n\nCONCLUSIONS\nA thorough understanding of the broad spectrum of clinical manifestations of PD is essential to the proper diagnosis of the disease. Genetic mutations or variants, neuroimaging abnormalities and other tests are potential biomarkers that may improve diagnosis and allow the identification of persons at risk.", "title": "" }, { "docid": "c3337e6fa136bd535f88ee4fad520d9e", "text": "Microprocessor execution speeds are improving at a rate of 50%-80% per year while DRAM access times are improving at a much lower rate of 5%-10% per year. Computer systems are rapidly approaching the point at which overall system performance is determined not by the speed of the CPU but by the memory system speed. We present a high performance memory system architecture that overcomes the growing speed disparity between high performance microprocessors and current generation DRAMs. A novel prediction and prefetching technique is combined with a distributed cache architecture to build a high performance memory system. We use a table based prediction scheme with a prediction cache to prefetch data from the on-chip DRAM array to an on-chip SRAM prefetch bu er. By prefetching data we are able to hide the large latency associated with DRAM access and cycle times. Our experiments show that with a small (32 KB) prediction cache we can get an e ective main memory access time that is close to the access time of larger secondary caches.", "title": "" }, { "docid": "b9e8007220be2887b9830c05c283f8a5", "text": "INTRODUCTION\nHealth-care professionals are trained health-care providers who occupy a potential vanguard position in human immunodeficiency virus (HIV)/acquired immune deficiency syndrome (AIDS) prevention programs and the management of AIDS patients. This study was performed to assess HIV/AIDS-related knowledge, attitude, and practice (KAP) and perceptions among health-care professionals at a tertiary health-care institution in Uttarakhand, India, and to identify the target group where more education on HIV is needed.\n\n\nMATERIALS AND METHODS\nA cross-sectional KAP survey was conducted among five groups comprising consultants, residents, medical students, laboratory technicians, and nurses. Probability proportional to size sampling was used for generating random samples. Data analysis was performed using charts and tables in Microsoft Excel 2016, and statistical analysis was performed using the Statistical Package for the Social Science software version 20.0.\n\n\nRESULTS\nMost participants had incomplete knowledge regarding the various aspects of HIV/AIDS. Attitude in all the study groups was receptive toward people living with HIV/AIDS. Practical application of knowledge was best observed in the clinicians as well as medical students. Poor performance by technicians and nurses was observed in prevention and prophylaxis. All groups were well informed about the National AIDS Control Policy except technicians.\n\n\nCONCLUSION\nPoor knowledge about HIV infection, particularly among the young medical students and paramedics, is evidence of the lacunae in the teaching system, which must be kept in mind while formulating teaching programs. As suggested by the respondents, Information Education Communication activities should be improvised making use of print, electronic, and social media along with interactive awareness sessions, regular continuing medical educations, and seminars to ensure good quality of safe modern medical care.", "title": "" }, { "docid": "3d5e2e0f0b9cefd240de2fd952eaf961", "text": "This paper focuses on detecting anomalies in a digital video broadcasting (DVB) system from providers’ perspective. We learn a probabilistic deterministic real timed automaton profiling benign behavior of encryption control in the DVB control access system. This profile is used as a one-class classifier. Anomalous items in a testing sequence are detected when the sequence is not accepted by the learned model.", "title": "" }, { "docid": "5c03be451f3610f39c94043d30314617", "text": "Syphilis is a sexually transmitted disease (STD) produced by Treponema pallidum, which mainly affects humans and is able to invade practically any organ in the body. Its infection facilitates the transmission of other STDs. Since the end of the last decade, successive outbreaks of syphilis have been reported in most western European countries. Like other STDs, syphilis is a notifiable disease in the European Union. In Spain, epidemiological information is obtained nationwide via the country's system for recording notifiable diseases (Spanish acronym EDO) and the national microbiological information system (Spanish acronym SIM), which compiles information from a network of 46 sentinel laboratories in twelve Spanish regions. The STDs that are epidemiologically controlled are gonococcal infection, syphilis, and congenital syphilis. The incidence of each of these diseases is recorded weekly. The information compiled indicates an increase in the cases of syphilis and gonococcal infection in Spain in recent years. According to the EDO, in 1999, the number of cases of syphilis per 100,000 inhabitants was recorded to be 1.69, which has risen to 4.38 in 2007. In this article, we review the reappearance and the evolution of this infectious disease in eight European countries, and alert dentists to the importance of a) diagnosing sexually-transmitted diseases and b) notifying the centres that control them.", "title": "" }, { "docid": "38db17ce89e1a046d7d37213b59c8163", "text": "Cardinality estimation has a wide range of applications and is of particular importance in database systems. Various algorithms have been proposed in the past, and the HyperLogLog algorithm is one of them. In this paper, we present a series of improvements to this algorithm that reduce its memory requirements and significantly increase its accuracy for an important range of cardinalities. We have implemented our proposed algorithm for a system at Google and evaluated it empirically, comparing it to the original HyperLogLog algorithm. Like HyperLogLog, our improved algorithm parallelizes perfectly and computes the cardinality estimate in a single pass.", "title": "" }, { "docid": "80cca2365ac99b9570c13b2d76b738e8", "text": "Video clickstream data are important for understanding user behaviors and improving online video services. Various visual analytics techniques have been proposed to explore patterns in these data. However, those techniques are mainly developed for analysis and do not sufficiently support presentations. It is still difficult for data analysts to convey their findings to an audience without prior knowledge. In this paper, we propose to use animated narrative visualization to present video clickstream data. Compared with traditional methods which directly turn click events into animations, our animated narrative visualization focuses on conveying the patterns in the data to a general audience and adopts two novel designs, non-linear time mapping and foreshadowing, to make the presentation more engaging and interesting. Our non-linear time mapping method keeps the interesting parts as the focus of the animation while compressing the uninteresting parts as the context. The foreshadowing techniques can engage the audience and alert them to the events in the animation. Our user study indicates the effectiveness of our system and provides guidelines for the design of similar systems.", "title": "" }, { "docid": "3e767477d7b2f36badd1f581262794cd", "text": "Inspired by the path transform (PT) algorithm of Zelinsky et al. the novel algorithm of complete coverage called complete coverage D* (CCD*) algorithm is developed, based on the D* search of the two-dimensional occupancy grid map of the environment. Unlike the original PT algorithm the CCD* algorithm takes the robot’s dimension into account, with emphasis on safety of motion and reductions of path length and search time. Additionally, the proposed CCD* algorithm has ability to produce new complete coverage path as the environment changes. The algorithms were tested on a Pioneer 3DX mobile robot equipped with a laser range finder.", "title": "" }, { "docid": "748eae887bcda0695cbcf1ba1141dd79", "text": "A wideband bandpass filter (BPF) with reconfigurable bandwidth (BW) is proposed based on a parallel-coupled line structure and a cross-shaped resonator with open stubs. The p-i-n diodes are used as the tuning elements, which can implement three reconfigurable BW states. The prototype of the designed filter reports an absolute BW tuning range of 1.22 GHz, while the fractional BW is varied from 34.8% to 56.5% when centered at 5.7 GHz. The simulation and measured results are in good agreement. Comparing with previous works, the proposed reconfigurable BPF features wider BW tuning range with maximum number of tuning states.", "title": "" }, { "docid": "5ca75490c015685a1fc670b2ee5103ff", "text": "The motion of the hand is the result of a complex interaction of extrinsic and intrinsic muscles of the forearm and hand. Whereas the origin of the extrinsic hand muscles is mainly located in the forearm, the origin (and insertion) of the intrinsic muscles is located within the hand itself. The intrinsic muscles of the hand include the lumbrical muscles I to IV, the dorsal and palmar interosseous muscles, the muscles of the thenar eminence (the flexor pollicis brevis, the abductor pollicis brevis, the adductor pollicis, and the opponens pollicis), as well as the hypothenar muscles (the abductor digiti minimi, flexor digiti minimi, and opponens digiti minimi). The thenar muscles control the motion of the thumb, and the hypothenar muscles control the motion of the little finger.1,2 The intrinsic muscles of the hand have not received much attention in the radiologic literature, despite their importance in moving the hand.3–7 Prospective studies on magnetic resonance (MR) imaging of the intrinsic muscles of the hand are rare, especially with a focus on new imaging techniques.6–8 However, similar to the other skeletal muscles, the intrinsic muscles of the hand can be affected by many conditions with resultant alterations in MR signal intensity ormorphology (e.g., with congenital abnormalities, inflammation, infection, trauma, neurologic disorders, and neoplastic conditions).1,9–12 MR imaging plays an important role in the evaluation of skeletal muscle disorders. Considered the most reliable diagnostic imaging tool, it can show subtle changes of signal and morphology, allow reliable detection and documentation of abnormalities, as well as provide a clear baseline for follow-up studies.13 It is also observer independent and allows second-opinion evaluation that is sometimes necessary, for example before a multidisciplinary discussion. Few studies exist on the clinical impact of MR imaging of the intrinsic muscles of the hand. A study by Andreisek et al in 19 patients with clinically evident or suspected intrinsic hand muscle abnormalities showed that MR imaging of the hand is useful and correlates well with clinical findings in patients with posttraumatic syndromes, peripheral neuropathies, myositis, and tumorous lesions, as well as congenital abnormalities.14,15 Because there is sparse literature on the intrinsic muscles of the hand, this review article offers a comprehensive review of muscle function and anatomy, describes normal MR imaging anatomy, and shows a spectrum of abnormal imaging findings.", "title": "" }, { "docid": "ab62cea43aa3ddc848cf129f0ea391a4", "text": "In this work we propose a method for converting triangular meshes into LEGO bricks through a voxel representation of boundary meshes. We present a novel voxelization approach that uses points sampled from a surface model to define which cubes (voxels) and their associated colors will compose the model. All steps of the algorithm were implemented on the GPU and real-time performance was achieved with satisfactory volumetric resolutions. Rendering results are illustrated using realistic graphics techniques such as screen space ambient occlusion and irradiance maps.", "title": "" }, { "docid": "5dca3981eb4c353712b51f3cc32ff3ec", "text": "We present a new classification architecture based on autoassociative neural networks that are used to learn discriminant models of each class. The proposed architecture has several interesting properties with respect to other model-based classifiers like nearest-neighbors or radial basis functions: it has a low computational complexity and uses a compact distributed representation of the models. The classifier is also well suited for the incorporation of a priori knowledge by means of a problem-specific distance measure. In particular, we will show that tangent distance (Simard, Le Cun, & Denker, 1993) can be used to achieve transformation invariance during learning and recognition. We demonstrate the application of this classifier to optical character recognition, where it has achieved state-of-the-art results on several reference databases. Relations to other models, in particular those based on principal component analysis, are also discussed.", "title": "" }, { "docid": "647b76de7edbca25accdd65fed64d34e", "text": "Despite the evidence that social video conveys rich human personality information, research investigating the automatic prediction of personality impressions in vlogging has shown that, amongst the Big-Five traits, automatic nonverbal behavioral cues are useful to predict mainly the Extraversion trait. This finding, also reported in other conversational settings, indicates that personality information may be coded in other behavioral dimensions like the verbal channel, which has been less studied in multimodal interaction research. In this paper, we address the task of predicting personality impressions from vloggers based on what they say in their YouTube videos. First, we use manual transcripts of vlogs and verbal content analysis techniques to understand the ability of verbal content for the prediction of crowdsourced Big-Five personality impressions. Second, we explore the feasibility of a fully-automatic framework in which transcripts are obtained using automatic speech recognition (ASR). Our results show that the analysis of error-free verbal content is useful to predict four of the Big-Five traits, three of them better than using nonverbal cues, and that the errors caused by the ASR system decrease the performance significantly.", "title": "" }, { "docid": "c676ccb53845c7108e07d9b08bccab46", "text": "-This paper is describing the recently introduced proportional-resonant (PR) controllers and their suitability for grid-connected converters current control. It is shown that the known shortcomings associated with PI controllers like steady-state error for single-phase converters and the need of decoupling for three-phase converters can be alleviated. Additionally, selective harmonic compensation is also possible with PR controllers. Suggested control-diagrams for three-phase grid converters and active filters are also presented. A practical application of PR current control for a photovoltaic (PV) inverter is also described. Index Terms current controller, grid converters, photovoltaic inverter", "title": "" }, { "docid": "df152d3c4dd667b642415b14c25b4513", "text": "We propose a methodology for automatic synthesis of embedded control software that accounts for exogenous disturbances. The resulting system is guaranteed, by construction, to satisfy a given specification expressed in linear temporal logic. The embedded control software consists of three components: a goal generator, a trajectory planner, and a continuous controller. We demonstrate the effectiveness of the proposed technique through an example of an autonomous vehicle navigating an urban environment. This example also illustrates that the system is not only robust with respect to exogenous disturbances but also capable of handling violation of the environment assumptions.", "title": "" }, { "docid": "b00311730b7b9b4f79cdd7bde5aa84f6", "text": "While neural networks demonstrate stronger capabilities in pattern recognition nowadays, they are also becoming larger and deeper. As a result, the effort needed to train a network also increases dramatically. In many cases, it is more practical to use a neural network intellectual property (IP) that an IP vendor has already trained. As we do not know about the training process, there can be security threats in the neural IP: the IP vendor (attacker) may embed hidden malicious functionality, i.e neural Trojans, into the neural IP. We show that this is an effective attack and provide three mitigation techniques: input anomaly detection, re-training, and input preprocessing. All the techniques are proven effective. The input anomaly detection approach is able to detect 99.8% of Trojan triggers although with 12.2% false positive. The re-training approach is able to prevent 94.1% of Trojan triggers from triggering the Trojan although it requires that the neural IP be reconfigurable. In the input preprocessing approach, 90.2% of Trojan triggers are rendered ineffective and no assumption about the neural IP is needed.", "title": "" }, { "docid": "cb3f1598c2769b373a20b4dddd8b35ea", "text": "An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations and distinct queries. Some applications also require the hash to be able to localize image tampering. This requires the hash to contain both robust content and alignment information to meet the above criterion. Fulfilling this is difficult because of two contradictory requirements. First, the hash should be small and second, to verify authenticity and then localize tampering, the amount of information in the hash about the original required would be large. Hence a tradeoff between these requirements needs to be found. This paper presents an image hashing method that addresses this concern, to not only detect but also localize tampering using a small signature (< 1kB). Illustrative experiments bring out the efficacy of the proposed method compared to existing methods.", "title": "" } ]
scidocsrr
e8eb31adf90de8289ff64570a8df9286
To See and Be Seen : Celebrity Practice on Twitter
[ { "docid": "53477003e3c57381201a69e7cc54cfc9", "text": "Twitter - a microblogging service that enables users to post messages (\"tweets\") of up to 140 characters - supports a variety of communicative practices; participants use Twitter to converse with individuals, groups, and the public at large, so when conversations emerge, they are often experienced by broader audiences than just the interlocutors. This paper examines the practice of retweeting as a way by which participants can be \"in a conversation.\" While retweeting has become a convention inside Twitter, participants retweet using different styles and for diverse reasons. We highlight how authorship, attribution, and communicative fidelity are negotiated in diverse ways. Using a series of case studies and empirical data, this paper maps out retweeting as a conversational practice.", "title": "" } ]
[ { "docid": "a7f81672b718b7f5990330e3a77663a9", "text": "CHARLES A. THIGPEN: Effects Of Forward Head And Rounded Shoulder Posture On Scapular Kinematics, Muscle Activity, And Shoulder Coordination (Under the direction of Dr. Darin A. Padua) Forward head and rounded shoulder posture (FHRSP) has been identified as a potential risk factor for the development of shoulder pain. The mechanism through which forward head and rounded shoulder can facilitate shoulder injury is not well understood. Altered scapular kinematics, muscle activity, and shoulder joint coordination due to FHRSP may lead to the development of shoulder pain. However, there is little evidence to support the influence of FHRSP on scapular kinematics, muscle activity, and shoulder joint coordination. Therefore, the purpose of this study was to compare scapular kinematics, muscle activity, and shoulder joint coordination in individuals with and without FHRSP. Eighty volunteers without shoulder pain were classified as having FHRSP or ideal posture. An electromagnetic tracking system together with hard-wired surface electromyography was used to collect three-dimensional scapular kinematics concurrently with muscle activity of the upper and lower trapezius as well as the serratus anterior during", "title": "" }, { "docid": "0090413bf614e3dbeb97cfe0725446bc", "text": "Imitation learning has proven to be useful for many real-world problems, but approaches such as behavioral cloning suffer from data mismatch and compounding error issues. One attempt to address these limitations is the DAGGER algorithm, which uses the state distribution induced by the novice to sample corrective actions from the expert. Such sampling schemes, however, require the expert to provide action labels without being fully in control of the system. This can decrease safety and, when using humans as experts, is likely to degrade the quality of the collected labels due to perceived actuator lag. In this work, we propose HG-DAGGER, a variant of DAGGER that is more suitable for interactive imitation learning from human experts in real-world systems. In addition to training a novice policy, HG-DAGGER also learns a safety threshold for a model-uncertainty-based risk metric that can be used to predict the performance of the fully trained novice in different regions of the state space. We evaluate our method on both a simulated and real-world autonomous driving task, and demonstrate improved performance over both DAGGER and behavioral cloning.", "title": "" }, { "docid": "af7479706cd15bb91fc84fba4e194eec", "text": "Wireless positioning has attracted much research attention and has become increasingly important in recent years. Wireless positioning has been found very useful for other applications besides E911 service, ranging from vehicle navigation and network optimization to resource management and automated billing. Although many positioning devices and services are currently available, it is necessary to develop an integrated and seamless positioning platform to provide a uniform solution for different network configurations. This article surveys the state-of-the-art positioning designs, focusing specifically on signal processing techniques in network-aided positioning. It serves as a tutorial for researchers and engineers interested in this rapidly growing field. It also provides new directions for future research for those who have been working in this field for many years.", "title": "" }, { "docid": "ce29ddfd7b3d3a28ddcecb7a5bb3ac8e", "text": "Steganography consist of concealing secret information in a cover object to be sent over a public communication channel. It allows two parties to share hidden information in a way that no intruder can detect the presence of hidden information. This paper presents a novel steganography approach based on pixel location matching of the same cover image. Here the information is not directly embedded within the cover image but a sequence of 4 bits of secret data is compared to the 4 most significant bits (4MSB) of the cover image pixels. The locations of the matching pixels are taken to substitute the 2 least significant bits (2LSB) of the cover image pixels. Since the data are not directly hidden in cover image, the proposed approach is more secure and difficult to break. Intruders cannot intercept it by using common LSB techniques.", "title": "" }, { "docid": "14838947ee3b95c24daba5a293067730", "text": "In this paper we address the issue of learning to rank for document retrieval. In the task, a model is automatically created with some training data and then is utilized for ranking of documents. The goodness of a model is usually evaluated with performance measures such as MAP (Mean Average Precision) and NDCG (Normalized Discounted Cumulative Gain). Ideally a learning algorithm would train a ranking model that could directly optimize the performance measures with respect to the training data. Existing methods, however, are only able to train ranking models by minimizing loss functions loosely related to the performance measures. For example, Ranking SVM and RankBoost train ranking models by minimizing classification errors on instance pairs. To deal with the problem, we propose a novel learning algorithm within the framework of boosting, which can minimize a loss function directly defined on the performance measures. Our algorithm, referred to as AdaRank, repeatedly constructs 'weak rankers' on the basis of reweighted training data and finally linearly combines the weak rankers for making ranking predictions. We prove that the training process of AdaRank is exactly that of enhancing the performance measure used. Experimental results on four benchmark datasets show that AdaRank significantly outperforms the baseline methods of BM25, Ranking SVM, and RankBoost.", "title": "" }, { "docid": "b0f752f3886de8e5d4fe0f186a495c68", "text": "Granular materials composed of a mixture of grain sizes are notoriously prone to segregation during shaking or transport. In this paper, a binary mixture theory is used to formulate a model for kinetic sieving of large and small particles in thin, rapidly flowing avalanches, which occur in many industrial and geophysical free-surface flows. The model is based on a simple percolation idea, in which the small particles preferentially fall into underlying void space and lever large particles upwards. Exact steady-state solutions have been constructed for general steady uniform velocity fields, as well as time-dependent solutions for plug-flow, that exploit the decoupling of material columns in the avalanche. All the solutions indicate the development of concentration shocks, which are frequently observed in experiments. A shock-capturing numerical algorithm is formulated to solve general problems and is used to investigate segregation in flows with weak shear.", "title": "" }, { "docid": "1f28ca58aabd0e2523492308c4da3929", "text": "Sepsis is a leading cause of in-hospital death over the world and septic shock, the most severe complication of sepsis, reaches a mortality rate as high as 50%. Early diagnosis and treatment can prevent most morbidity and mortality. In this work, Recent Temporal Patterns (RTPs) are used in conjunction with SVM classifier to build a robust yet interpretable model for early diagnosis of septic shock. This model is applied to two different prediction tasks: visit-level early diagnosis and event-level early prediction. For each setting, this model is compared against several strong baselines including atemporal method called Last-Value, six classic machine learning algorithms, and lastly, a state-of-the-art deep learning model: Long Short-Term Memory (LSTM). Our results suggest that RTP-based model can outperform all aforementioned baseline models for both diagnosis tasks. More importantly, the extracted interpretative RTPs can shed lights for the clinicians to discover progression behavior and latent patterns among septic shock patients.", "title": "" }, { "docid": "dbd6f56d4337ee35c7c375b6d31e7f38", "text": "Augmented Reality (AR) is becoming mobile. Mobile devices have many constraints but also rich new features that traditional desktop computers do not have. There are several survey papers on AR, but none is dedicated to Mobile Augmented Reality (MAR). Our work serves the purpose of closing this gap. The contents are organized with a bottom-up approach. We first present the state-of-the-art in system components including hardware platforms, software frameworks and display devices, follows with enabling technologies such as tracking and data management. We then survey the latest technologies and methods to improve run-time performance and energy efficiency for practical implementation. On top of these, we further introduce the application fields and several typical MAR applications. Finally we conclude the survey with several challenge problems, which are under exploration and require great research efforts in the future.", "title": "" }, { "docid": "9f3b749ee0035fa749efa6d16528e325", "text": "There's growing interest in developing applications for the Internet of Things. Such applications' main objective is to integrate technology into people's everyday lives, to be of service to them en masse. The form in which this integration is implemented, however, still leaves much room for improvement. Usually, the user must set parameters within the application. When the person's context changes, they have to manually reconfigure the parameters. What was meant to be a commodity in an unforeseen situation then becomes extra noise. This article describes a reference architecture that improves how people are integrated with the IoT, with smartphones doing the connecting. The resulting integration opens the way to new IoT scenarios supporting evolution towards the Internet of People.", "title": "" }, { "docid": "077f9a831b5adbff1e809df01428a197", "text": "In this paper, we simulated and analyzed about through-via's signal integrity, (SI)/power integrity, and (PI)/electromagnetic interference (EMI) that goes through the power/ground plane which was caused by the high dielectric material that supports the embedded high value capacitors. In order to evaluate through-via's effectiveness, the simulation condition was operated on the LTCC module for mixed signal system. For the circumstance SI, delay time of signal line and signal quality significantly decrease because of higher parasitic capacitance between through-via's and anti-pads. However, in a situation where the dielectric material is chosen, the EMI's characteristic power/ground plan with embedded high dielectric material shows a better characteristic than when the low dielectric material was chosen. As a result, if the high dielectric material is applied on LTCC module, the mixed module packaging that is made with the digital IC and RF component will be realized as the optimistic design. The simulation structure takes the LTCC process designer guidebook as a basic structure and uses the HFSS/designer tool. When the dielectric constant uses 7.8 and 500, the through-via's that pass through the LTCC module are delay time of 41.4 psec and 56, respectively. When the dielectric constant of 500 is compared with 7.8, the power/ground plane impedance shows a trait lower than several GHz range and effectiveness in the rejection of the resonance mode. When uses the dielectric constant is 500, the EMI level is 7.8 and it is prove that the EMI level improves at maximum 20 dB V/m.", "title": "" }, { "docid": "58b4320c2cf52c658275eaa4748dede5", "text": "Backing-out and heading-out maneuvers in perpendicular or angle parking lots are one of the most dangerous maneuvers, especially in cases where side parked cars block the driver view of the potential traffic flow. In this paper, a new vision-based Advanced Driver Assistance System (ADAS) is proposed to automatically warn the driver in such scenarios. A monocular grayscale camera was installed at the back-right side of a vehicle. A Finite State Machine (FSM) defined according to three CAN Bus variables and a manual signal provided by the user is used to handle the activation/deactivation of the detection module. The proposed oncoming traffic detection module computes spatio-temporal images from a set of predefined scan-lines which are related to the position of the road. A novel spatio-temporal motion descriptor is proposed (STHOL) accounting for the number of lines, their orientation and length of the spatio-temporal images. Some parameters of the proposed descriptor are adapted for nighttime conditions. A Bayesian framework is then used to trigger the warning signal using multivariate normal density functions. Experiments are conducted on image data captured from a vehicle parked at different location of an urban environment, including both daytime and nighttime lighting conditions. We demonstrate that the proposed approach provides robust results maintaining processing rates close to real time.", "title": "" }, { "docid": "faa43d139c23620e47aef56308f8a0fb", "text": "In the present research was to investigate the levels and the prevalence of academic procrastination on high school, undergraduate and graduate students. In this respect, Procrastination Assessment Scale-Student (PASS) was administered to a total of 448 students who were 149 (83 female; 66 male) high-school, 150 (80 female; 70 male) undergraduate and 148 (84 female; 64 male) graduate students. The average age was 15.5 years old (SD = .56) for High-school, 20.4 years old (SD = 1.71) for Undergraduate, and 25.5 years old (SD = 2.32) for Graduate students. Results showed a significant difference among the academic levels of the students. Specifically, undergraduate students claimed to procrastinate more than graduate and high school students. High school and undergraduate students claimed to be nearly always or always procrastinator on studying for exams, while graduate students procrastinate more on writing term papers.", "title": "" }, { "docid": "db480610388d64d8f5ad556b6f5651bd", "text": "An inter-band carrier aggregation (CA) quadplexer allows doubling the download rates and is therefore an important element in upcoming mobile phone systems. In a duplexer design, both Tx and Rx filters should behave like an open-circuit for respective counter-bands at the antenna port. Additionally, they have to attain high suppression in their counter-band to get good in-band isolation. The situation gets more difficult and challenging for a CA quadplexer. Besides an open-circuit requirement for now 3 bands simultaneously, each Tx filter should achieve high suppression in the frequency range of both Rx filters in order to get high in-band and cross-isolation. The same applies for each Rx filter. Generally, it is not sufficient to simply expand the well-known topology concepts of duplexers rather a different design methodology is required. In this paper we will discuss several approaches to realize a CA quadplexer and present an implementation of a B25-B4 CA quadplexer sized 3.6×2.0×0.8mm3 utilizing the company's advanced acoustic wave filtering technologies: bulk acoustic wave (BAW) and surface acoustic wave (SAW).", "title": "" }, { "docid": "f321e510630a9997ad2759d7789b3fc7", "text": "Dental ceramics are presented within a simplifying framework allowing for understanding of their composition and development. The meaning of strength and details of the fracture process are explored, and recommendations are given regarding making structural comparisons among ceramics. Assessment of clinical survival data is dealt with, and literature is reviewed on the clinical behavior of metal-ceramic and all-ceramic systems. Practical aspects are presented regarding the choice and use of dental ceramics.", "title": "" }, { "docid": "21edf22bbe51ce6a6d429fee59985fc5", "text": "This paper details filtering subsystem for a tetra-vision based pedestrian detection system. The complete system is based on the use of both visible and far infrared cameras; in an initial phase it produces a list of areas of attention in the images which can contain pedestrians. This list is furtherly refined using symmetry-based assumptions. Then, this results is fed to a number of independent validators that evaluate the presence of human shapes inside the areas of attention. Histogram of oriented gradients and Support Vector Machines are used as a filter and demonstrated to be able to successfully classify up to 91% of pedestrians in the areas of attention.", "title": "" }, { "docid": "0f0a869bfbfaf3c00f6ea4db9c5eda1d", "text": "Robotic Autonomy is a seven-week, hands-on introduction to robotics designed for high school students. The course presents a broad survey of robotics, beginning with mechanism and electronics and ending with robot behavior, navigation and remote teleoperation. During the summer of 2002, Robotic Autonomy was taught to twenty eight students at Carnegie Mellon West in cooperation with NASA/Ames (Moffett Field, CA). The educational robot and course curriculum were the result of a ground-up design effort chartered to develop an effective and low-cost robot for secondary level education and home use. Cooperation between Carnegie Mellon’s Robotics Institute, Gogoco, LLC. and Acroname Inc. yielded notable innovations including a fast-build robot construction kit, indoor/outdoor terrainability, CMOS vision-centered sensing, back-EMF motor speed control and a Java-based robot programming interface. In conjunction with robot and curriculum design, the authors at the Robotics Institute and the University of Pittsburgh’s Learning Research and Development Center planned a methodology for evaluating the educational efficacy of Robotic Autonomy, implementing both formative and summative evaluations of progress as well as an indepth, one week ethnography to identify micro-genetic mechanisms of learning that would inform the broader evaluation. This article describes the robot and curriculum design processes and then the educational analysis methodology and statistically significant results, demonstrating the positive impact of Robotic Autonomy on student learning well beyond the boundaries of specific technical concepts in robotics.", "title": "" }, { "docid": "00d76380bcc967a5b7eee4c8903cedf1", "text": "This paper demonstrates models that were designed and implemented to simulate slotted ALOHA multiple access computer network protocol. The models are spreadsheet-based simulating e-forms that were designed for students use in college level data communication and networking courses. Specifically, three models for simulating this protocol are fully implemented using spreadsheets. The features of these models are simplicity and quickness of implementation compared with other implementation techniques. These models assisted instructors to develop educational objects that in turn will help students for better understanding and exploring of the scientific concepts related to computer protocols by the aid of visual and interactive spreadsheet-based e-forms. Moreover, advanced spreadsheet techniques such as imagery integration, hyperlinks, conditional structures, conditional formats, and charts insetting, to simulate scientific notions that are taught to undergraduate students were exploited in these models. The models designing technique is characterized by simplicity, flexibility, and affordability. The technique can be applied and used in many disciplines of education, business, science, and technology. Generally, the developed computational e-forms can be used by instructors to illustrate topics in attractive fashions. In addition, students and learners can use the developed educational objects without instructor supervision in self-education or e-learning environments.", "title": "" }, { "docid": "27a4c7681dba525859bc2f153675b190", "text": "Ladder diagram (LD) and instruction list (IL) have been widely used in industries as programming languages for PLC (programmable logic controller). The LD is similar to the electrical schematic diagram, and can represent control logic explicitly. However, LD programs can not be executed directly by PLC. On the other hand the IL which is similar to the assemble language can be processed directly by PLC. Thus, it is necessary to study transformation algorithm from the LD to the IL. This paper proposes a transformation algorithm used to transform the LD into the IL for PLC systems. The transformation algorithm uses an AOV digraph to represent the LD program, and then realizes the transformation by postorder traversing binary trees built form the AOV digraph. In this paper, first some basic concepts and data structures in the algorithm are presented. Second, this paper describes main ideas and detailed steps of the transformation algorithm. A transformation example in this paper shows that the proposed algorithm is correct and has practicability", "title": "" }, { "docid": "a234950dce1d69ee1cfb1a9fa4231c82", "text": "RDF is the format of choice for representing Semantic Web data. RDF graphs may be large and their structure is heterogeneous and complex, making them very hard to explore and understand. To help users discover valuable insights from RDF graph, we have developed Dagger, a tool which automatically recommends interesting aggregation queries over the RDF graphs; Dagger evaluates the queries and graphically shows their results to the user, in the ranked order of their interestingness. We propose to demonstrate Dagger to the ISWC audience, based on popular real and synthetic RDF graphs.", "title": "" }, { "docid": "ab662b1dd07a7ae868f70784408e1ce1", "text": "We use autoencoders to create low-dimensional embeddings of underlying patient phenotypes that we hypothesize are a governing factor in determining how different patients will react to different interventions. We compare the performance of autoencoders that take fixed length sequences of concatenated timesteps as input with a recurrent sequence-to-sequence autoencoder. We evaluate our methods on around 35,500 patients from the latest MIMIC III dataset from Beth Israel Deaconess Hospital.", "title": "" } ]
scidocsrr
2194ef1ab674e0f341aade34f6073ca0
Mobile cloud computing: A survey
[ { "docid": "ca4d2862ba75bfc35d8e9ada294192e1", "text": "This paper provides a model that realistically represents the movements in a disaster area scenario. The model is based on an analysis of tactical issues of civil protection. This analysis provides characteristics influencing network performance in public safety communication networks like heterogeneous area-based movement, obstacles, and joining/leaving of nodes. As these characteristics cannot be modelled with existing mobility models, we introduce a new disaster area mobility model. To examine the impact of our more realistic modelling, we compare it to existing ones (modelling the same scenario) using different pure movement and link based metrics. The new model shows specific characteristics like heterogeneous node density. Finally, the impact of the new model is evaluated in an exemplary simulative network performance analysis. The simulations show that the new model discloses new information and has a significant impact on performance analysis.", "title": "" } ]
[ { "docid": "1f8a386867ba1157655eda86a80f4555", "text": "Body weight, length, and vocal tract length were measured for 23 rhesus macaques (Macaca mulatta) of various sizes using radiographs and computer graphic techniques. linear predictive coding analysis of tape-recorded threat vocalizations were used to determine vocal tract resonance frequencies (\"formants\") for the same animals. A new acoustic variable is proposed, \"formant dispersion,\" which should theoretically depend upon vocal tract length. Formant dispersion is the averaged difference between successive formant frequencies, and was found to be closely tied to both vocal tract length and body size. Despite the common claim that voice fundamental frequency (F0) provides an acoustic indication of body size, repeated investigations have failed to support such a relationship in many vertebrate species including humans. Formant dispersion, unlike voice pitch, is proposed to be a reliable predictor of body size in macaques, and probably many other species.", "title": "" }, { "docid": "f9b11e55be907175d969cd7e76803caf", "text": "In this paper, we consider the multivariate Bernoulli distribution as a model to estimate the structure of graphs with binary nodes. This distribution is discussed in the framework of the exponential family, and its statistical properties regarding independence of the nodes are demonstrated. Importantly the model can estimate not only the main effects and pairwise interactions among the nodes but also is capable of modeling higher order interactions, allowing for the existence of complex clique effects. We compare the multivariate Bernoulli model with existing graphical inference models – the Ising model and the multivariate Gaussian model, where only the pairwise interactions are considered. On the other hand, the multivariate Bernoulli distribution has an interesting property in that independence and uncorrelatedness of the component random variables are equivalent. Both the marginal and conditional distributions of a subset of variables in the multivariate Bernoulli distribution still follow the multivariate Bernoulli distribution. Furthermore, the multivariate Bernoulli logistic model is developed under generalized linear model theory by utilizing the canonical link function in order to include covariate information on the nodes, edges and cliques. We also consider variable selection techniques such as LASSO in the logistic model to impose sparsity structure on the graph. Finally, we discuss extending the smoothing spline ANOVA approach to the multivariate Bernoulli logistic model to enable estimation of non-linear effects of the predictor variables.", "title": "" }, { "docid": "b4dd6c9634e86845795bcbe32216ee44", "text": "Several program analysis tools - such as plagiarism detection and bug finding - rely on knowing a piece of code's relative semantic importance. For example, a plagiarism detector should not bother reporting two programs that have an identical simple loop counter test, but should report programs that share more distinctive code. Traditional program analysis techniques (e.g., finding data and control dependencies) are useful, but do not say how surprising or common a line of code is. Natural language processing researchers have encountered a similar problem and addressed it using an n-gram model of text frequency, derived from statistics computed over text corpora.\n We propose and compute an n-gram model for programming languages, computed over a corpus of 2.8 million JavaScript programs we downloaded from the Web. In contrast to previous techniques, we describe a code n-gram as a subgraph of the program dependence graph that contains all nodes and edges reachable in n steps from the statement. We can count n-grams in a program and count the frequency of n-grams in the corpus, enabling us to compute tf-idf-style measures that capture the differing importance of different lines of code. We demonstrate the power of this approach by implementing a plagiarism detector with accuracy that beats previous techniques, and a bug-finding tool that discovered over a dozen previously unknown bugs in a collection of real deployed programs.", "title": "" }, { "docid": "f28a91e0cdb4c3528a6d04cf549358b4", "text": "This paper presents an algorithm for calibrating erroneous tri-axis magnetometers in the magnetic field domain. Unlike existing algorithms, no simplification is made on the nature of errors to ease the estimation. A complete error model, including instrumentation errors (scale factors, nonorthogonality, and offsets) and magnetic deviations (soft and hard iron) on the host platform, is elaborated. An adaptive least squares estimator provides a consistent solution to the ellipsoid fitting problem and the magnetometer’s calibration parameters are derived. The calibration is experimentally assessed with two artificial magnetic perturbations introduced close to the sensor on the host platform and without additional perturbation. In all configurations, the algorithm successfully converges to a good estimate of the said errors. Comparing the magnetically derived headings with a GNSS/INS reference, the results show a major improvement in terms of heading accuracy after the calibration.", "title": "" }, { "docid": "50dc3186ad603ef09be8cca350ff4d77", "text": "Design iteration time in SoC design flow is reduced through performance exploration at a higher level of abstraction. This paper proposes an accurate and fast performance analysis method in early stage of design process using a behavioral model written in C/C++ language. We made a cycle-accurate but fast and flexible compiled instruction set simulator (ISS) and IP models that represent hardware functionality and performance. System performance analyzer configured by the target communication architecture analyzes the performance utilizing event-traces obtained by running the ISS and IP models. This solution is automated and implemented in the tool, HIPA. We obtain diverse performance profiling results and achieve 95% accuracy using an abstracted C model. We also achieve about 20 times speed-up over corresponding co-simulation tools.", "title": "" }, { "docid": "78ca8024a825fc8d5539b899ad34fc18", "text": "In this paper, we examine whether managers use optimistic and pessimistic language in earnings press releases to provide information about expected future firm performance to the market, and whether the market responds to optimistic and pessimistic language usage in earnings press releases after controlling for the earnings surprise and other factors likely to influence the market’s response to the earnings announcement. We use textual-analysis software to measure levels of optimistic and pessimistic language for a sample of approximately 24,000 earnings press releases issued between 1998 and 2003. We find a positive (negative) association between optimistic (pessimistic) language usage and future firm performance and a significant incremental market response to optimistic and pessimistic language usage in earnings press releases. Results suggest managers use optimistic and pessimistic language to provide credible information about expected future firm performance to the market, and that the market responds to managers’ language usage.", "title": "" }, { "docid": "3fc74e621d0e485e1e706367d30e0bad", "text": "Many commercial navigation aids suffer from a number of design flaws, the most important of which are related to the human interface that conveys information to the user. Aids for the visually impaired are lightweight electronic devices that are either incorporated into a long cane, hand-held or worn by the client, warning of hazards ahead. Most aids use vibrating buttons or sound alerts to warn of upcoming obstacles, a method which is only capable of conveying very crude information regarding direction and proximity to the nearest object. Some of the more sophisticated devices use a complex audio interface in order to deliver more detailed information, but this often compromises the user's hearing, a critical impairment for a blind user. The author has produced an original design and working prototype solution which is a major first step in addressing some of these faults found in current production models for the blind.", "title": "" }, { "docid": "cbfdea54abb1e4c1234ca44ca6913220", "text": "Seeds of chickpea (Cicer arietinum L.) were exposed in batches to static magnetic fields of strength from 0 to 250 mT in steps of 50 mT for 1-4 h in steps of 1 h for all fields. Results showed that magnetic field application enhanced seed performance in terms of laboratory germination, speed of germination, seedling length and seedling dry weight significantly compared to unexposed control. However, the response varied with field strength and duration of exposure without any particular trend. Among the various combinations of field strength and duration, 50 mT for 2 h, 100 mT for 1 h and 150 mT for 2 h exposures gave best results. Exposure of seeds to these three magnetic fields improved seed coat membrane integrity as it reduced the electrical conductivity of seed leachate. In soil, seeds exposed to these three treatments produced significantly increased seedling dry weights of 1-month-old plants. The root characteristics of the plants showed dramatic increase in root length, root surface area and root volume. The improved functional root parameters suggest that magnetically treated chickpea seeds may perform better under rainfed (un-irrigated) conditions where there is a restrictive soil moisture regime.", "title": "" }, { "docid": "f560be243747927a7d6873ca0f87d9c6", "text": "Hydrophobic interaction chromatography-high performance liquid chromatography (HIC-HPLC) is a powerful analytical method used for the separation of molecular variants of therapeutic proteins. The method has been employed for monitoring various post-translational modifications, including proteolytic fragments and domain misfolding in etanercept (Enbrel®); tryptophan oxidation, aspartic acid isomerization, the formation of cyclic imide, and α amidated carboxy terminus in recombinant therapeutic monoclonal antibodies; and carboxy terminal heterogeneity and serine fucosylation in Fc and Fab fragments. HIC-HPLC is also a powerful analytical technique for the analysis of antibody-drug conjugates. Most current analytical columns, methods, and applications are described, and critical method parameters and suitability for operation in regulated environment are discussed, in this review.", "title": "" }, { "docid": "3b45e971fd172b01045d8e5241514b37", "text": "Learning from reinforcements is a promising approach for creating intelligent agents. However, reinforcement learning usually requires a large number of training episodes. We present and evaluate a design that addresses this shortcoming by allowing a connectionist Q-learner to accept advice given, at any time and in a natural manner, by an external observer. In our approach, the advice-giver watches the learner and occasionally makes suggestions, expressed as instructions in a simple imperative programming language. Based on techniques from knowledge-based neural networks, we insert these programs directly into the agent‘s utility function. Subsequent reinforcement learning further integrates and refines the advice. We present empirical evidence that investigates several aspects of our approach and shows that, given good advice, a learner can achieve statistically significant gains in expected reward. A second experiment shows that advice improves the expected reward regardless of the stage of training at which it is given, while another study demonstrates that subsequent advice can result in further gains in reward. Finally, we present experimental results that indicate our method is more powerful than a naive technique for making use of advice.", "title": "" }, { "docid": "81e1d86f37d88bfdc39602d2e04dfa20", "text": "The working memory framework was used to investigate the factors determining the phenomenological vividness of images. Participants rated the vividness of visual or auditory images under control conditions or while performing tasks that differentially disrupted the visuospatial sketchpad and phonological loop subsystems of working memory. In Experiments 1, 2, and 6, participants imaged recently presented novel visual patterns and sequences of tones; ratings of vividness showed the predicted interaction between stimulus modality and concurrent task. The images in experiments 3, 4, 5, and 6 were based on long-term memory (LTM). They also showed an image modality by task interaction, with a clear effect of LTM variables (meaningfulness, activity, bizarreness, and stimulus familiarity), implicating both working memory and LTM in the experience of vividness.", "title": "" }, { "docid": "e099186ceed71e03276ab168ecf79de7", "text": "Twelve patients with deafferentation pain secondary to central nervous system lesions were subjected to chronic motor cortex stimulation. The motor cortex was mapped as carefully as possible and the electrode was placed in the region where muscle twitch of painful area can be observed with the lowest threshold. 5 of the 12 patients reported complete absence of previous pain with intermittent stimulation at 1 year following the initiation of this therapy. Improvements in hemiparesis was also observed in most of these patients. The pain of these patients was typically barbiturate-sensitive and morphine-resistant. Another 3 patients had some degree of residual pain but considerable reduction of pain was still obtained by stimulation. Thus, 8 of the 12 patients (67%) had continued effect of this therapy after 1 year. In 3 patients, revisions of the electrode placement were needed because stimulation became incapable of inducing muscle twitch even with higher stimulation intensity. The effect of stimulation on pain and capability of producing muscle twitch disappeared simultaneously in these cases and the effect reappeared after the revisions, indicating that appropriate stimulation of the motor cortex is definitely necessary for obtaining satisfactory pain control in these patients. None of the patients subjected to this therapy developed neither observable nor electroencephalographic seizure activity.", "title": "" }, { "docid": "75fd1706bb96a1888dc9939dbe5359c2", "text": "In this paper, we present a novel approach to ide ntify feature specific expressions of opinion in product reviews with different features and mixed emotions . The objective is realized by identifying a set of potential features in the review and extract ing opinion expressions about those features by exploiting their associatio ns. Capitalizing on the view that more closely associated words come togeth er to express an opinion about a certain feature, dependency parsing i used to identify relations between the opinion expressions. The syst em learns the set of significant relations to be used by dependency parsing and a threshold parameter which allows us to merge closely associated opinio n expressions. The data requirement is minimal as thi is a one time learning of the domain independent parameters . The associations are represented in the form of a graph which is partiti oned to finally retrieve the opinion expression describing the user specified feature. We show that the system achieves a high accuracy across all domains and performs at par with state-of-the-art systems despi t its data limitations.", "title": "" }, { "docid": "d87e9a6c62c100142523baddc499320c", "text": "Intelligent behaviour in the real-world requires the ability to acquire new knowledge from an ongoing sequence of experiences while preserving and reusing past knowledge. We propose a novel algorithm for unsupervised representation learning from piece-wise stationary visual data: Variational Autoencoder with Shared Embeddings (VASE). Based on the Minimum Description Length principle, VASE automatically detects shifts in the data distribution and allocates spare representational capacity to new knowledge, while simultaneously protecting previously learnt representations from catastrophic forgetting. Our approach encourages the learnt representations to be disentangled, which imparts a number of desirable properties: VASE can deal sensibly with ambiguous inputs, it can enhance its own representations through imagination-based exploration, and most importantly, it exhibits semantically meaningful sharing of latents between different datasets. Compared to baselines with entangled representations, our approach is able to reason beyond surface-level statistics and perform semantically meaningful cross-domain inference.", "title": "" }, { "docid": "69b1c87a06b1d83fd00d9764cdadc2e9", "text": "Sarcos Research Corporation, and the Center for Engineering Design at the University of Utah, have long been interested in both the fundamental and the applied aspects of robots and other computationally driven machines. We have produced substantial numbers of systems that function as products for commercial applications, and as advanced research tools specifically designed for experimental", "title": "" }, { "docid": "f44e5926c2aa6ff311cb2505e856217a", "text": "This paper investigates the possibility of implementing node positioning in the ZigBee wireless sensor network by using a readily available Received Signal Strength Indicator (RSSI) infrastructure provided by the physical layer of 802.15.4 networks. In this study the RSSI is converted to the distance providing the basis for using the trilateration methods for location estimation. The software written in C# is used to solve the trilateration problem and the final results of trilateration methods are mapped using Google maps. Providing node positioning capability to the ZigBee network offers an enormous benefit to the Wireless Sensor Networks applications, possibly extending the functionality of existing software solution to include node tracking and monitoring without an additional hardware investment.", "title": "" }, { "docid": "32d79366936e301c44ae4ac11784e9d8", "text": "A vast literature describes transformational leadership in terms of leader having charismatic and inspiring personality, stimulating followers, and providing them with individualized consideration. A considerable empirical support exists for transformation leadership in terms of its positive effect on followers with respect to criteria like effectiveness, extra role behaviour and organizational learning. This study aims to explore the effect of transformational leadership characteristics on followers’ job satisfaction. Survey method was utilized to collect the data from the respondents. The study reveals that individualized consideration and intellectual stimulation affect followers’ job satisfaction. However, intellectual stimulation is positively related with job satisfaction and individualized consideration is negatively related with job satisfaction. Leader’s charisma or inspiration was found to be having no affect on the job satisfaction. The three aspects of transformational leadership were tested against job satisfaction through structural equation modeling using Amos.", "title": "" }, { "docid": "c1389acb62cca5cb3cfdec34bd647835", "text": "A Chinese resume information extraction system (CRIES) based on semi-structured text is designed and implemented to obtain formatted information by extracting text content of every field from resumes in different formats and update information automatically based on the web. Firstly, ideas to classify resumes, some constraints obtained by analyzing resume features and overall extraction strategy is introduced. Then two extraction algorithms for parsing resumes in different text formats are given. Consequently, the system was implemented by java programming. Finally, use the system to resolve the resume samples, and the statistical analysis and system optimization analysis are carried out according to the accuracy rate and recall rate of the extracted results.", "title": "" }, { "docid": "18f530c400498658d73aba21f0ce984e", "text": "Anomaly and event detection has been studied widely for having many applications in fraud detection, network intrusion detection, detection of epidemic outbreaks, and so on. In this paper we propose an algorithm that operates on a time-varying network of agents with edges representing interactions between them and (1) spots \"anomalous\" points in time at which many agents \"change\" their behavior in a way it deviates from the norm; and (2) attributes the detected anomaly to those agents that contribute to the \"change\" the most. Experiments on a large mobile phone network (of 2 million anonymous customers with 50 million interactions over a period of 6 months) shows that the \"change\"-points detected by our algorithm coincide with the social events and the festivals in our data.", "title": "" }, { "docid": "536e45f7130aa40625e3119523d2e1de", "text": "We consider the problem of Simultaneous Localization and Mapping (SLAM) from a Bayesian point of view using the Rao-Blackwellised Particle Filter (RBPF). We focus on the class of indoor mobile robots equipped with only a stereo vision sensor. Our goal is to construct dense metric maps of natural 3D point landmarks for large cyclic environments in the absence of accurate landmark position measurements and reliable motion estimates. Landmark estimates are derived from stereo vision and motion estimates are based on visual odometry. We distinguish between landmarks using the Scale Invariant Feature Transform (SIFT). Our work defers from current popular approaches that rely on reliable motion models derived from odometric hardware and accurate landmark measurements obtained with laser sensors. We present results that show that our model is a successful approach for vision-based SLAM, even in large environments. We validate our approach experimentally, producing the largest and most accurate vision-based map to date, while we identify the areas where future research should focus in order to further increase its accuracy and scalability to significantly larger", "title": "" } ]
scidocsrr
13deb0844c2cca96fbbec58be700238a
A non-cooperative differential game-based security model in fog computing
[ { "docid": "2bf42d8ceff931531ca7a04d82576101", "text": "Fog computing is new buzz word in computing world after cloud computing. This new computing paradigm could be seen as an extension to cloud computing. Main aim of fog computing is to reduce the burden on cloud by gathering workloads, services, applications and huge data to near network edge. In this survey paper, we will discuss main characteristics of the Fog that are; 1. Mobility, 2. Location awareness, 3. Low latency, 4. Huge number of nodes, 5. Extensive geographical distribution, 6. Various real time applications and we explore the advantages and motivation of Fog computing, and analyze its applications for IOT.", "title": "" } ]
[ { "docid": "91e130d562a6a317d5f2885fb161354d", "text": "In silico modeling is a crucial milestone in modern drug design and development. Although computer-aided approaches in this field are well-studied, the application of deep learning methods in this research area is at the beginning. In this work, we present an original deep neural network (DNN) architecture named RANC (Reinforced Adversarial Neural Computer) for the de novo design of novel small-molecule organic structures based on the generative adversarial network (GAN) paradigm and reinforcement learning (RL). As a generator RANC uses a differentiable neural computer (DNC), a category of neural networks, with increased generation capabilities due to the addition of an explicit memory bank, which can mitigate common problems found in adversarial settings. The comparative results have shown that RANC trained on the SMILES string representation of the molecules outperforms its first DNN-based counterpart ORGANIC by several metrics relevant to drug discovery: the number of unique structures, passing medicinal chemistry filters (MCFs), Muegge criteria, and high QED scores. RANC is able to generate structures that match the distributions of the key chemical features/descriptors (e.g., MW, logP, TPSA) and lengths of the SMILES strings in the training data set. Therefore, RANC can be reasonably regarded as a promising starting point to develop novel molecules with activity against different biological targets or pathways. In addition, this approach allows scientists to save time and covers a broad chemical space populated with novel and diverse compounds.", "title": "" }, { "docid": "71fe65e31364d831214e308d6ef7814d", "text": "As aggregators, online news portals face great challenges in continuously selecting a pool of candidate articles to be shown to their users. Typically, those candidate articles are recommended manually by platform editors from a much larger pool of articles aggregated from multiple sources. Such a hand-pick process is labor intensive and time-consuming. In this paper, we study the editor article selection behavior and propose a learning by demonstration system to automatically select a subset of articles from the large pool. Our data analysis shows that (i) editors' selection criteria are non-explicit, which are less based only on the keywords or topics, but more depend on the quality and attractiveness of the writing from the candidate article, which is hard to capture based on traditional bag-of-words article representation. And (ii) editors' article selection behaviors are dynamic: articles with different data distribution come into the pool everyday and the editors' preference varies, which are driven by some underlying periodic or occasional patterns. To address such problems, we propose a meta-attention model across multiple deep neural nets to (i) automatically catch the editors' underlying selection criteria via the automatic representation learning of each article and its interaction with the meta data and (ii) adaptively capture the change of such criteria via a hybrid attention model. The attention model strategically incorporates multiple prediction models, which are trained in previous days. The system has been deployed in a commercial article feed platform. A 9-day A/B testing has demonstrated the consistent superiority of our proposed model over several strong baselines.", "title": "" }, { "docid": "6c8151eee3fcfaec7da724c2a6899e8f", "text": "Classic work on interruptions by Zeigarnik showed that tasks that were interrupted were more likely to be recalled after a delay than tasks that were not interrupted. Much of the literature on interruptions has been devoted to examining this effect, although more recently interruptions have been used to choose between competing designs for interfaces to complex devices. However, none of this work looks at what makes some interruptions disruptive and some not. This series of experiments uses a novel computer-based adventure-game methodology to investigate the effects of the length of the interruption, the similarity of the interruption to the main task, and the complexity of processing demanded by the interruption. It is concluded that subjects make use of some form of nonarticulatory memory which is not affected by the length of the interruption. It is affected by processing similar material however, and by a complex mentalarithmetic task which makes large demands on working memory.", "title": "" }, { "docid": "58ea96e65ce2f767064a32b1e9f60338", "text": "We present an approach to the problem of real-time identification of vehicle motion models based on fitting, on a continuous basis, parametrized slip models to observed behavior. Our approach is unique in that we generate parametric models capturing the dynamics of systematic error (i.e. slip) and then predict trajectories for arbitrary inputs on arbitrary terrain. The integrated error dynamics are linearized with respect to the unknown parameters to produce an observer relating errors in predicted slip to errors in the parameters. An Extended Kalman filter is used to identify this model on-line. The filter forms innovations based on residual differences between the motion originally predicted using the present model and the motion ultimately experienced by the vehicle. Our results show that the models converge in a few seconds and they reduce prediction error for even benign maneuvers where errors might be expected to be small already. Results are presented for both a skid-steered and an Ackerman steer vehicle.", "title": "" }, { "docid": "ecd8393f05d2e30b488a5828c9a6944a", "text": "Understanding the changes in the brain which occur in the transition from normal to addictive behavior has major implications in public health. Here we postulate that while reward circuits (nucleus accumbens, amygdala), which have been central to theories of drug addiction, may be crucial to initiate drug self-administration, the addictive state also involves disruption of circuits involved with compulsive behaviors and with drive. We postulate that intermittent dopaminergic activation of reward circuits secondary to drug self-administration leads to dysfunction of the orbitofrontal cortex via the striato-thalamo-orbitofrontal circuit. This is supported by imaging studies showing that in drug abusers studied during protracted withdrawal, the orbitofrontal cortex is hypoactive in proportion to the levels of dopamine D2 receptors in the striatum. In contrast, when drug abusers are tested shortly after last cocaine use or during drug-induced craving, the orbitofrontal cortex is hypermetabolic in proportion to the intensity of the craving. Because the orbitofrontal cortex is involved with drive and with compulsive repetitive behaviors, its abnormal activation in the addicted subject could explain why compulsive drug self-administration occurs even with tolerance to the pleasurable drug effects and in the presence of adverse reactions. This model implies that pleasure per se is not enough to maintain compulsive drug administration in the drugaddicted subject and that drugs that could interfere with the activation of the striato-thalamo-orbitofrontal circuit could be beneficial in the treatment of drug addiction.", "title": "" }, { "docid": "0800bfff6569d6d4f3eb00fae0ea1c11", "text": "An 8-layer, 75 nm half-pitch, 3D stacked vertical-gate (VG) TFT BE-SONOS NAND Flash array is fabricated and characterized. We propose a buried-channel (n-type well) device to improve the read current of TFT NAND, and it also allows the junction-free structure which is particularly important for 3D stackable devices. Large self-boosting disturb-free memory window (6V) can be obtained in our device, and for the first time the “Z-interference” between adjacent vertical layers is studied. The proposed buried-channel VG NAND allows better X, Y pitch scaling and is a very attractive candidate for ultra high-density 3D stackable NAND Flash.", "title": "" }, { "docid": "24625cbc472bf376b44ac6e962696d0b", "text": "Although deep neural networks have made tremendous progress in the area of multimedia representation, training neural models requires a large amount of data and time. It is well known that utilizing trained models as initial weights often achieves lower training error than neural networks that are not pre-trained. A fine-tuning step helps to both reduce the computational cost and improve the performance. Therefore, sharing trained models has been very important for the rapid progress of research and development. In addition, trained models could be important assets for the owner(s) who trained them; hence, we regard trained models as intellectual property. In this paper, we propose a digital watermarking technology for ownership authorization of deep neural networks. First, we formulate a new problem: embedding watermarks into deep neural networks. We also define requirements, embedding situations, and attack types on watermarking in deep neural networks. Second, we propose a general framework for embedding a watermark in model parameters, using a parameter regularizer. Our approach does not impair the performance of networks into which a watermark is placed because the watermark is embedded while training the host network. Finally, we perform comprehensive experiments to reveal the potential of watermarking deep neural networks as the basis of this new research effort. We show that our framework can embed a watermark during the training of a deep neural network from scratch, and during fine-tuning and distilling, without impairing its performance. The embedded watermark does not disappear even after fine-tuning or parameter pruning; the watermark remains complete even after 65% of parameters are pruned.", "title": "" }, { "docid": "a51b57427c5204cb38483baa9389091f", "text": "Cross-laminated timber (CLT), a new generation of engineered wood product developed initially in Europe, has been gaining popularity in residential and non-residential applications in several countries. Numerous impressive lowand mid-rise buildings built around the world using CLT showcase the many advantages that this product can offer to the construction sector. This article provides basic information on the various attributes of CLT as a product and as structural system in general, and examples of buildings made of CLT panels. A road map for codes and standards implementation of CLT in North America is included, along with an indication of some of the obstacles that can be expected.", "title": "" }, { "docid": "defc7f4420ad99d410fa18c24b46ab24", "text": "To determine a reference range of fetal transverse cerebellar diameter in Brazilian population. This was a retrospective cross-sectional study with 3772 normal singleton pregnancies between 18 and 24 weeks of pregnancy. The transverse cerebellar diameter was measured on the axial plane of the fetal head at the level of the lateral ventricles, including the thalamus, cavum septum pellucidum, and third ventricle. To assess the correlation between transverse cerebellar diameter and gestational age, polynomial equations were calculated, with adjustments by the determination coefficient (R2). The mean of fetal transverse cerebellar diameter ranged from 18.49 ± 1.24 mm at 18 weeks to 25.86 ± 1.66 mm at 24 weeks of pregnancy. We observed a good correlation between transverse cerebellar diameter and gestational age, which was best represented by a linear equation: transverse cerebellar diameter: -6.21 + 1.307*gestational age (R2 = 0.707). We determined a reference range of fetal transverse cerebellar diameter for the second trimester of pregnancy in Brazilian population.", "title": "" }, { "docid": "5da453a1e40f1781804045f64462ea8e", "text": "Severe aphasia, adult left hemispherectomy, Gilles de la Tourette syndrome (GTS), and other neurological disorders have in common an increased use of swearwords. There are shared linguistic features in common across these language behaviors, as well as important differences. We explore the nature of swearing in normal human communication, and then compare the clinical presentations of selectively preserved, impaired and augmented swearing. These neurolinguistic observations, considered along with related neuroanatomical and neurochemical information, provide the basis for considering the neurobiological foundation of various types of swearing behaviors.", "title": "" }, { "docid": "a9baecb9470242c305942f7bc98494ab", "text": "This paper summaries the state-of-the-art of image quality assessment (IQA) and human visual system (HVS). IQA provides an objective index or real value to measure the quality of the specified image. Since human beings are the ultimate receivers of visual information in practical applications, the most reliable IQA is to build a computational model to mimic the HVS. According to the properties and cognitive mechanism of the HVS, the available HVS-based IQA methods can be divided into two categories, i.e., bionics methods and engineering methods. This paper briefly introduces the basic theories and development histories of the above two kinds of HVS-based IQA methods. Finally, some promising research issues are pointed out in the end of the paper.", "title": "" }, { "docid": "84b9601738c4df376b42d6f0f6190f53", "text": "Cloud Computing is one of the most important trend and newest area in the field of information technology in which resources (e.g. CPU and storage) can be leased and released by customers through the Internet in an on-demand basis. The adoption of Cloud Computing in Education and developing countries is real an opportunity. Although Cloud computing has gained popularity in Pakistan especially in education and industry, but its impact in Pakistan is still unexplored especially in Higher Education Department. Already published work investigated in respect of factors influencing on adoption of cloud computing but very few investigated said analysis in developing countries. The Higher Education Institutions (HEIs) of Punjab, Pakistan are still not focused to discover cloud adoption factors. In this study, we prepared cloud adoption model for Higher Education Institutions (HEIs) of Punjab, a survey was carried out from 900 students all over Punjab. The survey was designed based upon literature and after discussion and opinions of academicians. In this paper, 34 hypothesis were developed that affect the cloud computing adoption in HEIs and tested by using powerful statistical analysis tools i.e. SPSS and SmartPLS. Statistical findings shows that 84.44% of students voted in the favor of cloud computing adoption in their colleges, while 99% supported Reduce Cost as most important factor in cloud adoption.", "title": "" }, { "docid": "8df0970ccf314018874ed3f877ec607e", "text": "In graph-based simultaneous localization and mapping, the pose graph grows over time as the robot gathers information about the environment. An ever growing pose graph, however, prevents long-term mapping with mobile robots. In this paper, we address the problem of efficient information-theoretic compression of pose graphs. Our approach estimates the mutual information between the laser measurements and the map to discard the measurements that are expected to provide only a small amount of information. Our method subsequently marginalizes out the nodes from the pose graph that correspond to the discarded laser measurements. To maintain a sparse pose graph that allows for efficient map optimization, our approach applies an approximate marginalization technique that is based on Chow-Liu trees. Our contributions allow the robot to effectively restrict the size of the pose graph.Alternatively, the robot is able to maintain a pose graph that does not grow unless the robot explores previously unobserved parts of the environment. Real-world experiments demonstrate that our approach to pose graph compression is well suited for long-term mobile robot mapping.", "title": "" }, { "docid": "fa557c1eaaf516035909a8e38be3ec56", "text": "This paper presents a new buck–boost converter. Unlike the single-switch buck–boost converter, the proposed converter has low-voltage stresses on semiconductors. Moreover, although both the conventional two-switch buck–boost (TSBB) and the proposed converters have the same number of passive and active components, and the proposed converter can reduce the conduction loss as a result of having fewer conducting components. Therefore, the proposed converter obtained a higher efficiency than the TSBB converter. A 48-V output voltage and 150-W output power prototype was fabricated to verify the effectiveness of the proposed converter.", "title": "" }, { "docid": "dac4ee56923c850874f8c6199456a245", "text": "In this paper, we present a multi-modal dataset for obstacle detection in agriculture. The dataset comprises approximately 2 h of raw sensor data from a tractor-mounted sensor system in a grass mowing scenario in Denmark, October 2016. Sensing modalities include stereo camera, thermal camera, web camera, 360 ∘ camera, LiDAR and radar, while precise localization is available from fused IMU and GNSS. Both static and moving obstacles are present, including humans, mannequin dolls, rocks, barrels, buildings, vehicles and vegetation. All obstacles have ground truth object labels and geographic coordinates.", "title": "" }, { "docid": "4973ce25e2a638c3923eda62f92d98b2", "text": "About 20 ethnic groups reside in Mongolia. On the basis of genetic and anthropological studies, it is believed that Mongolians have played a pivotal role in the peopling of Central and East Asia. However, the genetic relationships among these ethnic groups have remained obscure, as have their detailed relationships with adjacent populations. We analyzed 16 binary and 17 STR polymorphisms of human Y chromosome in 669 individuals from nine populations, including four indigenous ethnic groups in Mongolia (Khalkh, Uriankhai, Zakhchin, and Khoton). Among these four Mongolian populations, the Khalkh, Uriankhai, and Zakhchin populations showed relatively close genetic affinities to each other and to Siberian populations, while the Khoton population showed a closer relationship to Central Asian populations than to even the other Mongolian populations. These findings suggest that the major Mongolian ethnic groups have a close genetic affinity to populations in northern East Asia, although the genetic link between Mongolia and Central Asia is not negligible.", "title": "" }, { "docid": "e8f7017704e943fb1ab3055a114490ef", "text": "Class imbalance is one of the challenging problems for machine learning algorithms. When learning from highly imbalanced data, most classifiers are overwhelmed by the majority class examples, so the false negative rate is always high. Although researchers have introduced many methods to deal with this problem, including resampling techniques and cost-sensitive learning (CSL), most of them focus on either of these techniques. This study presents two empirical methods that deal with class imbalance using both resampling and CSL. The first method combines and compares several sampling techniques with CSL using support vector machines (SVM). The second method proposes using CSL by optimizing the cost ratio (cost matrix) locally. Our experimental results on 18 imbalanced datasets from the UCI repository show that the first method can reduce the misclassification costs, and the second method can improve the classifier performance.", "title": "" }, { "docid": "c0484f3055d7e7db8dfea9d4483e1e06", "text": "Metastasis the spread of cancer cells to distant organs, is the main cause of death for cancer patients. Metastasis is often mediated by lymphatic vessels that invade the primary tumor, and an early sign of metastasis is the presence of cancer cells in the regional lymph node (the first lymph node colonized by metastasizing cancer cells from a primary tumor). Understanding the interplay between tumorigenesis and lymphangiogenesis (the formation of lymphatic vessels associated with tumor growth) will provide us with new insights into mechanisms that modulate metastatic spread. In the long term, these insights will help to define new molecular targets that could be used to block lymphatic vessel-mediated metastasis and increase patient survival. Here, we review the molecular mechanisms of embryonic lymphangiogenesis and those that are recapitulated in tumor lymphangiogenesis, with a view to identifying potential targets for therapies designed to suppress tumor lymphangiogenesis and hence metastasis.", "title": "" }, { "docid": "2f0d6b9bee323a75eea3d15a3cabaeb6", "text": "OBJECTIVE\nThis article reviews the mechanisms and pathophysiology of traumatic brain injury (TBI).\n\n\nMETHODS\nResearch on the pathophysiology of diffuse and focal TBI is reviewed with an emphasis on damage that occurs at the cellular level. The mechanisms of injury are discussed in detail including the factors and time course associated with mild to severe diffuse injury as well as the pathophysiology of focal injuries. Examples of electrophysiologic procedures consistent with recent theory and research evidence are presented.\n\n\nRESULTS\nAcceleration/deceleration (A/D) forces rarely cause shearing of nervous tissue, but instead, initiate a pathophysiologic process with a well defined temporal progression. The injury foci are considered to be diffuse trauma to white matter with damage occurring at the superficial layers of the brain, and extending inward as A/D forces increase. Focal injuries result in primary injuries to neurons and the surrounding cerebrovasculature, with secondary damage occurring due to ischemia and a cytotoxic cascade. A subset of electrophysiologic procedures consistent with current TBI research is briefly reviewed.\n\n\nCONCLUSIONS\nThe pathophysiology of TBI occurs over time, in a pattern consistent with the physics of injury. The development of electrophysiologic procedures designed to detect specific patterns of change related to TBI may be of most use to the neurophysiologist.\n\n\nSIGNIFICANCE\nThis article provides an up-to-date review of the mechanisms and pathophysiology of TBI and attempts to address misconceptions in the existing literature.", "title": "" } ]
scidocsrr
1832330ea64a4151afb33bb223fac395
Statistical Post-editing and Quality Estimation for Machine Translation Systems
[ { "docid": "afd00b4795637599f357a7018732922c", "text": "We present a new part-of-speech tagger that demonstrates the following ideas: (i) explicit use of both preceding and following tag contexts via a dependency network representation, (ii) broad use of lexical features, including jointly conditioning on multiple consecutive words, (iii) effective use of priors in conditional loglinear models, and (iv) fine-grained modeling of unknown word features. Using these ideas together, the resulting tagger gives a 97.24% accuracy on the Penn Treebank WSJ, an error reduction of 4.4% on the best previous single automatically learned tagging result.", "title": "" } ]
[ { "docid": "dbc66199d6873d990a8df18ce7adf01d", "text": "Facebook has rapidly become the most popular Social Networking Site (SNS) among faculty and students in higher education institutions in recent years. Due to the various interactive and collaborative features Facebook supports, it offers great opportunities for higher education institutions to support student engagement and improve different aspects of teaching and learning. To understand the social aspects of Facebook use among students and how they perceive using it for academic purposes, an exploratory survey has been distributed to 105 local and international students at a large public technology university in Malaysia. Results reveal consistent patterns of usage compared to what has been reported in literature reviews in relation to the intent of use and the current use for educational purposes. A comparison was conducted of male and female, international and local, postgraduate and undergraduate students respectively, using nonparametric tests. The results indicate that the students’ perception of using Facebook for academic purposes is not significantly related to students’ gender or students’ background; while it is significantly related to study level and students’ experience. Moreover, based on the overall results of the survey and literature reviews, the paper presents recommendations and suggestions for further research of social networking in a higher education context.", "title": "" }, { "docid": "ed73d3c3e2961e10ff5843ef1062d7fe", "text": "Barcodes have been long used for data storage. Detecting and locating barcodes in images of complex background is an essential yet challenging step in the process of automatic barcode reading. This work proposed an algorithm that localizes and segments two-dimensional quick response (QR) barcodes. The localization involved a convolutional neural network that could detect partial QR barcodes. Majority voting was then applied to determine barcode locations. Then image processing algorithms were implemented to segment barcodes from the background. Experimental results shows that the proposed approach was robust to detect QR barcodes with rotation and deformation.", "title": "" }, { "docid": "ee5670c36cf9037918ecd176dae3c881", "text": "This paper focuses on the motion control problem of an omnidirectional mobile robot. A new control method based on the inverse input-output linearized kinematic model is proposed. As the actuator saturation and actuator dynamics have important impacts on the robot performance, this control law takes into account these two aspects and guarantees the stability of the closed-loop control system. Real-world experiments with an omnidirectional middle-size RoboCup robot verifies the performance of this proposed control algorithm.", "title": "" }, { "docid": "82a1285063aadcebd386fac6cb5214f0", "text": "Programs that take highly-structured files as inputs normally process inputs in stages: syntax parsing, semantic checking, and application execution. Deep bugs are often hidden in the application execution stage, and it is non-trivial to automatically generate test inputs to trigger them. Mutation-based fuzzing generates test inputs by modifying well-formed seed inputs randomly or heuristically. Most inputs are rejected at the early syntax parsing stage. Differently, generation-based fuzzing generates inputs from a specification (e.g., grammar). They can quickly carry the fuzzing beyond the syntax parsing stage. However, most inputs fail to pass the semantic checking (e.g., violating semantic rules), which restricts their capability of discovering deep bugs. In this paper, we propose a novel data-driven seed generation approach, named Skyfire, which leverages the knowledge in the vast amount of existing samples to generate well-distributed seed inputs for fuzzing programs that process highly-structured inputs. Skyfire takes as inputs a corpus and a grammar, and consists of two steps. The first step of Skyfire learns a probabilistic context-sensitive grammar (PCSG) to specify both syntax features and semantic rules, and then the second step leverages the learned PCSG to generate seed inputs. We fed the collected samples and the inputs generated by Skyfire as seeds of AFL to fuzz several open-source XSLT and XML engines (i.e., Sablotron, libxslt, and libxml2). The results have demonstrated that Skyfire can generate well-distributed inputs and thus significantly improve the code coverage (i.e., 20% for line coverage and 15% for function coverage on average) and the bug-finding capability of fuzzers. We also used the inputs generated by Skyfire to fuzz the closed-source JavaScript and rendering engine of Internet Explorer 11. Altogether, we discovered 19 new memory corruption bugs (among which there are 16 new vulnerabilities and received 33.5k USD bug bounty rewards) and 32 denial-of-service bugs.", "title": "" }, { "docid": "3b1ad3d3b05cf4ec1241f2885719aedd", "text": "A specific training program emphasizing the neuromuscular recruitment of the plantar intrinsic foot muscles, colloquially referred to as \"short foot\" exercise (SFE) training, has been suggested as a means to dynamically support the medial longitudinal arch (MLA) during functional tasks. A single-group repeated measures pre- and post-intervention study design was utilized to determine if a 4-week intrinsic foot muscle training program would impact the amount of navicular drop (ND), increase the arch height index (AHI), improve performance during a unilateral functional reaching maneuver, or the qualitative assessment of the ability to hold the arch position in single limb stance position in an asymptomatic cohort. 21 asymptomatic subjects (42 feet) completed the 4-week SFE training program. Subject ND decreased by a mean of 1.8 mm at 4 weeks and 2.2 mm at 8 weeks (p < 0.05). AHI increased from 28 to 29% (p < 0.05). Intrinsic foot muscle performance during a static unilateral balancing activity improved from a grade of fair to good (p < 0.001) and subjects experienced a significant improvement during a functional balance and reach task in all directions with the exception of an anterior reach (p < 0.05). This study offers preliminary evidence to suggest that SFE training may have value in statically and dynamically supporting the MLA. Further research regarding the value of this exercise intervention in foot posture type or pathology specific patient populations is warranted.", "title": "" }, { "docid": "7a01ddcc25e25e64b231fcee2c8b96b3", "text": "In the following pages, I shall demonstrate that there is a psychological technique which makes it possible to interpret dreams, and that on the application of this technique, every dream will reveal itself as a psychological structure, full of significance, and one which may be assigned to a specific place in the psychic activities of the waking state. Further, I shall endeavour to elucidate the processes which underlie the strangeness and obscurity of dreams, and to deduce from these processes the nature of the psychic forces whose conflict or co-operation is responsible for our dreams.", "title": "" }, { "docid": "e805148f883204562e25a052d6b35505", "text": "In patients with chronic stroke, the primary motor cortex of the intact hemisphere (M1(intact hemisphere)) may influence functional recovery, possibly through transcallosal effects exerted over M1 in the lesioned hemisphere (M1(lesioned hemisphere)). Here, we studied interhemispheric inhibition (IHI) between M1(intact hemisphere) and M1(lesioned hemisphere) in the process of generation of a voluntary movement by the paretic hand in patients with chronic subcortical stroke and in healthy volunteers. IHI was evaluated in both hands preceding the onset of unilateral voluntary index finger movements (paretic hand in patients, right hand in controls) in a simple reaction time paradigm. IHI at rest and shortly after the Go signal were comparable in patients and controls. Closer to movement onset, IHI targeting the moving index finger turned into facilitation in controls but remained deep in patients, a finding that correlated with poor motor performance. These results document an abnormally high interhemispheric inhibitory drive from M1(intact hemisphere) to M1(lesioned hemisphere) in the process of generation of a voluntary movement by the paretic hand. It is conceivable that this abnormality could adversely influence motor recovery in some patients with subcortical stroke, an interpretation consistent with models of interhemispheric competition in motor and sensory systems.", "title": "" }, { "docid": "72fb6765b43f47abc129c073bfdcdba5", "text": "The General Data Protection Regulation (GDPR) is a European Union regulation that will replace the existing Data Protection Directive on 25 May 2018. The most significant change is a huge increase in the maximum fine that can be levied for breaches of the regulation. Yet fewer than half of UK companies are fully aware of GDPR—and a number of those who were preparing for it stopped doing so when the Brexit vote was announced. A last-minute rush to become compliant is therefore expected, and numerous companies are starting to offer advice, checklists and consultancy on how to comply with GDPR. In such an environment, artificial intelligence technologies ought to be able to assist by providing best advice; asking all and only the relevant questions; monitoring activities; and carrying out assessments. The paper considers four areas of GDPR compliance where rule based technologies and/or machine learning techniques may be relevant: Following compliance checklists and codes of conduct; Supporting risk assessments; Complying with the new regulations regarding technologies that perform automatic profiling; Complying with the new regulations concerning recognising and reporting breaches of security. It concludes that AI technology can support each of these four areas. The requirements that GDPR (or organisations that need to comply with GDPR) state for explanation and justification of reasoning imply that rule-based approaches are likely to be more helpful than machine learning approaches. However, there may be good business reasons to take a different approach in some circumstances.", "title": "" }, { "docid": "a95c840844cb869d546a372e9deb065a", "text": "Abstract—All currencies around the world look very different from each other. For instance, the size, color, and pattern of the paper are different. With the development of modern banking services, automatic methods for paper currency recognition become important in many applications like vending machines. One of the currency recognition architecture’s phases is Feature detection and description. There are many algorithms that are used for this phase, but they still have some disadvantages. This paper proposes a feature detection algorithm, which merges the advantages given in the current SIFT and SURF algorithms, which we call, Speeded up Robust ScaleInvariant Feature Transform (SR-SIFT) algorithm. Our proposed SRSIFT algorithm overcomes the problems of both the SIFT and SURF algorithms. The proposed algorithm aims to speed up the SIFT feature detection algorithm and keep it robust. Simulation results demonstrate that the proposed SR-SIFT algorithm decreases the average response time, especially in small and minimum number of best key points, increases the distribution of the number of best key points on the surface of the currency. Furthermore, the proposed algorithm increases the accuracy of the true best point distribution inside the currency edge than the other two algorithms.", "title": "" }, { "docid": "7ca1c9096c6176cb841ae7f0e7262cb7", "text": "“Industry 4.0” is recognized as the future of industrial production in which concepts as Smart Factory and Decentralized Decision Making are fundamental. This paper proposes a novel strategy to support decentralized decision, whilst identifying opportunities and challenges of Industry 4.0 contextualizing the potential that represents industrial digitalization and how technological advances can contribute for a new perspective on manufacturing production. It is analysed a set of barriers to the full implementation of Industry 4.0 vision, identifying areas in which decision support is vital. Then, for each of the identified areas, the authors propose a strategy, characterizing it together with the level of complexity that is involved in the different processes. The strategies proposed are derived from the needs of two of Industry 4.0 main characteristics: horizontal integration and vertical integration. For each case, decision approaches are proposed concerning the type of decision required (strategic, tactical, operational and real-time). Validation results are provided together with a discussion on the main challenges that might be an obstacle for a successful decision strategy.", "title": "" }, { "docid": "cca61271fe31513cb90c2ac7ecb0b708", "text": "This paper deals with the synthesis of fuzzy state feedback controller of induction motor with optimal performance. First, the Takagi-Sugeno (T-S) fuzzy model is employed to approximate a non linear system in the synchronous d-q frame rotating with electromagnetic field-oriented. Next, a fuzzy controller is designed to stabilise the induction motor and guaranteed a minimum disturbance attenuation level for the closed-loop system. The gains of fuzzy control are obtained by solving a set of Linear Matrix Inequality (LMI). Finally, simulation results are given to demonstrate the controller’s effectiveness. Keywords—Rejection disturbance, fuzzy modelling, open-loop control, Fuzzy feedback controller, fuzzy observer, Linear Matrix Inequality (LMI)", "title": "" }, { "docid": "d7de2d835ce5a9f973a41b6f70a41512", "text": "This study addresses generating counterfactual explanations with multimodal information. Our goal is not only to classify a video into a specific category, but also to provide explanations on why it is not predicted as part of a specific class with a combination of visual-linguistic information. Requirements that the expected output should satisfy are referred to as counterfactuality in this paper: (1) Compatibility of visual-linguistic explanations, and (2) Positiveness/negativeness for the specific positive/negative class. Exploiting a spatio-temporal region (tube) and an attribute as visual and linguistic explanations respectively, the explanation model is trained to predict the counterfactuality for possible combinations of multimodal information in a posthoc manner. The optimization problem, which appears during the training/inference process, can be efficiently solved by inserting a novel neural network layer, namely the maximum subpath layer. We demonstrated the effectiveness of this method by comparison with a baseline of the actionrecognition datasets extended for this task. Moreover, we provide information-theoretical insight into the proposed method.", "title": "" }, { "docid": "accbfd3c4caade25329a2a5743559320", "text": "PURPOSE\nThe purpose of this investigation was to assess the frequency of complications of third molar surgery, both intraoperatively and postoperatively, specifically for patients 25 years of age or older.\n\n\nMATERIALS AND METHODS\nThis prospective study evaluated 3,760 patients, 25 years of age or older, who were to undergo third molar surgery by oral and maxillofacial surgeons practicing in the United States. The predictor variables were categorized as demographic (age, gender), American Society of Anesthesiologists classification, chronic conditions and medical risk factors, and preoperative description of third molars (present or absent, type of impaction, abnormalities or association with pathology). Outcome variables were intraoperative and postoperative complications, as well as quality of life issues (days of work missed or normal activity curtailed). Frequencies for data collected were tabulated.\n\n\nRESULTS\nThe sample was provided by 63 surgeons, and was composed of 3,760 patients with 9,845 third molars who were 25 years of age or older, of which 8,333 third molars were removed. Alveolar osteitis was the most frequently encountered postoperative problem (0.2% to 12.7%). Postoperative inferior alveolar nerve anesthesia/paresthesia occurred with a frequency of 1.1% to 1.7%, while lingual nerve anesthesia/paresthesia was calculated as 0.3%. All other complications also occurred with a frequency of less than 1%.\n\n\nCONCLUSION\nThe findings of this study indicate that third molar surgery in patients 25 years of age or older is associated with minimal morbidity, a low incidence of postoperative complications, and minimal impact on the patients quality of life.", "title": "" }, { "docid": "047949b0dba35fb11f9f3b716893701d", "text": "Many state-of-the-art segmentation algorithms rely on Markov or Conditional Random Field models designed to enforce spatial and global consistency constraints. This is often accomplished by introducing additional latent variables to the model, which can greatly increase its complexity. As a result, estimating the model parameters or computing the best maximum a posteriori (MAP) assignment becomes a computationally expensive task. In a series of experiments on the PASCAL and the MSRC datasets, we were unable to find evidence of a significant performance increase attributed to the introduction of such constraints. On the contrary, we found that similar levels of performance can be achieved using a much simpler design that essentially ignores these constraints. This more simple approach makes use of the same local and global features to leverage evidence from the image, but instead directly biases the preferences of individual pixels. While our investigation does not prove that spatial and consistency constraints are not useful in principle, it points to the conclusion that they should be validated in a larger context.", "title": "" }, { "docid": "1fe147f8da415604adab04f74dddf819", "text": "Today, with the use of Internet, a huge volume of data been generated in the form of transactions, logs etc. As assessed, 90% of total volume of data generated since evaluation of Computers is from last 3 years only. It’s because of advancements in Data storage, global connectivity with Internet high speed, mobile applications usage and IoT. BigData Technologies aims at processing the BigData for deriving trend analysis and business usage from its BigData information. This paper highlights some of the security concerns that Hadoop implemented in its current version and need for some of the enhancements along with a new methodology such as Electronic Currency (BitCoin) and BlockChain functionality. And also emphasises on why and how BitCoin and BlockChain can fit in Hadoop Eco-Systems and their possible advantages and disadvantages. Especially, in validating and authorizing business transactions with some mathematical cryptographic techniques like hashcode with the help of BlockChain Miners.", "title": "" }, { "docid": "1e17455be47fd697a085c8006f5947e9", "text": "We present a simple, but surprisingly effective, method of self-training a twophase parser-reranker system using readily available unlabeled data. We show that this type of bootstrapping is possible for parsing when the bootstrapped parses are processed by a discriminative reranker. Our improved model achieves an f -score of 92.1%, an absolute 1.1% improvement (12% error reduction) over the previous best result for Wall Street Journal parsing. Finally, we provide some analysis to better understand the phenomenon.", "title": "" }, { "docid": "007791833b15bd3367c11bb17b7abf82", "text": "When speakers talk, they gesture. The goal of this review is to investigate the contribution that these gestures make to how we communicate and think. Gesture can play a role in communication and thought at many timespans. We explore, in turn, gesture's contribution to how language is produced and understood in the moment; its contribution to how we learn language and other cognitive skills; and its contribution to how language is created over generations, over childhood, and on the spot. We find that the gestures speakers produce when they talk are integral to communication and can be harnessed in a number of ways. (a) Gesture reflects speakers' thoughts, often their unspoken thoughts, and thus can serve as a window onto cognition. Encouraging speakers to gesture can thus provide another route for teachers, clinicians, interviewers, etc., to better understand their communication partners. (b) Gesture can change speakers' thoughts. Encouraging gesture thus has the potential to change how students, patients, witnesses, etc., think about a problem and, as a result, alter the course of learning, therapy, or an interchange. (c) Gesture provides building blocks that can be used to construct a language. By watching how children and adults who do not already have a language put those blocks together, we can observe the process of language creation. Our hands are with us at all times and thus provide researchers and learners with an ever-present tool for understanding how we talk and think.", "title": "" }, { "docid": "5ee544ed19ef78fa9212caea791ac4cf", "text": "This paper describes the ecosystem of R add-on packages deve lop d around the infrastructure provided by the packagearules. The packages provide comprehensive functionality for ana lyzing interesting patterns including frequent itemsets, associ ati n rules, frequent sequences and for building applications like associative classification. After di scussing the ecosystem’s design we illustrate the ease of mining and visualizing rules with a short example .", "title": "" }, { "docid": "9567d1018a7d0fcfb9616d522214f44c", "text": "We discuss a physical implementation of the Crystalline robot system. Crystalline robots consist of modules that can aggregate together to form distributed robot systems. Crystalline modules are actuated by expanding and contracting each unit. This actuation mechanism permits automated shape metamorphosis. We describe the Crystalline module concept and a physical implementation of a robot system with ten units. We describe experiments with this robot.", "title": "" }, { "docid": "cc5746a332cca808cc0e35328eecd993", "text": "This paper investigates the relationship between corporate social responsibility (CSR) and the economic performance of corporations. It first examines the theories that suggest a relationship between the two. To test these theories, measures of CSR performance and disclosure developed by the New Consumer Group were analysed against the (past, concurrent and subsequent to CSR performance period) economic performance of 56 large UK companies. Economic performance included: financial (return on capital employed, return on equity and gross profit to sales ratios); and capital market performance (systematic risk and excess market valuation). The results supported the conclusion that (past, concurrent and subsequent) economic performance is related to both CSR performance and disclosure. However, the relationships were weak and lacked an overall consistency. For example, past economic performance was found to partly explain variations in firms’ involvement in philanthropic activities. CSR disclosure was affected (positively) by both a firm’s CSR performance and its concurrent financial performance. Involvement in environmental protection activities was found to be negatively correlated with subsequent financial performance. Whereas, a firm’s policies regarding women’s positions seem to be more rewarding in terms of positive capital market responses (performance) in the subsequent period. Donations to the Conservative Party were found not to be related to companies’ (past, concurrent or subsequent) financial and/or capital performance. operation must fall within the guidelines set by society; and • businesses act as moral agents within", "title": "" } ]
scidocsrr
2daf96f01ee705dcac8519d1b3c4da67
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security
[ { "docid": "9168a52d3c92685251b564ae9c467679", "text": "Dynamic Searchable Symmetric Encryption (DSSE) enables a client to encrypt his document collection in a way that it is still searchable and efficiently updatable. However, all DSSE constructions that have been presented in the literature so far come with several problems: Either they leak a significant amount of information (e.g., hashes of the keywords contained in the updated document) or are inefficient in terms of space or search/update time (e.g., linear in the number of documents). In this paper we revisit the DSSE problem. We propose the first DSSE scheme that achieves the best of both worlds, i.e., both small leakage and efficiency. In particular, our DSSE scheme leaks significantly less information than any other previous DSSE construction and supports both updates and searches in sublinear time in the worst case, maintaining at the same time a data structure of only linear size. We finally provide an implementation of our construction, showing its practical efficiency.", "title": "" } ]
[ { "docid": "e730935b097cb4c4f36221d774d2e63a", "text": "This paper outlines key design principles of Scilla—an intermediatelevel language for verified smart contracts. Scilla provides a clean separation between the communication aspect of smart contracts on a blockchain, allowing for the rich interaction patterns, and a programming component, which enjoys principled semantics and is amenable to formal verification. Scilla is not meant to be a high-level programming language, and we are going to use it as a translation target for high-level languages, such as Solidity, for performing program analysis and verification, before further compilation to an executable bytecode. We describe the automata-based model of Scilla, present its programming component and show how contract definitions in terms of automata streamline the process of mechanised verification of their safety and temporal properties.", "title": "" }, { "docid": "83c87294c33601023fdd0624d2dacecc", "text": "In modern road surveys, hanging power cables are among the most commonly-found geometric features. These cables are catenary curves that are conventionally modelled with three parameters in 2D Cartesian space. With the advent and popularity of the mobile mapping system (MMS), the 3D point clouds of hanging power cables can be captured within a short period of time. These point clouds, similarly to those of planar features, can be used for feature-based self-calibration of the system assembly errors of an MMS. However, to achieve this, a well-defined 3D equation for the catenary curve is needed. This paper proposes three 3D catenary curve models, each having different parameters. The models are examined by least squares fitting of simulated data and real data captured with an MMS. The outcome of the fitting is investigated in terms of the residuals and correlation matrices. Among the proposed models, one of them could estimate the parameters accurately and without any extreme correlation between the variables. This model can also be applied to those transmission lines captured by airborne laser scanning or any other hanging cable-like objects.", "title": "" }, { "docid": "80114263a722c25125803c7c8ecebb91", "text": "features suggest that this patient is an atypical presentation of chemotherapy-induced acral erythema, sparing the classic palmar location. The suggestion for an overlapping spectrum of chemotherapyinduced toxic injury of the skin helps resolve the clinicopathological challenge of this case. Toxic erythema of chemotherapy describes a particular category of toxin-associated diseases, some of which are specific, eg, chemotherapyassociated neutrophilic hidradenitis, and others, such as the eruption presented, defy further classification. Although dermatologists will likely preserve some of their preferred appellations, the field of dermatology will benefit from including toxic erythema of chemotherapy within the conceptual framework of chemotherapy-associated dermatoses.", "title": "" }, { "docid": "6505cf8aa0202f31b980087159b5006b", "text": "Dermatophytes, a group of keratinophilic fungi thriving on the keratin substrate are the etiological agents responsible for causing cutaneous infections. Dermatophytosis is currently treated with the commercially available topical and oral antifungal agents in spite of the existing side effects. Treatment of these cutaneous infections with secondary metabolites produced by marine microorganisms is considered as a novel approach. For many years these organisms have been explored with the view of developing antibacterial, antifungal, antiviral, anticancer and antiparasitic drugs. Exploring the unexplored aspect of actinobacteria for developing antidermatophytic drugs is a novel attempt which needs further investigation.", "title": "" }, { "docid": "2710a25b3cf3caf5ebd5fb9f08c9e5e3", "text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.", "title": "" }, { "docid": "c38ace7b9e86549455440011153e686c", "text": "In the current fast-paced world, people tend to possess limited knowledge about things from the past. For example, some young users may not know that Walkman played similar function as iPod does nowadays. In this paper, we approach the temporal correspondence problem in which, given an input term (e.g., iPod) and the target time (e.g. 1980s), the task is to find the counterpart of the query that existed in the target time. We propose an approach that transforms word contexts across time based on their neural network representations. We then experimentally demonstrate the effectiveness of our method on the New York Times Annotated Corpus.", "title": "" }, { "docid": "e33d34d0fbc19dbee009134368e40758", "text": "Quantum metrology exploits quantum phenomena to improve the measurement sensitivity. Theoretical analysis shows that quantum measurement can break through the standard quantum limits and reach super sensitivity level. Quantum radar systems based on quantum measurement can fufill not only conventional target detection and recognition tasks but also capable of detecting and identifying the RF stealth platform and weapons systems. The theoretical basis, classification, physical realization of quantum radar is discussed comprehensively in this paper. And the technology state and open questions of quantum radars is reviewed at the end.", "title": "" }, { "docid": "b18a12bf56af7f24c5cc0ff985379b76", "text": "BACKGROUND\nThe use of mobile apps for health and well being promotion has grown exponentially in recent years. Yet, there is currently no app-quality assessment tool beyond \"star\"-ratings.\n\n\nOBJECTIVE\nThe objective of this study was to develop a reliable, multidimensional measure for trialling, classifying, and rating the quality of mobile health apps.\n\n\nMETHODS\nA literature search was conducted to identify articles containing explicit Web or app quality rating criteria published between January 2000 and January 2013. Existing criteria for the assessment of app quality were categorized by an expert panel to develop the new Mobile App Rating Scale (MARS) subscales, items, descriptors, and anchors. There were sixty well being apps that were randomly selected using an iTunes search for MARS rating. There were ten that were used to pilot the rating procedure, and the remaining 50 provided data on interrater reliability.\n\n\nRESULTS\nThere were 372 explicit criteria for assessing Web or app quality that were extracted from 25 published papers, conference proceedings, and Internet resources. There were five broad categories of criteria that were identified including four objective quality scales: engagement, functionality, aesthetics, and information quality; and one subjective quality scale; which were refined into the 23-item MARS. The MARS demonstrated excellent internal consistency (alpha = .90) and interrater reliability intraclass correlation coefficient (ICC = .79).\n\n\nCONCLUSIONS\nThe MARS is a simple, objective, and reliable tool for classifying and assessing the quality of mobile health apps. It can also be used to provide a checklist for the design and development of new high quality health apps.", "title": "" }, { "docid": "b89099e9b01a83368a1ebdb2f4394eba", "text": "Orangutans (Pongo pygmaeus and Pongo abelii) are semisolitary apes and, among the great apes, the most distantly related to humans. Raters assessed 152 orangutans on 48 personality descriptors; 140 of these orangutans were also rated on a subjective well-being questionnaire. Principal-components analysis yielded 5 reliable personality factors: Extraversion, Dominance, Neuroticism, Agreeableness, and Intellect. The authors found no factor analogous to human Conscientiousness. Among the orangutans rated on all 48 personality descriptors and the subjective well-being questionnaire, Extraversion, Agreeableness, and low Neuroticism were related to subjective well-being. These findings suggest that analogues of human, chimpanzee, and orangutan personality domains existed in a common ape ancestor.", "title": "" }, { "docid": "f152838edb23a40e895dea2e1ee709d1", "text": "We present two uncommon cases of adolescent girls with hair-thread strangulation of the labia minora. The first 14-year-old girl presented with a painful pedunculated labial lump (Fig. 1). The lesion was covered with exudate. She was examined under sedation and found a coil of long hair forming a tourniquet around a labial segment. Thread removal resulted to immediate relief from pain, and gradual return to normal appearance. Another 10-year-old girl presented with a similar labial swelling. The recent experience of the first case led us straight to the problem. A long hair-thread was found at the neck of the lesion. Hair removal resulted in settling of the pain. The labial swelling subsided in few days.", "title": "" }, { "docid": "a349a9313444cc29ea89d9fd45aed657", "text": "The event-related responses of 18 individuals were recorded while they were listening to 3 music clips of 6 s duration which were repeated 30 times each. The music clips differed in the level of their complex structure, induced mood, musical tempo and prominent frequency. They were taken from Mozart's sonata (K. 448), and Brahms' Hungarian dance (no. 5). The third clip was a simplified version of the theme taken from Haydn's symphony (no. 94) played by a computer synthesizer. Significant differences in induced event-related desynchronization between the 3 music clips were only observed in the lower-1 alpha band which is related to attentional processes. A similar pattern was observed for the coherence measures. While respondents listened to the Mozart clip, coherence in the lower alpha bands increased more, whereas in the gamma band a less pronounced increase was observed as compared with the Brahms and Haydn clips. The clustering of the three clips based on EEG measures distinguished between the Mozart clip on the one hand, and the Haydn and Brahms clips on the other, even though the Haydn and Brahms clips were at the opposite extremes with regard to the mood they induced in listeners, musical tempo, and complexity of structure. This would suggest that Mozart's music—with no regard to the level of induced mood, musical tempo and complexity—influences the level of arousal. It seems that modulations in the frequency domain of Mozart's sonata have the greatest influence on the reported neurophysiological activity.", "title": "" }, { "docid": "91f3268092606d2bd1698096e32c824f", "text": "Classic pipeline models for task-oriented dialogue system require explicit modeling the dialogue states and hand-crafted action spaces to query a domain-specific knowledge base. Conversely, sequence-to-sequence models learn to map dialogue history to the response in current turn without explicit knowledge base querying. In this work, we propose a novel framework that leverages the advantages of classic pipeline and sequence-to-sequence models. Our framework models a dialogue state as a fixed-size distributed representation and use this representation to query a knowledge base via an attention mechanism. Experiment on Stanford Multi-turn Multi-domain Taskoriented Dialogue Dataset shows that our framework significantly outperforms other sequenceto-sequence based baseline models on both automatic and human evaluation. Title and Abstract in Chinese 面向任务型对话中基于对话状态表示的序列到序列学习 面向任务型对话中,传统流水线模型要求对对话状态进行显式建模。这需要人工定义对 领域相关的知识库进行检索的动作空间。相反地,序列到序列模型可以直接学习从对话 历史到当前轮回复的一个映射,但其没有显式地进行知识库的检索。在本文中,我们提 出了一个结合传统流水线与序列到序列二者优点的模型。我们的模型将对话历史建模为 一组固定大小的分布式表示。基于这组表示,我们利用注意力机制对知识库进行检索。 在斯坦福多轮多领域对话数据集上的实验证明,我们的模型在自动评价与人工评价上优 于其他基于序列到序列的模型。", "title": "" }, { "docid": "68477e8a53020dd0b98014a6eab96255", "text": "This article reviews a diverse set of proposals for dual processing in higher cognition within largely disconnected literatures in cognitive and social psychology. All these theories have in common the distinction between cognitive processes that are fast, automatic, and unconscious and those that are slow, deliberative, and conscious. A number of authors have recently suggested that there may be two architecturally (and evolutionarily) distinct cognitive systems underlying these dual-process accounts. However, it emerges that (a) there are multiple kinds of implicit processes described by different theorists and (b) not all of the proposed attributes of the two kinds of processing can be sensibly mapped on to two systems as currently conceived. It is suggested that while some dual-process theories are concerned with parallel competing processes involving explicit and implicit knowledge systems, others are concerned with the influence of preconscious processes that contextualize and shape deliberative reasoning and decision-making.", "title": "" }, { "docid": "26d0f9ea9e939cd09d1572965127e030", "text": "The emergence of “Fake News” and misinformation via online news and social media has spurred an interest in computational tools to combat this phenomenon. In this paper we present a new “Related Fact Checks” service, which can help a reader critically evaluate an article and make a judgment on its veracity by bringing up fact checks that are relevant to the article. We describe the core technical problems that need to be solved in building a “Related Fact Checks” service, and present results from an evaluation of an implementation.", "title": "" }, { "docid": "b475ddb8c3ff32dfea5f51d054680bc3", "text": "An increasing price and demand for natural gas has made it possible to explore remote gas fields. Traditional offshore production platforms for natural gas have been exporting the partially processed natural gas to shore, where it is further processed to permit consumption by end-users. Such an approach is possible where the gas field is located within a reasonable distance from shore or from an existing gas pipeline network. However, much of the world’s gas reserves are found in remote offshore fields where transport via a pipeline is not feasible or is uneconomic to install and therefore, to date, has not been possible to explore. The development of floating production platforms and, on the receiving end, regasification platforms, have increased the possibilities to explore these fields and transport the liquefied gas in a more efficient form, i.e. liquefied natural gas (LNG), to the end user who in turn can readily import the gas. Floating production platforms and regasification platforms, collectively referred to as FLNG, imply a blend of technology from land-based LNG industry, offshore oil and gas industry and marine transport technology. Regulations and rules based on experience from these applications could become too conservative or not conservative enough when applied to a FLNG unit. Alignment with rules for conventional LNG carriers would be an advantage since this would increase the transparency and possibility for standardization in the building of floating LNG production vessels. The objective of this study is to identify the risks relevant to FLNG. The risks are compared to conventional LNG carriers and whether or not regulatory alignment possibilities exist. To identify the risks, a risk analysis was performed based on the principles of formal safety assessment methodology. To propose regulatory alignment possibilities, the risks found were also evaluated against the existing rules and regulations of Det Norske Veritas. The conclusion of the study is that the largest risk-contributing factor on an FLNG is the presence of processing, liquefaction or regasification equipment and for an LNG carrier it is collision, grounding and contact accidents. Experience from oil FPSOs could be used in the design of LNG FPSOs, and attention needs to be drawn to the additional requirements due to processing and storage of cryogenic liquid on board. FSRUs may follow either an approach for offshore rules or, if intended to follow a regular docking scheme, follow an approach for ship rules with additional issues addressed in classification notes.", "title": "" }, { "docid": "a494d6d9c8919ade3590ed7f6cf44451", "text": "Most algorithms commonly exploited for radar imaging are based on linear models that describe only direct scattering events from the targets in the investigated scene. This assumption is rarely verified in practical scenarios where the objects to be imaged interact with each other and with surrounding environment producing undesired multipath signals. These signals manifest in radar images as “ghosts\" that usually impair the reliable identification of the targets. The recent literature in the field is attempting to provide suitable techniques for multipath suppression from one side and from the other side is focusing on the exploitation of the additional information conveyed by multipath to improve target detection and localization. This work addresses the first problem with a specific focus on multipath ghosts caused by target-to-target interactions. In particular, the study is performed with regard to metallic scatterers by means of the linearized inverse scattering approach based on the physical optics (PO) approximation. A simple model is proposed in the case of point-like targets to gain insight into the ghosts problem so as to devise possible measurement and processing strategies for their mitigation. Finally, the effectiveness of these methods is assessed by reconstruction results obtained from full-wave synthetic data.", "title": "" }, { "docid": "6b7594aa4ace0f56884d970a9e254dc5", "text": "Recent work has explored the use of hidden Markov models for unsupervised discourse and conversation modeling, where each segment or block of text such as a message in a conversation is associated with a hidden state in a sequence. We extend this approach to allow each block of text to be a mixture of multiple classes. Under our model, the probability of a class in a text block is a log-linear function of the classes in the previous block. We show that this model performs well at predictive tasks on two conversation data sets, improving thread reconstruction accuracy by up to 15 percentage points over a standard HMM. Additionally, we show quantitatively that the induced word clusters correspond to speech acts more closely than baseline models.", "title": "" }, { "docid": "440b90f61bc7826c1165a1f3d306bd5e", "text": "Image descriptors based on activations of Convolutional Neural Networks (CNNs) have become dominant in image retrieval due to their discriminative power, compactness of representation, and search efficiency. Training of CNNs, either from scratch or fine-tuning, requires a large amount of annotated data, where a high quality of annotation is often crucial. In this work, we propose to fine-tune CNNs for image retrieval on a large collection of unordered images in a fully automated manner. Reconstructed 3D models obtained by the state-of-the-art retrieval and structure-from-motion methods guide the selection of the training data. We show that both hard-positive and hard-negative examples, selected by exploiting the geometry and the camera positions available from the 3D models, enhance the performance of particular-object retrieval. CNN descriptor whitening discriminatively learned from the same training data outperforms commonly used PCA whitening. We propose a novel trainable Generalized-Mean (GeM) pooling layer that generalizes max and average pooling and show that it boosts retrieval performance. Applying the proposed method to the VGG network achieves state-of-the-art performance on the standard benchmarks: Oxford Buildings, Paris, and Holidays datasets.", "title": "" }, { "docid": "18f530c400498658d73aba21f0ce984e", "text": "Anomaly and event detection has been studied widely for having many applications in fraud detection, network intrusion detection, detection of epidemic outbreaks, and so on. In this paper we propose an algorithm that operates on a time-varying network of agents with edges representing interactions between them and (1) spots \"anomalous\" points in time at which many agents \"change\" their behavior in a way it deviates from the norm; and (2) attributes the detected anomaly to those agents that contribute to the \"change\" the most. Experiments on a large mobile phone network (of 2 million anonymous customers with 50 million interactions over a period of 6 months) shows that the \"change\"-points detected by our algorithm coincide with the social events and the festivals in our data.", "title": "" }, { "docid": "11212d5474184c1dc549c8cadc023e43", "text": "Videoconferencing is going to become attractive for geo-graphically distributed team collaboration, specifically to avoid travelling and to increase flexibility. Against this background this paper presents a next generation system - a 3D videoconference providing immersive tele-presence and natural representation of all participants in a shared virtual meeting space to enhance quality of human-centred communication. This system is based on the principle of a shared virtual table environment, which guarantees correct eye contact and gesture reproduction. The key features of our system are presented and compared to other approaches like tele-cubicles. Furthermore the current system design and details of the real-time hardware and software concept are explained.", "title": "" } ]
scidocsrr
bedd771bc6d2a805c72aa585df3d7340
Reviewing CS1 exam question content
[ { "docid": "05c82f9599b431baa584dd1e6d7dfc3e", "text": "It is a common conception that CS1 is a very difficult course and that failure rates are high. However, until now there has only been anecdotal evidence for this claim. This article reports on a survey among institutions around the world regarding failure rates in introductory programming courses. The article describes the design of the survey and the results. The number of institutions answering the call for data was unfortunately rather low, so it is difficult to make firm conclusions. It is our hope that this article can be the starting point for a systematic collection of data in order to find solid proof of the actual failure and pass rates of CS1.", "title": "" } ]
[ { "docid": "9e1c3d4a8bbe211b85b19b38e39db28e", "text": "This paper presents a novel context-based scene recognition method that enables mobile robots to recognize previously observed topological places in known environments or categorize previously unseen places in new environments. We achieve this by introducing the Histogram of Oriented Uniform Patterns (HOUP), which provides strong discriminative power for place recognition, while offering a significant level of generalization for place categorization. HOUP descriptors are used for image representation within a subdivision framework, where the size and location of sub-regions are determined using an informative feature selection method based on kernel alignment. Further improvement is achieved by developing a similarity measure that accounts for perceptual aliasing to eliminate the effect of indistinctive but visually similar regions that are frequently present in outdoor and indoor scenes. An extensive set of experiments reveals the excellent performance of our method on challenging categorization and recognition tasks. Specifically, our proposed method outperforms the current state of the art on two place categorization datasets with 15 and 5 place categories, and two topological place recognition datasets, with 5 and 27 places.", "title": "" }, { "docid": "853edc6c6564920d0d2b69e0e2a63ad0", "text": "This study evaluates the environmental performance and discounted costs of the incineration and landfilling of municipal solid waste that is ready for the final disposal while accounting for existing waste diversion initiatives, using the life cycle assessment (LCA) methodology. Parameters such as changing waste generation quantities, diversion rates and waste composition were also considered. Two scenarios were assessed in this study on how to treat the waste that remains after diversion. The first scenario is the status quo, where the entire residual waste was landfilled whereas in the second scenario approximately 50% of the residual waste was incinerated while the remainder is landfilled. Electricity was produced in each scenario. Data from the City of Toronto was used to undertake this study. Results showed that the waste diversion initiatives were more effective in reducing the organic portion of the waste, in turn, reducing the net electricity production of the landfill while increasing the net electricity production of the incinerator. Therefore, the scenario that incorporated incineration performed better environmentally and contributed overall to a significant reduction in greenhouse gas emissions because of the displacement of power plant emissions; however, at a noticeably higher cost. Although landfilling proves to be the better financial option, it is for the shorter term. The landfill option would require the need of a replacement landfill much sooner. The financial and environmental effects of this expenditure have yet to be considered.", "title": "" }, { "docid": "fa855a3d92bf863c33b269383ddde081", "text": "A network supporting deep unsupervised learning is present d. The network is an autoencoder with lateral shortcut connections from the enc oder to decoder at each level of the hierarchy. The lateral shortcut connections al low the higher levels of the hierarchy to focus on abstract invariant features. Wher eas autoencoders are analogous to latent variable models with a single layer of st ochastic variables, the proposed network is analogous to hierarchical latent varia bles models. Learning combines denoising autoencoder and denoising sou rces separation frameworks. Each layer of the network contributes to the cos t function a term which measures the distance of the representations produce d by the encoder and the decoder. Since training signals originate from all leve ls of the network, all layers can learn efficiently even in deep networks. The speedup offered by cost terms from higher levels of the hi erarchy and the ability to learn invariant features are demonstrated in exp eriments.", "title": "" }, { "docid": "d42aaf5c7c4f7982c1630e7b95b0377a", "text": "In this paper we analyze our recent research on the use of document analysis techniques for metadata extraction from PDF papers. We describe a package that is designed to extract basic metadata from these documents. The package is used in combination with a digital library software suite to easily build personal digital libraries. The proposed software is based on a suitable combination of several techniques that include PDF parsing, low level document image processing, and layout analysis. In addition, we use the information gathered from a widely known citation database (DBLP) to assist the tool in the difficult task of author identification. The system is tested on some paper collections selected from recent conference proceedings.", "title": "" }, { "docid": "6c81b1fe36a591b3b86a5e912a8792c1", "text": "Mobile phones, sensors, patients, hospitals, researchers, providers and organizations are nowadays, generating huge amounts of healthcare data. The real challenge in healthcare systems is how to find, collect, analyze and manage information to make people's lives healthier and easier, by contributing not only to understand new diseases and therapies but also to predict outcomes at earlier stages and make real-time decisions. In this paper, we explain the potential benefits of big data to healthcare and explore how it improves treatment and empowers patients, providers and researchers. We also describe the ability of reality mining in collecting large amounts of data to understand people's habits, detect and predict outcomes, and illustrate the benefits of big data analytics through five effective new pathways that could be adopted to promote patients' health, enhance medicine, reduce cost and improve healthcare value and quality. We cover some big data solutions in healthcare and we shed light on implementations, such as Electronic Healthcare Record (HER) and Electronic Healthcare Predictive Analytics (e-HPA) in US hospitals. Furthermore, we complete the picture by highlighting some challenges that big data analytics faces in healthcare.", "title": "" }, { "docid": "073f129a34957b19c6d9af96c869b9ab", "text": "The stability of dc microgrids (MGs) depends on the control strategy adopted for each mode of operation. In an islanded operation mode, droop control is the basic method for bus voltage stabilization when there is no communication among the sources. In this paper, it is shown the consequences of droop implementation on the voltage stability of dc power systems, whose loads are active and nonlinear, e.g., constant power loads. The set of parallel sources and their corresponding transmission lines are modeled by an ideal voltage source in series with an equivalent resistance and inductance. This approximate model allows performing a nonlinear stability analysis to predict the system qualitative behavior due to the reduced number of differential equations. Additionally, nonlinear analysis provides analytical stability conditions as a function of the model parameters and it leads to a design guideline to build reliable (MGs) based on safe operating regions.", "title": "" }, { "docid": "f086fef6b9026a67e73cd6f892aa1c37", "text": "Shoulder girdle movement is critical for stabilizing and orientating the arm during daily activities. During robotic arm rehabilitation with stroke patients, the robot must assist movements of the shoulder girdle. Shoulder girdle movement is characterized by a highly nonlinear function of the humeral orientation, which is different for each person. Hence it is improper to use pre-calculated shoulder girdle movement. If an exoskeleton robot cannot mimic the patient's shoulder girdle movement well, the robot axes will not coincide with the patient's, which brings reduced range of motion (ROM) and discomfort to the patients. A number of exoskeleton robots have been developed to assist shoulder girdle movement. The shoulder mechanism of these robots, along with the advantages and disadvantages, are introduced. In this paper, a novel shoulder mechanism design of exoskeleton robot is proposed, which can fully mimic the patient's shoulder girdle movement in real time.", "title": "" }, { "docid": "fab33f2e32f4113c87e956e31674be58", "text": "We consider the problem of decomposing the total mutual information conveyed by a pair of predictor random variables about a target random variable into redundant, uniqueand synergistic contributions. We focus on the relationship be tween “redundant information” and the more familiar information theoretic notions of “common information.” Our main contri bution is an impossibility result. We show that for independent predictor random variables, any common information based measure of redundancy cannot induce a nonnegative decompositi on of the total mutual information. Interestingly, this entai ls that any reasonable measure of redundant information cannot be deri ved by optimization over a single random variable. Keywords—common and private information, synergy, redundancy, information lattice, sufficient statistic, partial information decomposition", "title": "" }, { "docid": "f128c1903831e9310d0ed179838d11d1", "text": "A partially corporate feeding waveguide located below the radiating waveguide is introduced to a waveguide slot array to enhance the bandwidth of gain. A PMC termination associated with the symmetry of the feeding waveguide as well as uniform excitation is newly proposed for realizing dense and uniform slot arrangement free of high sidelobes. To exploit the bandwidth of the feeding circuit, the 4 × 4-element subarray is also developed for wider bandwidth by using standing-wave excitation. A 16 × 16-element array with uniform excitation is fabricated in the E-band by diffusion bonding of laminated thin copper plates which has the advantages of high precision and high mass-productivity. The antenna gain of 32.4 dBi and the antenna efficiency of 83.0% are measured at the center frequency. The 1 dB-down gain bandwidth is no less than 9.0% and a wideband characteristic is achieved.", "title": "" }, { "docid": "71da7722f6ce892261134bd60ca93ab7", "text": "Semantically annotated data, using markup languages like RDFa and Microdata, has become more and more publicly available in the Web, especially in the area of e-commerce. Thus, a large amount of structured product descriptions are freely available and can be used for various applications, such as product search or recommendation. However, little efforts have been made to analyze the categories of the available product descriptions. Although some products have an explicit category assigned, the categorization schemes vary a lot, as the products originate from thousands of different sites. This heterogeneity makes the use of supervised methods, which have been proposed by most previous works, hard to apply. Therefore, in this paper, we explain how distantly supervised approaches can be used to exploit the heterogeneous category information in order to map the products to set of target categories from an existing product catalogue. Our results show that, even though this task is by far not trivial, we can reach almost 56% accuracy for classifying products into 37 categories.", "title": "" }, { "docid": "6afe0360f074304e9da9c100e28e9528", "text": "Unikernels are a promising alternative for application deployment in cloud platforms. They comprise a very small footprint, providing better deployment agility and portability among virtualization platforms. Similar to Linux containers, they are a lightweight alternative for deploying distributed applications based on microservices. However, the comparison of unikernels with other virtualization options regarding the concurrent provisioning of instances, as in the case of microservices-based applications, is still lacking. This paper provides an evaluation of KVM (Virtual Machines), Docker (Containers), and OSv (Unikernel), when provisioning multiple instances concurrently in an OpenStack cloud platform. We confirmed that OSv outperforms the other options and also identified opportunities for optimization.", "title": "" }, { "docid": "6ed5198b9b0364f41675b938ec86456f", "text": "Artificial intelligence (AI) will have many profound societal effects It promises potential benefits (and may also pose risks) in education, defense, business, law, and science In this article we explore how AI is likely to affect employment and the distribution of income. We argue that AI will indeed reduce drastically the need fol human toil We also note that some people fear the automation of work hy machines and the resulting unemployment Yet, since the majority of us probably would rather use our time for activities other than our present jobs, we ought thus to greet the work-eliminating consequences of AI enthusiastically The paper discusses two reasons, one economic and one psychological, for this paradoxical apprehension We conclude with a discussion of problems of moving toward the kind of economy that will he enahled by developments in AI ARTIFICIAL INTELLIGENCE [Al] and other developments in computer science are giving birth to a dramatically different class of machinesPmachines that can perform tasks requiring reasoning, judgment, and perception that previously could be done only by humans. Will these I am grateful for the helpful comments provided by many people Specifically I would like to acknowledge the advice teceived from Sandra Cook and Victor Walling of SRI, Wassily Leontief and Faye Duchin of the New York University Institute for Economic Analysis, Margaret Boden of The University of Sussex, Henry Levin and Charles Holloway of Stanford University, James Albus of the National Bureau of Standards, and Peter Hart of Syntelligence Herbert Simon, of CarnegieMellon Univetsity, wrote me extensive criticisms and rebuttals of my arguments Robert Solow of MIT was quite skeptical of my premises, but conceded nevertheless that my conclusions could possibly follow from them if certain other economic conditions were satisfied. Save1 Kliachko of SRI improved my composition and also referred me to a prescient article by Keynes (Keynes, 1933) who, a half-century ago, predicted an end to toil within one hundred years machines reduce the need for human toil and thus cause unemployment? There are two opposing views in response to this question Some claim that AI is not really very different from other technologies that have supported automation and increased productivitytechnologies such as mechanical engineering, ele&onics, control engineering, and operations rcsearch. Like them, AI may also lead ultimately to an expanding economy with a concomitant expansion of employment opportunities. At worst, according to this view, thcrc will be some, perhaps even substantial shifts in the types of jobs, but certainly no overall reduction in the total number of jobs. In my opinion, however, such an out,come is based on an overly conservative appraisal of the real potential of artificial intelligence. Others accept a rather strong hypothesis with regard to AI-one that sets AI far apart from previous labor-saving technologies. Quite simply, this hypothesis affirms that anything people can do, AI can do as well. Cert,ainly AI has not yet achieved human-level performance in many important functions, but many AI scientists believe that artificial intelligence inevitably will equal and surpass human mental abilities-if not in twenty years, then surely in fifty. The main conclusion of this view of AI is that, even if AI does create more work, this work can also be performed by AI devices without necessarily implying more jobs for humans Of course, the mcrc fact that some work can be performed automatically does not make it inevitable that it, will be. Automation depends on many factorsPeconomic, political, and social. The major economic parameter would seem to be the relative cost of having either people or machines execute a given task (at a specified rate and level of quality) In THE AI MAGAZINE Summer 1984 5 AI Magazine Volume 5 Number 2 (1984) (© AAAI)", "title": "" }, { "docid": "9b628f47102a0eee67e469e223ece837", "text": "We present a method for automatically extracting from a running system an indexable signature that distills the essential characteristic from a system state and that can be subjected to automated clustering and similarity-based retrieval to identify when an observed system state is similar to a previously-observed state. This allows operators to identify and quantify the frequency of recurrent problems, to leverage previous diagnostic efforts, and to establish whether problems seen at different installations of the same site are similar or distinct. We show that the naive approach to constructing these signatures based on simply recording the actual ``raw'' values of collected measurements is ineffective, leading us to a more sophisticated approach based on statistical modeling and inference. Our method requires only that the system's metric of merit (such as average transaction response time) as well as a collection of lower-level operational metrics be collected, as is done by existing commercial monitoring tools. Even if the traces have no annotations of prior diagnoses of observed incidents (as is typical), our technique successfully clusters system states corresponding to similar problems, allowing diagnosticians to identify recurring problems and to characterize the ``syndrome'' of a group of problems. We validate our approach on both synthetic traces and several weeks of production traces from a customer-facing geoplexed 24 x 7 system; in the latter case, our approach identified a recurring problem that had required extensive manual diagnosis, and also aided the operators in correcting a previous misdiagnosis of a different problem.", "title": "" }, { "docid": "7121d534b758bab829e1db31d0ce2e43", "text": "With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this is still an open research problem, and previous research in predicting malicious events only looked at binary outcomes (eg. whether an attack would happen or not), but not at the specific steps that an attacker would undertake. To fill this gap we present Tiresias xspace, a system that leverages Recurrent Neural Networks (RNNs) to predict future events on a machine, based on previous observations. We test Tiresias xspace on a dataset of 3.4 billion security events collected from a commercial intrusion prevention system, and show that our approach is effective in predicting the next event that will occur on a machine with a precision of up to 0.93. We also show that the models learned by Tiresias xspace are reasonably stable over time, and provide a mechanism that can identify sudden drops in precision and trigger a retraining of the system. Finally, we show that the long-term memory typical of RNNs is key in performing event prediction, rendering simpler methods not up to the task.", "title": "" }, { "docid": "aef76a8375b12f4c38391093640a704a", "text": "Storytelling plays an important role in human life, from everyday communication to entertainment. Interactive storytelling (IS) offers its audience an opportunity to actively participate in the story being told, particularly in video games. Managing the narrative experience of the player is a complex process that involves choices, authorial goals and constraints of a given story setting (e.g., a fairy tale). Over the last several decades, a number of experience managers using artificial intelligence (AI) methods such as planning and constraint satisfaction have been developed. In this paper, we extend existing work and propose a new AI experience manager called player-specific automated storytelling (PAST), which uses automated planning to satisfy the story setting and authorial constraints in response to the player's actions. Out of the possible stories algorithmically generated by the planner in response, the one that is expected to suit the player's style best is selected. To do so, we employ automated player modeling. We evaluate PAST within a video-game domain with user studies and discuss the effects of combining planning and player modeling on the player's perception of agency.", "title": "" }, { "docid": "9086d8f1d9a0978df0bd93cff4bce20a", "text": "Australian government enterprises have shown a significant interest in the cloud technology-enabled enterprise transformation. Australian government suggests the whole-of-a-government strategy to cloud adoption. The challenge is how best to realise this cloud adoption strategy for the cloud technology-enabled enterprise transformation? The cloud adoption strategy realisation requires concrete guidelines and a comprehensive practical framework. This paper proposes the use of an agile enterprise architecture framework to developing and implementing the adaptive cloud technology-enabled enterprise architecture in the Australian government context. The results of this paper indicate that a holistic strategic agile enterprise architecture approach seems appropriate to support the strategic whole-of-a-government approach to cloud technology-enabled government enterprise transformation.", "title": "" }, { "docid": "e0a314eb1fe221791bc08094d0c04862", "text": "The present study was undertaken with the objective to explore the influence of the five personality dimensions on the information seeking behaviour of the students in higher educational institutions. Information seeking behaviour is defined as the sum total of all those activities that are usually undertaken by the students of higher education to collect, utilize and process any kind of information needed for their studies. Data has been collected from 600 university students of the three broad disciplines of studies from the Universities of Eastern part of India (West Bengal). The tools used for the study were General Information schedule (GIS), Information Seeking Behaviour Inventory (ISBI) and NEO-FFI Personality Inventory. Product moment correlation has been worked out between the scores in ISBI and those in NEO-FFI Personality Inventory. The findings indicated that the five personality traits are significantly correlated to all the dimensions of information seeking behaviour of the university students.", "title": "" }, { "docid": "a4ed5c4f87e4faa357f0dec0f5c0e354", "text": "In today's information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing secret information has been an ever existing concern for the data communication experts. Cryptography and steganography are the most widely used techniques to overcome this threat. Cryptography involves converting a message text into an unreadable cipher. On the other hand, steganography embeds message into a cover media and hides its existence. Both these techniques provide some security of data neither of them alone is secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder attacks. Although these techniques are often combined together to achieve higher levels of security but still there is a need of a highly secure system to transfer information over any communication media minimizing the threat of intrusion. In this paper we propose an advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding. This system will be more secure than any other these techniques alone and also as compared to steganography and cryptography combined systems Visual steganography is one of the most secure forms of steganography available today. It is most commonly implemented in image files. However embedding data into image changes its color frequencies in a predictable way. To overcome this predictability, we propose the concept of multiple cryptography where the data will be encrypted into a cipher and the cipher will be hidden into a multimedia image file in encrypted format. We shall use traditional cryptographic techniques to achieve data encryption and visual steganography algorithms will be used to hide the encrypted data.", "title": "" }, { "docid": "7ba3f13f58c4b25cc425b706022c1f2b", "text": "Detecting pedestrian has been arguably addressed as a special topic beyond general object detection. Although recent deep learning object detectors such as Fast/Faster R-CNN [1,2] have shown excellent performance for general object detection, they have limited success for detecting pedestrian, and previous leading pedestrian detectors were in general hybrid methods combining hand-crafted and deep convolutional features. In this paper, we investigate issues involving Faster R-CNN [2] for pedestrian detection. We discover that the Region Proposal Network (RPN) in Faster R-CNN indeed performs well as a stand-alone pedestrian detector, but surprisingly, the downstream classifier degrades the results. We argue that two reasons account for the unsatisfactory accuracy: (i) insufficient resolution of feature maps for handling small instances, and (ii) lack of any bootstrapping strategy for mining hard negative examples. Driven by these observations, we propose a very simple but effective baseline for pedestrian detection, using an RPN followed by boosted forests on shared, high-resolution convolutional feature maps. We comprehensively evaluate this method on several benchmarks (Caltech, INRIA, ETH, and KITTI), presenting competitive accuracy and good speed. Code will be made publicly available.", "title": "" }, { "docid": "953d1b368a4a6fb09e6b34e3131d7804", "text": "The activation of the Deep Convolutional Neural Networks hidden layers can be successfully used as features, often referred as Deep Features, in generic visual similarity search tasks. Recently scientists have shown that permutation-based methods offer very good performance in indexing and supporting approximate similarity search on large database of objects. Permutation-based approaches represent metric objects as sequences (permutations) of reference objects, chosen from a predefined set of data. However, associating objects with permutations might have a high cost due to the distance calculation between the data objects and the reference objects. In this work, we propose a new approach to generate permutations at a very low computational cost, when objects to be indexed are Deep Features. We show that the permutations generated using the proposed method are more effective than those obtained using pivot selection criteria specifically developed for permutation-based methods.", "title": "" } ]
scidocsrr
968c51f919d208fb9969e8c42918ad0b
Sentence Alignment using Unfolding Recursive Autoencoders
[ { "docid": "3b0b6075cf6cdb13d592b54b85cdf4af", "text": "We address the problem of sentence alignment for monolingual corpora, a phenomenon distinct from alignment in parallel corpora. Aligning large comparable corpora automatically would provide a valuable resource for learning of text-totext rewriting rules. We incorporate context into the search for an optimal alignment in two complementary ways: learning rules for matching paragraphs using topic structure and further refining the matching through local alignment to find good sentence pairs. Evaluation shows that our alignment method outperforms state-of-the-art systems developed for the same task.", "title": "" }, { "docid": "062c970a14ac0715ccf96cee464a4fec", "text": "A goal of statistical language modeling is to learn the joint probability function of sequences of words in a language. This is intrinsically difficult because of the curse of dimensionality: a word sequence on which the model will be tested is likely to be different from all the word sequences seen during training. Traditional but very successful approaches based on n-grams obtain generalization by concatenating very short overlapping sequences seen in the training set. We propose to fight the curse of dimensionality by learning a distributed representation for words which allows each training sentence to inform the model about an exponential number of semantically neighboring sentences. The model learns simultaneously (1) a distributed representation for each word along with (2) the probability function for word sequences, expressed in terms of these representations. Generalization is obtained because a sequence of words that has never been seen before gets high probability if it is made of words that are similar (in the sense of having a nearby representation) to words forming an already seen sentence. Training such large models (with millions of parameters) within a reasonable time is itself a significant challenge. We report on experiments using neural networks for the probability function, showing on two text corpora that the proposed approach significantly improves on state-of-the-art n-gram models, and that the proposed approach allows to take advantage of longer contexts.", "title": "" } ]
[ { "docid": "ce08ae4dd55bb290900f49010e219513", "text": "BACKGROUND\nCurrent antipsychotics have only a limited effect on 2 core aspects of schizophrenia: negative symptoms and cognitive deficits. Minocycline is a second-generation tetracycline that has a beneficial effect in various neurologic disorders. Recent findings in animal models and human case reports suggest its potential for the treatment of schizophrenia. These findings may be linked to the effect of minocycline on the glutamatergic system, through inhibition of nitric oxide synthase and blocking of nitric oxide-induced neurotoxicity. Other proposed mechanisms of action include effects of minocycline on the dopaminergic system and its inhibition of microglial activation.\n\n\nOBJECTIVE\nTo examine the efficacy of minocycline as an add-on treatment for alleviating negative and cognitive symptoms in early-phase schizophrenia.\n\n\nMETHOD\nA longitudinal double-blind, randomized, placebo-controlled design was used, and patients were followed for 6 months from August 2003 to March 2007. Seventy early-phase schizophrenia patients (according to DSM-IV) were recruited and 54 were randomly allocated in a 2:1 ratio to minocycline 200 mg/d. All patients had been initiated on treatment with an atypical antipsychotic < or = 14 days prior to study entry (risperidone, olanzapine, quetiapine, or clozapine; 200-600 mg/d chlorpromazine-equivalent doses). Clinical, cognitive, and functional assessments were conducted, with the Scale for the Assessment of Negative Symptoms (SANS) as the primary outcome measure.\n\n\nRESULTS\nMinocycline was well tolerated, with few adverse events. It showed a beneficial effect on negative symptoms and general outcome (evident in SANS, Clinical Global Impressions scale). A similar pattern was found for cognitive functioning, mainly in executive functions (working memory, cognitive shifting, and cognitive planning).\n\n\nCONCLUSIONS\nMinocycline treatment was associated with improvement in negative symptoms and executive functioning, both related to frontal-lobe activity. Overall, the findings support the beneficial effect of minocycline add-on therapy in early-phase schizophrenia.\n\n\nTRIAL REGISTRATION\nclinicaltrials.gov Identifier: NCT00733057.", "title": "" }, { "docid": "2ed433611f5e953760d7d501c977470b", "text": "Creating multiple layout alternatives for graphical user interfaces to accommodate different screen orientations for mobile devices is labor intensive. Here, we investigate how such layout alternatives can be generated automatically from an initial layout. Providing good layout alternatives can inspire developers in their design work and support them to create adaptive layouts. We performed an analysis of layout alternatives in existing apps and identified common realworld layout transformation patterns. Based on these patterns we developed a prototype that generates landscape and portrait layout alternatives for an initial layout. In general, there is a very large number of possibilities of how widgets can be rearranged. For this reason we developed a classification method to identify and evaluate “good” layout alternatives automatically. From this set of “good” layout alternatives, designers can choose suitable layouts for their applications. In a questionnaire study we verified that our method generates layout alternatives that appear well structured and are easy to use.", "title": "" }, { "docid": "a88dc240c7cbb2570c1fc7c22a813ef3", "text": "The Acropolis of Athens is one of the most prestigious ancient monuments in the world, attracting daily many visitors, and therefore its structural integrity is of paramount importance. During the last decade an accelerographic array has been installed at the Archaeological Site, in order to monitor the seismic response of the Acropolis Hill and the dynamic behaviour of the monuments (including the Circuit Wall), while several optical fibre sensors have been attached at a middle-vertical section of the Wall. In this study, indicative real time recordings of strain and acceleration on the Wall and the Hill with the use of optical fibre sensors and accelerographs, respectively, are presented and discussed. The records aim to investigate the static and dynamic behaviour – distress of the Wall and the Acropolis Hill, taking also into account the prevailing geological conditions. The optical fibre technology, the location of the sensors, as well as the installation methodology applied is also presented. Emphasis is given to the application of real time instrumental monitoring which can be used as a valuable tool to predict potential structural", "title": "" }, { "docid": "df2f425b5f4c4ad9db16a8d9dc8286ee", "text": "Radiofrequency Identification (RFID) tags are ever increasing in use, from the monitoring of components to the tracking of produce or livestock during processing & production. They are also widely used in the touch-less technologies seen today in store and payment cards and banking services. With this there has been the ever increasing need to reduce the power required to activate the RFID tag, while maximizing the read range. In addition there is a need to reduce the size of the RFID tags, which are typically embedded in labels and/or cards, in order to make them discreet. In order to maximize read ranges, one needs to ideally match the impedance of the RFID tag antenna to the chip utilized in the tag & ensure that for a particular reader that a minimum threshold power is achieved to activate the tag chip at the required operating frequencies. In this work, we look at the modelling of a physical RFID tag used in a store card and its read ranges obtained from literature, and make comparisons of the model simulations to physical test data. In addition, we take the validated model and find an optimal tag antenna design for a particular application with both size and manufacturing constraints.", "title": "" }, { "docid": "703696ca3af2a485ac34f88494210007", "text": "Cells navigate environments, communicate and build complex patterns by initiating gene expression in response to specific signals. Engineers seek to harness this capability to program cells to perform tasks or create chemicals and materials that match the complexity seen in nature. This Review describes new tools that aid the construction of genetic circuits. Circuit dynamics can be influenced by the choice of regulators and changed with expression 'tuning knobs'. We collate the failure modes encountered when assembling circuits, quantify their impact on performance and review mitigation efforts. Finally, we discuss the constraints that arise from circuits having to operate within a living cell. Collectively, better tools, well-characterized parts and a comprehensive understanding of how to compose circuits are leading to a breakthrough in the ability to program living cells for advanced applications, from living therapeutics to the atomic manufacturing of functional materials.", "title": "" }, { "docid": "b79575908a84a015c8a83d35c63e4f06", "text": "This study examines the relation between stress and illness among bus drivers in a large American city. Several factors are identified that predict stress-related ill health for this occupational group. Canonical correlation techniques are used to combine daily work stress and recent stressful life events into a single life/work stress variate. Likewise, somatic symptoms and serious illness reports are combined into a single canonical illness variate. This procedure simplifies the analysis of multiple stress and illness indicators and also permits the statistical control of potential contaminating influences on stress and illness measures (eg, neuroticism). Discriminant function analysis identified four variables that differentiate bus drivers who get ill under high stress (N = 137) from those who remain healthy under stress (N = 137). Highly stressed and ill bus drivers use more avoidance coping behaviors, report more illness in their family medical histories, are low in the disposition of \"personality hardiness,\" and are also low in social assets. The derived stepwise discriminant function correctly classified 71% of cases in an independent \"hold-out\" sample. These results suggest fruitful areas of attention for health promotion and stress management programs in the public transit industry.", "title": "" }, { "docid": "aee2fa15c3ed5beb9b9161db8fec2a47", "text": "With the proliferation of MOOCs (Massive Open Online Courses) providers, like Coursera, edX, FutureLearn, UniCampus.ro, NOVAMOOC.uvt.ro or MOOC.ro, it’s a real challenge to find the best learning resource. MOOCBuddy – a MOOC recommender system as a chatbot for Facebook Messenger, based on user’s social media profile and interests, could be a solution. MOOCBuddy is looking like the big trend of 2016, based on the Messenger Platform launched by Facebook in the mid of April 2016. Author", "title": "" }, { "docid": "2ecbaf6755e049d3afe4634ed7ed1c4d", "text": "We present a modular and extensible approach to integrate noisy measurements from multiple heterogeneous sensors that yield either absolute or relative observations at different and varying time intervals, and to provide smooth and globally consistent estimates of position in real time for autonomous flight. We describe the development of algorithms and software architecture for a new 1.9kg MAV platform equipped with an IMU, laser scanner, stereo cameras, pressure altimeter, magnetometer, and a GPS receiver, in which the state estimation and control are performed onboard on an Intel NUC 3rd generation i3 processor. We illustrate the robustness of our framework in large-scale, indoor-outdoor autonomous aerial navigation experiments involving traversals of over 440 meters at average speeds of 1.5 m/s with winds around 10 mph while entering and exiting buildings.", "title": "" }, { "docid": "1f3e2c432a5f2f1a6ffcf892c6a06eab", "text": "In this letter, we study the Ramanujan Sums (RS) transform by means of matrix multiplication. The RS are orthogonal in nature and therefore offer excellent energy conservation capability. The 1-D and 2-D forward RS transforms are easy to calculate, but their inverse transforms are not defined in the literature for non-even function <formula formulatype=\"inline\"><tex Notation=\"TeX\">$ ({\\rm mod}~ {\\rm M}) $</tex></formula>. We solved this problem by using matrix multiplication in this letter.", "title": "" }, { "docid": "08c26880862b09e81acc1cd99904fded", "text": "Efficient use of high speed hardware requires operating system components be customized to the application workload. Our general purpose operating systems are ill-suited for this task. We present EbbRT, a framework for constructing per-application library operating systems for cloud applications. The primary objective of EbbRT is to enable highperformance in a tractable and maintainable fashion. This paper describes the design and implementation of EbbRT, and evaluates its ability to improve the performance of common cloud applications. The evaluation of the EbbRT prototype demonstrates memcached, run within a VM, can outperform memcached run on an unvirtualized Linux. The prototype evaluation also demonstrates an 14% performance improvement of a V8 JavaScript engine benchmark, and a node.js webserver that achieves a 50% reduction in 99th percentile latency compared to it run on Linux.", "title": "" }, { "docid": "3b1bee4155fb7fa948f342e246a6c1c0", "text": "This article presents a number of complementary algorithms for detecting faults on-board operating robots, where a fault is defined as a deviation from expected behavior. The algorithms focus on faults that cannot directly be detected from current sensor values but require inference from a sequence of time-varying sensor values. Each algorithm provides an independent improvement over the basic approach. These improvements are not mutually exclusive, and the algorithms may be combined to suit the application domain. All the approaches presented require dynamic models representing the behavior of each of the fault and operational states. These models can be built from analytical models of the robot dynamics, data from simulation, or from the real robot. All the approaches presented detect faults from a finite number of known fault conditions, although there may potentially be a very large number of these faults.", "title": "" }, { "docid": "513dd1327dffdb43998e7f4e85fdc817", "text": "This paper proposes an elastic spatial verification method for Instance Search, particularly for dealing with non-planar and non-rigid queries exhibiting complex spatial transformations. Different from existing models that map keypoints between images based on a linear transformation (e.g., affine, homography), our model exploits the topological arrangement of keypoints to address the non-linear spatial transformations that are extremely common in real life situations. In particular, we propose a novel technique to elastically verify the topological spatial consistency with the triangulated graph through a “sketch-and-match” scheme. The spatial topology configuration, emphasizing relative positioning rather than absolute coordinates, is first sketched by a triangulated graph, whose edges essentially capture the topological layout of the corresponding keypoints. Next, the spatial consistency is efficiently estimated as the number of common edges between the triangulated graphs. Compared to the existing methods, our technique is much more effective in modeling the complex spatial transformations of non-planar and non-rigid instances, while being compatible to instances with simple linear transformations. Moreover, our method is by nature more robust in spatial verification by considering the locations, rather than the local geometry of keypoints, which are sensitive to motions and viewpoint changes. We evaluate our method extensively on three years of TRECVID datasets, as well as our own dataset MQA, showing large improvement over other methods for the task of Instance Search.", "title": "" }, { "docid": "41fe7d2febb05a48daf69b4a41c77251", "text": "Multi-objective evolutionary algorithms for the construction of neural ensembles is a relatively new area of research. We recently proposed an ensemble learning algorithm called DIVACE (DIVerse and ACcurate Ensemble learning algorithm). It was shown that DIVACE tries to find an optimal trade-off between diversity and accuracy as it searches for an ensemble for some particular pattern recognition task by treating these two objectives explicitly separately. A detailed discussion of DIVACE together with further experimental studies form the essence of this paper. A new diversity measure which we call Pairwise Failure Crediting (PFC) is proposed. This measure forms one of the two evolutionary pressures being exerted explicitly in DIVACE. Experiments with this diversity measure as well as comparisons with previously studied approaches are hence considered. Detailed analysis of the results show that DIVACE, as a concept, has promise. Mathematical Subject Classification (2000): 68T05, 68Q32, 68Q10.", "title": "" }, { "docid": "2d0121e8509d09571d8973da784440a5", "text": "In this paper we examine the suitability of BPMN for business process modelling, using the Workflow Patterns as an evaluation framework. The Workflow Patterns are a collection of patterns developed for assessing control-flow, data and resource capabilities in the area of Process Aware Information Systems (PAIS). In doing so, we provide a comprehensive evaluation of the capabilities of BPMN, and its strengths and weaknesses when utilised for business process modelling. The analysis provided for BPMN is part of a larger effort aiming at an unbiased and vendor-independent survey of the suitability and the expressive power of some mainstream process modelling languages. It is a sequel to an analysis series where languages like BPEL and UML 2.0 A.D are evaluated.", "title": "" }, { "docid": "c117a5fc0118f3ea6c576bb334759d59", "text": "While neural networks have achieved high accuracy on standard image classification benchmarks, their accuracy drops to nearly zero in the presence of small adversarial perturbations to test inputs. Defenses based on regularization and adversarial training have been proposed, but often followed by new, stronger attacks that defeat these defenses. Can we somehow end this arms race? In this work, we study this problem for neural networks with one hidden layer. We first propose a method based on a semidefinite relaxation that outputs a certificate that for a given network and test input, no attack can force the error to exceed a certain value. Second, as this certificate is differentiable, we jointly optimize it with the network parameters, providing an adaptive regularizer that encourages robustness against all attacks. On MNIST, our approach produces a network and a certificate that no attack that perturbs each pixel by at most = 0.1 can cause more than 35% test error.", "title": "" }, { "docid": "8e70aea51194dba675d4c3e88ee6b9ad", "text": "Trust is central to all transactions and yet economists rarely discuss the notion. It is treated rather as background environment, present whenever called upon, a sort of ever-ready lubricant that permits voluntary participation in production and exchange. In the standard model of a market economy it is taken for granted that consumers meet their budget constraints: they are not allowed to spend more than their wealth. Moreover, they always deliver the goods and services they said they would. But the model is silent on the rectitude of such agents. We are not told if they are persons of honour, conditioned by their upbringing always to meet the obligations they have chosen to undertake, or if there is a background agency which enforces contracts, credibly threatening to mete out punishment if obligations are not fulfilled a punishment sufficiently stiff to deter consumers from ever failing to fulfil them. The same assumptions are made for producers. To be sure, the standard model can be extended to allow for bankruptcy in the face of an uncertain future. One must suppose that there is a special additional loss to becoming bankrupt a loss of honour when honour matters, social and economic ostracism, a term in a debtors’ prison, and so forth. Otherwise, a person may take silly risks or, to make a more subtle point, take insufficient care in managing his affairs, but claim that he ran into genuine bad luck, that it was Mother Nature’s fault and not his own lack of ability or zeal.", "title": "" }, { "docid": "45849edd3c46d92300707c38d0f39a7a", "text": "Skin cancer is one of the most common malignancies in fair skin population. It can be divided in two main classes: melanoma and non-melanoma skin cancer. This means that pigmented and, also, non-pigmented skin lesions might raise an important risk. Due to the fact that melanoma is more aggressive, pigmented skin lesions gained more attention in terms of automatic diagnosis. One of the most important steps in this procedure is to correctly identify the skin lesion in an image (acquired with a dermoscope or a standard camera). Based on the accurate identification of the lesion, specific automatic algorithms for cancer diagnosis can be developed. In this paper we propose and evaluate an artificial intelligence method for pigmented and non-pigmented lesion segmentation. The method uses generative adversarial neural networks. The network was trained and tested on a large set of images acquired with smartphone cameras. The results show that approximately 92% of the lesions are correctly identified on the test set.", "title": "" }, { "docid": "89189f434e7ffd2110048d43955566de", "text": "This paper describes two techniques for designing phase-frequency detectors (PFDs) with higher operating frequencies (periods of less than 8x the delay of a fan-out-4 inverter (FO-4)) and faster frequency acquisition. Prototypes designed in 0.25-µm CMOS process exhibit operating frequencies of 1.25 GHz ( = 1/(8 ċ FO-4) ) and 1.5 GHz ( = 1/(6.7 ċ FO-4) ) for two techniques respectively whereas a conventional PFD operates < 1 GHz ( = 1/(10 ċ FO-4) ). The two proposed PFDs achieve a capture range of 1.7x and 1.2x the conventional design.", "title": "" }, { "docid": "a0605a35164bba33c4e74c5a1bf997fa", "text": "Most of the research on text categorization has focused on classifying text documents into a set of categories with no structural relationships among them (flat classification). However, in many information repositories documents are organized in a hierarchy of categories to support a thematic search by browsing topics of interests. The consideration of the hierarchical relationship among categories opens several additional issues in the development of methods for automated document classification. Questions concern the representation of documents, the learning process, the classification process and the evaluation criteria of experimental results. They are systematically investigated in this paper, whose main contribution is a general hierarchical text categorization framework where the hierarchy of categories is involved in all phases of automated document classification, namely feature selection, learning and classification of a new document. An automated threshold determination method for classification scores is embedded in the proposed framework. It can be applied to any classifier that returns a degree of membership of a document to a category. In this work three learning methods are considered for the construction of document classifiers, namely centroid-based, naïve Bayes and SVM. The proposed framework has been implemented in the system WebClassIII and has been tested on three datasets (Yahoo, DMOZ, RCV1) which present a variety of situations in terms of hierarchical structure. Experimental results are reported and several conclusions are drawn on the comparison of the flat vs. the hierarchical approach as well as on the comparison of different hierarchical classifiers. The paper concludes with a review of related work and a discussion of previous findings vs. our findings.", "title": "" }, { "docid": "29d98961d0ecde875bedcd4cfcb72026", "text": "The claim that we have a moral obligation, where a choice can be made, to bring to birth the 'best' child possible, has been highly controversial for a number of decades. More recently Savulescu has labelled this claim the Principle of Procreative Beneficence. It has been argued that this Principle is problematic in both its reasoning and its implications, most notably in that it places lower moral value on the disabled. Relentless criticism of this proposed moral obligation, however, has been unable, thus far, to discredit this Principle convincingly and as a result its influence shows no sign of abating. I will argue that while criticisms of the implications and detail of the reasoning behind it are well founded, they are unlikely to produce an argument that will ultimately discredit the obligation that the Principle of Procreative Beneficence represents. I believe that what is needed finally and convincingly to reveal the fallacy of this Principle is a critique of its ultimate theoretical foundation, the notion of impersonal harm. In this paper I argue that while the notion of impersonal harm is intuitively very appealing, its plausibility is based entirely on this intuitive appeal and not on sound moral reasoning. I show that there is another plausible explanation for our intuitive response and I believe that this, in conjunction with the other theoretical criticisms that I and others have levelled at this Principle, shows that the Principle of Procreative Beneficence should be rejected.", "title": "" } ]
scidocsrr
39bab4f77ae27b7d60f132efac4d0499
How to use attribute-based encryption to implement role-based access control in the cloud
[ { "docid": "d4ee96388ca88c0a5d2a364f826dea91", "text": "Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and medium-sized enterprises with limited budgets, they can achieve cost savings and productivity enhancements by using cloud-based services to manage projects, to make collaborations, and the like. However, allowing cloud service providers (CSPs), which are not in the same trusted domains as enterprise users, to take care of confidential data, may raise potential security and privacy issues. To keep the sensitive user data confidential against untrusted CSPs, a natural way is to apply cryptographic approaches, by disclosing decryption keys only to authorized users. However, when enterprise users outsource confidential data for sharing on cloud servers, the adopted encryption system should not only support fine-grained access control, but also provide high performance, full delegation, and scalability, so as to best serve the needs of accessing data anytime and anywhere, delegating within enterprises, and achieving a dynamic set of users. In this paper, we propose a scheme to help enterprises to efficiently share confidential data on cloud servers. We achieve this goal by first combining the hierarchical identity-based encryption (HIBE) system and the ciphertext-policy attribute-based encryption (CP-ABE) system, and then making a performance-expressivity tradeoff, finally applying proxy re-encryption and lazy re-encryption to our scheme.", "title": "" } ]
[ { "docid": "f9f0241c02486f6760951d3ac33cc861", "text": "Clinical evidence indicates that swallowing, a vital function, may be impaired in sleep. To address this issue, we elicited swallows in awake and sleeping adult cats by injecting water through a nasopharyngeal tube. Our results indicate that swallowing occurs not only in non-rapid eye movement (NREM) sleep, but also in rapid eye movement (REM) sleep. In NREM sleep, the injections often caused arousal followed by swallowing, but, in the majority of cases, swallowing occurred in NREM sleep before arousal. These swallows in NREM sleep were entirely comparable to swallows in wakefulness. In contrast, the injections in REM sleep were less likely to cause arousal, and the swallows occurred as hypotonic events. Furthermore, apneas were sometimes elicited by the injections in REM sleep, and there was repetitive swallowing upon arousal. These results suggest that the hypotonic swallows of REM sleep were ineffective.", "title": "" }, { "docid": "747df95d08e6e5b1802dacf4e84b6642", "text": "One of the key requirement of many schemes is that of random numbers. Sequence of random numbers are used at several stages of a standard cryptographic protocol. A simple example is of a Vernam cipher, where a string of random numbers is added to massage string to generate the encrypted code. It is represented as C = M ⊕ K where M is the message, K is the key and C is the ciphertext. It has been mathematically shown that this simple scheme is unbreakable is key K as long as M and is used only once. For a good cryptosystem, the security of the cryptosystem is not be based on keeping the algorithm secret but solely on keeping the key secret. The quality and unpredictability of secret data is critical to securing communication by modern cryptographic techniques. Generation of such data for cryptographic purposes typically requires an unpredictable physical source of random data. In this manuscript, we present studies of three different methods for producing random number. We have tested them by studying its frequency, correlation as well as using the test suit from NIST.", "title": "" }, { "docid": "0dc3c4e628053e8f7c32c0074a2d1a59", "text": "Understanding inter-character relationships is fundamental for understanding character intentions and goals in a narrative. This paper addresses unsupervised modeling of relationships between characters. We model relationships as dynamic phenomenon, represented as evolving sequences of latent states empirically learned from data. Unlike most previous work our approach is completely unsupervised. This enables data-driven inference of inter-character relationship types beyond simple sentiment polarities, by incorporating lexical and semantic representations, and leveraging large quantities of raw text. We present three models based on rich sets of linguistic features that capture various cues about relationships. We compare these models with existing techniques and also demonstrate that relationship categories learned by our model are semantically coherent.", "title": "" }, { "docid": "8d56aa104cb727bd6496cac89f1f7d9c", "text": "In this paper, we develop a semantic annotation technique for location-based social networks to automatically annotate all places with category tags which are a crucial prerequisite for location search, recommendation services, or data cleaning. Our annotation algorithm learns a binary support vector machine (SVM) classifier for each tag in the tag space to support multi-label classification. Based on the check-in behavior of users, we extract features of places from i) explicit patterns (EP) of individual places and ii) implicit relatedness (IR) among similar places. The features extracted from EP are summarized from all check-ins at a specific place. The features from IR are derived by building a novel network of related places (NRP) where similar places are linked by virtual edges. Upon NRP, we determine the probability of a category tag for each place by exploring the relatedness of places. Finally, we conduct a comprehensive experimental study based on a real dataset collected from a location-based social network, Whrrl. The results demonstrate the suitability of our approach and show the strength of taking both EP and IR into account in feature extraction.", "title": "" }, { "docid": "b61c9f69a2fffcf2c3753e51a3bbfa14", "text": "..............................................................................................................ix 1 Interoperability .............................................................................................1 1.", "title": "" }, { "docid": "db215a998da127466bcb5e80b750cbbb", "text": "to design and build computing systems capable of running themselves, adjusting to varying circumstances, and preparing their resources to handle most efficiently the workloads we put upon them. These autonomic systems must anticipate needs and allow users to concentrate on what they want to accomplish rather than figuring how to rig the computing systems to get them there. Abtract The performance of current shared-memory multiprocessor systems depends on both the efficient utilization of all the architectural elements in the system (processors, memory, etc), and the workload characteristics. This Thesis has the main goal of improving the execution of workloads of parallel applications in shared-memory multiprocessor systems by using real performance information in the processor scheduling. In multiprocessor systems, users request for resources (processors) to execute their parallel applications. The Operating System is responsible to distribute the available physical resources among parallel applications in the more convenient way for both the system and the application performance. It is a typical practice of users in multiprocessor systems to request for a high number of processors assuming that the higher the processor request, the higher the number of processors allocated, and the higher the speedup achieved by their applications. However, this is not true. Parallel applications have different characteristics with respect to their scalability. Their speedup also depends on run-time parameters such as the influence of the rest of running applications. This Thesis proposes that the system should not base its decisions on the users requests only, but the system must decide, or adjust, its decisions based on real performance information calculated at run-time. The performance of parallel applications is an information that the system can dynamically measure without introducing a significant penalty in the application execution time. Using this information, the processor allocation can be decided, or modified, being robust to incorrect processor requests given by users. We also propose that the system use a target efficiency to ensure the efficient use of processors. This target efficiency is a system parameter and can be dynamically decided as a function of the characteristics of running applications or the number of queued applications. We also propose to coordinate the different scheduling levels that operate in the processor scheduling: the run-time scheduler, the processor scheduler, and the queueing system. We propose to establish an interface between levels to send and receive information, and to take scheduling decisions considering the information provided by the rest of …", "title": "" }, { "docid": "6870efe6d9607c82992b5015a5336969", "text": "We present an approach to automatically classify clinical text at a sentence level. We are using deep convolutional neural networks to represent complex features. We train the network on a dataset providing a broad categorization of health information. Through a detailed evaluation, we demonstrate that our method outperforms several approaches widely used in natural language processing tasks by about 15%.", "title": "" }, { "docid": "fa7682dc85d868e57527fdb3124b309c", "text": "The seminal 2003 paper by Cosley, Lab, Albert, Konstan, and Reidl, demonstrated the susceptibility of recommender systems to rating biases. To facilitate browsing and selection, almost all recommender systems display average ratings before accepting ratings from users which has been shown to bias ratings. This effect is called Social Inuence Bias (SIB); the tendency to conform to the perceived \\norm\" in a community. We propose a methodology to 1) learn, 2) analyze, and 3) mitigate the effect of SIB in recommender systems. In the Learning phase, we build a baseline dataset by allowing users to rate twice: before and after seeing the average rating. In the Analysis phase, we apply a new non-parametric significance test based on the Wilcoxon statistic to test whether the data is consistent with SIB. If significant, we propose a Mitigation phase using polynomial regression and the Bayesian Information Criterion (BIC) to predict unbiased ratings. We evaluate our approach on a dataset of 9390 ratings from the California Report Card (CRC), a rating-based system designed to encourage political engagement. We found statistically significant evidence of SIB. Mitigating models were able to predict changed ratings with a normalized RMSE of 12.8% and reduce bias by 76.3%. The CRC, our data, and experimental code are available at: http://californiareportcard.org/data/", "title": "" }, { "docid": "447b689d9c7c2a6b71baf2fac2fa2a4f", "text": "Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract Various routing protocols, including Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (ISIS), explicitly allow \"Equal-Cost Multipath\" (ECMP) routing. Some router implementations also allow equal-cost multipath usage with RIP and other routing protocols. The effect of multipath routing on a forwarder is that the forwarder potentially has several next-hops for any given destination and must use some method to choose which next-hop should be used for a given data packet.", "title": "" }, { "docid": "d8b0ef94385d1379baeb499622253a02", "text": "Mining association rules associates events that took place together. In market basket analysis, these discovered rules associate items purchased together. Items that are not part of a transaction are not considered. In other words, typical association rules do not take into account items that are part of the domain but that are not together part of a transaction. Association rules are based on frequencies and count the transactions where items occur together. However, counting absences of items is prohibitive if the number of possible items is very large, which is typically the case. Nonetheless, knowing the relationship between the absence of an item and the presence of another can be very important in some applications. These rules are called negative association rules. We review current approaches for mining negative association rules and we discuss limitations and future research directions.", "title": "" }, { "docid": "81c2fca06af30c27e74267dbccd84080", "text": "Instability and variability of Deep Reinforcement Learning (DRL) algorithms tend to adversely affect their performance. Averaged-DQN is a simple extension to the DQN algorithm, based on averaging previously learned Q-values estimates, which leads to a more stable training procedure and improved performance by reducing approximation error variance in the target values. To understand the effect of the algorithm, we examine the source of value function estimation errors and provide an analytical comparison within a simplified model. We further present experiments on the Arcade Learning Environment benchmark that demonstrate significantly improved stability and performance due to the proposed extension.", "title": "" }, { "docid": "92e186ba05566110020ed92df960f3d5", "text": "From just a glance, humans can make rich predictions about the future state of a wide range of physical systems. On the other hand, modern approaches from engineering, robotics, and graphics are often restricted to narrow domains and require direct measurements of the underlying states. We introduce the Visual Interaction Network, a general-purpose model for learning the dynamics of a physical system from raw visual observations. Our model consists of a perceptual front-end based on convolutional neural networks and a dynamics predictor based on interaction networks. Through joint training, the perceptual front-end learns to parse a dynamic visual scene into a set of factored latent object representations. The dynamics predictor learns to roll these states forward in time by computing their interactions and dynamics, producing a predicted physical trajectory of arbitrary length. We found that from just six input video frames the Visual Interaction Network can generate accurate future trajectories of hundreds of time steps on a wide range of physical systems. Our model can also be applied to scenes with invisible objects, inferring their future states from their effects on the visible objects, and can implicitly infer the unknown mass of objects. Our results demonstrate that the perceptual module and the object-based dynamics predictor module can induce factored latent representations that support accurate dynamical predictions. This work opens new opportunities for model-based decision-making and planning from raw sensory observations in complex physical environments.", "title": "" }, { "docid": "766b18cdae33d729d21d6f1b2b038091", "text": "1.1 Terminology Intercultural communication or communication between people of different cultural backgrounds has always been and will probably remain an important precondition of human co-existance on earth. The purpose of this paper is to provide a framework of factors thatare important in intercultural communication within a general model of human, primarily linguistic, communication. The term intercultural is chosen over the largely synonymousterm cross-cultural because it is linked to language use such as “interdisciplinary”, that is cooperation between people with different scientific backgrounds. Perhaps the term also has somewhat fewer connotations than crosscultural. It is not cultures that communicate, whatever that might imply, but people (and possibly social institutions) with different cultural backgrounds that do. In general, the term”cross-cultural” is probably best used for comparisons between cultures (”crosscultural comparison”).", "title": "" }, { "docid": "4c3b4a6c173a40327c2db17772cbd242", "text": "We reproduce four Twitter sentiment classification approaches that participated in previous SemEval editions with diverse feature sets. The reproduced approaches are combined in an ensemble, averaging the individual classifiers’ confidence scores for the three classes (positive, neutral, negative) and deciding sentiment polarity based on these averages. The experimental evaluation on SemEval data shows our re-implementations to slightly outperform their respective originals. Moreover, not too surprisingly, the ensemble of the reproduced approaches serves as a strong baseline in the current edition where it is top-ranked on the 2015 test set.", "title": "" }, { "docid": "1d56b3aa89484e3b25557880ec239930", "text": "We present an FPGA accelerator for the Non-uniform Fast Fourier Transform, which is a technique to reconstruct images from arbitrarily sampled data. We accelerate the compute-intensive interpolation step of the NuFFT Gridding algorithm by implementing it on an FPGA. In order to ensure efficient memory performance, we present a novel FPGA implementation for Geometric Tiling based sorting of the arbitrary samples. The convolution is then performed by a novel Data Translation architecture which is composed of a multi-port local memory, dynamic coordinate-generator and a plug-and-play kernel pipeline. Our implementation is in single-precision floating point and has been ported onto the BEE3 platform. Experimental results show that our FPGA implementation can generate fairly high performance without sacrificing flexibility for various data-sizes and kernel functions. We demonstrate up to 8X speedup and up to 27 times higher performance-per-watt over a comparable CPU implementation and up to 20% higher performance-per-watt when compared to a relevant GPU implementation.", "title": "" }, { "docid": "1d88a06a34beff2c3e926a6d24f70036", "text": "Graph-based clustering methods perform clustering on a fixed input data graph. If this initial construction is of low quality then the resulting clustering may also be of low quality. Moreover, existing graph-based clustering methods require post-processing on the data graph to extract the clustering indicators. We address both of these drawbacks by allowing the data graph itself to be adjusted as part of the clustering procedure. In particular, our Constrained Laplacian Rank (CLR) method learns a graph with exactly k connected components (where k is the number of clusters). We develop two versions of this method, based upon the L1-norm and the L2-norm, which yield two new graph-based clustering objectives. We derive optimization algorithms to solve these objectives. Experimental results on synthetic datasets and real-world benchmark datasets exhibit the effectiveness of this new graph-based clustering method. Introduction State-of-the art clustering methods are often based on graphical representations of the relationships among data points. For example, spectral clustering (Ng, Jordan, and Weiss 2001), normalized cut (Shi and Malik 2000) and ratio cut (Hagen and Kahng 1992) all transform the data into a weighted, undirected graph based on pairwise similarities. Clustering is then accomplished by spectral or graphtheoretic optimization procedures. See (Ding and He 2005; Li and Ding 2006) for a discussion of the relations among these graph-based methods, and also the connections to nonnegative matrix factorization. All of these methods involve a two-stage process in which an data graph is formed from the data, and then various optimization procedures are invoked on this fixed input data graph. A disadvantage of this two-stage process is that the final clustering structures are not represented explicitly in the data graph (e.g., graph-cut methods often use K-means algorithm to post-process the ∗To whom all correspondence should be addressed. This work was partially supported by US NSF-IIS 1117965, NSFIIS 1302675, NSF-IIS 1344152, NSF-DBI 1356628, NIH R01 AG049371. Copyright c © 2016, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. results to get the clustering indicators); also, the clustering results are dependent on the quality of the input data graph (i.e., they are sensitive to the particular graph construction methods). It seems plausible that a strategy in which the optimization phase is allowed to change the data graph could have advantages relative to the two-phase strategy. In this paper we propose a novel graph-based clustering model that learns a graph with exactly k connected components (where k is the number of clusters). In our new model, instead of fixing the input data graph associated to the affinity matrix, we learn a new data similarity matrix that is a block diagonal matrix and has exactly k connected components—the k clusters. Thus, our new data similarity matrix is directly useful for the clustering task; the clustering results can be immediately obtained without requiring any post-processing to extract the clustering indicators. To achieve such ideal clustering structures, we impose a rank constraint on the Laplacian graph of the new data similarity matrix, thereby guaranteeing the existence of exactly k connected components. Considering both L2-norm and L1norm objectives, we propose two new clustering objectives and derive optimization algorithms to solve them. We also introduce a novel graph-construction method to initialize the graph associated with the affinity matrix. We conduct empirical studies on simulated datasets and seven real-world benchmark datasets to validate our proposed methods. The experimental results are promising— we find that our new graph-based clustering method consistently outperforms other related methods in most cases. Notation: Throughout the paper, all the matrices are written as uppercase. For a matrix M , the i-th row and the ij-th element of M are denoted by mi and mij , respectively. The trace of matrix M is denoted by Tr(M). The L2-norm of vector v is denoted by ‖v‖2, the Frobenius and the L1 norm of matrix M are denoted by ‖M‖F and ‖M‖1, respectively. New Clustering Formulations Graph-based clustering approaches typically optimize their objectives based on a given data graph associated with an affinity matrix A ∈ Rn×n (which can be symmetric or nonsymmetric), where n is the number of nodes (data points) in the graph. There are two drawbacks with these approaches: (1) the clustering performance is sensitive to the quality of the data graph construction; (2) the cluster structures are not explicit in the clustering results and a post-processing step is needed to uncover the clustering indicators. To address these two challenges, we aim to learn a new data graph S based on the given data graph A such that the new data graph is more suitable for the clustering task. In our strategy, we propose to learn a new data graph S that has exactly k connected components, where k is the number of clusters. In order to formulate a clustering objective based on this strategy, we start from the following theorem. If the affinity matrix A is nonnegative, then the Laplacian matrix LA = DA − (A + A)/2, where the degree matrix DA ∈ Rn×n is defined as a diagonal matrix whose i-th diagonal element is ∑ j(aij + aji)/2, has the following important property (Mohar 1991; Chung 1997): Theorem 1 The multiplicity k of the eigenvalue zero of the Laplacian matrix LA is equal to the number of connected components in the graph associated with A. Given a graph with affinity matrix A, Theorem 1 indicates that if rank(LA) = n − k, then the graph is an ideal graph based on which we already partition the data points into k clusters, without the need of performing K-means or other discretization procedures as is necessary with traditional graph-based clustering methods such as spectral clustering. Motivated by Theorem 1, given an initial affinity matrix A ∈ Rn×n, we learn a similarity matrix S ∈ Rn×n such that the corresponding Laplacian matrix LS = DS−(S+S)/2 is constrained to be rank(LS) = n − k. Under this constraint, the learned S is block diagonal with proper permutation, and thus we can directly partition the data points into k clusters based on S (Nie, Wang, and Huang 2014). To avoid the case that some rows of S are all zeros, we further constrain the S such that the sum of each row of S is one. Under these constraints, we learn that S that best approximates the initial affinity matrixA. Considering two different distances, the L2-norm and the L1-norm, between the given affinity matrix A and the learned similarity matrix S, we define the Constrained Laplacian Rank (CLR) for graph-based clustering as the solution to the following optimization problem: JCLR L2 = min ∑ j sij=1,sij≥0,rank(LS)=n−k ‖S −A‖2F (1) JCLR L1 = min ∑ j sij=1,sij≥0,rank(LS)=n−k ‖S −A‖1. (2) These problems seem very difficult to solve since LS = DS − (S +S)/2, and DS also depends on S, and the constraint rank(LS) = n−k is a complex nonlinear constraint. In the next section, we will propose novel and efficient algorithms to solve these problems. Optimization Algorithms Optimization Algorithm for Solving JCLR L2 in Eq. (1) Let σi(LS) denote the i-th smallest eigenvalue of LS . Note that σi(LS) ≥ 0 because LS is positive semidefinite. The problem (1) is equivalent to the following problem for a large enough value of λ: min ∑ j sij=1,sij≥0 ‖S −A‖2F + 2λ k ∑", "title": "" }, { "docid": "0102748c7f9969fb53a3b5ee76b6eefe", "text": "Face veri cation is the task of deciding by analyzing face images, whether a person is who he/she claims to be. This is very challenging due to image variations in lighting, pose, facial expression, and age. The task boils down to computing the distance between two face vectors. As such, appropriate distance metrics are essential for face veri cation accuracy. In this paper we propose a new method, named the Cosine Similarity Metric Learning (CSML) for learning a distance metric for facial veri cation. The use of cosine similarity in our method leads to an e ective learning algorithm which can improve the generalization ability of any given metric. Our method is tested on the state-of-the-art dataset, the Labeled Faces in the Wild (LFW), and has achieved the highest accuracy in the literature. Face veri cation has been extensively researched for decades. The reason for its popularity is the non-intrusiveness and wide range of practical applications, such as access control, video surveillance, and telecommunication. The biggest challenge in face veri cation comes from the numerous variations of a face image, due to changes in lighting, pose, facial expression, and age. It is a very di cult problem, especially using images captured in totally uncontrolled environment, for instance, images from surveillance cameras, or from the Web. Over the years, many public face datasets have been created for researchers to advance state of the art and make their methods comparable. This practice has proved to be extremely useful. FERET [1] is the rst popular face dataset freely available to researchers. It was created in 1993 and since then research in face recognition has advanced considerably. Researchers have come very close to fully recognizing all the frontal images in FERET [2,3,4,5,6]. However, these methods are not robust to deal with non-frontal face images. Recently a new face dataset named the Labeled Faces in the Wild (LFW) [7] was created. LFW is a full protocol for evaluating face veri cation algorithms. Unlike FERET, LFW is designed for unconstrained face veri cation. Faces in LFW can vary in all possible ways due to pose, lighting, expression, age, scale, and misalignment (Figure 1). Methods for frontal images cannot cope with these variations and as such many researchers have turned to machine learning to 2 Hieu V. Nguyen and Li Bai Fig. 1. From FERET to LFW develop learning based face veri cation methods [8,9]. One of these approaches is to learn a transformation matrix from the data so that the Euclidean distance can perform better in the new subspace. Learning such a transformation matrix is equivalent to learning a Mahalanobis metric in the original space [10]. Xing et al. [11] used semide nite programming to learn a Mahalanobis distance metric for clustering. Their algorithm aims to minimize the sum of squared distances between similarly labeled inputs, while maintaining a lower bound on the sum of distances between di erently labeled inputs. Goldberger et al. [10] proposed Neighbourhood Component Analysis (NCA), a distance metric learning algorithm especially designed to improve kNN classi cation. The algorithm is to learn a Mahalanobis distance by minimizing the leave-one-out cross validation error of the kNN classi er on a training set. Because it uses softmax activation function to convert distance to probability, the gradient computation step is expensive. Weinberger et al. [12] proposed a method that learns a matrix designed to improve the performance of kNN classi cation. The objective function is composed of two terms. The rst term minimizes the distance between target neighbours. The second term is a hinge-loss that encourages target neighbours to be at least one distance unit closer than points from other classes. It requires information about the class of each sample. As a result, their method is not applicable for the restricted setting in LFW (see section 2.1). Recently, Davis et al. [13] have taken an information theoretic approach to learn a Mahalanobis metric under a wide range of possible constraints and prior knowledge on the Mahalanobis distance. Their method regularizes the learned matrix to make it as close as possible to a known prior matrix. The closeness is measured as a Kullback-Leibler divergence between two Gaussian distributions corresponding to the two matrices. In this paper, we propose a new method named Cosine Similarity Metric Learning (CSML). There are two main contributions. The rst contribution is Cosine Similarity Metric Learning for Face Veri cation 3 that we have shown cosine similarity to be an e ective alternative to Euclidean distance in metric learning problem. The second contribution is that CSML can improve the generalization ability of an existing metric signi cantly in most cases. Our method is di erent from all the above methods in terms of distance measures. All of the other methods use Euclidean distance to measure the dissimilarities between samples in the transformed space whilst our method uses cosine similarity which leads to a simple and e ective metric learning method. The rest of this paper is structured as follows. Section 2 presents CSML method in detail. Section 3 present how CSML can be applied to face veri cation. Experimental results are presented in section 4. Finally, conclusion is given in section 5. 1 Cosine Similarity Metric Learning The general idea is to learn a transformation matrix from training data so that cosine similarity performs well in the transformed subspace. The performance is measured by cross validation error (cve). 1.1 Cosine similarity Cosine similarity (CS) between two vectors x and y is de ned as: CS(x, y) = x y ‖x‖ ‖y‖ Cosine similarity has a special property that makes it suitable for metric learning: the resulting similarity measure is always within the range of −1 and +1. As shown in section 1.3, this property allows the objective function to be simple and e ective. 1.2 Metric learning formulation Let {xi, yi, li}i=1 denote a training set of s labeled samples with pairs of input vectors xi, yi ∈ R and binary class labels li ∈ {1, 0} which indicates whether xi and yi match or not. The goal is to learn a linear transformation A : R → R(d ≤ m), which we will use to compute cosine similarities in the transformed subspace as: CS(x, y,A) = (Ax) (Ay) ‖Ax‖ ‖Ay‖ = xAAy √ xTATAx √ yTATAy Speci cally, we want to learn the linear transformation that minimizes the cross validation error when similarities are measured in this way. We begin by de ning the objective function. 4 Hieu V. Nguyen and Li Bai 1.3 Objective function First, we de ne positive and negative sample index sets Pos and Neg as:", "title": "" }, { "docid": "61ad35eaee012d8c1bddcaeee082fa22", "text": "For realistic simulation it is necessary to thoroughly define and describe light-source characteristics¿especially the light-source geometry and the luminous intensity distribution.", "title": "" }, { "docid": "54663fcef476f15e2b5261766a19375b", "text": "In this study, performances of classification techniques were compared in order to predict the presence of coronary artery disease (CAD). A retrospective analysis was performed in 1245 subjects (865 presence of CAD and 380 absence of CAD). We compared performances of logistic regression (LR), classification and regression tree (CART), multi-layer perceptron (MLP), radial basis function (RBF), and self-organizing feature maps (SOFM). Predictor variables were age, sex, family history of CAD, smoking status, diabetes mellitus, systemic hypertension, hypercholesterolemia, and body mass index (BMI). Performances of classification techniques were compared using ROC curve, Hierarchical Cluster Analysis (HCA), and Multidimensional Scaling (MDS). Areas under the ROC curves are 0.783, 0.753, 0.745, 0.721, and 0.675, respectively for MLP, LR, CART, RBF, and SOFM. MLP was found the best technique to predict presence of CAD in this data set, given its good classificatory performance. MLP, CART, LR, and RBF performed better than SOFM in predicting CAD in according to HCA and MDS. 2006 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "af9768101a634ab57eb2554953ef63ec", "text": "Very recently, there has been a perfect storm of technical advances that has culminated in the emergence of a new interaction modality: on-body interfaces. Such systems enable the wearer to use their body as an input and output platform with interactive graphics. Projects such as PALMbit and Skinput sought to answer the initial and fundamental question: whether or not on-body interfaces were technologically possible. Although considerable technical work remains, we believe it is important to begin shifting the question away from how and what, and towards where, and ultimately why. These are the class of questions that inform the design of next generation systems. To better understand and explore this expansive space, we employed a mixed-methods research process involving more than two thousand individuals. This started with high-resolution, but low-detail crowdsourced data. We then combined this with rich, expert interviews, exploring aspects ranging from aesthetics to kinesthetics. The results of this complimentary, structured exploration, point the way towards more comfortable, efficacious, and enjoyable on-body user experiences.", "title": "" } ]
scidocsrr